Identity-related sessions at Microsoft Ignite 2021 Spring Edition

Microsoft’s Ignite 2021 Spring event kicks off in one week.

For 2020, Ignite is organized differently to align with the new reality. Microsoft has announced that they will organize virtual events only until July 2021. Instead of an in-person event, a virtual Ignite event is organized from Tuesday March 2nd to Thursday March 4th, 2021.

The big advantage for you, is that you can attend Ignite for free again, just like last year’s Microsoft Ignite.

As Identity geeks, we encourage you to attend the following Identity-related sessions at Microsoft Ignite 2021 Spring Edition:

Live sessions

FS195 Azure Active Directory: our vision and roadmap for strengthening Zero Trust defenses in the era of hybrid work

Thursday, March 4, 2:00 AM – 2:30 AM CET 
Thursday, March 4 11:30 AM – 12:00 PM CET 
Joy Chik, Ramiro Calderon, Inbar Kobrinsky, Sana Noorani, Ricky Pullan and Preeti Rastogi

As cyberattacks get more sophisticated, securing hybrid work environments is more complex—and more critical. Adopting a Zero Trust approach and upgrading your identity infrastructure hardens your defenses now and for the long-term. In this demo-heavy, can’t-miss session, we’ll share how Azure AD helps you maximize control while enabling a seamless and secure user experience. Join us to see and learn how to eliminate passwords, simplify onboarding, and secure access to all your apps.

FS198 Security for All

Tuesday, March 2, 8:00 PM – 8:30 PM CET    
Wednesday, March 3, 5:30 AM – 6:00 AM CET 
Irina Nechaeva and Alym Rayani

Learn how to reduce complexity and defend your organization against business risk with innovations in security, compliance, identity, and management.

LRN250 Defend against threats in Teams

Tuesday, March 2, 10:00 PM – 11:15 PM CET
John Gruszczyk and Brett Polen

Microsoft Teams provides your users with a powerful cloud-based collaboration experience. In this session, you'll learn about the powerful tools that can help identify and protect your cloud-based services using Advanced Threat Protection (ATP), Cloud App Security, and Conditional Access.

LRN252 Plan, implement and administer conditional access

Wednesday, March 3, 10:30 AM – 11:45 AM CET
Stefan van der Wiele and Peter van Leeuwen

Conditional access gives a fine granularity of control over which users can do specific activities, access resources, and ensure data and systems are safe. This session will highlight how to plan and implement security defaults, test and troubleshoot conditional access policies implement application controls and session management as well as how to configure smart lockout thresholds.

Ask the Experts sessions

ATE-FS195 Azure Active Directory: our vision and roadmap for strengthening Zero Trust defenses in the era of hybrid work

Thursday, March 4, 5:30 AM – 6:00 AM CET 
Ramiro Calderon, Inbar Kobrinsky, Sana Noorani, Ricky Pullan and Preeti Rastogi

Join this Ask the Expert session that corresponds to Featured Session FS195 “Azure Active Directory: our vision and roadmap for helping defend against advanced threats.”

ATE109 Deploying secure passwordless solutions

Wednesday, March 3, 2:00 AM – 2:30 AM CET
Inbar Kobrinsky and Ricky Pullan

Join this Ask the Experts session for a live discussion with Microsoft experts on going passwordless in your organization. We will discuss deploying MFA, Windows Hello for Business, FIDO security keys, the Microsoft Authenticator application and more.

ATE112 Zero Trust – The proactive approach to cybersecurity

Wednesday, March 3, 8:00 PM – 8:30 PM CET 
Nitika Gupta and Mayunk Jain

Join this Ask the Expert session that corresponds to on-demand session OD362 "Zero Trust – The proactive approach to cybersecurity" for a live discussion with Microsoft experts on how the Microsoft platform enables you to implement an end-to-end Zero Trust security model today.

Table Talk sessions

CON251 Future of Cybersecurity

Thursday, March 4, 10:30 AM – 11:00 AM CET 

Alex Benoit, Mike Jankowski-Lorek, Paula Januszkiewicz, Gokan Ozcifci and Tomas Vileikis

Join this Teams Meeting to connect with the most experienced cybersecurity professionals in the community! Get familiar with the biggest mistakes in infrastructure and teamwork security, a hacker’s perspective of your security system and come away with suggestions & ideas on how to reach the next level of security in your workspaces. Unmute yourself, turn your camera on – No presentations here! Join the Cybersecurity Table Talk and be prepared for chat and a fun interactive discussion!

On Demand sessions

OD356 Taking identity and privacy to a new level | Verifiable Credentials with decentralized identity using blockchain

Joy Chik

Today your identity and related credentials are spread across multiple directory services and institutions. Decentralized identity has the power to move identity lookups securely to blockchain’s distributed ledger to put YOU in control of your identity, credentials and privacy. In this demo-rich tour, we’ll show you how it works and how you can set this up to issue or verify credentials, along with the simple end user experience with their digital wallet.

OD360 Prevent attacks by protecting your applications with Azure Active Directory

Jasmine Betthauser and Michelle Swafford

Remote work and recent security attacks have heightened the need for a cloud first approach to identity and access management. On-premises applications and infrastructure can be targets for attackers. It’s time to upgrade to a cloud first approach, protecting your organization from compromise by connecting all your apps to Azure AD. Learn how you can protect your on-premises apps and upgrade your app authentication from legacy solutions like AD FS to Azure AD without modifying your apps.

OD 362 Zero Trust – The proactive approach to cybersecurity

Nitika Gupta and Dilip Radhakrishnan

As technology becomes increasingly sophisticated, so are hackers, continually working on new ways to exploit and compromise it. Recent incidents have taught us that we need to up-level our security strategy to be more proactive by identifying threats and addressing security weaknesses before an attack occurs. Learn how Zero Trust can help manage the evolving global threat landscape and embrace the "assume breach" mindset through thorough and continuous security monitoring of our environments.

OD363 Winning Azure Active Directory strategies for identity, security, and governance

Rohini Goyal and Caroline Templeton

Identity-related cybersecurity incidents make news regularly, and the attacks have become more sophisticated for organizations to keep up. The key to successful identity management is moving towards an identity-centric security strategy that guards against insider and outsider attacks. In this session, we will discuss winning strategies you can do today with Azure Active Directory and achieve a stronger security posture with greater control over access rights and privileges.

OD386 Reimagining government services with digital identity

James Collins, Trever Esko and Ngozi Nwoko

We have seen governments modernize their technology and tools in response to COVID-19. They are re-creating their Digital Transformation strategies with a sharp focus on digital services that are no longer dependent on physical offices and face-to-face interactions. In this session learn how governments are deploying secure technology solutions for authenticating citizen requests and program delivery, via business methods that are not dependent on presenting documents

OD388 Enabling strong passwordless authentication at scale

Ashvin Saminathen

Passwords are fundamentally broken, as they are among the weakest forms of authentication. Learn how to implement the latest security protocol innovations, pioneered by Microsoft and Yubico, and the best way to deliver trust at scale with strong, passwordless authentication. We will cover how to approach improving security and usability that is critical to today’s businesses.

OD439 Role of IAM in securing the cloud

Vivin Sathyan, ManageEngine

As users continue to work from their homes, following tasks have become the foundation of any IAM-centric organization:

  • Enforcing centralized granular password policies across Active Directory and cloud applications
  • Securing work from home using System and VPN MFA
  • Standardizing user onboarding/ offboarding via automation to avoid common privilege escalation mistakes – AD/Exchange/M365/GSuite, etc.
  • Delegating tasks to technicians instead of delegating native privileges

OD449 SailPoint and Microsoft Fireside Chat: The Importance of Identity Governance

Matt Mills

Join SailPoint CRO, Matt Mills and Microsoft’s President of US Enterprise Business, Matt Renner as they discuss the importance of identity in today’s new world and how the SailPoint – Microsoft partnership is solving the complex security and compliance needs of enterprise organizations. This winning combination of Microsoft’s comprehensive cloud offerings coupled with SailPoint’s AI-driven cloud identity, creates a secure foundation for digital transformation during times of change.

leave your comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.