Microsoft’s Ignite 2021 Spring event kicks off in one week.
For 2020, Ignite is organized differently to align with the new reality. Microsoft has announced that they will organize virtual events only until July 2021. Instead of an in-person event, a virtual Ignite event is organized from Tuesday March 2nd to Thursday March 4th, 2021.
The big advantage for you, is that you can attend Ignite for free again, just like last year’s Microsoft Ignite.
As Identity geeks, we encourage you to attend the following Identity-related sessions at Microsoft Ignite 2021 Spring Edition:
FS195 Azure Active Directory: our vision and roadmap for strengthening Zero Trust defenses in the era of hybrid work
As cyberattacks get more sophisticated, securing hybrid work environments is more complex—and more critical. Adopting a Zero Trust approach and upgrading your identity infrastructure hardens your defenses now and for the long-term. In this demo-heavy, can’t-miss session, we’ll share how Azure AD helps you maximize control while enabling a seamless and secure user experience. Join us to see and learn how to eliminate passwords, simplify onboarding, and secure access to all your apps.
FS198 Security for All
Learn how to reduce complexity and defend your organization against business risk with innovations in security, compliance, identity, and management.
LRN250 Defend against threats in Teams
Microsoft Teams provides your users with a powerful cloud-based collaboration experience. In this session, you'll learn about the powerful tools that can help identify and protect your cloud-based services using Advanced Threat Protection (ATP), Cloud App Security, and Conditional Access.
LRN252 Plan, implement and administer conditional access
Conditional access gives a fine granularity of control over which users can do specific activities, access resources, and ensure data and systems are safe. This session will highlight how to plan and implement security defaults, test and troubleshoot conditional access policies implement application controls and session management as well as how to configure smart lockout thresholds.
Ask the Experts sessions
ATE-FS195 Azure Active Directory: our vision and roadmap for strengthening Zero Trust defenses in the era of hybrid work
Join this Ask the Expert session that corresponds to Featured Session FS195 “Azure Active Directory: our vision and roadmap for helping defend against advanced threats.”
ATE109 Deploying secure passwordless solutions
Join this Ask the Experts session for a live discussion with Microsoft experts on going passwordless in your organization. We will discuss deploying MFA, Windows Hello for Business, FIDO security keys, the Microsoft Authenticator application and more.
ATE112 Zero Trust – The proactive approach to cybersecurity
Join this Ask the Expert session that corresponds to on-demand session OD362 "Zero Trust – The proactive approach to cybersecurity" for a live discussion with Microsoft experts on how the Microsoft platform enables you to implement an end-to-end Zero Trust security model today.
Table Talk sessions
CON251 Future of Cybersecurity
Join this Teams Meeting to connect with the most experienced cybersecurity professionals in the community! Get familiar with the biggest mistakes in infrastructure and teamwork security, a hacker’s perspective of your security system and come away with suggestions & ideas on how to reach the next level of security in your workspaces. Unmute yourself, turn your camera on – No presentations here! Join the Cybersecurity Table Talk and be prepared for chat and a fun interactive discussion!
On Demand sessions
OD356 Taking identity and privacy to a new level | Verifiable Credentials with decentralized identity using blockchain
Today your identity and related credentials are spread across multiple directory services and institutions. Decentralized identity has the power to move identity lookups securely to blockchain’s distributed ledger to put YOU in control of your identity, credentials and privacy. In this demo-rich tour, we’ll show you how it works and how you can set this up to issue or verify credentials, along with the simple end user experience with their digital wallet.
Remote work and recent security attacks have heightened the need for a cloud first approach to identity and access management. On-premises applications and infrastructure can be targets for attackers. It’s time to upgrade to a cloud first approach, protecting your organization from compromise by connecting all your apps to Azure AD. Learn how you can protect your on-premises apps and upgrade your app authentication from legacy solutions like AD FS to Azure AD without modifying your apps.
Nitika Gupta and Dilip Radhakrishnan
As technology becomes increasingly sophisticated, so are hackers, continually working on new ways to exploit and compromise it. Recent incidents have taught us that we need to up-level our security strategy to be more proactive by identifying threats and addressing security weaknesses before an attack occurs. Learn how Zero Trust can help manage the evolving global threat landscape and embrace the "assume breach" mindset through thorough and continuous security monitoring of our environments.
Identity-related cybersecurity incidents make news regularly, and the attacks have become more sophisticated for organizations to keep up. The key to successful identity management is moving towards an identity-centric security strategy that guards against insider and outsider attacks. In this session, we will discuss winning strategies you can do today with Azure Active Directory and achieve a stronger security posture with greater control over access rights and privileges.
We have seen governments modernize their technology and tools in response to COVID-19. They are re-creating their Digital Transformation strategies with a sharp focus on digital services that are no longer dependent on physical offices and face-to-face interactions. In this session learn how governments are deploying secure technology solutions for authenticating citizen requests and program delivery, via business methods that are not dependent on presenting documents
Passwords are fundamentally broken, as they are among the weakest forms of authentication. Learn how to implement the latest security protocol innovations, pioneered by Microsoft and Yubico, and the best way to deliver trust at scale with strong, passwordless authentication. We will cover how to approach improving security and usability that is critical to today’s businesses.
Vivin Sathyan, ManageEngine
As users continue to work from their homes, following tasks have become the foundation of any IAM-centric organization:
- Enforcing centralized granular password policies across Active Directory and cloud applications
- Securing work from home using System and VPN MFA
- Standardizing user onboarding/ offboarding via automation to avoid common privilege escalation mistakes – AD/Exchange/M365/GSuite, etc.
- Delegating tasks to technicians instead of delegating native privileges
Join SailPoint CRO, Matt Mills and Microsoft’s President of US Enterprise Business, Matt Renner as they discuss the importance of identity in today’s new world and how the SailPoint – Microsoft partnership is solving the complex security and compliance needs of enterprise organizations. This winning combination of Microsoft’s comprehensive cloud offerings coupled with SailPoint’s AI-driven cloud identity, creates a secure foundation for digital transformation during times of change.