Identity-related sessions at Microsoft Inspire 2021

Reading Time: 3 minutes

Microsoft Inspire is Microsoft’s annual event where it kicks off its fiscal year with its partner community. Inspire is Microsoft’s way to explain what’s coming in the year ahead and work together to find shared solutions for customers.

As all of Microsoft’s events will have a focus on online events until July 2021, Microsoft Inspire 2021 is also an online event. It’s free to attend and sessions are streamed at convenient times for several global regions.

As an identity consultant working for a Microsoft Partner, I feel Microsoft Inspire is a worthwhile event, as it helps me prepare for coming (shared) projects. During Inspire 2021, you can enjoy the following general and Identity-related sessions:

Theme sessions

TS03 Build a foundation of trust and security

Speakers: Rodney Clark, Vasu Jakkal, Lucas Joppa and Jenny Lay-Flurrie
Dates: Wednesday, July 14 9:30 PM – 10 PM CEST
            Thursday, July 15 1:30 PM – 2 PM CEST
Duration: 30 minutes

Trust is the foundation of successful business relationships. It is the key to unlocking innovation for your organization, and driving more inclusive, equitable, and sustainable growth for the world. Discover how you can earn your customers’ trust by securing their digital transformation and partnering with the world’s leading security company. And learn about our collective opportunity to build solutions and technologies that create a better future for everyone.

Breakout sessions

BRK122 Identity and endpoint management – a strong foundation for Zero Trust and profitability

Speakers: Gideon Bibliowicz and Irina Nechaeva
Dates: Thursday, July 15 7:30 PM – 8 PM CEST
            Friday, July 16 11:30 AM – 12 PM CEST
Duration: 30 minutes

Security has become top-of-mind for you and your customers in the face of advanced threats and evolution of hybrid work. Microsoft believes a Zero Trust framework is the best strategy to provide maximum security and flexibility, and it starts with a foundation of securing identities and endpoints. Come hear how this can be achieved with Azure AD and Microsoft Endpoint Manager. Microsoft shares how each can provide maximum business value and stories from other partners that have built successful practices around Zero Trust.

Connection Zone sessions

ATEBRK122 Ask the Experts: Identity and endpoint management – a strong foundation for Zero Trust and profitability

Speakers: Harish Aitharaju, Cedric Depaepe, Mayunk Jain and Irina Nechaeva
Dates: Thursday, July 15 8:30 PM – 9 PM CEST
            Friday, July 16 12:30 PM – 1 PM CEST
Duration: 30 minutes

Join Microsoft experts for a live Ask-the-Experts session following "Zero Trust foundations help jumpstart customers security journey and your business profitability."

On-demand sessions

OD122 Build a business around helping customers drive towards a Zero Trust framework

Speakers: Cedric Depaepe and Mandana Javaheri

Position Zero Trust framework as a key starting point to drive partner practices as they embrace security.

OD230 Go passwordless with Thales FIDO Devices and Microsoft

Speaker: Gregory Vigroux (Thales)

Organizations are facing challenges as they strive to enable permanent work from home, meet security regulations and protect their apps and data. Thales and Microsoft have partnered to help customers on their Zero Trust journeys and broaden the use of multi-factor authentication with a range of passwordless FIDO2 technologies. This session will cover how you can get started with your Passwordless strategy and understand the broad range of use cases supported by Thales identity protection solutions.

 

OD235 Role of IAM in securing the cloud

Speaker: Vivin Sathyan (ManageEngine)

In this session you will learn:

  1. Standardizing user onboarding / offboarding via automation to avoid common privilege escalation mistakes – AD/Exchange/M365 etc.
  2. Delegating tasks to technicians instead of delegating native privileges
  3. Enforce centralized granular password policies across Active Directory and cloud applications.
  4. Securing access to cloud applications via adaptive MFA and SSO.

leave your comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.