Microsoft Summit 2022 | On-demand
Skip to content

Microsoft Summit 2022

Resources on-demand

arrow icon arrow icon

Experience summit from the comfort of your office chair. Scroll down to watch inspiring keynote presentations and download our expert workshop slide decks.

Circle overlay image
tag icon

Security Keynote

The changing threat landscape and how Microsoft’s security portfolio is evolving

Sarah Armstrong-Smith – Chief Security Advisor, Microsoft

Understand how Microsoft is evolving its integrated and automated enterprise security offerings to help organisations tackle the increasing complexity of threats.

Sarah addresses how Microsoft have been responding to the changing threat landscape, from nation state attacks and the war in Ukraine, to developing tools to counter the rise in volume and sophistication of ransomware and phishing attacks.

Circle overlay image

Identity Keynote

The A-Z Roadmap for Microsoft’s identity strategy

Rohit Gulati – Senior Identity Product Manager, Microsoft

Learn about Microsoft’s plans for enabling secure access in a connected world.

We’ll cover Microsoft Entra, the Azure AD Roadmap, and the next steps for identity governance and decentralised identity.

Workshops

Day 1: Security and compliance

Securing devices and endpoints in a remote working world

Your one-stop masterclass in secure device management in the new remote working world. Discover Microsoft’s latest developments with Endpoint Manager, Intune, Secure Modern Desktop, autopilot, and more.

Download slides

 

Security Operations: In-house Vs. Outsourcing?

Anna and Jacques address key operational, commercial and assurance factors that organisations must consider when building a threat monitoring and incident response capability.

Download slides

 

Hybrid/Cloud Security Masterclass

Our experts will deep dive into Microsoft Defender for Cloud and Defender for Cloud Apps. Discover how to control access and protect your cloud apps and resources across Azure, AWS and Google.

Download slides

Turn compliance stress into compliance success

Are you tired of dealing with subject access requests and compliance audits? If compliance is a thorn in your side, this session can help take the pain away. Our experts will take your questions and introduce you to approaches that will elevate compliance out of the traditional IT silo.

Download slides

 

How to fight phishing and optimise your Office 365 security

Learn how Microsoft Defender for Office 365 can help with the prevention, detection, investigation, and holistic response to modern threats such as email compromise, credential phishing, ransomware and malware.

Download slides

Turn your passwordless plans into a super secure reality

Find out how to fix your biggest security black hole – poor passwords and compromised credentials. Understand how a passwordless approach can help users get to apps and services faster, achieve improved security, and reduce IT support costs.

Download slides

 

An introduction to Security Posture Assessments

Understanding your current security state, gaps and weaknesses is the key starting point for any security strategy. In this session we’ll showcase Kocho’s Security Posture Assessment (SPA) and reveal how it can help you prioritise security investments, mitigate risk quickly and improve security ROI.

Download slides

 

Understanding Microsoft Information Protection

The explosion of data across your organisation can make information protection and compliance a challenge. Join our session to hear about Microsoft Purview and Microsoft Information Protection. Learn how to discover, classify, and protect sensitive information wherever it lives or travels.

Download slides

Achieving XDR: A deep dive into Microsoft Sentinel and Defender for Endpoint

Learn how a modern Security Operations Centre (SOC), based on the latest Microsoft Defender and Sentinel technologies, can help you see and stop threats across your entire cloud and hybrid estate before they can do damage.

Join our webinar

 

An experts guide to Securing your IoT environment

Our experts will unpick Microsoft’s various Azure IOT security tools to help you understand how to deliver end-to-end security across data, devices and connections.

Download slides

Workshops

Day Two: Identity

Zero trust IAM – the key to successful cloud transformation

Security and secure access start with a solid identity management framework. In this workshop, Dave will provide a deep dive on how to secure user authentication and grant timely privileged access.

Download slides

 

Identity management and reporting made easy

Discover how SoftwareIDM’s identity solutions can turbo-charge all your Identity and Access Management processes.

Download slides

 

The future of MIM and the art of the possible with your current MIM Portal!

A workshop for the MIM hardcore. There’s been a lot of noise around the future of MIM and questions around the proper application of MIM for cloud and hybrid IAM. This session aims to address those questions.

Download slides

A deep dive into decentralised identity management

Discover Microsoft’s roadmap for blockchain and decentralised identity. Understand how it reduces risk and improves compliance, trust, and transparency.

Download slides

 

Managing privileged access, permissions, and entitlements in the cloud

In the new remote working world, effective management of privileged access to your sensitive data and systems just got a whole lot more important. Do you have a plan? Join to learn more about Microsoft’s privileged access solutions.

Download slides

Cloud Identity Governance Masterclass

Join our expert speakers as we take a deep dive into Microsoft and Saviynt’s identity governance features and capabilities. Including real-life use cases of which technology to use where, and some useful demonstrations of new and improved cloud governance features.

Download slides

 

Securing your cloud transformation journey

The steep rise of remote working is driving demand for rapid cloud and digital transformation. Dave will explain how to migrate to the cloud effectively and safely, with identity and security at the core of your approach.

Download slides

CIAM / External Identity Management made easy

Understand how to simplify the management of customer and partner identities beyond your organisation. And learn how to provide seamless and secure external access to your customer portals and collaborative solutions.

Download slides

 

Is your tech project really finished? How to drive user engagement and deliver lasting change

According to McKinsey, only 30% of digital transformation projects result in improved corporate performance. Discover the key facets of any successful technology change project and learn how to put them into action.

Download slides

Butterfly overlay image

We’re here to help you on your journey towards becoming greater.

Get in touch to find out how.