Wide angle shot of large gathering of people in a lobby

Microsoft Summit 2022

Agenda

to

Day one registration and orientation

Collect your name badge, grab a coffee, and catch up with other delegates before the morning sessions.

to

Welcome to the Microsoft Identity and Security Summit

Presenter: Lewis Coburn – Head of Marketing, Kocho

We kick off the Summit with details on our agenda and top tips on how to get the most out of the event.

to
tag icon

Keynote

The changing risk landscape and how Microsoft’s security portfolio is evolving

Presenter: Sarah Armstrong-Smith – Chief Security Advisor, Microsoft

Hear how Microsoft is evolving and improving its enterprise security and compliance offering to help organisations tackle increasing complexity and threats. Get the inside track on new tools in development to counter phishing and ransomware, and understand the holistic power of Microsoft’s security solutions.

Sarah addresses how Microsoft has been responding to the changing security landscape, from nation-state attacks and the war in Ukraine, and the urgent need to improve threat visibility and intelligence.

Learn about the tools Microsoft are developing to counter the rise in volume and sophistication of ransomware and phishing attacks.

to

Solving the compliance conundrum

Presenter: Mat Richards – Head of Mobility and Security, Kocho

Mat showcases Microsoft’s latest compliance suite developments. Whether you need to protect your sensitive data from malicious or accidental sharing, protect against ‘insider risk’ or simply utilise tools to improve auditing – our experts will show your the tools available.

to

Coffee break

to

Modernising security operations with unified SIEM and XDR

Presenter: Jacques Fourie – Director of Information Security, Kocho

Learn how you can empower security professionals to get ahead of today’s complex threat landscape with integrated SIEM and XDR tools from a single vendor – for holistic defence.

Jacques will highlight key use cases where Microsoft Sentinel and Defender work together to provide simple and seamless protection. He’ll also demonstrate how you can make modernised security operations a reality in your organisation.

to

Client stories: How Linc Cymru revolutionised threat protection and incident response with Sentinel

Presenter: Peter Murphy – Technology Manager, Linc Cymru

Hear how Linc Cymru, one of Wales’ most innovative housing associations, planned and deployed its Sentinel instance to boost threat defence and learn how it’s weaving in compliance controls to realise a holistic security vision.

to

Talking risks! How to ensure security takes priority on the board agenda

Presenter: Dave Guest – Senior Consultant and Tech Evangelist, Kocho

Dave reveals how to firmly establish security and compliance on The Board agenda. From advice on how to lower cyber insurance premiums to tips on improving executive-level awareness of compliance.

to

Client Stories: Security health checks enable global collaboration at Bupa

Presenter: Eleanor Sim – Director for Security Strategy and Architecture, Bupa

Learn more about how Kocho’s Security Posture Assessments helped Bupa better understand the security risks across 13+ global tenants, and how it played a key part in enabling global cross-tenant collaboration.

to

Lunch

Grab a bite, browse our exhibition, and talk with our partners and colleagues.

to

Workshops, Session One – take your pick

Choose ONE workshop between the 2:00 to 3:30 pm time slot.

  • Financial Services Strategy Workshop – INVITE ONLY

    Get Real: Planning and securing your cloud transformation journey in financial services – INVITE ONLY

    A strategic roundtable promoting discussion between financial services organisation decision-makers and Microsoft’s Chief Security Advisor, responsible for product development and direction for the Microsoft 365 security stack.

    Suitable for financial services and insurance organisations, this session will include a 20-minute thought-provoking presentation from Sarah, followed by Q&A and peer-to-peer discussion.

    Learn what other decision makers in your industry are planning to keep themselves protected, and share ideas on how to ensure compliance.

    Session hosts:

    • Sarah Armstrong-Smith – Chief Security Advisor, Microsoft
    • Amit Sinha – CTO for Private Equity, Microsoft
    • Dave Guest – Senior Consultant and Tech Evangelist, Kocho
    • Mark Dennis – Managing Director, Evolve North
  • Workshop 1

    Securing devices and endpoints in a remote working world

    Your one-stop masterclass in secure device management in the new remote working world. Discover Microsoft’s latest developments with Endpoint Manager, Intune, Secure Modern Desktop, autopilot, and more.

    In the remote working world, you can still achieve seamless productivity without compromising on security!

    Our resident enterprise mobility expert, Tom Waller, will demonstrate how to provide a seamless and secure end-to-end device management experience.

    Tom will show you the joined-up security and productivity features of Windows 10 and Microsoft Endpoint Manager.

    This workshop includes a demonstration. See how to provision and set up new user equipment and devices in a remote working world using autopilot and Microsoft Modern Desktop principles.


    Session host:

    • Tom Waller – Security Architect, Kocho
  • Workshop 2

    Turn compliance stress into compliance success

    Are you tired of dealing with subject access requests and compliance audits? If compliance is a thorn in your side, this session can help take the pain away. Our experts will take your questions and introduce you to approaches that will elevate compliance out of the traditional IT silo.

    This roundtable is perfect for organisations without defined compliance processes, no CISO, or where compliance is siloed within IT.

    Our experts will step you through Microsoft’s full compliance offering and any new developments in the last 12 months (including Purview). We’ll showcase tools and services that can work together across complex environments to improve visibility, enable better reporting, reduce risks, and protect sensitive data.

    We’ll share client use cases where these tools have been successfully deployed, and we’ll reveal some exciting new propositions that can help you manage and stay on top of your compliance obligations.


    Session hosts:

    • Mark Warnes – Security Architect, Kocho
    • Mark Dennis – Managing Director, Evolve North
  • Workshop 3

    Security Operations: In-house Vs. Outsourcing?

    Anna and Jacques address key operational, commercial and assurance factors that organisations must consider when building a threat monitoring and incident response capability.

    If you have questions about the benefits and viability of outsourcing your security operations for threat monitoring and incident response vs. managing in-house this is the session for you!

    Understand the full range of technical, people, and process considerations and discover the hidden costs of setting up and maintaining a security operations centre (SOC) or SIEM/SOAR.

    Our resident security services experts will share answers to common questions and key considerations all organisations must address when planning the security operations approach.


    Session hosts:

    • Anna Webb – Head of Managed Security, Kocho
    • Jacques Fourie – Director of Information Security, Kocho
  • Workshop 4

    How to fight phishing and optimise your Office 365 security

    Learn how Microsoft Defender for Office 365 can help with the prevention, detection, investigation, and holistic response to modern threats such as email compromise, credential phishing, ransomware and malware.

    Email, SaaS apps, and collaboration software are essential to the day-to-day running of your organisation. They’re also frequently exploited to target your users with phishing and social engineering attacks.

    In this session you will learn:

    • How to set tailored protection levels through fine-grained threat protection policies
    • Advanced reporting dashboards that give you the latest threat insights and recommendations
    • How to prevent threats in Office 365, improve efficiency, and respond at speed with automated threat response
    • The benefits of holistic Microsoft security protection vs point solutions for email security tools


    Session host:

    • Paul Rouse – Senior Security Consultant, Kocho
  • Workshop 5

    Hybrid/Cloud Security Masterclass

    Our experts will deep dive into Microsoft Defender for Cloud and Defender for Cloud Apps. Discover how to control access and protect your cloud apps and resources across Azure, AWS and Google.

    A perfect session for those looking to secure a multi-cloud workload in the new remote working world we live in.

    Learn more about how Microsoft’s security tools such as Defender for Cloud and Defender for Cloud Apps can help safeguard your cloud infrastructure, platforms and business apps (IaaS, PaaS and SaaS).


    Session host: 

    • Mat Richards – Head of Mobility and Security, Kocho
to

Coffee Break

to

Workshops, Session Two – take your pick

Choose ONE workshop between the 4:00 to 5:00 pm time slot.

  • Workshop 1

    Turn your passwordless plans into a super secure reality

    Find out how to fix your biggest security black hole – poor passwords and compromised credentials. Understand how a passwordless approach can help users get to apps and services faster, achieve improved security, and reduce IT support costs.

    Passwords are known as the weakest link for enterprise security, with 81% of successful attacks originating from compromised usernames or passwords.

    In this workshop, our experts will provide guidance on how to adopt and successfully deploy a passwordless strategy.

    • Learn what passwordless options are available and how they best serve different user scenarios
    • Understand how the technologies work and hear about the security standards underpinning them
    • Discover how to plan your passwordless strategy, how to best structure deployment, and top tips to make your transition a success.

    Includes demos of various passwordless technologies in action, including Windows Hello, Microsoft Authenticator and Yubikey’s FIDO2 passwordless keys.

     

    Session hosts:

    • Dave Guest – Technology Evangelist, Kocho
    • Nic Sarginson – Principle Solutions Engineer, Yubico
  • Workshop 2

    Achieving XDR: A deep dive into Microsoft Sentinel and Defender for Endpoint

    Learn how a modern Security Operations Centre (SOC), based on the latest Microsoft Defender and Sentinel technologies, can help you see and stop threats across your entire cloud and hybrid estate before they can do damage.

    In this practical workshop, Jacques Fourie, Kocho Director of Information Security, looks at the technologies and processes involved in transforming your business security operations.

    Learn how to:

    • Establish a single view of your security from across your hybrid estate
    • Quickly detect and respond to threats across your environment
    • Leverage AI, threat intelligence, and automation to proactively respond to threats

    Anna and Toby will also provide a detailed Sentinel and Defender demonstration – see first-hand the power of this cloud-native SIEM solution.

     

    Session hosts:

    • Jacques Fourie – Director of Information Security, Kocho
    • Anna Webb – Head of Managed Security, Kocho
    • Toby Goulden – Security Architect, Kocho
  • Workshop 3

    An introduction to Security Posture Assessments

    Understanding your current security state, gaps and weaknesses is the key starting point for any security strategy. In this session we’ll showcase Kocho’s Security Posture Assessment (SPA) and reveal how it can help you prioritise security investments, mitigate risk quickly and improve security ROI.

    Tom and Mat will showcase our SPA offering, including detailed dashboards and reports alongside our unique security workshop and discovery approach, used at leading clients such as Bupa, to help them visualise security posture and gaps, and articulate security priorities and board level.


    Session hosts:

    • Mat Richards – Head of Mobility and Security, Kocho
    • Tom Waller – Senior Security Architect, Kocho
  • Workshop 4

    An experts guide to Securing your IoT environment

    Our experts will unpick Microsoft’s various Azure IOT security tools to help you understand how to deliver end-to-end security across data, devices and connections.

    More detail to be confirmed…


    Session hosts:

    • Paul Rouse – Senior Security Consultant, Kocho
    • Mitesh Desai – Director of Technology, Kocho
  • Workshop 5

    Understanding Microsoft Information Protection

    The explosion of data across your organisation can make information protection and compliance a challenge. Join our session to hear about Microsoft Purview and Microsoft Information Protection. Learn how to discover, classify, and protect sensitive information wherever it lives or travels.

    In this session, Mark will walk you through the key facets of Microsoft Purview and how the different technologies combine to protect your sensitive information.

    • Know your data: Understand what tools are available and how you can use them to understand your data landscape across your hybrid environment.
    • Protect your data: Discover how to apply flexible protection with encryption and labelling to keep your information safe.
    • Preventing data loss: Learn how to detect insider risk and prevent accidental or malicious sharing of sensitive data.

    Session host:

    • Mark Warnes – Security Architect, Kocho
to

Evening Entertainment

Reading City Centre

We are working on something exciting for our evening entertainment. Take the chance to refuel and chat with friends new and old while taking part in some fun activities.

to

Day two registration and orientation

Pick up your name badge (again), grab another coffee, and catch up with peers ahead of day two’s sessions.

to

Reflections on day one, and what to look forward to on day two

Presenter: Lewis Coburn – Head of Marketing, Kocho

We recap on day one’s learnings and sessions and run through the identity and transformation agenda for day two.

to
tag icon

Keynote

The A-Z Roadmap for Microsoft’s identity strategy

Presenter: Brandon Murdoch – Partner Director of Engineering, Microsoft

Learn about Microsoft’s plans for enabling secure access in a connected world. We’ll cover Microsoft Entra, the Azure AD Roadmap, and the next steps for identity governance and decentralised identity.

to
tag icon

Keynote

A closer look at Cloud Infrastructure Entitlement Management (CIEM)

Presenter: Senior Microsoft Speaker to be confirmed…

We take a closer look at Microsoft’s plans for CIEM and unified privileged access following the acquisition of CloudKnox.

to

Coffee break

to

Protecting customer access: An experts guide to secure external identity management

Presenters: Marcus Idle – Head of External Identity, Kocho
Presenters: Jas Suri – Senior Program Manager, Microsoft

Marcus and Jas unpick the detail behind Microsoft’s external identity solution Azure AD B2C. Understand what the platform can offer in terms of easy/customisable authentication, security and privacy, ensuring compliance, integration with systems and CRMs, and more.

to

Client stories: Wrapping security around customer access at BT plc

Presenters: Roy Corneloues – Enterprise Architect, BT
Presenters: Claire Van Hinsbergh – Senior Software Engineering Manager, BT

Hear how Kocho and BT have been working together on the world’s biggest Azure B2C and Microsoft Sentinel rollout. – ensuring a secure and seamless modern experience for its customers.

to

The art of delivering successful technology projects and real business change

Presenter: Tony Simmonds – Head of Business Transformation, Kocho

Projects don’t end at the point you deploy your shiny new piece of technology. Your ultimate goal is to deliver real organisational change and to transform deeply ingrained user habits. We’ll show you how.

to

Lunch

Grab a bite, browse our exhibition, and talk with our partners and colleagues.

to

Workshops, Session One – take your pick

Choose ONE workshop between the 1:30 to 3:00 pm time slot.

  • Workshop 1

    Zero trust IAM – the key to successful cloud transformation

    Security and secure access start with a solid identity management framework. In this workshop, Dave will provide a deep dive on how to secure user authentication and grant timely privileged access.

    Rapid cloud adoption and a sharp rise in remote working have redefined your security perimeter. Identity is now the control plane – the conduit through which we control access to sensitive systems and data. But how can you trust it?

    Understand the key steps required to manage identities in complex/hybrid environments – through the lens of zero trust security.

    Learn about:

    • The key identity considerations to achieve zero trust
    • Methods to connect users and applications in Azure AD
    • Verifying identity in a hybrid world with MFA and conditional access
    • Building visibility and control over secure access

    Session hosts:

    • Dave Guest – Senior Architect and Tech Evangelist, Kocho
    • Mark Warnes – Senior Architect, Kocho
  • Workshop 2

    A deep dive into decentralised identity management

    Discover Microsoft’s roadmap for blockchain and decentralised identity. Understand how it reduces risk and improves compliance, trust, and transparency.

    Imagine managing one single user ID for the rest of time. Understand the differences between distributed and decentralised identity. Learn who holds and ratifies identities, and discover how this approach can be used to control access.

    Dee and Rohit will show you how Microsoft is planning to link users’ various distributed identities and access rights together to provide a secure method for people to provide details about themselves in a controlled manner. See how you can link these entities to systems, services, and companies to enable the user artefacts to be used as part of the verification/validation for seamless cross-platform access.

    Session hosts:

    • Rohit Gulati – Senior Identity Product Manager, Microsoft
    • Dee Bolt – Senior Consultant, Kocho
  • Workshop 3

    Identity management and reporting made easy

    Discover new tools to turbo-charge your identity systems with intelligent identity reporting and management solutions your users and admins will love.

    If you feel the pain from identity management health, identity reporting and defining the right metrics, root cause analysis, regression testing, and high levels of support calls, then this is the session for you.

    Shaun will demonstrate how you can bring identity reporting intelligence to the Microsoft stack. They’ll show you how Identity Panel and Service Panel solutions from SoftwareIDM can automate a lot of those painful identity management processes – and reduce calls to your support desk.

    This workshop includes technical demonstrations and a chance for an in-depth Q&A with our in-house experts.

    Session hosts:

    • Shaun McCann – Senior Identity Consultant, Kocho
    • Simon Veale – Senior Identity Consultant, Kocho
    • Peter Sidebotham – Vice President, SoftwareIDM
  • Workshop 4

    Managing privileged access, permissions, and entitlements in the cloud

    In the new remote working world, effective management of privileged access to your sensitive data and systems just got a whole lot more important. Do you have a plan? Join to learn more about Microsoft’s privileged access solutions.

    People have been talking about ‘least privilege’ for years – it’s an essential part of any zero trust strategy. But how do you manage it and how do people get just the right amount of access they need – and for the right amount of time?

    Our experts will demonstrate how privileged Identity Management (PIM) and Privileged Access Management (PAM) both work together to solve your complex access challenges – allowing individuals access to administer services using only the access privileges that they need.

    We’ll also deep-dive into Microsoft’s Permissions Management (CIEM) solution – showcasing how it can help you discover permission risks, and automate and apply intelligence to permissions management and detection of risky behaviour.

    Session hosts:

    • Tom Urwin – Senior Identity Architect, Kocho
    • Microsoft speaker to be confirmed…
  • Workshop 5

    The future of MIM and the art of the possible with your current MIM Portal!

    A workshop for the MIM hardcore. There’s been a lot of noise around the future of MIM and questions around the proper application of MIM for cloud and hybrid IAM. This session aims to address those questions.

    In this session, we’ll look to the future of Identity and Access Management – looking at a few of the areas where Microsoft is investing in IAM in the cloud and how this relates to what you can do in MIM.

    We’ll look at when, where, and why you should continue to use MIM, plus useful demos that show you new possibilities you may not know existed.

    Session host:

    • Ian Bassi – Senior Identity Consultant, Kocho
to

Coffee break

to

Workshops, Session Two – take your pick

Choose ONE workshop between the 3:30 to 5:00 pm time slot.

  • Workshop 1

    Cloud Identity Governance Masterclass

    Join our expert speakers as we take a deep dive into Microsoft and Saviynt’s identity governance features and capabilities. Including real-life use cases of which technology to use where, and some useful demonstrations of new and improved cloud governance features.

    In this session you’ll learn how Microsoft and Saviynt governance tools can be used to help you:

    • Govern user lifecycles with entitlement management
    • Easily review, grant and remove access across cloud apps
    • Spot and act of segregation of duties and access creed errors
    • Set up disclaimers, terms of use and other reporting to improve compliance

    Session hosts:

    • Marcus Idle – Head of External Identity, Kocho
    • Saviynt senior speaker to be confirmed…
  • Workshop 2

    CIAM / External Identity Management made easy

    Understand how to simplify the management of customer and partner identities beyond your organisation. And learn how to provide seamless and secure external access to your customer portals and collaborative solutions.

    Microsoft’s UK program manager for External Identity will join Kocho’s resident experts, Harsha and Jamie, for a detailed look at Microsoft’s changing external identities offering.

    Learn how you can use external identity management for flexible single sign-on and authentication across multiple platforms while providing unparalleled security, scalability, and user experiences.

    Learn how to:

    • Connect your workforce anywhere
    • Protect and govern customer access
    • Engage with your customers and partners
    • Integrate CIAM workflows into customer-facing SaaS apps

    Session hosts:

    • Harsha Doddamane – External Identity Consultant, Kocho
    • Jamie Vaughan – Senior External Identity Architect, Kocho
    • Jas Suri – Senior Program Manager, Microsoft
  • Workshop 3

    Securing your cloud transformation journey

    The steep rise of remote working is driving demand for rapid cloud and digital transformation. Dave will explain how to migrate to the cloud effectively and safely, with identity and security at the core of your approach.

    In the post-Covid business world, the benefits of the cloud have quickly moved from optional to necessary. But all the advantages of cloud transformation are tempered by the increased risk from your growing attack surface and both internal and external threats.

    In this workshop, our secure transformation experts show you why building your cloud estate from the ground up with security in mind will help you fully exploit the benefits of the cloud, whilst bolstering your security defences.

    Session host:

    • Dave Guest – Senior Consultant and Tech Evangelist, Kocho

     

  • Workshop 4

    Is your tech project really finished? How to drive user engagement and deliver lasting change

    According to McKinsey, only 30% of digital transformation projects result in improved corporate performance. Discover the key facets of any successful technology change project and learn how to put them into action.

    Research demonstrates there are 3 key factors for project success:

    • Strong sponsorship to ensure that the ‘motivation to change’ flows down from the top.
    • Robust project management to deliver the technical initiative according to a set timeline and budget.
    • Adoption and change management processes that focus on the people and the way they work.

    Many organisations can be strong in one or two of these areas, but only the most successful recognise the value and resource in each area effectively.

    In this workshop, we will show you the tools and tricks to align the 3 key factors and provide insight into the challenges faced by your real end-users.

    Session hosts:

    • Tony Simmonds – Head of Business Transformation, Kocho
    • Kyle Maynard – Business Change Consultant, Kocho
  • Workshop 5

    A guide to Microsoft Azure for cloud data analytics and business intelligence

    With more and more business data existing in the Cloud, the need to bring together multiple data sources and foster a culture of data-led decision-making is crucial to business success. This workshop will help you to make the business case for investing and plan your first steps.

    This workshop is a great starting point for those organisations that want to start harnessing the power of big data/cloud data to realise data-driven insights and find new opportunities for competitive advantage.

    Mitesh will showcase the ‘art of the possible’ for data analytics and business intelligence within Azure. He’ll provide tips and tricks to help you navigate some of the common pitfalls and challenges with bringing your data sources together. He’ll also talk through some real-life case studies showing how Kocho has bought this to life for our clients.

    Session hosts:

    • Mitesh Desai – Director of Technology, Kocho
    • Microsoft Azure speaker to be confirmed…
Butterfly overlay image

Register today. There’s a limited number of spaces for this year’s free-to-attend Microsoft Summit.