Note: This text is provided as a courtesy. It has been automatically translated using software and may not have been proofread. The English language version is considered the official version and you can find the most up-to-date information there.

Microsoft 365 Virtual Marathon 2021

April 26, 2021 | 8:00 am (CET)–April 27, 2021 | 5:00 pm (CET)

Virtual Event
Start: April 26, 2021 | 8:00 am (CET)
End:  April 27, 2021 | 5:00 pm (CET)

About this Event

Microsoft 365 Virtual Marathon is a free, online, 60-hour event happening April 26-28, 2021.There will be content going the whole time with speakers from around the globe. This event is free for all wanting to attend. Join talks about the many different pieces of Microsoft 365, including Azure.

Who to expect on-stage, at our booth & on the showfloor

Our sessions

26th April, 2021

2:00 pm – 3:00 pm | Online

Protecting Microsoft Teams from Cyber Security Threats – a Practical Guide

While Microsoft Teams adoption is growing incredibly fast with over 80 million active daily users in 2020, some highly regulated organizations are often hesitant to deploy Teams or limit the deployment of Teams due to information security concerns and possible cyber security threats. Supporting any platform with that many daily users you can be sure that hackers are watching closely and will do everything they can to gain a foothold in your environment.

During this presentation we will cover real-world cyber security threats as well as strategies for hardening your security configurations to protect your Teams deployment. We will also cover the available Microsoft add-on solutions to improve security, including Advanced Threat Protection (ATP), increased logging options, and Azure AD P1 licenses that improve Teams governance capabilities. Some of the topics we’ll discuss:

  • Credential theft campaigns
  • Identity spoofing for user impersonation
  • Man-in-the-middle attacks
  • Locking down 3rd party application implementations
  • Conditional access policies
  • Permission management settings
  • Information boundary configurations
  • And more…

You’ll learn how hackers think, and how you can gain the upper hand by preparing and training your users for the most common cyber security exploits as well as leveraging the best Microsoft tools available to mitigate both external and internal security risks.

Ben Menesi

You may also be interested in