Note: This text is provided as a courtesy. It has been automatically translated using software and may not have been proofread. The English language version is considered the official version and you can find the most up-to-date information there.

Scottish Summit 2021

February 27, 2021 | 8:00 am (CET)–February 27, 2021 | 5:00 pm (CET)

EMEA (Europe, Middle-East and Africa)
United Kingdom
Start: February 27, 2021 | 8:00 am (CET)
End:  February 27, 2021 | 5:00 pm (CET)

About this Event

Join Ben Menesi at Scottish Summit 2021 as he presents “Protecting Microsoft Teams from Cyber Security Threats – a Practical Guide”

Who to expect on-stage, at our booth & on the showfloor

Our sessions

27th February, 2021

9:00 am – 10:00 am

Protecting Microsoft Teams from Cyber Security Threats – a Practical Guide

While Microsoft Teams adoption is growing incredibly fast with over 115 million active daily users in 2020, some highly regulated organizations are often hesitant to deploy Teams or limit the deployment of Teams due to information security concerns and possible cyber security threats. Supporting any platform with that many daily users you can be sure that hackers are watching closely and will do everything they can to gain a foothold in your environment.

During this presentation we will cover real-world cyber security threats as well as strategies for hardening your security configurations to protect your Teams deployment. We will also cover the available Microsoft add-on solutions to improve security, including Advanced Threat Protection (ATP), increased logging options, and Azure AD P1 licenses that improve Teams governance capabilities. Some of the topics we’ll discuss:

  • Credential theft campaigns
  • Identity spoofing for user impersonation
  • Man-in-the-middle attacks
  • Locking down 3rd party application implementations
  • Conditional access policies
  • Permission management settings
  • Information boundary configurations
  • And more…

You’ll learn how hackers think, and how you can gain the upper hand by preparing and training your users for the most common cyber security exploits as well as leveraging the best Microsoft tools available to mitigate both external and internal security risks.

Ben Menesi

You may also be interested in