Modernizing Active Directory and Entra is essential for today's security landscape, but the transition can introduce significant risks. How do you consolidate and modernize without compromising your s
Find out how to stop the damage and respond with purpose in this informative, dynamic and empathetic TEC Talk where the disaster recovery lifecycle will be dissected from the seats of a technical expert, an IT risk consultant and product owner.
Cyber threats are evolving at an alarming pace, with nation-state actors and advanced adversaries weaponizing AI to breach organizations — not by breaking in, but by logging in. The urgency to p
Covering the progression of identity governance, moving from traditional on-premises methodologies to contemporary approaches in a technology-driven world.
This session provides an understanding of the Power BI Service components and how these link together in order to plan and perform a migration of Power BI Workspaces.
Every organization has Tier 0 assets—those critical accounts, groups, and objects that need to be safeguarded to keep your identify provider (Active Directory, Entra ID, etc.) out of malicious hands.
Token artifacts take the essential role in the process of verifying identity of the user and obtaining an access to resources in Microsoft Entra. It's important to consider token theft scenarios which allow to steal those artifacts and use them elsewhere.