Salt Lake M365 Friday 2020

February 07, 2020 | 12:00 am

AMER (North, Central and South America) | United States
9750 S 300 W, Sandy

February 07, 2020 | 12:00 am

AMER (North, Central and South America) | United States
9750 S 300 W, Sandy

Featured Image - Salt Lake M365 Friday 2020

About this Event

VP, Products & Innovation, Ben Menesi will be presenting the following session at Salt Lake M365 Friday 2020.
Salt Lake M365 Friday 2020 (#M365Friday) is a free community‐focused technology event dedicated to educating and engaging members of the local technical community. With the expansion of the Microsoft 365 platform, the event now draws upon the expertise of IT professionals, developers and solutions architects who come together to share their real-world experiences, lessons learned, best practices, and general knowledge with other like‐minded individuals. These individuals bring invaluable experience and lessons across the broad suite of services Microsoft offers like: SharePoint, Microsoft Teams, PowerApps, Flow, Power BI, Azure, Dynamics and other Office applications.

Who to expect on-stage, at our booth & on the showfloor

Our sessions

February 7, 2020

12:00 am – 12:00 am

Office 365 in today’s digital threats landscape: attacks & remedies from a hacker
Ben Menesi

Office 365 environments are very attractive targets for attackers. So, it’s never been more important to understand how its security structure works, and how to best configure it.

In this in-depth session, we’ll run through real-time attack scenarios and examine common attack vectors. And then we’ll explore the various defense capabilities of Office 365, the MS Graph API, and Azure AD. We’ll deep-dive into external sharing, authentication options, third-party application security (what apps should and shouldn’t be able to do), and even some do’s and don’ts regarding Azure AD endpoints and authorization mechanisms.

You’ll walk away with a solid understanding of how to use the Office 365 defense tools at your disposal, such as the Attack Simulator and Threat Intelligence, as well as how they relate to real-world attacks.