Latest Webinar:
TEC Talk: What’s New in Conditional Access Policies and Why You Should Care
Hosted by: Louis Mastelinck
Discover the latest advancements in CAP (Conditional Access Policy) and understand why staying updated is crucial for your organization’s security. In this session, we’ll dive into the significance of configuring a strong conditional access baseline and demonstrate how integrating new features can enhance protection.
Through practical demonstrations, we’ll unveil the exciting capabilities of the latest CAP enhancements. Attendees will gain actionable insights to begin crafting their organization’s next-generation access policies.
Join us as we demystify the intricacies of CAP, empowering you to stay ahead of emerging threats and safeguard your organization’s assets effectively. Let’s explore the future of access management together.
Past Webinars:
TEC Talk: What’s New in Conditional Access Policies and Why You Should Care
Hosted by: Louis Mastelinck
TEC Talk: 10 AD Misconfigurations That Will Expose Your Environment
Hosted by: Victor King and Bastiaan Verdonk
TEC Talk: Tips and Tricks for Migrating Workstations to Entra ID
Hosted by: Joe Sharmer, Craig Baldwin, and Trevor Taegder
TEC Talk: The Dark Corners of Microsoft 365 that Microsoft Ignores
Hosted by: Tony Redmond
TEC Talk: Fantastic Tokens in Microsoft Entra ID and How to Protect Them
Hosted by: Thomas Naunheim
TEC Talk: The Trauma That Binds US: AD Disaster Recovery
Hosted by: Brian Hymer, Bastiaan Verdonk, Michael Keenan
TEC Talk: Trust, Verify, and Govern: Advancing Beyond Authentication in the Cloud and AI Era
Hosted by: Ramiro Calderon and Jef Kazimer
TEC Talk: Understanding Power BI Tenant to Tenant Migration Concepts and Component Dependencies
Hosted by: Sean Visser
TEC Talk: Boost your M365 Administration & Security with AI
Hosted by: Curtis Johnstone & Habib Mankal
TEC Talk: Advanced Hypothesis-Based Threat Hunting with Microsoft Azure Solutions
Hosted by: Mike Janowski-Lorek
TEC Talk: Protecting Privileged User and Workload Identities in Entra ID
Hosted by: Thomas Naunheim
TEC Talk: Preparing for a Transition from Active Directory to Entra ID
Hosted by: Becky Cross
TEC Talk: Active Directory Modernization: A Journey to a Secure and Flexible Identity Infrastructure
Hosted by: Joe Sharmer & Julian Stephan
TEC Talk: Migrating T2T with Native Tools
Hosted by: Mike Weaver
TEC Talk: Tenant-to-Tenant Power BI Migrations: The Next Frontier
Hosted by: Sean Visser & Gary Hughes
TEC Talk: Controlling the Control Plane: Defining Gaps in Tier Zero to Shut Down Attack Paths
Hosted by: Justin Kohler
TEC Talk: Abusing Group Policy for Fun and Profit
Hosted by: Matthew Vinton
TEC Talk: 5 Steps to Embark on Your Zero Trust Journey with Microsoft 365
Hosted by: Adwoa Boateng-Kwakye & Jeff Bley
TEC Talk: Proper Password Protection within Active Directory and Azure Active Directory Environments
Hosted by: Darryl Baker
TEC Talk: AD-Based Attacks in 2023 – What We’ve Learned So Far
Hosted by: Paul Robichaux and Bryan Patton
Could an Active Directory disaster cost you $730k/hour
Hosted by: Patrick Ancipink, Alistair Holmes, and Matt Clarke
TEC Talk: What to Do About Exchange On-Premises After Microsoft Starts to Block Messages
Hosted by: Tony Redmond, Malte Schoch, and Backy Cross
TEC Talk: From Zero to Teams Hero: The Top 10 Must-Do Actions for Successful Teams Migration
Hosted by: Sofya Serna Perez & Randy Remple
TEC Talk: Active Directory, when old age is both a curse and a blessing
Hosted by: Michael Van Horenbeeck
TEC Talk: Five Things Microsoft 365 Security Administrators Should Do in 2023
Hosted by: Tony Redmond
Stop Cyberattacks Before They Start: Securing Your AD with Proactive GPO and Attack Path Management
Hosted by: Darryl Baker & Matthew Vinton
You’ve Migrated… But What Did you Leave Behind?
Hosted by: Sean McAvinue & Jason Jacobo
Watch on-Demand
Understanding the Microsoft 365 Kill Chain: Bad actor tactics and how to stay ahead. Hosted by: Shawn Barker and Chris Goosen
TEC Talk: Azure Attack Paths Explained
Hosted by: Andy Robbins
Watch On-Demand
TEC Talk: Lessons Learned in Merger and Acquisition Microsoft 365 Tenant Consolidation Projects
Hosted by: Mike Weaver and Jennifer LuPiba
Watch On-Demand
How to Restrict PST Files in Group Policy and MS Endpoint Manager
Hosted by: Mike Weaver and Chris Cahill
Watch On-Demand
TEC TALK: Shielding On-prem & Azure AD from Cyberattacks
Hosted by: Bryan Patton, Sean Metcalf and Michael Van Horenbeeck
Watch On-Demand
Microsoft Active Directory Disaster? Recover at Least Five Times Faster
Hosted by: Brian Hymer and Jack Poller
Watch On-Demand
How to Transfer PST Files to Office 365
Hosted by: Chris Cahill and Mike Weaver
Watch On-Demand
Office 365 Tenant Migration: Cutover or Staged?
Hosted by: Mike Weaver and Rich Dean
Watch On-Demand
How to Find All PST Files on Your Network
Hosted by: Mike Weaver
Watch On-Demand
How to Establish Coexistence in Cross-Tenant Migrations
Hosted by: Melissa Espinal and Rich Dean
Watch On-Demand
TEC TALK: Moving Beyond a SharePoint-only Mindset for Modern Compliance
Hosted by: Joanne C. Klein
Watch On-Demand
TEC Talk: The Truth About Tenant-to-Tenant Teams Migrations
Hosted by: Mike Weaver and Rich Dean
Watch On-Demand
HAFNIUM Exchange Server Hack: Why Patching Isn’t Enough & Where to Start Hunting
Hosted by: Jeff Guillet, Michael Van Horenbeeck,
Paul Robichaux and Bryan Patton
Watch On-Demand
Exchange Server Exploits: Experts Discuss Why Cloud Email Can be More Secure and How to Make the Transition
Hosted by: Tony Redmond, Paul Robichaux, Malte Schoch and Rich Dean
Watch On-Demand
TEC TALK: Seven Azure AD Premium Features Worth Paying for
Hosted by: Brian Desmond
Watch On-Demand
TEC TALK: Five Practical Uses of SharePoint Syntex
Hosted by: Joel Oleson
Watch On-Demand