For the best web experience, please use IE11+, Chrome, Firefox, or Safari

The Experts Conference - TEC Talk Series

The Experts Conference (TEC) is where Active Directory and Microsoft 365 experts gather, learn and innovate. But when you’re not able to travel to one of the global TEC events in person, you can access the advanced, practical Microsoft platform insight TEC is known for via our TEC Talk sessions.

These free, 60-minute online sessions give you a sneak preview of the deep domain expertise you’ll find at in-person TEC events, but from the ease of your home or office. And just like in-person TEC events, these are delivered by Microsoft MVPs or seasoned Microsoft experts – with absolutely no product pitches. The only thing you have to gain is practical knowledge you can use right away, direct from experts.

Select your events


Online

Dec.

11

Time: 11:00 AM EST
Location: Microsoft Teams Meeting

Learn insider tips and tricks from Craig Bladwin and Joe Sharmer on migrating workstations to Entra ID. Gain insights into transitioning from traditional on-premises setups to Entra, as well as executing seamless Entra-to-Entra migrations. Join us for valuable insights and practical guidance on streamlining your workstation migration process.

Speakers: Craig Baldwin, Joe Sharmer and Trevor Taegder

Online

Jan.

9

Time: 11:00 AM EST
Location: Microsoft Teams Meeting

Attend our session on 10 AD misconfigurations that expose your environment. We'll cover critical oversights like configuration drift and Tier Zero asset identification. Discover the consequences and actionable strategies to mitigate them. Get practical guidelines to strengthen your AD configuration for better security and performance.

Speakers: Victor King and Bastiaan Verdonk

Online

Jan.

23

Time: 11:00 AM EST
Location: Microsoft Teams Meeting

Post-authentication attacks are on the rise and offer attackers the opportunity to satisfy strong security controls (such as MFA or compliant device requirements). Token artifacts take the essential role in the process of verifying identity of the user and obtaining an access to resources in Microsoft Entra. Therefore, it's important to consider token theft scenarios which allow to steal those artifacts and use them elsewhere.

Speaker: Thomas Naunheim

Online

Feb.

6

Time: 11:00 AM EST
Location: Microsoft Teams Meeting

What happens when a senior security architect, C-level advisor and product management director share lessons from the field about when Active Directory is attacked? Find out how to stop the damage and respond with purpose in this informative, dynamic and empathetic TEC Talk where the disaster recovery lifecycle will be dissected from the seats of a technical expert, an IT risk consultant and product owner. They will walk through the 360-degree experience of an attack to stress:

  • The criticality of having a well-rehearsed plan in the face of distress
  • The importance of alternative communications methods that include all affected teams
  • Why sorting out internal politics and governance beforehand is required for tech to execute
  • How business impact analysis and continuity ensure that your IT leaders have a voice and autonomy to execute recovery
  • Why the big red button of forest recovery should not be your first move

Speakers:

- Brian Hymer, Bastiaan Verdonk, Michael Keenan

Online

Feb.

20

Time: 11:00 AM EST
Location: Microsoft Teams Meeting

Join Microsoft Product Managers Jef Kazimer and Ramiro Calderon as they share insights gleaned from collaborating with global customers to tackle a wide array of identity and access challenges. Our exploration of identity management in the cloud era transcends authentication, encompassing the governance of access lifecycles for both cloud and on-premises systems. Within this evolution, Artificial Intelligence (AI) assumes a pivotal role in effectively governing a complex digital landscape at scale.

We'll delve into the progression of identity governance, moving from traditional on-premises methodologies to contemporary approaches in a technology-driven world. Our dialogue will underscore how the integration of Microsoft cloud technologies can streamline governance procedures across varied technological environments, including legacy systems.

Online

Mar.

6

Time: 11:00 AM EST
Location: Microsoft Teams Meeting

Customers are increasingly using the Power BI Service, which is located in their M365 tenant, for business reporting. This does make for ease of use in terms of both building and sharing reporting within the organization with the online reporting becoming a business dependency. This does then result in a need to move these reporting functions between tenants in the event of a tenant-to-tenant migration being performed in order to retain this functionality.

This session provides an understanding of the Power BI Service components and how these link together in order to plan and perform a migration of Power BI Workspaces. This would include the Workspace and permissions structure of Power BI, the Reports and their connection to the Semantic Models along with data connections, including on premises gateways.  You will also gain an understanding of Power BI migration pre-requisites and limitations that would need to be accounted for prior to embarking on a Power BI migration process.

Online

Mar.

20

Time: 11:00 AM EST
Location: Microsoft Teams Meeting

Discover the latest advancements in CAP (Conditional Access Policy) and understand why staying updated is crucial for your organization's security. In this session, we'll dive into the significance of configuring a strong conditional access baseline and demonstrate how integrating new features can enhance protection.
Through practical demonstrations, we'll unveil the exciting capabilities of the latest CAP enhancements. Attendees will gain actionable insights to begin crafting their organization's next-generation access policies.

Join us as we demystify the intricacies of CAP, empowering you to stay ahead of emerging threats and safeguard your organization's assets effectively. Let's explore the future of access management together.

Select one or more relevant webcast(s) you wish to attend before you register.

Please wait...

triangle-down check
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.