ThirdSpace ThirdSpace
ThirdSpace Contact Us
Close 0 Reset Search Run Search What are you looking for? Type at least three characters to search. Filter Search Results
  • All Content
  • Blog
  • Page
  • Case Studies
  • Event
  • Resources
  • News
  • Careers
  • Access Centre
  • Technologies
  • Workshops
  • Service
  • Solutions
  • People
Load more

Agenda

Wednesday, 6 October
Wednesday, 6 October 09:00 – 09:30

Registration and virtual orientation

09:30 – 09:40

Welcome to the ThirdSpace Summit

Lewis Coburn, Marketing Manager and David Guest, Technology Evangelist
09:40 – 10:30

What’s new in Microsoft identity, Azure AD, and external identities?

Keynote
10:30 – 10:40

Client stories – "It's good to talk" with BT plc about external identity (Azure AD B2C / B2B)

Keynote
10:40 – 11:00

Decentralised digital Identity masterclass (Azure directory verifiable credentials)

11:00 – 11:10

Have a break, have a chit chat

11:40 – 12:10

The promised land of zero trust - and how to get there

12:10 – 12:20

Test

12:20 – 12:50

Cyber Threats SOS – A DIY or MSS approach?

12:50 – 1:00

Closing remarks

1:00 - 1:30

Munch and mingle

Grab a bite and browse the exhibitor booths. And don't forget to check out the various ‘lunch and learn’ chat rooms in our networking lounge.
1:30 – 2:30 Session one workshops – take your pick

Choose ONE workshop between the 1:30 – 2:30 time slot.

We’ve scheduled a mix of business value, technical and cross-functional workshops to suit different interest areas within your organisation.

If you’ve come as a group, it’s time to split up and cover all bases! Can’t choose? They all look amazing? Don’t worry, they’re all being recorded, and you can watch them back on-demand at your leisure.

Decentralised identity management is the future

Building zero trust into your organisation

Harness the power of Azure AD External Identities

Up close and personnel - connecting all apps and users

Unleashing the power of Azure Sentinel

Changing user behaviour for the new remote working norm

2:40 – 3:40 Session two workshops – take your pick

Choose ONE workshop between the 2:40 – 3:40 time slot.

Enjoy a mix of business value, technical and cross-functional workshops - helping to tackle a range of business challenges.

The choice conundrum? Don’t worry if there’s more than one workshop you’d like to watch. They’re all being recorded for easy on-demand viewing.

IGA ROI – Understand the real value of identity governance

No CISO? No problem…

The Workshop Hall
Mat Richards, Head of Mobility and Security
Perfect for organisations in need of a CISO type role.

A masterclass on how to elevate responsibility for security and compliance out of the traditional IT silo. This workshop also features Mark Dennis, Managing Director (Evolve North).
More

Are you struggling with incident management, subject access requests, compliance auditing, building out assurance frameworks or increasing security awareness at board level?

We’ll showcase a brand new ‘virtual CISO’ managed service – perfect for uplifting your security and compliance processes.

Learn how a CISO-as-a-service model can help you:

  • Add 100+ years or extensive compliance experience to your leadership team, including handling ICO, FCA, PCI DSS and more
  • Provide better ROI and scalability vs. a full time CISO resource
  • Elevate security and compliance risks and reporting at board level
  • Improve security awareness throughout the organisation and avoid silos

It’s identity management, Jim, but not as we know it

The Workshop Hall
Simon Veale, Identity Architect
Not just for the Trekkies…

Discover a new tool to turbo-charge your identity systems with intelligent reporting and management solutions your users and admins will love. This workshop is also delivered by Gwyn Jenkins, Support Lead.
More

If you feel the pain from identity management health, identity reporting, root cause analysis, regression testing and high levels of support calls, then this is the session for you.

Simon and Gwyn will demonstrate how you can bring identity reporting intelligence to the Microsoft stack. They’ll show you how Identity Panel and Service Panel solutions from SoftwareIDM can automate a lot of those painful identity management processes – and reduce calls into your support desk.

This workshop includes technical demonstrations and a chance for an in-depth Q&A with our in-house experts.

Do you have a plan for PIM and PAM?

The Workshop Hall
Dave Guest, Technology Evangelist
In the post-COVID remote working world, effective management of privileged access to your sensitive data and systems just got a whole lot more important. Do you have a plan? More

People have been talking about ‘least privilege’ for years. But how do you manage it and how do people get just the right amount of access they need – for the right amount of time?

Dave will demonstrate how privileged identity management (PIM) and privileged access management (PAM) work together to solve your complex access challenges – allowing individuals access to administer services using only the access privileges that they need.

Dave will also highlight key implementation considerations.

Mobile device and desktop management – post COVID-19

The Workshop Hall
Keynote
Tom Waller, Security Architect
Your one-stop masterclass in secure device management in the new remote working world. Discover Microsoft’s latest developments with Endpoint Manager, Intune, Secure Modern Desktop, autopilot and more… More

In the remote working world, you can still achieve seamless productivity without compromising on security.

Our resident enterprise mobility expert, Tom Waller, will demonstrate how to provide a seamless and secure end-to-end device management experience.

Tom will show you the joined up security and productivity features of Windows 10 and Microsoft Endpoint Manager.

This workshop includes a demonstration. See how to provision and set-up new user equipment and devices in a remote working world using autopilot and Microsoft Modern Desktop principles.

In-house vs. Managed Security Services – Your questions answered

The Workshop Hall
Greg Heard, Security Managed Services Lead
Greg addresses key operational, commercial and assurance factors that organisations must consider when building a threat monitoring and incident response capability. More

If you have questions about the benefits and viability of outsourcing certain cyber security process vs. managing in-house – this is the session for you!

Understand the technical, people, process, and hidden costs of setting up and maintaining an in-house security operations centre (SOC) or SIEM.

Our resident security managed services expert Greg Heard will share his 20+ years of experience in the sector, discussing common questions and key considerations all organisation must address when considering /selecting the perfect managed security partner.

3:50 - 4:50 Session three workshops – take your pick

Choose ONE workshop between the 3:50 – 4:50 time slot.

Enjoy our mix of business value, technical and cross-functional workshops - helping to tackle a range of business challenges.

The choice conundrum? Don’t worry if there’s more than one workshop you’d like to watch. They’re all being recorded for easy on-demand viewing.

The path to passwordless (authentication)

The Workshop Hall
Dave Guest, Technology Evangelist
Find out how to fix your biggest security black hole.

Dave takes you on a voyage through MFA and modern authentication, including demonstrations of Yubico’s passwordless authentication solutions. This workshop is also delivered by Nic Sarginson, Principle Solutions Engineer (Yubico).
More

Passwords are known as the weakest link for enterprise security.

‘qwerty’, ‘mypassword’, and ‘covid19’ are all examples of passwords that should not be used (but probably are). Moving to ‘passwordless’ authentication is now possible.

Windows Hello for Business, FIDO2, and Microsoft Authenticator all are pieces of the jigsaw puzzle on moving away from a reliance on passwords.

But what are the requirements to make this work for you and where do you start?

Join Yubico and ThirdSpace to:

  • Examine the four options for authentication using a key
  • Discuss the future of the FIDO2 authentication standard
  • See the benefits of a truly passwordless approach to managing your user identities

Solving complex cross platform access governance with cloud PAM

The Workshop Hall
Joe Liptrot, Senior Architect
Understand how Saviynt’s Cloud PAM solution can integrate with Microsoft to significantly reduce your attack surface and mitigate risks while saving valuable time for service desk and managers. More

Allow identity to be the common denominator across cloud services, on-premises apps, and SaaS-based applications.

We’ll show you how Cloud PAM from Saviynt can integrate with Microsoft PIM to control and limit access to privileged resources. Get easy to apply ‘just-in-time’ access controls spanning on-premises and SaaS applications.

We’ll demonstrate how Cloud PAM can reduce your attack surface and risk while also improving your governance processes with a single pane of glass view of access and simplified processes.

Building a coordinated, fully integrated threat defence with MTP

The Workshop Hall
Paul Rouse, EMS Consultant
A masterclass on the new Microsoft Threat Protection solution.

We’ll get under the hood and show you how this integrated, holistic suite of tools can protect your organisation. This workshop is also delivered by Paul Rouse, Security Consultant.
More

Frustrated and confused by portal and product sprawl? Fed up of wasting precious resource on manual alert investigations?

Join us to learn how Microsoft Threat Protection automatically combines and correlates signals from endpoints, email, identity, and applications to supercharge your SOC capability – ensuring you can deal with sophisticated attacks.

Our experts walk through the investigatory experience to demonstrate how an advanced multistage attack is identified and remediated with minimal effort based on the power of MTP.

Witness the power of advanced hunting and custom detection rules – and come away with a clear understanding of where MTP can enhance your defences.

External Identity Masterclass - A closer look at new B2B and B2C developments in Azure AD

The Workshop Hall
Marcus Idle, Head of CIAM
Learn how you can use Azure AD B2C for flexible customer single sign-on and authentication across multiple platforms, while providing unparalleled security and scalability. More

Microsoft’s own external identity product managers will Join ThirdSpace’s resident expert Marcus Idle for a detailed look at the new Azure B2B and B2C functionality now brought together under the Microsoft’s new External Identities umbrella.

Learn how you can use external identities (or B2X) for flexible single sign-on and authentication across multiple platforms, while providing unparalleled security and scalability.

We’ll demonstrate access governance features and new detailed user sign-in (user flow) functionality.

‘Life in lockdown’ for your important information

The Workshop Hall
John Hur, Security Architect
Learn how Microsoft Information Protection helps you track, trace, classify, and protect sensitive information wherever it lives or travels. This workshop is also delivered by Mark Warnes (Senior Consultant) More

With more remote working enforced by lockdown, your data is being accessed from a wider range of locations and devices than ever before. How can you shield your data from exposure whilst supporting your users to be productive?

This workshop will look at how Microsoft Information Protection can be used to understand and indicate the sensitivity of your unstructured data, prevent it from leaving your trusted environment, and protect it wherever it is stored or accessed.

The secret sauce for delivering real business change

The Workshop Hall
Harini Bandara, Head of Business Transformation
Discover the 3 key ingredients of any successful technology change project. With a generous sprinkling of change management, culture, user behaviours and communication stirred in. More

Research demonstrates there are 3 key factors for project success:

  • Having strong sponsorship to ensure that the ‘motivation to change’ flows down from the top.
  • Strong project management to deliver the technical initiative according to set timeline and budget.
  • Adoption and change management, which puts a focus on the people and the way they work.

Many organisations are historically strong in one or two of these areas, but only the most successful resource each area equally.

In this workshop, we will show you the tools and tricks to align the 3 key factors and provide insight into the challenges faced by end-users as a result of many technology projects.

4:50 onwards

Ask the experts

Networking Lounge and exhibition
If you’re still hungry for more, find a ThirdSpacer, or one of our sponsors, in the exhibition hall or networking space. We’ll be available to help with any questions from the day.
Wednesday, 21 October
Wednesday, 6 October
Close
Register your place
Award-winning solutions Award-winning solutions

Eight-time winner of the Microsoft Partner of the Year Award for Identity Management, Enterprise Mobility, and Security and Compliance.

ThirdSpace Please upgrade your browser

You are seeing this because you are using a browser that is not supported. The ThirdSpace website is built using modern technology and standards. We recommend upgrading your browser with one of the following to properly view our website:

Windows Mac

Please note that this is not an exhaustive list of browsers. We also do not intend to recommend a particular manufacturer's browser over another's; only to suggest upgrading to a browser version that is compliant with current standards to give you the best and most secure browsing experience.