ThirdSpace ThirdSpace
ThirdSpace
Close 0 Reset Search Run Search What are you looking for? Type at least three characters to search. Filter Search Results
  • All Content
  • Blog
  • Case Studies
  • Event
  • Resources
  • News
  • Careers
  • Access Centre
  • Technologies
  • Workshops
  • Solutions
  • People
Load more

Agenda

Our two-day programme is jam-packed with presentations and workshops, with keynotes from leading figures shaping Microsoft’s identity and security strategy.

Please note: the agenda is still being finalised and all sessions are subject to change.

Tuesday 15th October
Tuesday 15th October 09:30 - 09:45

Welcome to the ThirdSpace Identity, Access and Security Summit

NICK LAMIDEY, DIRECTOR (THIRDSPACE)
Taking you through the day’s proceedings, speakers, workshop format and news on the evening’s entertainment.
09:45 – 10:45

Microsoft's cloud identity roadmap with Azure AD

Keynote
ALEX SIMONS - PARTNER DIRECTOR OF PROGRAM MANAGEMENT (MICROSOFT IDENTITY DIVISION)
Alex will take you through Microsoft’s vision for hybrid and cloud identity and provide useful insight on how organisations similar to yours are transforming their identity approaches.
10:45 – 11:05

Networking break

THE BREAK AREA
Help yourself to complimentary refreshments and network with your peers.
11:05 – 11:30

Customer stories: Identity as the new control plane

SPEAKER TO BE CONFIRMED
Case Study. A closer look at how one of ThirdSpace’s customers integrated their entire JML process with MIM and Azure Active Directory Premium, plus how new Azure B2C and IoT solutions are helping secure their customer environment, too.
11:30 – 12:00

Stop managing identity governance in silos

Keynote
DIANA VOLERE – CHIEF EVANGELIST (SAVIYNT)
A high-level view on how you can enhance governance and compliance processes to manage all your identity and access governance needs in just one place – across your entire cloud estate.
12:00 – 12:25

Customer stories: Delighting customers with secure, hassle-free online experiences

SPEAKER TO BE CONFIRMED
More information pending.
12:25 – 12:40

Planning your long-term cloud identity strategy

DAVE GUEST - SENIOR ARCHITECT AND TECHNOLOGY EVANGELIST (THIRDSPACE)
Dave will talk through Azure cloud identity and how you can use it for your staff, partners and customers to accelerate access, improve scalability, achieve real control - and remain secure.
12:40 – 1:40

Networking lunch

THE BREAK AREA
Help yourself to a complimentary buffet lunch and network with your peers.
1:40 – 3:10 Pick your workshops

Choose ONE workshop between the 1:40 - 3:10 PM time slot. Spaces are limited so preferences will be offered on a first come, first served basis.

1. Planning your long-term identity strategy with Azure AD

DAVE GUEST and SIMON VEALE – Architects (THIRDSPACE)
Identity provisioning is constantly changing, and we can help you keep up, as you move from on-premises with MIM to cloud-based with Azure AD, SCIM, connectors and more. More

Azure AD can form the heart of your identity strategy.  It can control access to your Office 365 environment, cloud-based services such as ServiceNow, Concur and Salesforce – and also control access to internal, web-based apps.  Linking this to your partners and customers can provide a firm foundation for access in the future.

In this session, we will try to cover as much of this as we can (in 90 minutes) – focusing on:

  • Single sign-on (SSO) in the Cloud with password hash sync authentication (moving away from ADFS)
  • Azure governance and attestation
  • Entitlement management
  • Access reviews
  • The Microsoft Azure AD roadmap
  • Other cool future stuff such as biometrics, AI, passwordless, digital identity and blockchain.

2. Flexible identity reporting and management platforms that augment your existing identity systems

MATHEW RAWLINGS AND IAN BASSI - Architects (ThirdSpace)
Your admins want intelligent reporting, monitoring and auditing capabilities, instant, event-driven updates and a customised user-friendly interface. Learn how you can give this to them. More

Love Microsoft Identity Manager, but want more? Looking for ways to bring your other identity systems to life? We can help.

Users and admins love MIM’s powerful sync engine, user provisioning features and the resilience of a state-based identity solution – but even for one of our all-time favourite identity platforms, there are big gains to be made.

Come to this workshop to understand how Software IDM enhances managing your identity management solution, enabling you to:

  • View and report on identities across MIM and other connected systems
  • Easily generate powerful reports on user status and changes
  • Track changes to users and groups identities over time
  • Make instant modifications for emergency changes
  • Access an identity reporting portal from any device and location
  • Manage sync schedules and more via a web-based interface

3. Engaging your users and securing your customer or membership data with Microsoft Azure AD B2C

MARCUS IDLE - HEAD OF CIAM & IP DEVELOPMENT (THIRDSPACE)
Learn how you can better engage your customers or members with seamless login and access experiences, while meeting your security, scalability and compliance needs. More

Microsoft Azure AD B2C can both increase your level of customer or member engagement (normally measured in user registrations, user logins, etc.) and better protect your users and your website, along with a host of other benefits.

With scalable state-of-the-art security on tap, from securing your user credentials, to the use of modern protocols that guard against known attack vectors, to detecting suspicious user activity – you’re covered.

In this workshop we will:

  • Explain key features of B2C
  • Look at why customers choose B2C for customer authentication
  • Answer technical questions
  • Take a look at specific use cases raised by workshop attendees

You should come away with a good understanding of whether implementing B2C would be a useful step for your organisation.

4. The next generation in identity governance and administration (IGA)

DIANA VOLERE – CHIEF EVANGELIST (SAVIYNT)
Understand how Saviynt’s IGA solution, and its deep integration with Microsoft, can provide you with a powerful blend of provisioning, governance and compliance capabilities. More

Over 55% of IT leaders believe end users have more access than is required to do their jobs, and 44% are not confident in the compliance of their user access practices.

If you have holes in your identity governance and administration (IGA) policies and are concerned about compliance risks then join us for this deep dive into Saviynt’s IGA solution.

It’s your chance to learn:

  • How to get the most out of identities managed through Azure AD and MIM
  • How you can provide a single view of access governance across all apps and data
  • How to power access governance across vendor boundaries (e.g. Azure AD and AWS)
  • How IGA policies can integrate with existing MIM and Azure AD JML processes
  • How to accelerate identity governance and administration adoption
3:10 – 3:30

Networking break

THE BREAK AREA
Help yourself to complimentary refreshments and network with your peers.
3:30 – 5:00 Pick your workshop

Choose ONE workshop between the 3:30 – 5:00 PM time slot. Spaces are limited so preferences will be offered on a first come, first served basis.

1. Secure identity workshop: Protecting identities and securing access

JOHN HUR – ARCHITECT (THIRDSPACE)
Learn the components that make up a secure identity and how you can take advantage of new capabilities across the Microsoft stack. More

We know from industry analysts that 81% of successful cyber attacks begin with a compromised username and password. Protecting your identities has never been of more importance, but many customers still show low-adoption rates of traditional services like MFA, especially on privileged accounts.

In this session, we’ll learn how to plug the gaps in your secure identity strategy – utilising built-in tools and services to improve your posture and limit the attack surface.

We will cover:

  • Azure AD Identity Protection
  • Conditional access and MFA
  • Passwordless authentication
  • Intelligent alerting and powerful automated governance
  • The dangers of legacy authentication
  • How to tackle adoption challenges
  • Customer examples of a strong, secure identity

2. The five W’s of privileged access: A closer look at request-based privileged access

DAVE GUEST AND IAN BASSI - Architects (ThirdSpace)
Why do you have so many domain/global administrators all the time? Learn how PIM and PAM can power-up your access management, reduce attack surfaces and keep you more secure. More

Administration is a necessary evil.  Some tasks need to be completed by users with a high level of access, but do they need that access all the time?

Do they meet the relevant criteria:

  • Who are they?
  • Where are they?
  • What device are they using?
  • What service are they accessing?
  • Why do they need access?

Organisations often make the mistake of assuming they can manage privileged access in the same way they manage regular access. A better method may be to provide Just-in-Time (JIT) elevated access giving the relevant users Just Enough (JE) access.  Providing this both on-premises and in the Cloud can reduce an attack surface and keep you more secure.

In this session, we’ll discuss PIM and PAM technologies in depth working through common scenarios and use cases.

3. Governance for B2B and internal users with Microsoft Azure Active Directory

MARCUS IDLE – HEAD OF CIAM AND IP (THIRDSPACE)
As your organisation grows, often so does the complexity of your identity and access management (IAM) landscape. We’ll show you how to tame the IAM jungle with tools from Microsoft and ThirdSpace. More

Keeping privileged access to a minimum and managing the lifecycles of external users are critical processes for securing data in any large organisation.

In this workshop we will cover:

  • Terms of use
  • Privileged identity management
  • Entitlement management
  • Access Reviews
  • ThirdSpace’s Access Centre

We will be available to answer technical questions on the above and help you to plan your next steps in taming your IAM ecosystem.

4. How to go passwordless using FIDO2

DAVE GUEST – SENIOR ARCHITECT (THIRDSPACE)
A closer look at FIDO2 passwordless authentication covering the security and cost benefits it can have in your organisation and key considerations for enterprise deployment. More

Imagine a world where users no longer need to set, forget and reset multiple passwords.

Passwords are known as the weakest link for enterprise security and are an obstacle to streamlined customer journeys and internal processes.

In this workshop, we’ll discuss the future of the FIDO2 authentication standard and the benefits of a truly passwordless approach to managing your user identities. We’ll share a range of industry use cases where FIDO2 authentication really can be a game changer.

7:00 - Late

Evening Entertainment

Smash, 5-6 Gun St, Reading, RG1 2JR
Join us at Smash in Reading town centre when things get really serious - ping pong and pizza! More

Do you have what it takes to serve and smash your way to the coveted ThirdSpace Summit Ping Pong Legend title? Our leading architects are in full training ready to take on all challengers!

If competition isn’t your thing, then don’t worry – we’re not that good really.

This is your chance to unwind and have a bit of fun with the ThirdSpace team and your fellow delegates.

Plus, there will be pizza!

Wednesday 16th October 09:30 - 09:40

Welcome to day 2 of the ThirdSpace Identity, Access and Security Summit

Nick Lamidey - Director (ThirdSpace)
Taking you through the day’s security focused content including speakers, customer case studies and workshops.
09:40 - 10:40

Microsoft’s holistic security vision

Keynote
Sian John (MBE) - Chief Security Advisor (Microsoft EMEA)
Sian will show you how Microsoft’s 3,500+ cyber security professionals and global partnerships are adapting new technologies such as Threat Experts, Azure Sentinel, AI and more to tackle security threats head-on.
10:40 - 11:00

Networking break

THE BREAK AREA
Help yourself to complimentary refreshments and network with your peers.
11:00 - 11:15

Customer stories: Changing employee attitudes around security and information protection

Speaker to be confirmed
A closer look at how one of ThirdSpace’s customers developed an end-to-end security solution incorporating dedicated technology adoption strategies for data classification and more.
11:15 - 12:00

Mobile Threat Landscape - Phishing, Malware, Advanced Compromise and more

David Richardson – Senior Director (Lookout)
Learn about the latest threats impacting Android and iOS devices. David will explore real-world examples of mobile threats across the app, device, network and web layers. With a specific focus on how these threats can open up enterprises to potential data breaches.
12:00 - 12:20

Addressing the UK’s cyber security skills gap

Clare Johnson – Head of Cyber Security (University of South Wales)
54% of UK businesses have a cyber security skills gap. Find out how the University of South Wales is addressing industry needs to provide experienced ‘work ready’ graduates.
12:20 - 12:40

The art of getting people on board

Harini Bandara – Head of Business Transformation (ThirdSpace)
A closer look at the ‘people element’ of new technology adoption, and how it can help deliver project on time and under budget. More

In a world where change is constant and technology is evolving at a rapid pace, there is increasing need to adopt new approaches, solutions and ways of working. Many organisations overlook the people element of change as they improve their strategies and technology and thus fail to fully achieve the expected outcomes for their projects.

We’ll show you change management and technology adoption techniques that will help you identify the real business need behind your IT projects.

Learn how to design the right technical solutions, with people and user experience in mind – to ensure they are fully adopted by your workforce.

12:40 - 1:00

How secure am I? Introducing security assessments and managed services

Tom Waller and John Hur - Architects (ThirdSpace)
Understand how our security assessments and services can provide real value and actionable items to improve your security posture. More

Organisations find it difficult to understand their overall security posture and often are not confident that their Microsoft 365 tenant is configured against best practice. The setup and configuration of the tenant is likely something that has evolved over time, having involvement from different groups or individuals.

Learn how our assessments can provide real data against your tenant to help you see exactly where you need to focus your attention and gain the most security improvement.

We’ll also share with you some exciting news on our upcoming managed security service.

1:00 - 2:00

Networking lunch

THE BREAK AREA
Help yourself to complimentary refreshments and network with your peers.
2:00 - 3:30 Pick your workshops

Choose ONE workshop between 14:00 – 15:30 time slot. Spaces are limited so preferences will be offered on a first-come, first-served basis.

1. Microsoft Azure Sentinel deep dive

Mathew Richards – Head of Mobility and Security (ThirdSpace)
Getting into the detail on Azure Sentinel. Understand how to bring all your security telemetry together and make it work with insights, automation and orchestration. More

With many security telemetry sources available within your organisation, it’s critical that you bring them all together and apply some rules. This is typically achieved through the deployment of a SIEM.

Microsoft have announced their offering in this space called Azure Sentinel, a SIEM with a difference! Easy to bring all your data feeds into a single area combined with powerful machine learning, automation and orchestration capabilities.

This workshop will dig deep into the mechanics and capabilities of Azure Sentinel, showing you aspects of it through a live console.

Mat will be joined by Clive Watson – Azure Infrastructure Specialist (Microsoft).

2. Business transformation and technology adoption

Harini Bandara – Head of Business Transformation (ThirdSpace)
Learn how to deliver your projects ahead of schedule and below budget with successful technology adoption and change management programmes. More

Having great technology and excellent project management isn’t enough to deliver new solutions to your workforce on their own. Successful adoption and change management is essential – and it will help you deliver your projects ahead of schedule and below budget.

Many organisations forget that implementing new technology means introducing change – this is something that makes most people very uncomfortable.

Successfully delivering change requires changes in mindset, behaviours and use of processes. Your project teams need to recognise that new solutions won’t be fully adopted until the benefits are understood by all individuals. They want to know, “What’s in it for me?”, “How will this change help me?” and “Why should I change?”.

In this workshop we’ll show you how to successfully deliver a change project, regardless of the technology.

3. Secure modern desktop workshop

Tom Waller – Mobility and Security Architect (ThirdSpace)
If you want to meet users’ demands for greater simplicity, flexibility and mobility – while controlling security, compliance and manageability, then this workshop is for you. More

Achieving user satisfaction and best-in-class security is no longer the impossible dream. Using a modern desktop strategy, UK organisations could realise full return on investment in just 13 months, gaining almost 2 ½ hours in individual user productivity per week and reducing security risks by up to 40%.

Attend our secure modern desktop workshop to learn:

  • The risks posed from legacy hardware and operating systems
  • The security, productivity and cost benefits of a modern desktop strategy
  • Key technology features in Windows 10, Office 365, SCCM and Intune
  • How you can ‘make the shift’, considering infrastructure, apps and devices
  • Customer use cases, and implementation roadmaps tailored to your challenges

With Windows 7 and Office 2010 products both coming out of support in 2020 – now is the time to make the switch and ensure you remain secure and compliant.

4. Microsoft Information Protection workshop

Dave Guest and John Hur – Architects (ThirdSpace)
What is Microsoft Information Protection (MIP) and how does it differ from AIP? How can you get the most out of it to protect your sensitive corporate data? More

Information protection is no longer just about labelling and encrypting files. Reporting on how they are labelled, using data loss prevention, accessing the data from different devices and ensuring that the data is still secure.

MIP is a broad panorama of applications that, working together, can protect all of your corporate data. Truly effective MIP involves linking a set of applications and services together to provide a robust security foundation that includes cloud, mobile and on-premises environments.

Will talk you through a typical set up, discussing how to apply the below technologies across Windows, Mac, Android and iOS:

  • Azure Information Protection (AIP)
  • Data Loss Prevention (DLP)
  • Microsoft Cloud App Security (MCAS)
  • Window Information Protection (WIP)
  • Microsoft Defender Advanced Threat Protection (MDATP)
3:30 – 3:45

Networking break

The Break Area
Help yourself to complimentary refreshments and network with your peers.
3:45 - 5:15 Pick your workshops

Choose ONE workshop between 3:45 – 5:15 PM time slot. Spaces are limited so preferences will be offered on a first-come, first-served basis.

1. Secure Identity workshop: Protecting identities and securing access

John Hur – Architect (ThirdSpace)
Learn the components that make up a secure identity and how you can take advantage of new capabilities across the Microsoft stack. More

We know from industry analysts that 81% of successful cyber attacks begin with a compromised username and password. Protecting your identities has never been of more importance, but many customers still show low-adoption rates of traditional services like MFA, especially on privileged accounts.

In this session, you’ll learn how to plug the gaps in your secure identity strategy – utilising built-in tools and services to improve your posture and limit the attack surface.

We will cover:

  • Azure AD Identity Protection
  • Conditional Access and MFA
  • Passwordless authentication
  • Intelligent alerting and powerful automated governance
  • The dangers of legacy authentication
  • How to tackle adoption challenges
  • Customer examples of a strong, secure identity

2. Threat protection explained by Microsoft’s expert

Steve Newby - Senior Program Manager Windows Cyber Defence (Microsoft)
A detailed look at how the connected elements of the Azure Threat Protection (ATP) solutions provide comprehensive detection and investigative capabilities. More

At this workshop, you will get an understanding of what the current threat protection offerings are from Microsoft. We’ll be running demos and showing you some of the latest capabilities that can provide you with an advanced threat protection capability.

Microsoft have been busy building new integrations, visualisations and assessments into their offerings that give you better protection and visibility. Come and learn more about this exciting topic!

Steve will be joined by ThirdSpace’s Head of Mobility and Security, Mat Richards.

3. Preparing your security breach strategy and incident response plan

Nick Walker (ThirdSpace)
During a security breach many organisations can panic and react in an inconsistent and sometimes ineffective way. In this workshop, we’ll discuss plans and processes that can be developed to support your overall breach strategy. More

Security breaches are getting more common these days, due to the connected nature of our IT infrastructures. Protecting your business against these incidents without pre-thought, results in reactive responses that in many cases are not effective.

What about if you could make these processes structured and repeatable, knowing what and who needs to be involved at every step?

By creating an overall incident response plan supported by appropriate playbooks for each type of scenario, you then have a clear understanding of what to do and when. Taking this approach ensures that you remediate the incident effectively, learn from the exercise and reduce the risk of it happening again.

In this workshop, we’ll discuss some of the core components of an incident response plan and dig into some examples of effective playbooks. We’ll also discuss options to automate and orchestrate these, where appropriate, through Azure Sentinel.

4. Mobile security and device management workshop

David Richardson – Senior Director (Lookout)
Your users have gone mobile and so has your data. The perimeter has disappeared, and devices can no longer be trusted. How can you protect your organisation's sensitive information? More

The world has changed. Your data centre is in the Cloud and Starbucks is your new enterprise Wi-Fi. Your users have gone mobile and so has your data.

Lookout and ThirdSpace will be your guide through the world of mobile security. We’ll explore Microsoft Intune for device management, as well as Lookout’s mobile security solutions, through a series of presentations, demos, and industry use cases. You will have the opportunity to familiarise yourself with the Lookout solution admin and user interface.

By moving critical security capabilities to endpoints and establishing continuous conditional access to data based on risk, your organisation can maintain corporate levels of security and compliance, whilst enhancing end user productivity and improving business continuity.

In this workshop we’ll discuss:

  • Lookout’s security offering
  • Intune for device management
  • Mobile Device Management (MDM)
  • Mobile Application Management (MAM)
Tuesday 15th October
Close
Register your place

Save Your Place

We are expecting this year’s free-to-attend event to be another sell-out, so save your place today to ensure you don’t miss out.

Save my place
Award-winning solutions Award-winning solutions

Eight-time winner of the Microsoft Partner of the Year Award for Identity Management, Enterprise Mobility, and Security and Compliance.

ThirdSpace Please upgrade your browser

You are seeing this because you are using a browser that is not supported. The ThirdSpace website is built using modern technology and standards. We recommend upgrading your browser with one of the following to properly view our website:

Windows Mac

Please note that this is not an exhaustive list of browsers. We also do not intend to recommend a particular manufacturer's browser over another's; only to suggest upgrading to a browser version that is compliant with current standards to give you the best and most secure browsing experience.