ThirdSpace ThirdSpace
Close 0 Reset Search Run Search What are you looking for? Type at least three characters to search. Filter Search Results
  • All Content
  • Blog
  • Case Studies
  • Event
  • Resources
  • News
  • Careers
  • Access Centre
  • Technologies
  • Workshops
  • Solutions
  • People
Load more


That’s it, the ThirdSpace Summit 2019 is fully booked and registration has now closed! For those lucky enough to secure a space, we’ll see you in Reading!

Our two-day programme is jam-packed with presentations and workshops, with keynotes from leading figures shaping Microsoft’s identity and security strategy.

Please note: the agenda is still being finalised and all sessions are subject to change.

Tuesday 15th October
Tuesday 15th October 09:00 – 09:30

Registration and morning refreshments

Give yourself plenty of time before the first session starts. You'll need to register and collect your badges from reception, and there'll be morning refreshments available as you network with your peers.
09:30 – 09:45

Welcome to the ThirdSpace Identity, Access and Security Summit

Taking you through the day’s proceedings, speakers, workshop format and news on the evening’s entertainment.
09:45 – 10:45

Microsoft's cloud identity roadmap with Azure AD

ALEX SIMONS - Corporate Vice President, Identity Program Management (Microsoft)
Alex will take you through Microsoft’s vision for hybrid and cloud identity and provide useful insight on how organisations similar to yours are transforming their identity approaches.
10:45 – 11:10

Customer stories: Identity as the new control plane

A closer look at how one of ThirdSpace’s customers integrated their entire JML process with MIM and Azure Active Directory Premium, plus how new Azure B2C and IoT solutions are helping secure their customer environment, too.
11:10 – 11:30

Networking break

Help yourself to complimentary refreshments and network with your peers.
11:30 – 12:10

Identity as the foundation of security

Identity is the new security perimeter. Learn how Saviynt can enhance Microsoft's identity model with holistic governance and compliance functionality, as well as the tools available to help organisations ensure security through their digital transformation.
12:10 – 12:35

Planning your long-term cloud identity strategy

Dave will talk through Azure cloud identity and how you can use it for your staff, partners and customers to accelerate access, improve scalability, achieve real control - and remain secure.
12:35 – 12:50

Secure and scalable management of external identities

Referencing real life use cases, Marcus will explain how Azure B2B and B2C technologies can be deployed in your organisation to improve productivity and boost security.
12:50 – 1:40

Networking lunch

Help yourself to a complimentary buffet lunch and network with your peers.
1:40 – 3:10 Pick your workshops

Choose ONE workshop between the 1:40 - 3:10 PM time slot. Spaces are limited so preferences will be offered on a first come, first served basis.

*FULLY BOOKED* 1. Planning your long-term identity strategy with Azure AD

Identity provisioning is constantly changing, and we can help you keep up, as you move from on-premises with MIM to cloud-based with Azure AD, SCIM, connectors and more.

2. Flexible identity reporting and management platforms that augment your existing identity systems

Your admins want intelligent reporting, monitoring and auditing capabilities, instant, event-driven updates and a customised user-friendly interface. Learn how you can give this to them. More

Love Microsoft Identity Manager, but want more? Looking for ways to bring your other identity systems to life? We can help.

Users and admins love MIM’s powerful sync engine, user provisioning features and the resilience of a state-based identity solution – but even for one of our all-time favourite identity platforms, there are big gains to be made.

Come to this workshop to understand how Software IDM enhances managing your identity management solution, enabling you to:

  • View and report on identities across MIM and other connected systems
  • Easily generate powerful reports on user status and changes
  • Track changes to users and groups identities over time
  • Make instant modifications for emergency changes
  • Access an identity reporting portal from any device and location
  • Manage sync schedules and more via a web-based interface

3. Engaging your users and securing your customer or membership data with Microsoft Azure AD B2C

Learn how you can better engage your customers or members with seamless login and access experiences, while meeting your security, scalability and compliance needs. More

Microsoft Azure AD B2C can both increase your level of customer or member engagement (normally measured in user registrations, user logins, etc.) and better protect your users and your website, along with a host of other benefits.

With scalable state-of-the-art security on tap, from securing your user credentials, to the use of modern protocols that guard against known attack vectors, to detecting suspicious user activity – you’re covered.

In this workshop we will:

  • Explain key features of B2C
  • Look at why customers choose B2C for customer authentication
  • Answer technical questions
  • Take a look at specific use cases raised by workshop attendees

You should come away with a good understanding of whether implementing B2C would be a useful step for your organisation.

4. The next generation in identity governance and administration (IGA)

Learn how Saviynt can provide answers to those all-important governance questions; ‘who has access to what?', ‘how did they get it?', and ‘what are they doing with it?' More

Over 55% of IT leaders believe end users have more access than is required to do their jobs, and 44% are not confident in the compliance of their user access practices.

If you have holes in your identity governance and administration (IGA) policies and are concerned about compliance risks then join us for this deep dive into Saviynt’s IGA solution.

It’s your chance to learn:

  • How to get the most out of identities managed through Azure AD and MIM
  • How you can provide a single view of access governance across all apps and data
  • How to power access governance across vendor boundaries (e.g. Azure AD and AWS)
  • How IGA policies can integrate with existing MIM and Azure AD JML processes
  • How to accelerate identity governance and administration adoption
3:10 – 3:30

Networking break

Help yourself to complimentary refreshments and network with your peers.
3:30 – 5:00 Pick your workshop

Choose ONE workshop between the 3:30 – 5:00 PM time slot. Spaces are limited so preferences will be offered on a first come, first served basis.

1. Secure identity workshop: Protecting identities and securing access

Learn the components that make up a secure identity and how you can take advantage of new capabilities across the Microsoft stack. More

We know from industry analysts that 81% of successful cyber attacks begin with a compromised username and password. Protecting your identities has never been of more importance, but many customers still show low-adoption rates of traditional services like MFA, especially on privileged accounts.

In this session, we’ll learn how to plug the gaps in your secure identity strategy – utilising built-in tools and services to improve your posture and limit the attack surface.

We will cover:

  • Azure AD Identity Protection
  • Conditional access and MFA
  • Passwordless authentication
  • Intelligent alerting and powerful automated governance
  • The dangers of legacy authentication
  • How to tackle adoption challenges
  • Customer examples of a strong, secure identity

*FULLY BOOKED* 2. The five W’s of privileged access: A closer look at request-based privileged access

DAVE GUEST AND IAN BASSI - Architects (ThirdSpace)
Why do you have so many domain/global administrators all the time? Learn how PIM and PAM can power-up your access management, reduce attack surfaces and keep you more secure.

*FULLY BOOKED* 3. Governance for B2B and internal users with Microsoft Azure Active Directory

As your organisation grows, often so does the complexity of your identity and access management (IAM) landscape. We’ll show you how to tame the IAM jungle with tools from Microsoft and ThirdSpace.

*FULLY BOOKED* 4. How to go passwordless using FIDO2

A closer look at FIDO2 passwordless authentication covering the security and cost benefits it can have in your organisation and key considerations for enterprise deployment.
7:00 - Late

Evening Entertainment

Smash, 5-6 Gun St, Reading, RG1 2JR
Join us at Smash in Reading town centre when things get really serious - ping pong and pizza! More

Do you have what it takes to serve and smash your way to the coveted ThirdSpace Summit Ping Pong Legend title? Our leading architects are in full training ready to take on all challengers!

If competition isn’t your thing, then don’t worry – we’re not that good really.

This is your chance to unwind and have a bit of fun with the ThirdSpace team and your fellow delegates.

Plus, there will be pizza!

Wednesday 16th October 09:00 - 09:30

Registration and morning refreshments

Microsoft Campus, Building 3 Reception
Give yourself plenty of time before the first session starts. You'll need to register and collect your badges from reception, and there'll be morning refreshments available as you network with your peers.
09:30 – 09:40

Welcome to day 2 of the ThirdSpace Identity, Access and Security Summit

Nick Lamidey - Director (ThirdSpace)
Taking you through the day’s security focused content including speakers, customer case studies and workshops.
09:40 – 10:40

Microsoft’s holistic security vision

Sian John (MBE) - Chief Security Advisor (Microsoft EMEA)
Sian will show you how Microsoft’s 3,500+ cyber security professionals and global partnerships are adapting new technologies such as Threat Experts, Azure Sentinel, AI and more to tackle security threats head-on.
10:40 – 11:10

How secure am I? Introducing security assessments and managed services

Understand how our security assessments and services can provide real value and actionable items to improve your security posture. More

Organisations find it difficult to understand their overall security posture and often are not confident that their Microsoft 365 tenant is configured against best practice. The setup and configuration of the tenant is likely something that has evolved over time, having involvement from different groups or individuals.

Learn how our assessments can provide real data against your tenant to help you see exactly where you need to focus your attention and gain the most security improvement.

We’ll also share with you some exciting news on our upcoming managed security service.

11:10 – 11:30

Networking break

Help yourself to complimentary refreshments and network with your peers.
11:30 – 11:45

Customer stories: Changing employee attitudes around security and information protection

A closer look at how one of ThirdSpace’s customers developed an end-to-end security solution incorporating dedicated technology adoption strategies for data classification and more.
11:45 – 12:05

The art of getting people on board

A closer look at the ‘people element’ of new technology adoption, and how it can help deliver project on time and under budget. More

In a world where change is constant and technology is evolving at a rapid pace, there is increasing need to adopt new approaches, solutions and ways of working. Many organisations overlook the people element of change as they improve their strategies and technology and thus fail to fully achieve the expected outcomes for their projects.

We’ll show you change management and technology adoption techniques that will help you identify the real business need behind your IT projects.

Learn how to design the right technical solutions, with people and user experience in mind – to ensure they are fully adopted by your workforce.

12:05 – 12:50

Mobile Threat Landscape - Phishing, Malware, Advanced Compromise and more

David Richardson – Senior Director (Lookout)
Learn about the latest threats impacting Android and iOS devices. David will explore real-world examples of mobile threats across the app, device, network and web layers. With a specific focus on how these threats can open up enterprises to potential data breaches.
12:50 – 1:10

Addressing the UK’s cyber security skills gap

Clare Johnson – Head of Cyber Security (University of South Wales)
54% of UK businesses have a cyber security skills gap. Find out how the University of South Wales is addressing industry needs to provide experienced ‘work ready’ graduates.
1:10 – 2:00

Networking lunch

Help yourself to complimentary refreshments and network with your peers.
2:00 – 3:30 Pick your workshops

Choose ONE workshop between 14:00 – 15:30 time slot. Spaces are limited so preferences will be offered on a first-come, first-served basis.

1. Microsoft Azure Sentinel deep dive

Mathew Richards – Head of Mobility and Security (ThirdSpace)
Getting into the detail on Azure Sentinel. Understand how to bring all your security telemetry together and make it work with insights, automation and orchestration. More

With many security telemetry sources available within your organisation, it’s critical that you bring them all together and apply some rules. This is typically achieved through the deployment of a SIEM.

Microsoft have announced their offering in this space called Azure Sentinel, a SIEM with a difference! Easy to bring all your data feeds into a single area combined with powerful machine learning, automation and orchestration capabilities.

This workshop will dig deep into the mechanics and capabilities of Azure Sentinel, showing you aspects of it through a live console.

Mat will be joined by Clive Watson – Azure Infrastructure Specialist (Microsoft).

2. Business transformation and technology adoption

Harini Bandara – Head of Business Transformation (ThirdSpace)
Learn how to deliver your projects ahead of schedule and below budget with successful technology adoption and change management programmes. More

Having great technology and excellent project management isn’t enough to deliver new solutions to your workforce on their own. Successful adoption and change management is essential – and it will help you deliver your projects ahead of schedule and below budget.

Many organisations forget that implementing new technology means introducing change – this is something that makes most people very uncomfortable.

Successfully delivering change requires changes in mindset, behaviours and use of processes. Your project teams need to recognise that new solutions won’t be fully adopted until the benefits are understood by all individuals. They want to know, “What’s in it for me?”, “How will this change help me?” and “Why should I change?”.

In this workshop we’ll show you how to successfully deliver a change project, regardless of the technology.

3. Secure modern desktop workshop

Tom Waller – Mobility and Security Architect (ThirdSpace)
If you want to meet users’ demands for greater simplicity, flexibility and mobility – while controlling security, compliance and manageability, then this workshop is for you. More

Achieving user satisfaction and best-in-class security is no longer the impossible dream. Using a modern desktop strategy, UK organisations could realise full return on investment in just 13 months, gaining almost 2 ½ hours in individual user productivity per week and reducing security risks by up to 40%.

Attend our secure modern desktop workshop to learn:

  • The risks posed from legacy hardware and operating systems
  • The security, productivity and cost benefits of a modern desktop strategy
  • Key technology features in Windows 10, Office 365, SCCM and Intune
  • How you can ‘make the shift’, considering infrastructure, apps and devices
  • Customer use cases, and implementation roadmaps tailored to your challenges

With Windows 7 and Office 2010 products both coming out of support in 2020 – now is the time to make the switch and ensure you remain secure and compliant.

4. Microsoft Information Protection workshop

Dave Guest and John Hur – Architects (ThirdSpace)
What is Microsoft Information Protection (MIP) and how does it differ from AIP? How can you get the most out of it to protect your sensitive corporate data? More

Information protection is no longer just about labelling and encrypting files. Reporting on how they are labelled, using data loss prevention, accessing the data from different devices and ensuring that the data is still secure.

MIP is a broad panorama of applications that, working together, can protect all of your corporate data. Truly effective MIP involves linking a set of applications and services together to provide a robust security foundation that includes cloud, mobile and on-premises environments.

Will talk you through a typical set up, discussing how to apply the below technologies across Windows, Mac, Android and iOS:

  • Azure Information Protection (AIP)
  • Data Loss Prevention (DLP)
  • Microsoft Cloud App Security (MCAS)
  • Window Information Protection (WIP)
  • Microsoft Defender Advanced Threat Protection (MDATP)
3:30 – 3:45

Networking break

The break area
Help yourself to complimentary refreshments and network with your peers.
3:45 – 5:15 Pick your workshops

Choose ONE workshop between 3:45 – 5:15 PM time slot. Spaces are limited so preferences will be offered on a first-come, first-served basis.

*FULLY BOOKED* 1. Secure Identity workshop: Protecting identities and securing access

John Hur – Architect (ThirdSpace)
Learn the components that make up a secure identity and how you can take advantage of new capabilities across the Microsoft stack.

*FULLY BOOKED* 2. Threat protection explained by Microsoft’s expert

Steve Newby - Senior Program Manager Windows Cyber Defence (Microsoft)
A detailed look at how the connected elements of the Azure Threat Protection (ATP) solutions provide comprehensive detection and investigative capabilities.

*FULLY BOOKED* 3. Preparing your security breach strategy and incident response plan

Nick Walker (Architect, ThirdSpace)
During a security breach many organisations can panic and react in an inconsistent and sometimes ineffective way. In this workshop, we’ll discuss plans and processes that can be developed to support your overall breach strategy.

4. Mobile security and device management workshop

David Richardson – Senior Director (Lookout)
Your users have gone mobile and so has your data. The perimeter has disappeared, and devices can no longer be trusted. How can you protect your organisation's sensitive information? More

The world has changed. Your data centre is in the Cloud and Starbucks is your new enterprise Wi-Fi. Your users have gone mobile and so has your data.

Lookout and ThirdSpace will be your guide through the world of mobile security. We’ll explore Microsoft Intune for device management, as well as Lookout’s mobile security solutions, through a series of presentations, demos, and industry use cases. You will have the opportunity to familiarise yourself with the Lookout solution admin and user interface.

By moving critical security capabilities to endpoints and establishing continuous conditional access to data based on risk, your organisation can maintain corporate levels of security and compliance, whilst enhancing end user productivity and improving business continuity.

In this workshop we’ll discuss:

  • Lookout’s security offering
  • Intune for device management
  • Mobile Device Management (MDM)
  • Mobile Application Management (MAM)
Tuesday 15th October
Register your place
Award-winning solutions Award-winning solutions

Eight-time winner of the Microsoft Partner of the Year Award for Identity Management, Enterprise Mobility, and Security and Compliance.

ThirdSpace Please upgrade your browser

You are seeing this because you are using a browser that is not supported. The ThirdSpace website is built using modern technology and standards. We recommend upgrading your browser with one of the following to properly view our website:

Windows Mac

Please note that this is not an exhaustive list of browsers. We also do not intend to recommend a particular manufacturer's browser over another's; only to suggest upgrading to a browser version that is compliant with current standards to give you the best and most secure browsing experience.