Event
Strengthening identity security: Achieving real results with Microsoft tools
While organisations are rightly focused on ensuring they have a strong security posture, the basic adoption of security tools – including high-level licences like Microsoft E5 – can often fail to produce meaningful results without ongoing tuning, clear responsibility, and continuous monitoring. It's common to see gaps in administration, permission management, and security oversight across sectors and at all sizes of organisation: unused admin accounts lingering in the background and creating risk; missed configurations resulting in high Defender exposure scores; device compliance gaps persisting and not being tracked.
Ben Simpson
Microsoft Practice Lead
Date & time
May 6, 2026 - 11:00 - 11:50 (BST)
Why attend?
- Learn from real-world examples of misconfigurations, forgotten admin accounts, and under-utilised licensing to ensure your organisation is minimising its risk while maximising its investments.
- Receive actionable insights and best-practice approaches to derive meaningful results from your Microsoft tools.
- Gain a clear picture of how an effective identity-first security model works, what it involves, and the path to achieving it.
- Find out how security assessments, MDR, and consultation can support your organisation in achieving strong identity security.
Agenda:
| 11:00 | Welcome and introduction to speakers |
| 11:05 | The reality – key changes Identity has become the main attack surface for the modern organisation, due to MFA gaps, overprivileged accounts, and weak conditional access: misconfigurations are common, with Defender and logging often not enabled; default settings are left unchanged; and E5 tooling is used without tuning, ownership, or monitoring. We start off by examining the existing threat landscape and drawing up clear, actionable changes organisations can make to have an immediate impact on their security posture. |
| 11:15 | Real life examples Anonymised examples of gaps in identity security, and the real-world steps taken to reduce risk and secure for the orgainsations. |
| 11:20 | Live hacks Live sessions on identity risk sign-in monitoring, finding unused admin accounts, checking Defender exposure scores, and spotting device compliance gaps. |
| 11:35 | What does ‘good’ look like? Run through of a best-practice identity-first security model: aligning baseline configurations with recognised frameworks, using continuous monitoring instead of point-in-time checks, and assigning clear ownership. |
| 11:40 | Next steps Assess, baseline, monitor, and improve your identity security through security assessments, using Managed Detection and Response (MDR), and consulting with experts to implement best practice. |
| 11.45 | Q and A |
About the speaker
Related