{"id":3261,"date":"2026-03-30T13:21:35","date_gmt":"2026-03-30T12:21:35","guid":{"rendered":"https:\/\/conscia.com\/uk\/?post_type=events&#038;p=3261"},"modified":"2026-04-01T13:22:46","modified_gmt":"2026-04-01T12:22:46","slug":"strengthening-identity-security-achieving-real-results-with-microsoft-tools","status":"publish","type":"events","link":"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/","title":{"rendered":"Strengthening identity security: Achieving real results with Microsoft tools"},"content":{"rendered":"\n<div class=\"wp-block-columns  spacing-before--6 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column  spacing-before--8 has-green-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h4 class=\"wp-block-heading  background-graphics--none wp-block-paragraph spacing-after--7 spacing-before--0\" id=\"h-why-attend\"><strong>Why attend?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list  spacing-after--3\">\n<li class=\" background-graphics--none\">Learn from real-world examples of misconfigurations, forgotten admin accounts, and under-utilised licensing to ensure your organisation is minimising its risk while maximising its investments.<\/li>\n\n\n\n<li>Receive actionable insights and best-practice approaches to derive meaningful results from your Microsoft tools.<\/li>\n\n\n\n<li>Gain a clear picture of how an effective identity-first security model works, what it involves, and the path to achieving it.<\/li>\n\n\n\n<li>Find out how security assessments, MDR, and consultation can support your organisation in achieving strong identity security.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group  spacing-before--5 background-graphics--none has-brand-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading  wp-block-paragraph spacing-after--0 spacing-before--3\" id=\"h-agenda\"><strong>Agenda:<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table spacing-before--6 spacing-after--4 is-style-regular\"><table class=\"has-white-color has-text-color has-link-color\"><tbody><tr><td><strong>11:00<\/strong><\/td><td><strong>Welcome and introduction to speakers<\/strong><\/td><\/tr><tr><td><strong>11:05<\/strong><\/td><td><strong>The reality &#8211; key changes<\/strong><br>Identity has become the main attack surface for the modern organisation, due to MFA gaps, overprivileged accounts, and weak conditional access: misconfigurations are common, with Defender and logging often not enabled; default settings are left unchanged; and E5 tooling is used without tuning, ownership, or monitoring. We start off by examining the existing threat landscape and drawing up clear, actionable changes organisations can make to have an immediate impact on their security posture.<\/td><\/tr><tr><td><strong>11:15<\/strong><\/td><td><strong>Real life examples<\/strong><br>Anonymised examples of gaps in identity security, and the real-world steps taken to reduce risk and secure for the orgainsations.<\/td><\/tr><tr><td><strong>11:20<\/strong><\/td><td><strong>Live hacks<\/strong><br>Live sessions on identity risk sign-in monitoring, finding unused admin accounts, checking Defender exposure scores, and spotting device compliance gaps.<\/td><\/tr><tr><td><strong>11:35<\/strong><\/td><td><strong>What does &#8216;good&#8217; look like?<br><\/strong>Run through of a best-practice identity-first security model: aligning baseline configurations with recognised frameworks, using continuous monitoring instead of point-in-time checks, and assigning clear ownership.<\/td><\/tr><tr><td><strong>11:40<\/strong><\/td><td><strong>Next steps<br><\/strong>Assess, baseline, monitor, and improve your identity security through security assessments, using Managed Detection and Response (MDR), and consulting with experts to implement best practice.<\/td><\/tr><tr><td><strong>11.45<\/strong><\/td><td><strong>Q and A<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>While organisations are rightly focused on ensuring they have a strong security posture, the basic adoption of security tools \u2013 including high-level licences like Microsoft E5 \u2013 can often fail to produce meaningful results without ongoing tuning, clear responsibility, and continuous monitoring. It&#8217;s common to see gaps in administration, permission management, and security oversight across sectors and at all sizes of organisation: unused admin accounts lingering in the background and creating risk; missed configurations resulting in high Defender exposure scores; device compliance gaps persisting and not being tracked.<\/p>\n","protected":false},"featured_media":505,"menu_order":0,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"global_solutions":[6],"global_partners":[],"global_industries":[18],"global_business_outcome":[],"global_types":[],"class_list":["post-3261","events","type-events","status-publish","has-post-thumbnail","hentry","global_solutions-security","global_industries-all-industries"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Strengthening identity security: Achieving real results with Microsoft tools - Conscia UK<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strengthening identity security: Achieving real results with Microsoft tools\" \/>\n<meta property=\"og:description\" content=\"While organisations are rightly focused on ensuring they have a strong security posture, the basic adoption of security tools \u2013 including high-level licences like Microsoft E5 \u2013 can often fail to produce meaningful results without ongoing tuning, clear responsibility, and continuous monitoring. It&#039;s common to see gaps in administration, permission management, and security oversight across sectors and at all sizes of organisation: unused admin accounts lingering in the background and creating risk; missed configurations resulting in high Defender exposure scores; device compliance gaps persisting and not being tracked.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia UK\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T12:22:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/16by9-ideation-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/\",\"url\":\"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/\",\"name\":\"Strengthening identity security: Achieving real results with Microsoft tools - Conscia UK\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/16by9-ideation-2.jpg\",\"datePublished\":\"2026-03-30T12:21:35+00:00\",\"dateModified\":\"2026-04-01T12:22:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/16by9-ideation-2.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/16by9-ideation-2.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Strengthening identity security: Achieving real results with Microsoft tools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/uk\/#website\",\"url\":\"https:\/\/conscia.com\/uk\/\",\"name\":\"Conscia UK\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/uk\/#organization\",\"name\":\"Conscia UK\",\"url\":\"https:\/\/conscia.com\/uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png\",\"contentUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png\",\"width\":628,\"height\":628,\"caption\":\"Conscia UK\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/itglconscia-uk\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Strengthening identity security: Achieving real results with Microsoft tools - Conscia UK","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/","og_locale":"en_GB","og_type":"article","og_title":"Strengthening identity security: Achieving real results with Microsoft tools","og_description":"While organisations are rightly focused on ensuring they have a strong security posture, the basic adoption of security tools \u2013 including high-level licences like Microsoft E5 \u2013 can often fail to produce meaningful results without ongoing tuning, clear responsibility, and continuous monitoring. It's common to see gaps in administration, permission management, and security oversight across sectors and at all sizes of organisation: unused admin accounts lingering in the background and creating risk; missed configurations resulting in high Defender exposure scores; device compliance gaps persisting and not being tracked.","og_url":"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/","og_site_name":"Conscia UK","article_modified_time":"2026-04-01T12:22:46+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/16by9-ideation-2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/","url":"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/","name":"Strengthening identity security: Achieving real results with Microsoft tools - Conscia UK","isPartOf":{"@id":"https:\/\/conscia.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/16by9-ideation-2.jpg","datePublished":"2026-03-30T12:21:35+00:00","dateModified":"2026-04-01T12:22:46+00:00","breadcrumb":{"@id":"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/#primaryimage","url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/16by9-ideation-2.jpg","contentUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/16by9-ideation-2.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/uk\/events\/strengthening-identity-security-achieving-real-results-with-microsoft-tools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Strengthening identity security: Achieving real results with Microsoft tools"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/uk\/#website","url":"https:\/\/conscia.com\/uk\/","name":"Conscia UK","description":"","publisher":{"@id":"https:\/\/conscia.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/conscia.com\/uk\/#organization","name":"Conscia UK","url":"https:\/\/conscia.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png","contentUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png","width":628,"height":628,"caption":"Conscia UK"},"image":{"@id":"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/itglconscia-uk\/"]}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/events\/3261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/types\/events"}],"version-history":[{"count":10,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/events\/3261\/revisions"}],"predecessor-version":[{"id":3365,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/events\/3261\/revisions\/3365"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/media\/505"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/media?parent=3261"}],"wp:term":[{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_solutions?post=3261"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_partners?post=3261"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_industries?post=3261"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_business_outcome?post=3261"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_types?post=3261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}