Arriving in MAY: Zero Trust Workshop

Zero Trust is “easy”, just follow three principles:

  • Least Privilege Access
  • Assume Breach
  • Verify Explicitly

That’s what Microsoft said to their customers a few years back and the answer was: HOW?

Turns out that taking those three principles and operationalizing them in Windows, Microsoft 365 and Entra ID is a LOT harder than it looks. So, Microsoft followed up with the Zero Trust workshop which applies the principles to every service they offer.

Our instructor Paul Schnackenburg, is going to teach you how in 3 sessions designed specifically for MSPs who want to set up and protect their clients the right way. Microsoft created the Zero Trust Workshop format, Paul will teach you how to make Zero Trust real.

Session 1

Paul will introduce the workshop overall and how you can apply it to your clients’ environments. We’ll look at the tools, the Excel spreadsheet, the website and the tenant analysis tool. We’ll deep dive on the Identity pillar – Access, apps, operations and more. Next, we’ll look at the Devices pillar – Tenant administration, Windows, Endpoint security, Authentication, Mobile Device Management, Application Management and iOS, macOS & Android.

Session 2

Starts with the Data pillar – identification and classification, data access and protecting critical assets, followed by the Network pillar – modernizing VPNs and protecting legacy apps, segmentation, secure web gateway, network and application threat protection. We’ll also cover the Infrastructure pillar – governance, compliance, server protection, endpoint protection, containers, storage protection, databases, APIs and infrastructure services.

Session 3

The third and final session starts with the Security Operations pillar – identity threat protection, email & collaboration threat protection, endpoints, cloud applications, SIEM & SOAR + XDR and AI for Security. The final (newly added) pillar is AI – mapping and assessing AI risk, registering agents, securing authentication and access, network access, data access and security detection and response for AI. We’ll also go deep on the Zero Trust Assessment tool which you’ll run on your MSP tenant and client tenants to make the results real and actionable.

Zero Trust is the fundamental IT security north star that every client configuration should be built on, but operationalizing it in a MSP for SMB clients in a standardized, sustainable and profitable way is challenging – this course will make it easy.

Keep your eye here – Registration is coming soon

Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.