Sasha is a Microsoft Regional Director (RD), Microsoft MVP, and CEO of both Kloudatech and Kranjac - IT Training and Consulting. He holds numerous certifications from Microsoft, ISC2, AWS, CompTIA and EC-Council, and in addition to cloud, security architecture, and consulting, they deliver vendor and exclusive tailored workshops and courses that solve unique security challenges faced by executives and organizations worldwide. Among others, Sasha is a CISSP, MCT, MCT Community Lead, CEI, CompTIA Instructor, frequent speaker at international conferences, user groups and events, book author on cloud security, Microsoft Azure, Microsoft 365, and Windows Server.
Continuously evolving threats on the internet as a working network of choice changed the technology landscape of the modern workplace. The significant shift in mindset is required, sparking the journey that has only begun to efficiently protect our modern enterprises and businesses. What you need right NOW is Zero Trust Security Deployment in Microsoft 365 – but only if you want your businesses and enterprises to exist in 2024 and beyond. Fortunately, this session will explain how to start, implement, and create a Zero Trust Security Model in Microsoft 365!
Read moreAs cyber threats evolve, traditional security models are no longer sufficient to protect modern cloud environments. Zero Trust Security is a critical framework for securing identities, devices, applications, and data in Microsoft Azure. In this session, we will explore the core principles of Zero Trust—verify explicitly, use least privileged access, and assume breach—and demonstrate how to implement them effectively in Azure. Attendees will learn how to leverage Conditional Access, Microsoft Defender for Cloud, network segmentation, Just-In-Time access, and other key security controls to build a robust Zero Trust architecture. By the end of this session, you will have a clear roadmap for strengthening security in their Azure environments, reducing attack surfaces, and improving overall resilience against cyber threats. Sign up and be secure!
Read moreIn today’s evolving threat landscape, securing your cloud environment is more critical than ever. Join us for this one-day intensive workshop where we’ll explore and demonstrate Microsoft’s powerful security solutions, including the Microsoft Defender suite and other essential security tools. Learn how to detect, prevent, and respond to threats effectively within Microsoft’s cloud ecosystem. What will we cover? 🔹 Microsoft Defender Suite – Secure endpoints, emails, cloud workloads, and identities with Defender for Endpoint, Defender for Office 365, Defender for Cloud and more. 🔹 Threat Detection & Response – Use Microsoft Sentinel for advanced security analytics and real-time threat detection. 🔹 Identity & Access Security – Strengthen authentication with Azure AD (Entra ID), Conditional Access, Multi-Factor Authentication (MFA), and Privileged Identity Management (PIM). 🔹 Data Protection & Compliance – Safeguard sensitive information using Microsoft Purview for data governance and compliance. 🔹 Best Practices & Live Demonstrations – See Microsoft’s security solutions in action and learn best practices to enhance your cloud security posture. This workshop is designed for IT security professionals, cloud administrators, and security officers looking to enhance their Microsoft cloud security expertise. Join two Azure and Security gurus who work with security and implement security solutions for worldwide customers. Sign up today!
Read moreOne of the most popular sessions of the dynamic duo is back! Now revamped and thoroughly rewritten for the security challenges of 2025 and beyond! A lot of companies have moved to the cloud, and even more companies went hybrid and multi-cloud. This solved many problems but created many security challenges, especially nowadays, when organisations massively adopted (and still are adopting!) AI-related technologies without even having fundamental knowledge. Security landscape is evolving and expanding at a staggering expansion rate, and not every company is able to follow the trends successfully. Fortunately, our session is here to show you what are the security challenges of the new era and how to protect from rising number of new attacks against your Azure and Microsoft 365 environments. You will be able to see both perspectives - how attackers try to exploit your tenants and how can we detect threats and stop them before breaches happen. And of course, this session description did not write ChatGPT or any other LLM!
Read moreToday’s digital heterogenous environments are everything but simple: hundreds and thousands of users, ten times as many incidents and alerts, laws and regulations, deadlines, emergencies. Security and compliance are a priority, while mitigating adversaries with efficiency and speed is a must. This full-day tutorial is ideal for security professionals who want to get up to date with the latest Microsoft 365 security products and technologies through practical, real-world examples, from unified and powerful end-to-end incident response workflow governance, through efficient incident and alert management. The tutorial will cover the integration of Microsoft 365 security products (Microsoft Defender XDR), sprinkled with Microsoft Sentinel on top to enable you to create a unified security strategy across entire ecosystem. Join Sasha and Omar in this new, fully rewritten and revamped tutorial, packed with latest news for 2026, and takeaway insights and knowledge about (including, but not limited to): • Understanding Microsoft’s security architecture • Detecting risky events and responding with policy-driven insider risk strategies • Detecting and preventing data loss across Microsoft 365 and endpoint devices • Respond to incidents and compliance investigations efficiently • Build a unified security approach capable of mitigating adversaries’ techniques • Identify and analyze breached data to uncover hidden data security risks • Discover and secure all AI activity in Microsoft 365 • Microsoft Defender XDR (Defender for Office, Endpoint, Identity, Cloud Apps, Vulnerability Management) • Microsoft Defender for Cloud, Application Governance, Microsoft Sentinel • And much more! NOTE: As Microsoft announces new functionalities, products and updates, the tutorial agenda will be updated accordingly!
Read more