May 2021 - MC2MC Evening


We are thrilled to announce the date of our next event in 2021, on the 27th of May. Expect four top notch sessions from top notch speakers. Hope to see you all there!

This will be a virtual live event on Teams: Click here to join the meeting.

Tickets available, register here:


18h30 – 18u45: Welcome

18h45 – 19u30: What is this Modern Authentication everyone is talking about, and why you should phase out Legacy authentication? by Kenneth van Surksum and Eric Loef
Microsoft has announced that they will stop the usage of Legacy Authentication for Exchange Online in H2 2021. Legacy authentication must be replaced by Modern authentication. In this session Erik Loef and Kenneth van Surksum will explain what Legacy – and Modern authentication is and why legacy authentication is bad and should therefore be phased out. They will also explain how you can detect whether Legacy authentication is still in use within your environment, and what you can do to start phasing out legacy authentication and transition to Modern authentication instead. Erik and Kenneth will explain and prove that Modern Authentication alone isn’t enough though. They will also share a possible project approach, and lessons learned – so that you don’t have to make the mistakes that we made during our enrollments. At the end of the session, we want attendees to be aware of this upcoming change and give them the necessary information in order to start phasing out legacy authentication and optimize their security posture within their own environment.

19h30 – 20h15: Adapting Big Data Architecture Patterns for Real-world Scenarios by Heini Ilmarinen
Big data is often defined with the five V’s: volume, velocity, variety, veracity and value. But what if your data does not conform to that definition? What if your data only has variety and value, velocity and variety or some other combination? Should you completely ditch all big data concepts? What really makes us think about data in a different way compared to a classic data environment is not the most obvious of the V’s – volume, but actually the rest of them. When we take the other V’s into account, the way we’ve been taught to design and build data environments no longer seem to solve all the problems. The usual suspects – relational databases, extract-transform-load patterns and data warehouses – don’t quite work when we go beyond just considering the data volume. In this session, we will look at the big data architecture on Azure and see how we can adapt it to solve the problems with our data. We will dig into how to combine the different Azure data services to create the architecture that you need, for the volume, velocity, variety, veracity and value of your data, today.

20h15 – 20h30: Break

20h30 – 21h15: Top 5 ways to secure Azure resources by Sasha Kranjac
Although Microsoft Azure is secure by default, it has many security features and settings. But because of this, it is sometimes very easy not to see the tree from the forest and hard to find a needle in a haystack. In this session, we will focus on and show you top five ways to protect your Azure infrastructure – the five ways and capabilities that have been proven to significantly improve tenant, data and Azure infrastructure security.

21h15 – 22h00: Windows 10 Servicing in the work from home era by Ronni Pedersen and Jorgen Nilsson
In the work from anywhere era we need to be able to Service Windows 10 anywhere. How can we service Windows 10 without using Task Sequence and loosing control?! How do we troubleshoot, how can we handle drivers? That and much more will be answered during the session! Don’t miss out!

22:00 – …: BYOB (Bring-Your-Own-Beer) Social