Media Summary: Thursday, January 15th, 2026 8:00AM – 9:00AM (PT, Redmond Time webinar recording date) Microsoft Purview Purview Data ... Connect users to on-premises resources while enforcing Conditional In this video, we'll walk you through how to configure Multi-Factor

Unlocking Secure Access How Pcclogin Works Behind The Scenes - Detailed Analysis & Overview

Thursday, January 15th, 2026 8:00AM – 9:00AM (PT, Redmond Time webinar recording date) Microsoft Purview Purview Data ... Connect users to on-premises resources while enforcing Conditional In this video, we'll walk you through how to configure Multi-Factor This video will walk you through implementing Entra Private This video is going to introduce you to Microsoft's no Global Freshbooks message: Head over to and don't forget to enter Tech Quickie in the “How Did You ...

Learn more about encryption → Learn more about current threats → Check out ... In this video I look at credential and token theft and what we can do to protect. Looking for content on a particular topic? Search ... Continuing with the server-side vulnerabilities learning path on PortSwigger's Web This Deep Dive Session focuses on EN 40000-1-4: In this official video guide, we walk through the “ In this tutorial, we dive into the concept of Configuration Lock in Check Point's

In this deep-dive lab, we trace Pass-Through Authentication (PTA) in a hybrid identity environment and prove that Microsoft 365 ... Join David Spark as he talks with Rob Allen, chief product officer, ThreatLocker about ThreatLocker's innovative Elevation Control ...

Photo Gallery

Purview Data Security and Entra Global Secure Access Deep Dive
Introducing Microsoft Global Secure Access - No More VPN's!
Replace your VPN - Global Secure Access in Microsoft Entra
Secure Access Unlocked Configure Multi-Factor Unlock with Intune in Minutes
Configure Entra Private Access and Quick Access in Microsoft Entra Global Secure Access
No more VPN? What is Global Secure Access
Deep Dive on Microsoft Entra Private Access
Logging In With A USB Key (U2F Explained)
Tech Talk: What is Public Key Infrastructure (PKI)?
Protecting Against Credential and Token Theft
Exploiting Unprotected Admin Functionality | Web Security Academy Walkthrough.
CRA Standards Unlocked: Deep Dive Session Security Controls - Generic security requirements
Sponsored
Sponsored
View Detailed Profile
Purview Data Security and Entra Global Secure Access Deep Dive

Purview Data Security and Entra Global Secure Access Deep Dive

Thursday, January 15th, 2026 | 8:00AM – 9:00AM (PT, Redmond Time webinar recording date) Microsoft Purview | Purview Data ...

Introducing Microsoft Global Secure Access - No More VPN's!

Introducing Microsoft Global Secure Access - No More VPN's!

Microsoft Global

Sponsored
Replace your VPN - Global Secure Access in Microsoft Entra

Replace your VPN - Global Secure Access in Microsoft Entra

Connect users to on-premises resources while enforcing Conditional

Secure Access Unlocked Configure Multi-Factor Unlock with Intune in Minutes

Secure Access Unlocked Configure Multi-Factor Unlock with Intune in Minutes

In this video, we'll walk you through how to configure Multi-Factor

Configure Entra Private Access and Quick Access in Microsoft Entra Global Secure Access

Configure Entra Private Access and Quick Access in Microsoft Entra Global Secure Access

This video will walk you through implementing Entra Private

Sponsored
No more VPN? What is Global Secure Access

No more VPN? What is Global Secure Access

This video is going to introduce you to Microsoft's no Global

Deep Dive on Microsoft Entra Private Access

Deep Dive on Microsoft Entra Private Access

A look at the Microsoft Entra Private

Logging In With A USB Key (U2F Explained)

Logging In With A USB Key (U2F Explained)

Freshbooks message: Head over to http://freshbooks.com/techquickie and don't forget to enter Tech Quickie in the “How Did You ...

Tech Talk: What is Public Key Infrastructure (PKI)?

Tech Talk: What is Public Key Infrastructure (PKI)?

Learn more about encryption → https://ibm.biz/BdPu9v Learn more about current threats → https://ibm.biz/BdPu9m Check out ...

Protecting Against Credential and Token Theft

Protecting Against Credential and Token Theft

In this video I look at credential and token theft and what we can do to protect. Looking for content on a particular topic? Search ...

Exploiting Unprotected Admin Functionality | Web Security Academy Walkthrough.

Exploiting Unprotected Admin Functionality | Web Security Academy Walkthrough.

Continuing with the server-side vulnerabilities learning path on PortSwigger's Web

CRA Standards Unlocked: Deep Dive Session Security Controls - Generic security requirements

CRA Standards Unlocked: Deep Dive Session Security Controls - Generic security requirements

This Deep Dive Session focuses on EN 40000-1-4:

How Hackers Dump Active Directory Passwords (DCSync Explained)

How Hackers Dump Active Directory Passwords (DCSync Explained)

Security

Unlock Access with Azure Key Vault | Walkthrough | Pwned Labs

Unlock Access with Azure Key Vault | Walkthrough | Pwned Labs

In this official video guide, we walk through the “

Learn about Microsoft secure access solution

Learn about Microsoft secure access solution

60 second video that addresses how to

2-Check Point CCSA Course  - Configuration Lock Explained

2-Check Point CCSA Course - Configuration Lock Explained

In this tutorial, we dive into the concept of Configuration Lock in Check Point's

Pass-Through Authentication Explained (With Packet Capture & Setup Demo)

Pass-Through Authentication Explained (With Packet Capture & Setup Demo)

In this deep-dive lab, we trace Pass-Through Authentication (PTA) in a hybrid identity environment and prove that Microsoft 365 ...

Use ThreatLocker's Elevation Control to fill the gaps of Privileged Access Managenet (PAM)

Use ThreatLocker's Elevation Control to fill the gaps of Privileged Access Managenet (PAM)

Join David Spark as he talks with Rob Allen, chief product officer, ThreatLocker about ThreatLocker's innovative Elevation Control ...