
Webinar Recording
Identity Under Attack: How to Build a Resilient Zero Trust Strategy
Our Speakers

Andre Priebe
Chief Technology Officer
As a globally recognized expert in CIAM, IoT, API and MFA, Andre has successfully built global CIAM solutions with millions of users and devices and implemented MFA for more than 100,000 users in over 100 locations worldwide.
Andre holds a patent for DevOps related IAM methodologies and has an engineering degree and an MBA.

Roger Halbheer
Chief Security Advisor
Watch the Webinar:

Timestamped Summary
Building a resilient zero trust strategy is essential for organizations to protect against increasing identity attacks by prioritizing identity security, continuous assessment, and effective communication.
Key Insights
Core Zero Trust Principles
Microsoft’s zero trust journey spans 8 years, emphasizing it’s a continuous process requiring ongoing effort to strengthen posture, not a one-time project with a defined end.
The approach assumes breach from the start, verifying each user’s identity and location, ensuring admins have no standing access, only elevated privileges for specific tasks.
Implementation Strategies
Microsoft implemented adaptive access control with different identities and devices for varying levels of access and security, including specialized devices and accounts for financial and admin access.
The journey involved vendor consolidation to the Microsoft platform, device management, endpoint protection, and application proxy to make applications internet-facing and eliminate VPN needs.