Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
News
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/8b/6a/a0/8b6aa0b5-d020-74cc-1766-3046253bc6d0/mza_2730532121990333816.jpg/600x600bb.jpg
M365.FM - Modern work, security, and productivity with Microsoft 365
Mirko Peters (Microsoft 365 consultant and trainer)
436 episodes
13 hours ago
Welcome to the M365.FM — your essential podcast for everything Microsoft 365, Azure, and beyond. Join us as we explore the latest developments across Power BI, Power Platform, Microsoft Teams, Viva, Fabric, Purview, Security, and the entire Microsoft ecosystem. Each episode delivers expert insights, real-world use cases, best practices, and interviews with industry leaders to help you stay ahead in the fast-moving world of cloud, collaboration, and data innovation. Whether you're an IT professional, business leader, developer, or data enthusiast, the M365.FM brings the knowledge, trends, and strategies you need to thrive in the modern digital workplace. Tune in, level up, and make the most of everything Microsoft has to offer. M365.FM is part of the M365-Show Network.

Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-fm-modern-work-security-and-productivity-with-microsoft-365--6704921/support.
Show more...
Tech News
Education,
Technology,
News,
How To
RSS
All content for M365.FM - Modern work, security, and productivity with Microsoft 365 is the property of Mirko Peters (Microsoft 365 consultant and trainer) and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to the M365.FM — your essential podcast for everything Microsoft 365, Azure, and beyond. Join us as we explore the latest developments across Power BI, Power Platform, Microsoft Teams, Viva, Fabric, Purview, Security, and the entire Microsoft ecosystem. Each episode delivers expert insights, real-world use cases, best practices, and interviews with industry leaders to help you stay ahead in the fast-moving world of cloud, collaboration, and data innovation. Whether you're an IT professional, business leader, developer, or data enthusiast, the M365.FM brings the knowledge, trends, and strategies you need to thrive in the modern digital workplace. Tune in, level up, and make the most of everything Microsoft has to offer. M365.FM is part of the M365-Show Network.

Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-fm-modern-work-security-and-productivity-with-microsoft-365--6704921/support.
Show more...
Tech News
Education,
Technology,
News,
How To
https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/07fab928fc1e9870d73efb800aa77ea1.jpg
Entra ID - The Conditional Chaos Engine
M365.FM - Modern work, security, and productivity with Microsoft 365
1 hour 14 minutes
1 week ago
Entra ID - The Conditional Chaos Engine
(00:00:00) The Identity Debt Crisis in Azure
(00:00:39) The Control Plane Conundrum
(00:01:43) The Accumulation of Identity Debt
(00:04:13) Measuring and Observing Identity Debt
(00:04:52) Hybrid Identity Debt Propagation
(00:09:22) Breaking the Inheritance Cycle
(00:14:22) Conditional Access Sprawl
(00:24:54) Workload Identities: The Silent Threat
(00:35:23) B2B Guest Access: Undermining Governance
(00:36:11) The Three Paths of Identity Debt

Most organizations believe they have identity security under control — but in reality, they’re operating with ambiguity, over-permissioned access, and fragile policies that only work on paper. In this episode, we break down how to move from identity sprawl and “heroic” incident response to a boring, disciplined, and effective security loop. You’ll learn how to pay down identity debt, reduce blast radius, and turn conditional access from a blunt execution engine into clear, enforceable policy — without grinding the business to a halt. This is a practical, operator-focused conversation about what actually works at scale. What You’ll Learn
  • Why most identity programs fail despite heavy tooling
  • The real cost of identity debt — and how it quietly compounds risk
  • Why “hero weekends” are a red flag, not a success story
  • How a 90-day remediation cadence creates momentum without chaos
  • The three phases of moving from ambiguity to enforceable intent
  • How to design conditional access policies that don’t break the business
  • Practical guidance for break-glass access, privilege ownership, and exclusions
  • How to shrink blast radius systematically — not reactively
Key Topics & Timestamps
  • Why identity security often looks mature on the surface while remaining fundamentally fragile underneath
  • How identity debt forms, compounds over time, and quietly increases organizational risk
  • The dangers of “just in case” access and how over-permissioning becomes normalized
  • Why reactive, high-effort security work is a warning sign — not a success metric
  • How disciplined, repeatable remediation outperforms heroic incident response
  • What a sustainable identity cleanup loop actually looks like in real environments
  • The role of clarity and ownership in making security policies enforceable
  • Why conditional access should be treated as an execution layer, not a decision engine
  • Common failure modes in conditional access design and how to avoid them
  • Practical approaches to privileged access, emergency accounts, and policy exclusions
  • How to ship an initial identity security baseline without blocking the business
  • Why incremental improvement beats waiting for a “perfect” security posture
  • How reducing blast radius becomes a predictable outcome — not a lucky accident
Key Takeaways
  • Security maturity isn’t about speed — it’s about repeatability
  • Reducing ambiguity is what makes intent enforceable
  • Strong identity programs favor boring, consistent execution over heroics
  • Conditional access only works when ownership and outcomes are clear
  • Progress comes from shipping baselines early and improving them on schedule
Who This Episode Is For
  • Security and IAM leaders
  • Cloud and platform engineers
  • CISOs and security architects
  • Anyone responsible for access, identity, or zero-trust initiatives
Quote from the Episode “This is not a heroic weekend. It’s a boring, disciplined loop that shrinks blast radius on a schedule.”

Become a supporter of this podcast:
M365.FM - Modern work, security, and productivity with Microsoft 365
Welcome to the M365.FM — your essential podcast for everything Microsoft 365, Azure, and beyond. Join us as we explore the latest developments across Power BI, Power Platform, Microsoft Teams, Viva, Fabric, Purview, Security, and the entire Microsoft ecosystem. Each episode delivers expert insights, real-world use cases, best practices, and interviews with industry leaders to help you stay ahead in the fast-moving world of cloud, collaboration, and data innovation. Whether you're an IT professional, business leader, developer, or data enthusiast, the M365.FM brings the knowledge, trends, and strategies you need to thrive in the modern digital workplace. Tune in, level up, and make the most of everything Microsoft has to offer. M365.FM is part of the M365-Show Network.

Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-fm-modern-work-security-and-productivity-with-microsoft-365--6704921/support.