#WPNinjasNL Meeting #2 2026
Details
Details
The Workplace Ninja User Group Netherlands is proud to announce that on Wednesday the 1st of April 2026 we will organize our 2nd in-person event in the year 2026.
Program:
15:30 - 16:00: Welcome at location
16:00 - 17:00: Session 1: Jorik Polhuis “Copilot als reality check: wanneer AI je project niet spaart”
17:05 - 18:05: Session 2: Arno van Dijk, "How to Protect Your Tokens with Intune & Conditional Access"
18:05 - 19:00: Food, drinks and networking, sponsored by location host
19:00 - 20:00: Session 3:
20:00 - 21:00: Drinks and networking
Location: \
Session 1: Jorik Polhuis “Copilot als reality check: wanneer AI je project niet spaart”
Wat gebeurt er als je Copilot vraagt om eerlijk te zijn over je project?
In deze sessie bouwen we samen een agent die niet samenvat, maar kritisch meedenkt: wat klopt hier niet, wat missen we, en waar lopen we risico zonder het te benoemen?
Aan de hand van een herkenbare projectcase laten we zien:
- hoe je van een idee naar een agent komt
- waarom agent‑denken iets anders is dan prompten
- en waar het misgaat zonder goede afspraken en data
Session 2: How to Protect Your Tokens with Intune & Conditional Access - Arno van Dijk
When accessing resources with Single Sign On, the Microsoft Services makes use of a Primary Refresh Token (PRT). This token is created when a device is registered so it can make use of Single Sign On. Now a days token theft is becoming a huge problem. Luckily Microsoft has released several features to reduces the possibility for Token theft. Read on to learn more about the profile possibilities in Intune and how to enforce your token protection with Conditional Access
Session 3: How Not to Manage Your Microsoft 365 Tenant: And What to Do Instead - Dave Stork
Managing a Microsoft 365 tenant can be deceptively simple (it is a commodity, right! Right?), but small misconfigurations can lead to security gaps and vulnerabilities. In this session, Microsoft MVP Dave Stork highlights common mistakes he encounters in real-world M365 environments and explains why they introduce unnecessary risk.
More importantly, he demonstrates practical, secure alternatives based on Microsoft's latest guidance, CIS benchmarks, and field experience.
Attendees will learn how to strengthen administrative identity, access, and posture with approaches such as least‑privilege administration, secure account design, Conditional Access, privileged access management, and automation-first operations.
Expect pragmatic insights, recognizable examples, and actionable recommendations to immediately improve your tenant’s management.




