Skip to content

Details

Details
The Workplace Ninja User Group Netherlands is proud to announce that on Wednesday the 1st of April 2026 we will organize our 2nd in-person event in the year 2026.

Program:
15:30 - 16:00: Welcome at location
16:00 - 17:00: Session 1: Jorik Polhuis “Copilot als reality check: wanneer AI je project niet spaart”
17:05 - 18:05: Session 2: Arno van Dijk, "How to Protect Your Tokens with Intune & Conditional Access"
18:05 - 19:00: Food, drinks and networking, sponsored by location host
19:00 - 20:00: Session 3:
20:00 - 21:00: Drinks and networking

Location: \

Session 1: Jorik Polhuis “Copilot als reality check: wanneer AI je project niet spaart”

Wat gebeurt er als je Copilot vraagt om eerlijk te zijn over je project?
In deze sessie bouwen we samen een agent die niet samenvat, maar kritisch meedenkt: wat klopt hier niet, wat missen we, en waar lopen we risico zonder het te benoemen?

Aan de hand van een herkenbare projectcase laten we zien:

  • hoe je van een idee naar een agent komt
  • waarom agent‑denken iets anders is dan prompten
  • en waar het misgaat zonder goede afspraken en data

Session 2: How to Protect Your Tokens with Intune & Conditional Access - Arno van Dijk

When accessing resources with Single Sign On, the Microsoft Services makes use of a Primary Refresh Token (PRT). This token is created when a device is registered so it can make use of Single Sign On. Now a days token theft is becoming a huge problem. Luckily Microsoft has released several features to reduces the possibility for Token theft. Read on to learn more about the profile possibilities in Intune and how to enforce your token protection with Conditional Access

Session 3: How Not to Manage Your Microsoft 365 Tenant: And What to Do Instead - Dave Stork

Managing a Microsoft 365 tenant can be deceptively simple (it is a commodity, right! Right?), but small misconfigurations can lead to security gaps and vulnerabilities. In this session, Microsoft MVP Dave Stork highlights common mistakes he encounters in real-world M365 environments and explains why they introduce unnecessary risk.
More importantly, he demonstrates practical, secure alternatives based on Microsoft's latest guidance, CIS benchmarks, and field experience.

Attendees will learn how to strengthen administrative identity, access, and posture with approaches such as least‑privilege administration, secure account design, Conditional Access, privileged access management, and automation-first operations.

Expect pragmatic insights, recognizable examples, and actionable recommendations to immediately improve your tenant’s management.

Related topics

Events in Hoevelaken
Microsoft Azure
New Technology
Microsoft
Enterprise Mobility

Sponsors

AvePoint

AvePoint

Gold sponsor

ControlUp

ControlUp

Gold Sponsor

Inforcer

Inforcer

Gold sponsor

Recast

Recast

Gold Sponsor

You may also like