On-demand webinar

Movers, Joiners, and Leavers: Managing personnel changes and external users in M365

“It is easier for an external or internal threat actor to gain unauthorized access to enterprise assets or data through using valid user credentials than through ‘hacking’ the environment.” (CIS Control 5: Account Management)

The native Microsoft 365 features allow for collaboration with external users. But, like any powerful tool, your M365 environment must have the right measures in place to maintain security and compliance baselines.

You might be wondering:

  • How can we allocate licenses to internal and guest users so that everyone can do their jobs?
  • What's the best way to evaluate our current security setup for all users, regardless of their location or role?
  • How can we maintain a consistent, efficient review process for user access rights?

Get your user and guest access questions answered in our upcoming webinar, “Movers, Joiners, and Leavers: Managing personnel changes and external users in Microsoft 365.” Microsoft expert Roy Martinez and MVP nominee Kas Nowicka will walk through best practices and tips for governing users in Microsoft 365.  

You’ll walk away with insights on:

  • How to allocate and manage licenses effectively and securely
  • Recommended security measures to implement for all internal and external users
  • Developing systems and processes to assess user access rights on an ongoing basis

Register for the on-demand webinar today!

G2 5 stars
"Since implementing Simeon, our team has reduced the time spent managing endpoint configurations and building Intune application packages by an order of magnitude.”
– Eric Levin, CTO, GCM Grosvenor
G2 5 stars
"Simeon has given us full strategic control over all our regulatory fiduciary and machine learning environments which provides much-needed informational governance."
– Glenn Hann, CIO, Starmark Financial
G2 5 stars
“Our team would spend countless hours to upkeep and ensure Microsoft 365 configuration consistencies and still, gaps are everywhere. Thanks to Simeon, we can now focus on providing white glove customer service."
– Chee Lam, CEO, Deskflix

Join us for a live webinar on strengthening your identity security

Learn how to protect your organization from today’s most advanced threats using Microsoft Entra Apps. This expert-led session covers key security best practices, real-world attack scenarios, and practical steps to harden your identity perimeter, all powered by CoreView’s advanced capabilities.

Hacker in a hoodie using a computer with a digital world map overlay

Why you should attend

Checkmark
Get a breakdown of the Midnight Blizzard attack — what happened, how it worked, and why it matters
Checkmark
Understand the role of Entra Apps in Microsoft 365’s security architecture
Checkmark
Learn proactive strategies to detect, monitor, and respond to app-based threats
Checkmark
See how CoreView helps you audit, control, and remediate Entra app vulnerabilities
Checkmark
Walk away with actionable tips and resources to strengthen your security posture immediately

Whether you're a seasoned security leader or looking to improve your Microsoft 365 compliance strategy, this session will provide actionable steps you can implement immediately.

CIS Compliance in Microsoft 365 is challenging…

With thousands of Microsoft 365 configurations across multiple business units and locations, achieving consistent policy enforcement and audit-readiness is nearly impossible. And manual compliance processes lead to misconfiguration, leaving you vulnerable to cyberattacks.

CIS Compliance in Microsoft 365: From Theory to Practice

Watch now and take the first step towards automated security and compliance.

Transform CIS controls into actionable, enterprise-scale security

Join CIS and cyber security experts to learn how to simplify CIS compliance in Microsoft 365. In this exclusive webinar for enterprise security teams, we’ll dive into:

Checkmark
Applying CIS Benchmarks across Microsoft 365—without combing through 400+ pages of guidelines
Checkmark
Improving compliance workflows to reduce risk and overhead
Checkmark
Achieving CIS Compliance at scale with automated configuration management

Whether you're a seasoned security leader or looking to improve your Microsoft 365 compliance strategy, this session will provide actionable steps you can implement immediately.

Watch now

Meet the expert panelists

John Stevenson, Senior Product Marketing Manager at CoreView
John Stevenson
Senior Product Marketing Manager
CoreView
John brings over 25 years of cybersecurity experience across anti-malware, email and web security, access management, and air-gapped networks. Before joining CoreView, he led product marketing for critical infrastructure at Skybox Security, Forcepoint, and Deep Secure, supporting defense and government agencies globally.
Alberto Brianza, Director of Product at CoreView
Alberto Brianza
Director of Product
CoreView
Alberto has over 6 years of product management experience focused on turning complex M365 challenges into clear, impactful solutions. At CoreView, he leads product strategy to simplify M365 security, governance, and administration—helping IT teams streamline operations and maximize efficiency.

Meet the expert panelists

Susan Lindquist, Center for Internet Security
Susan Lindquist
CIS
Terence Jackson, Microsoft
Terence Jackson
Microsoft
Watch now