SQLBits 2024
Understanding Zero Trust security
In this session we will look at what Zero Trust principles are. Zero Trust is the modern way to apply security. It assumes a breach, verifies every user, and enforces least privilege, giving users access only to the private applications and resources they need. It no longer secures the perimeter (the network boundaries) which doesn't scale in the modern world.
We will see how it applies to your Microsoft services like Microsoft Fabric too.
The world is evolving at a rapid pace. Your users are all over the world, looking at your data from the airport Wifi and being threatened by bad actors trying to get at your data. At the same time, we are moving more and more of our services and data to the cloud with easy-to-use SaaS services like Microsoft Fabric instead of securing networks or VM's.
In the last couple of years, the industry is moving from this traditional network security approach that uses legacy VPNs or perimeter security that simply cannot scale to modern demands. Once your remote users connect to your corporate network through VPN, they are granted excessive access to your entire network, all it takes is a single compromised user account, infected device, or open port for an attacker to gain entry, move laterally, and access your most critical assets.
Instead, the industry is pushing for Zero Trust principles. It assumes a breach, verifies every user, and enforces least privilege, giving users access only to the private applications and resources they need.
In this introduction session we will look at what Zero Trust is and how to apply it to your Microsoft services like Microsoft Fabric.
In the last couple of years, the industry is moving from this traditional network security approach that uses legacy VPNs or perimeter security that simply cannot scale to modern demands. Once your remote users connect to your corporate network through VPN, they are granted excessive access to your entire network, all it takes is a single compromised user account, infected device, or open port for an attacker to gain entry, move laterally, and access your most critical assets.
Instead, the industry is pushing for Zero Trust principles. It assumes a breach, verifies every user, and enforces least privilege, giving users access only to the private applications and resources they need.
In this introduction session we will look at what Zero Trust is and how to apply it to your Microsoft services like Microsoft Fabric.
Speakers
Kasper de Jonge's other proposed sessions for 2026
Unlocking AI Potential: Leveraging Your Data with Microsoft Fabric - 2026
The Ultimate Fabric Security Deep Dive You Didn’t Know You Needed - 2026
Kasper de Jonge's previous sessions
Fabric security: everything you need to know!
Learn how Microsoft Fabric makes sure your data is secure. Did you know for example that all data is encrypted by default? Or that you can configure MFA for all your users? Fabric offers many of these possibilities and more out of the box without most of us knowing! In this session you will learn everything to convince your security team
Understanding Zero Trust security
In this session we will look at what Zero Trust principles are. Zero Trust is the modern way to apply security. It assumes a breach, verifies every user, and enforces least privilege, giving users access only to the private applications and resources they need. It no longer secures the perimeter (the network boundaries) which doesn't scale in the modern world.
We will see how it applies to your Microsoft services like Microsoft Fabric too.
The Power BI Engine in 20 minutes
In this action-packed session we will investigate how the Power BI engine works. From loading the data through M to its fast vertipaq engine.
The Power BI secret sauce: Security and governance
Learn how to convince your security team that Power BI's security and governance features are secure. It's baked in features that allow your org to upload your upload your data to the cloud and enable self-service in a safe and managable way.
Debugging common DAX and Model performance issues
In this session, we will explore real world DAX and Model performance scenario's. These scenarios range from memory pressure to high CPU load. Watch as we will dive into the model and improve performance by going through concrete examples.
Microsoft Power BI Premium: Building enterprise-grade models
Power BI Premium enables you to build comprehensive, enterprise-scale analytic solutions that deliver actionable insights through Microsoft Power BI. The session will focus on performance, scalability, and application lifecycle management (ALM).
Power BI security deep dive
One hot topic with Power BI is security, in this deep dive session we will look at all the aspects of security of Power BI, from users, logging to where and how your data is stored andleverage additional Azure services to secure it even more.
Understanding the Power BI data model
In this session we will look at all the important topics that are needed to get your Power BI modelling skills to the next level. We will cover the in memory engine, relationships, DAX filter context, DAX vs M and DirectQuery.
Developing For PowerBI
The Power BI Preview service offers developers a rich API service for anyone to interact with Power BI programmatically and create applications for Power BI. In this session we will introduce you to the Power BI developer story
Building Great Models for Crescent
SQL Server Code Name Denali Reporting Services will include Project Crescent for visualizing, interacting with and presenting data. Project Crescent. Come to this session to see how to make the most of this new tool.