Bram de Jager is a seasoned professional with a passion for architecting robust solutions within the Microsoft ecosystem. His expertise lies at the intersection of Data Security & Compliance and Information Management in the Microsoft 365 environment. Bram’s commitment to excellence has earned him the prestigious Microsoft Certified Master (MCM) certification, a testament to his deep technical knowledge and practical experience. As a Microsoft 365 & Security Architect at Advice Matters, Bram leverages his expertise to design and implement secure and efficient Microsoft 365 solutions. Whether it’s configuring compliance features, managing identities, or safeguarding sensitive data, Bram ensures organizations can harness the full potential of Microsoft’s productivity suite and helps navigate their cloud journey. His dedication to enhancing data security and protection within the Microsoft 365 ecosystem makes him an invaluable asset to organizations seeking to thrive in the digital age. Bram’s commitment extends beyond technical excellence. He actively contributes to the community as a Microsoft MVP, sharing insights, best practices, and real-world experiences through conferences, webinars, and blog posts. He is active as a board member of two user groups in The Netherlands: the DIWUG and DSSCC. His passion for continuous learning and knowledge dissemination makes him a sought-after speaker at industry events. When not immersed in technology, Bram enjoys exploring Europe with the family, workout at the gym or play tennis, and savoring a good cup of coffee. Connect with Bram on LinkedIn to stay updated on his latest endeavors and insights.
We are all connected making secure collaboration essential for protecting sensitive information while enabling seamless teamwork. Join us for an in-depth session on setting up secure collaboration with Microsoft Teams, where we will explore the best practices and tools to ensure your organization's data remains protected. This session will cover: • An overview of the key components and products involved in secure collaboration, including Microsoft Teams, SharePoint, and OneDrive. • A detailed explanation of the three tiers of protection to configure in Teams: ○ Tier 1: Basic Protection - Suitable for general information with minimal sensitivity, allowing sharing with anyone, including unauthenticated users. ○ Tier 2: Enhanced Protection - Designed for internal sharing of sensitive information, restricting access to specific people within the organization. ○ Tier 3: Advanced Protection - For highly sensitive information, enabling secure collaboration with specific individuals both inside and outside the organization, with stringent security and compliance requirements. • Practical steps to configure settings for sharing information of any sensitivity with people outside your organization. • And demos showing how-to configure the three different tiers of protection within a Microsoft 365 tenant. By the end of this session, you will have a comprehensive understanding of how to set up and manage secure collaboration environments using Microsoft Teams, empowering your organization to collaborate safely and efficiently.
Read moreIn today's digital landscape, security is paramount. Join me for an insightful session on the "Secure by Default" approach with Microsoft Purview, where we will explore how to enhance your organization's security posture by leveraging default settings that prioritize protection without compromising productivity. This session will cover: • An introduction to the "Secure by Default" strategy and its four phases: 1) Foundational, 2) Managed, 3) Optimized, and 4) Strategic. • Practical steps to implement secure-by-default sensitivity labeling, ensuring your data is protected from oversharing and unauthorized access. • How to use label publishing defaults and auto-labeling in Office clients to streamline deployment and achieve rapid adoption. • Recommended practices for configuring secure-by-default settings in SharePoint and Teams to reduce risks associated with unintentional data exposure. • Tips for training end users to manage exceptions effectively, accelerating the adoption of secure practices across your organization. By the end of this session, you will have a comprehensive understanding of how to deploy and manage Microsoft Purview's secure-by-default features, empowering your organization to stay ahead of potential threats while maintaining a seamless user experience.
Read moreAs organizations embrace the power of artificial intelligence (AI) and collaborative tools, it’s crucial to address the intersection of Data Security and Information Governance. In this session, we’ll delve into how GenAI and Copilot are transforming work and what you need to know to safeguard your data effectively. During this session we will go over the following topics to understand how Microsoft Purview helps safeguarding your organization today. 1. GenAI and Copilot: Understand the capabilities and impact of these cutting-edge technologies within Microsoft 365. 2. Microsoft Purview Information Protection: Explore how Purview enhances data discovery, classification, and protection across your organization. 3. Data Loss Prevention (DLP): Learn strategies to prevent accidental or intentional data leaks and protect sensitive information. 4. Insider Risk Management: Discover tools and practices to mitigate risks posed by internal users and safeguard against insider threats. 5. Information Governance is the foundation: Understand why having a good information governance is crucial for your Data Security practice. Don’t miss this opportunity to gain insights and elevate your understanding of Data Security and Information Governance. Let’s prepare for the future together!
Read moreData Security is gaining momentum, although it has been around for a long time. Especially Copilot is surfacing data in new places and makes data more accessible which drives the need for a solid Data Security strategy. Join me for an insightful session where we delve into five essential tips to ensure the success of your Data Security strategy. During the session I will discuss organizational aspects and technology, including tips on what is driving your strategy and which technology supports this. We'll explore practical strategies and best practices to help you navigate the complexities of data security. Learn how to effectively implement Information Protection to safeguard your sensitive data, utilize Sensitivity Labels to classify and protect your information, deploy DLP policies to prevent data breaches, and gain insights into GenAI use by your employees. Whether you're just starting your data security journey or looking to enhance your existing measures, this session will provide you with the knowledge and tools you need to succeed. Don't miss this opportunity to gain valuable insights and take your data security journey to the next level!
Read more