Johannes Muller is a passionate IT professional and public speaker with a strong affinity for Microsoft technologies. He thrives in dynamic environments that embrace and adapt to emerging technologies ideally before they turn into empty buzzwords. In today’s fast-paced digital world, staying current with industry trends and translating them into meaningful, real-world solutions is what drives him. Johannes believes there is always a way to reach your goals. Even when technology (or budgets) seem determined to test your patience. He is often described as knowledgeable, open-minded, and forward-thinking, with a sharp eye for both today’s demands and tomorrow’s challenges. Committed to continuous learning and self-improvement, Johannes constantly looks for smarter, more engaging ways to approach complex topics without losing the human side of technology. It is a privilege for him to share his knowledge, experience, and personal perspective on modern IT with his audience, aiming to leave people inspired, better informed and reassured that technology can be powerful, practical, and even enjoyable.
Sharing platforms like WeTransfer, Dropbox or Google Drive are often seen as the data leakage risk. In reality, they are only the symptom, not the root cause. In this session, we take a step back and rethink Data Loss Prevention from a modern perspective. Instead of focusing on blocking individual websites, we demonstrate how Microsoft Purview shifts DLP from blocking tools to protecting data, using classification, endpoint controls and user-aware policies. We will walk through common data exfiltration scenarios, explain why traditional network-based controls fall short and show how Purview DLP, Endpoint DLP and sensitivity labels work together to create a data-centric security model. You’ll learn how to balance security, usability and governance, including real-world design choices, licensing considerations and user experience. This session is for the professionals who want to move beyond blocking tools and start protecting what really matters: the data itself.
Read moreMany organizations move to Azure expecting flexibility, scalability, and predictable costs. Yet year after year, the Azure bill keeps growing and budgets are getting exceed before the first week ends. Often without a clear explanation. We take a realistic look at why Azure costs increase even when environments seem unchanged. Spoiler: it’s usually not caused by price increases allone and it’s rarely a single service. We explore the most common hidden cost drivers seen in Azure environments, including data growth, logging and monitoring consumption, backup and retention policies, networking charges, and “small” or "historical" architectural decisions that quietly add up. We’ll also cover recent developments in Azure Cost Management and FinOps such as improved cost analysis, better anomaly detection, commitment-based discount and the growing importance of cost governance instead of ad-hoc optimization. Rather than focusing on cost cutting tricks this session shows how to design Azure environments that remain financially sustainable at scale. As an attendee you will leave use with practical insights, design considerations and governance principles to regain control over their Azure spend without sacrificing performance or security. And yes, we will share our own practices that give us tears when it happens but now, we can laughter about.
Read moreTraditional VPNs were designed for a world with fixed locations, static networks and permanent access. Basically a world before Covid-19. That world no longer exists. In this session we explore how Microsoft Entra Private Access and Entra Internet Access, part of Microsoft’s Global Secure Access platform, enable a fundamentally different approach to connectivity. One that is identity-driven, Zero Trust by design and built for modern hybrid environments. We’ll look at recent innovations such as identity-aware access to private resources, secure internet breakout for Microsoft and SaaS services, guest access scenarios and the ability to restrict access to Microsoft services unless traffic is routed through Entra Internet Access. These capabilities allow organizations to enforce security controls far beyond what traditional VPNs or firewalls can offer. We will share a real-world design pattern where sensitive internal resources are no longer permanently accessible. Instead, access is granted just-in-time, time-bound and fully governed allowing users to request temporary access only when needed, without exposing the network or relying on always-on connectivity. As an attendee you will gain a clear understanding of how identity, context and time-based access come together to replace VPN complexity with a more secure and manageable access model.
Read more