I am a technology evangelist helping companies to design, implement and secure Microsoft 365. As Microsoft MVP, I also travel the world to speak at events, conferences, and user groups to talk about technology and to make sure people do not make the same expensive mistakes that I made.
One of the most important steps in your Microsoft 365 journey is setting up and configuring your tenant. It’s just next, next, finish - right? Look again! In this session, Thomas will guide you through some essential tasks and decisions you need to make as well as the foundational technologies you might want to revisit (DNS anyone?). You will learn about some hidden gems and good practices that will help you optimize your tenant performance and security. Additionally, we will cover some more advanced scenarios, such as multi-geo and multi-tenant deployments. Whether you are a new or an existing Microsoft 365 IT professional, this session will provide you with valuable insights and tips from the field.
Read moreGit and GitHub are everywhere - but many of us still feel like we’re faking it. What’s the difference between clone and fork? Why does rebase feel like magic (or mayhem)? And how do you fix a commit that went horribly wrong? In this practical, beginner-friendly session, we’ll walk through the real-world git and GitHub scenarios developers ánd administrators deal with daily. You’ll learn how to undo mistakes, work smarter with branches and pull requests, and finally understand the tools and terms that often go unspoken. Whether you’re maintaining code or managing teams, you’ll leave with a clearer mental model and practical tips to make git and GitHub less intimidating and more powerful. No question is too small, and no shame is allowed - this is your safe space to level up your git game.
Read moreAgents are multiplying. Some just answer questions; others act on behalf of users, pulling data and triggering workflows without direct oversight. If you're not governing them now, you're accepting risk you haven't measured and costs you haven't approved. This session arms IT administrators with the controls that matter: boundaries on connectors and data access, tenant-wide sharing restrictions, identity assignment and lifecycle management, and detection policies for risky or sensitive interactions. We'll also cover orphaned agents, billing models, and how to build audit trails that survive scrutiny. Expect demos, real scenarios, and configurations you can apply immediately.
Read moreAI agents and automations do not use passwords or MFA, yet they authenticate and access data continuously. Treated like normal users, they become hard to track, easy to over-permission, and difficult to audit. This session shows Microsoft 365 admins how to apply Zero Trust to non-human identities at scale using Microsoft Entra. You will learn how these identities differ from user accounts, what “good” access control looks like in practice, and how to block risky access before it reaches sensitive resources. We will also cover governance patterns that keep ownership clear and permissions time-bound, so every non-human identity has accountability and built-in review.
Read more