SQLBits 2024
Understanding Zero Trust security
In this session we will look at what Zero Trust principles are. Zero Trust is the modern way to apply security. It assumes a breach, verifies every user, and enforces least privilege, giving users access only to the private applications and resources they need. It no longer secures the perimeter (the network boundaries) which doesn't scale in the modern world.
We will see how it applies to your Microsoft services like Microsoft Fabric too.
The world is evolving at a rapid pace. Your users are all over the world, looking at your data from the airport Wifi and being threatened by bad actors trying to get at your data. At the same time, we are moving more and more of our services and data to the cloud with easy-to-use SaaS services like Microsoft Fabric instead of securing networks or VM's.
In the last couple of years, the industry is moving from this traditional network security approach that uses legacy VPNs or perimeter security that simply cannot scale to modern demands. Once your remote users connect to your corporate network through VPN, they are granted excessive access to your entire network, all it takes is a single compromised user account, infected device, or open port for an attacker to gain entry, move laterally, and access your most critical assets.
Instead, the industry is pushing for Zero Trust principles. It assumes a breach, verifies every user, and enforces least privilege, giving users access only to the private applications and resources they need.
In this introduction session we will look at what Zero Trust is and how to apply it to your Microsoft services like Microsoft Fabric.
In the last couple of years, the industry is moving from this traditional network security approach that uses legacy VPNs or perimeter security that simply cannot scale to modern demands. Once your remote users connect to your corporate network through VPN, they are granted excessive access to your entire network, all it takes is a single compromised user account, infected device, or open port for an attacker to gain entry, move laterally, and access your most critical assets.
Instead, the industry is pushing for Zero Trust principles. It assumes a breach, verifies every user, and enforces least privilege, giving users access only to the private applications and resources they need.
In this introduction session we will look at what Zero Trust is and how to apply it to your Microsoft services like Microsoft Fabric.
Speakers
Kasper de Jonge's other proposed sessions for 2026
Unlocking AI Potential: Leveraging Your Data with Microsoft Fabric - 2026
The Ultimate Fabric Security Deep Dive You Didn’t Know You Needed - 2026
Microsoft Fabric, Lakehouses and Power BI: A guide for BI developers - 2026
Kasper de Jonge's previous sessions
Fabric security: everything you need to know!
Learn how Microsoft Fabric makes sure your data is secure. Did you know for example that all data is encrypted by default? Or that you can configure MFA for all your users? Fabric offers many of these possibilities and more out of the box without most of us knowing! In this session you will learn everything to convince your security team
Understanding Zero Trust security
In this session we will look at what Zero Trust principles are. Zero Trust is the modern way to apply security. It assumes a breach, verifies every user, and enforces least privilege, giving users access only to the private applications and resources they need. It no longer secures the perimeter (the network boundaries) which doesn't scale in the modern world.
We will see how it applies to your Microsoft services like Microsoft Fabric too.