Yannick Dils
Cloud Solution Architect| MCT
Antwerpen, Belgium
Actions
Working in IT for over 15 years now, coming from an Infrastructure background. Last couple of years I have been focusing on guiding customers and partners on their cloud journey. Walking them from IaaS to SaaS and helping them make the right choice is what keeps me going day 2 day.
Area of Expertise
Topics
Jurassic Governance - 10 tips to save your resources from extinction
"Ooh, ah," that's how it always starts. But then later there's running and screaming. Disaster is bound to happen, so let's see how we can store our embryos in a secure location. Prevent Doctor Who from creating any hybrid monsters. And make sure our fences are always working and that our assets are highly secured.
Depending on the timeframe more demos can be provided during the session. 30-60 minutes session.
Sure, we can migrate that!
"Oh what? Yes, certainly! Of course, it will work in the Azure Cloud!" Have you ever been in this situation but don't really know how to get started? Luckily for you, migrating to the Azure cloud is the easiest thing in the world. In this session, we will show you how!"
This session is all about real-world issues during migrations to Azure and how to prevent or tackle them.
Automating Azure Migrations
Migrating resources to Azure has never been more accessible with all the latest automation possibilities that Azure Migrate offers. This session will cover the different automation possibilities from onboarding an Azure Migrate project until the final migration of a resource to Azure.
Session timing: 30-50min
Mind the Gap: Demystifying Azure Networking for Developers
Networking in Azure often feels like a black box - especially for developers trying to make sense of VNETs, address spaces, private endpoints, firewalls, and reverse proxies. In this session, we’ll break it down in developer-friendly terms, using a practical, scenario-driven approach.
Join us as we explore how to:
-Design IP address spaces that won’t haunt you later - especially when working with containers and overlapping ranges.
-Connect APIs, Functions, and Containers to private networks without breaking your CI/CD flows.
-Leverage Azure Private Endpoints, Application Gateway, and API Management securely in a microservices context.
-Introduce Azure Firewall in a way that doesn’t get in your way - but still protects your workloads.
-Debug the invisible: Understand common issues we've seen in real-world projects and how to avoid them.
Expect whiteboard sketches, war stories from the trenches, and code-centric networking patterns that developers can actually use.
Whether you’re building cloud-native apps or integrating with legacy backends, this session will help you treat Azure networking not as a blocker - but as an enabler.
-Session Type: Breakout session (preferred duration: 45 minutes)
-Delivery: This will be the first public delivery of this session.
-Speakers: Two co-speakers with hands-on Azure experience in AppDev and Infra domains
-Technical Level: 300 (Intermediate to Advanced)
-Target Audience:
--Developers building apps in Azure using App Services, Container Apps, Functions, and APIM
--DevOps engineers and cloud architects responsible for connectivity, security, and scalability
--Anyone confused by networking acronyms but responsible for “just making it work”
-Technical Requirements:
--Internet access (for demos and live diagrams)
--Whiteboard or flipchart (optional but preferred for interactive diagrams)
--Projector/Screen + audio for code walkthroughs and short demo videos
-Demo Tools Used: Azure CLI, Bicep, Visual Studio Code, Azure Portal
-Related Topics: Azure Private Link, VNET integration, Azure Firewall policies, Application Gateway WAF, API Management in internal mode, Container networking strategies
-Bonus: All session materials and reference architectures will be published on GitHub after delivery.
You don’t need more skills. You need a skills strategy.
Digital transformation improves when organizations stop treating skills as a shortage and start managing them as a portfolio. Learn how to segment skills by business uniqueness and pace of change, then apply the right mix of upskilling, insourcing, and partnering.
Expect a clear storyline, concrete examples, and a practical framework to turn skill decisions into measurable impact.
Target audience: CIO/CTO, IT & transformation leaders, product/platform leaders, enterprise architects, HR/L&D.
Session format: Keynote with practical framework and examples.
Includes: Skills portfolio framework, sourcing/upskilling decision model, measurement ideas.
Duration: 30–45 minutes ( adjustable )
The session is the basis of a new framework that is under development, including a book that is in the progress of being written.
No, the hypervisor cannot read this: Confidential AVD from build to attestation.
Standard virtual machines offer no protection against a compromised hypervisor, cloud operator access, or memory dump attacks. Azure Confidential Computing changes that guarantee at the hardware level, and Azure Virtual Desktop now supports it.
In this session, we walk end-to-end through building and deploying a fully confidential AVD environment: from automating image creation with Azure Image Builder and Bicep IaC, to configuring Customer-Managed Keys backed by a Managed HSM, to deploying DCasv5 session hosts with SEV-SNP memory encryption enabled.
The session closes with a live attestation walkthrough: we request a hardware-signed JWT from the Azure Instance Metadata Service, decode the MAA token, and verify that the workload is genuinely running on AMD SEV-SNP hardware with the expected boot measurements.
You will leave with a clear mental model of confidential compute, a reusable Bicep and PowerShell codebase, and the ability to prove to auditors and regulators that your AVD environment meets hardware-level isolation guarantees.
Target audience: Cloud architects, Azure administrators, and security engineers working on regulated or sensitive workloads. Intermediate to advanced level; familiarity with Azure Virtual Desktop and basic IaC concepts is assumed.
Preferred duration: 45 or 60 minutes (including live demo). Can be adapted to 75 minutes with extended Q&A and a deeper attestation policy walkthrough.
Technical requirements: Projector or large display at 1920x1080 minimum. Reliable internet connection required for the live Azure demo. A fallback recorded demo is available if live connectivity cannot be guaranteed.
Session tags: Azure Virtual Desktop, Confidential Computing, Security, IaC / Bicep, Azure Image Builder,
Additional resources:
All code referenced is publicly available at github.com/yannickdils/confidentialavd.
Supporting blog posts are published at tunecom.be.
Code, Cloud, Agents: Reinventing Disaster Recovery as Code
Your disaster recovery plan is a PDF. It was last updated 18 months ago. It references three deprecated services, two engineers who have left the company, and a runbook step that no longer works because the portal has been redesigned twice since.
This is not a technology problem. It's an architecture problem, and the same discipline that turned infrastructure into code can turn disaster recovery into code. We call it DRaaC: Disaster Recovery as Code.
In this session, we'll walk through a working DRaaC implementation built on Azure DevOps or GitHub Actions:
Ppipelines that scan your subscriptions on every PR, exports the live state, generates DR-ready Bicep for a secondary region, detects drift, and posts a structured compliance report directly on the pull request.
The interesting part is what happens around it. We'll cover the forward loop, where code merges trigger DR deployments, and the reverse loop, where portal changes get reverse-engineered back into the repo and into the DR region automatically.
The reverse loop is where agents earn their place: taking lossy decompile output and shaping it into clean Bicep that matches your repo conventions, then opening a PR that re-enters the forward loop like any other change.
We'll be honest about the hard parts: the reserved Azure subnet names that break naive transformation, the resource types that don't export, the data-plane replication that Bicep can't touch, the traffic routing that "near-zero downtime" actually requires.
And we'll be clear-eyed about agents: where they belong (contextual reasoning, refactoring), where they don't (as primary security scanners), and how to scope their autonomy so they help instead of haunt.
You'll leave with a clear architectural pattern, a list of the constraints to design around, the open-source pipeline that implements it, and a frank view of what's solved versus what still needs human judgement.
Your disaster recovery plan is a PDF. It's outdated, it's untested, and it's the wrong shape for a world where everything else is code. This session shows a working pattern for treating DR as a code artefact: Pipelines where pull requests deploy DR alongside production, portal changes reverse-engineer themselves back into the repo, and AI agents handle the contextual work humans used to do at 3am. With the open-source implementation, the constraints, and the honest limits.
CloudBrew 2025 - A two-day Microsoft Azure event Sessionize Event
Techorama 2022 BE Sessionize Event
Azure Summit Sessionize Event
Azure Back to School 2021 Sessionize Event
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top