Promotional Agenda Secure and Resilient Architectures in Microsoft Foundry Live Troubleshooting Week with MVP & MCT Agnieszka Mietz‑Blijleven
30 March – 3 April 2026
Daily from 18:00–20:00 CET — About the Series Join Most Valuable Professional and Microsoft Certified Trainer Agnieszka Mietz‑Blijleven for a five‑day deep‑dive into Microsoft Foundry architecture, configuration, and cybersecurity hardening. This series goes far beyond theory — every session includes live troubleshooting, real‑world scenarios, and step‑by‑step reasoning from an experienced architect and cybersecurity expert. Whether you are an engineer, architect, security specialist, or technical leader, this week will equip you with practical skills to design, secure, and operate Foundry environments at enterprise scale. —
Daily Agenda —
Monday — 30.03.2026 Session 1: Foundations of Secure Architecture in Microsoft Foundry
18:00–20:00 CET Kick off the week with a deep architectural overview of Foundry. Learn how to design secure, resilient environments and avoid the most common misconfigurations that impact performance and security. Key topics: • Foundry architecture layers and secure-by-default design • Workspace isolation and environment boundaries • Governance alignment with Zero Trust, CIS, and NIST • Identifying architectural drift and anti‑patterns • Live demo: diagnosing a misconfigured workspace topology —
Tuesday — 31.03.2026 Session 2: Live Troubleshooting of Foundry Workspaces and Data Pipelines
18:00–20:00 CET A fully hands-on session focused on debugging real Foundry workloads. Watch live as performance issues, pipeline failures, and configuration errors are identified and resolved. Key topics: • Root-cause analysis for pipeline failures • Compute cluster diagnostics and performance tuning • Secrets, environment variables, and configuration validation • Live demo: fixing a failing ingestion pipeline and optimizing compute pools —
Wednesday — 1.04.2026 Session 3: Identity, Access, and Zero Trust Hardening in Foundry
18:00–20:00 CET Identity is the new security perimeter — and this session shows how to secure it properly. Learn how to enforce Zero Trust principles and eliminate identity risks in Foundry. Key topics: • Role-based access, service principals, and managed identities • Least privilege enforcement and micro-segmentation • Conditional Access, MFA, and PIM integration • Live demo: detecting and correcting an overly permissive identity path —
Thursday — 2.04.2026 Session 4: Observability, Telemetry, and Incident Response in Foundry
18:00–20:00 CET Visibility is essential for security and reliability. This session shows how to build full observability into Foundry and respond effectively to incidents. Key topics: • Logs, metrics, traces, and event correlation • SIEM/SOAR integration for enterprise monitoring • Incident response workflows and forensics • Live demo: investigating a suspicious identity action and tracing a pipeline failure —
Friday — 3.04.2026 Session 5: Architecting Resilient, Secure, and Scalable Foundry Environments
18:00–20:00 CET The final session brings everything together into a complete architectural blueprint. Learn how to design Foundry environments that scale, self-heal, and remain secure over time. Key topics: • Enterprise-scale patterns and governance blueprints • Resilience engineering and failover strategies • Policy-as-code, drift detection, and automated guardrails • Live demo: applying governance controls and running a resilience test —
Who Should Attend • Cloud architects • Security engineers • DevOps/SRE professionals • Data engineers • Technical leaders and decision-makers • Anyone responsible for securing or operating Foundry environments —
Why This Series Stands Out • 100% practical, scenario-driven content • Live troubleshooting with real architectural challenges • Clear explanations from an experienced MVP & MCT • Immediate takeaways you can apply in your environment • A complete journey from fundamentals to advanced hardening.