Organizations are continuously adding more and more layers of security to their corporate devices. They're keeping them up to date, patching vulnerabilities, enforcing security configurations, deploying EDR and AV solutions, and granting access through device compliance. But how are we going to protect those unmanaged devices that we have no visibility into or control over? Looking the other way will leave our business vulnerable to cyberattacks, unauthorized access and data leaks. In this session, we're going to identify the different user groups that work from unmanaged devices, and then explore, implement, and combine solutions such as MAM for Windows, session policies, MTD connectors, Edge for Business, in-browser protection, device-bound passkeys, and more! By the end of this session, you'll be fully prepared to implement solutions that protect your business from the threat of unmanaged devices.
Myron works for one of the leading IT-service providers in the Netherlands called Pink Elephant. His primary focus is developing security products and services based on Microsoft technology. The unique selling point of these offerings is to make work environments safe and, more importantly, keep them safe. As a Microsoft Security MVP, he enjoys sharing his knowledge and experience with others by writing blog posts, speaking at events and conferences, and co-organizing the monthly Dutch Microsoft Security Meetup with 2000+ members. Besides Microsoft Security, he lives happily in the Netherlands with his wife. In his free time, he enjoys snowboarding and geeky activities like reading fantasy/sci-fi books or playing board games or video games.