Myron Helgering
Pink Elephant
Tech Lead Security
Netherlands

Microsoft MVP | Microsoft Security | Blogger | Speaker | Fantasy Geek

Myron works for one of the leading IT-service providers in the Netherlands called Pink Elephant. His primary focus is developing security products and services based on Microsoft technology. The unique selling point of these offerings is to make work environments safe and, more importantly, keep them safe. As a Microsoft Security MVP, he enjoys sharing his knowledge and experience with others by writing blog posts, speaking at events and conferences, and co-organizing the monthly Dutch Microsoft Security Meetup with 2000+ members. Besides Microsoft Security, he lives happily in the Netherlands with his wife. In his free time, he enjoys snowboarding and geeky activities like reading fantasy/sci-fi books or playing board games or video games.

How to Protect your Business from the Threat of Unmanaged Devices
microsoft
security

Organizations are continuously adding more and more layers of security to their corporate devices. They're keeping them up to date, patching vulnerabilities, enforcing security configurations, deploying EDR and AV solutions, and granting access through device compliance. But how are we going to protect those unmanaged devices that we have no visibility into or control over? Looking the other way will leave our business vulnerable to cyberattacks, unauthorized access and data leaks. In this session, we're going to identify the different user groups that work from unmanaged devices, and then explore, implement, and combine solutions such as MAM for Windows, session policies, MTD connectors, Edge for Business, in-browser protection, device-bound passkeys, and more! By the end of this session, you'll be fully prepared to implement solutions that protect your business from the threat of unmanaged devices.

Read more

Creating Classifiers from Scratch to Identify Sensitive Data with Microsoft Purview
microsoft
security
datasecurity

Microsoft Purview offers a wide range of data security solutions, including Information Protection to protect data, Data Loss Prevention to prevent data leaks, Data Lifecycle Management to control the data lifecycle, and Insider Risk Management to detect and respond to insider risks. The first step for many organizations is to classify their sensitive data. One approach is letting users take charge and classify the data themselves. But if we want to make the most of the platform, we need Microsoft Purview to understand what sensitive data looks like in our environment. In this session, we are going to create classifiers that enable Microsoft Purview to identify, classify, and protect sensitive data. Join me as we explore Sensitive Information Types, Custom SITs, Fingerprint SITs, Exact Data Match SITs, Trainable Classifiers, and more. By the end of this session, you will have the skills to create classifiers in Microsoft Purview from scratch and the knowledge to know when to use which one. This will help you make the most of the platform for your organization.

Read more

Applying DLP Controls to Cloud Apps Using Edge for Business
microsoft
security
edge
data-loss-prevention
data-security
purview

Security controls are moving closer to where users actually work. With Edge for Business, the browser is becoming the place where you can apply Data Loss Prevention controls the moment someone interacts with a cloud app. In this session, we will take a look at how to configure Data Loss Prevention policies and Edge for Business to apply real‑time controls when users attempt to share sensitive information from the browser. We will also cover how these controls can be applied to different types of apps when configured, including managed apps, unmanaged apps, and GenAI apps. We will build on this by looking at some new security features available through the Edge for Business admin portal, such as protected clipboard, watermarking, extension governance, and unified policy management, and how they complement your DLP policies to provide even more protection from the browser. By the end, you will have a clear understanding of how to apply Purview DLP controls from Edge for Business and how this approach fits into your broader data security strategy.

Read more

Myron can deliver sessions in
English
Dutch
 Flemish
Connect with Myron

Report speaker profile

Reason for reporting this profile (multiple options possible)


Please select at least one option.

Please select at least one option.

Please select at least one option.

Please select at least one option.

Please select at least one option.
Please complete this required field.
Please complete this required field.

Thank you for reporting this profile, we are going to review it as soon as possible.