Myron Helgering
Microsoft MVP | Microsoft Security | Blogger | Speaker | Fantasy Geek
Almere Stad, The Netherlands
Actions
Myron works for one of the leading IT-service providers in the Netherlands called Pink Elephant. His primary focus is developing security products and services based on Microsoft technology. The unique selling point of these offerings is to make work environments safe and, more importantly, keep them safe.
As a Microsoft Security MVP, he enjoys sharing his knowledge and experience with others by writing blog posts, speaking at events and conferences, and co-organizing the monthly Dutch Microsoft Security Meetup with 2000+ members.
Besides Microsoft Security, he lives happily in the Netherlands with his wife. In his free time, he enjoys snowboarding and geeky activities like reading fantasy/sci-fi books or playing board games or video games.
Links
Area of Expertise
Topics
How to Protect your Business from the Threat of Unmanaged Devices
Organizations are continuously adding more and more layers of security to their corporate devices. They're keeping them up to date, patching vulnerabilities, enforcing security configurations, deploying EDR and AV solutions, and granting access through device compliance.
But how are we going to protect those unmanaged devices that we have no visibility into or control over? Looking the other way will leave our business vulnerable to cyberattacks, unauthorized access and data leaks.
In this session, we're going to identify the different user groups that work from unmanaged devices, and then explore, implement, and combine solutions such as MAM for Windows, Session Policies, MTD Connectors, Edge for Business, In-Browser Protection, and more!
By the end of this session, you'll be fully prepared to implement solutions that protect your business from the threat of unmanaged devices.
Creating Classifiers from Scratch to Identify Sensitive Data with Microsoft Purview
Microsoft Purview offers a wide range of data security solutions, including Information Protection to protect data, Data Loss Prevention to prevent data leaks, Data Lifecycle Management to control the data lifecycle, and Insider Risk Management to detect and respond to insider risks.
The first step for many organizations is to classify their sensitive data. One approach is letting users take charge and classify the data themselves. But if we want to make the most of the platform, we need Microsoft Purview to understand what sensitive data looks like in our environment.
In this session, we are going to create classifiers that enable Microsoft Purview to identify, classify, and protect sensitive data. Join me as we explore Sensitive Information Types, Custom SITs, Fingerprint SITs, Exact Data Match SITs, Trainable Classifiers, and more.
By the end of this session, you will have the skills to create classifiers in Microsoft Purview from scratch and the knowledge to know when to use which one. This will help you make the most of the platform for your organization.
Edge for Business in 2026: What’s Here, What’s New, What’s Next
The challenge is that organizations need a browser that doesn’t just deliver productivity, but also enforces security where users work most.
This session looks at Edge for Business as the secure browser for organizations, showing how it integrates with app protection policies and data loss prevention for managed and unmanaged apps, including detection of sensitive information shared to unmanaged AI apps.
We’ll explore what’s here now, along with new capabilities like watermarking, protected clipboard, unified policy management, and extension governance, before giving a forward look at what’s coming next.
By the end, you’ll have a clear picture of how Edge for Business is evolving and how you can apply it in your organization.
Configuring Cross-Tenant Access for Secure Collaboration
Guest users often come from different environments, which makes it hard to enforce consistent security.
In this quick 20‑minute session, we’ll look at cross‑tenant access settings for B2B guests in Microsoft Entra, showing how it can reduce friction by accepting MFA that’s already been satisfied, while still enforcing device compliance to ensure guests meet standards, though not always the ones you expect.
We’ll use short demos to show how to configure these policies and settings and what guests experience when they sign in.
By the end, you’ll know how to configure guest trust, when it’s the right fit, and when it’s not.
Live! 360 Tech Con Orlando 2025
Automated Data Security: Identifying Sensitive Data with Microsoft Purview
Six Methods to Protect your Business from the Threat of Unmanaged Devices
The Challenge of Providing Secure Access to External Admins
Workplace Ninja User Group Netherlands (Meetup #5 2025)
The Challenge of Providing Secure Access to External Admins
Experts Live Netherlands 2025 Sessionize Event
Dutch Data Security & Compliance Community (Meetup #4 2025)
Automated Data Security: Identifying Sensitive Data with Microsoft Purview
Workplace Ninja User Group Belgium (Meetup #3 2025)
Six Methods to Protect your Business from the Threat of Unmanaged Devices
Dutch Microsoft Security Meetup (April 2025)
Automated Data Security: Identifying Sensitive Data with Microsoft Purview
Workplace Ninjas NL Connect 2025
Six Methods to Protect your Business from the Threat of Unmanaged Devices
Scottish Summit 2024
Automated Data Security: Identifying Sensitive Data with Microsoft Purview
Experts Live Netherlands 2024 Sessionize Event
Dutch Microsoft Security Meetup (September 2023)
7 Methods to Prevent Data Leakage from Personal Devices
Workplace Ninja User Group Netherlands (Meetup #5 2023)
7 Methods to Prevent Data Leakage from Personal Devices
Experts Live Netherlands 2023 Sessionize Event
Myron Helgering
Microsoft MVP | Microsoft Security | Blogger | Speaker | Fantasy Geek
Almere Stad, The Netherlands
Links
Actions
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top