Myron Helgering
Microsoft MVP | Cyber and Data Security | Blogger | Speaker | Fantasy Geek
Almere Stad, The Netherlands
Actions
Myron works for one of the leading IT-service providers in the Netherlands called Pink Elephant. His primary focus is developing security products and services based on Microsoft technology. The unique selling point of these offerings is to make work environments safe and, more importantly, keep them safe.
As a Microsoft Security MVP, he enjoys sharing his knowledge and experience with others by writing blog posts, speaking at events and conferences, and co-organizing the monthly Dutch Microsoft Security Meetup with 2000+ members.
Besides Microsoft Security, he lives happily in the Netherlands with his wife. In his free time, he enjoys snowboarding and geeky activities like reading fantasy/sci-fi books or playing board games or video games.
Links
Area of Expertise
Topics
How to Protect your Business from the Threat of Unmanaged Devices
Organizations are continuously adding more and more layers of security to their corporate devices. They're keeping them up to date, patching vulnerabilities, enforcing security configurations, deploying EDR and AV solutions, and granting access through device compliance.
But how are we going to protect those unmanaged devices that we have no visibility into or control over? Looking the other way will leave our business vulnerable to cyberattacks, unauthorized access and data leaks.
In this session, we're going to identify the different user groups that work from unmanaged devices, and then explore, implement, and combine solutions such as MAM for Windows, session policies, MTD connectors, Edge for Business, in-browser protection, device-bound passkeys, and more!
By the end of this session, you'll be fully prepared to implement solutions that protect your business from the threat of unmanaged devices.
Creating Classifiers from Scratch to Identify Sensitive Data with Microsoft Purview
Microsoft Purview offers a wide range of data security solutions, including Information Protection to protect data, Data Loss Prevention to prevent data leaks, Data Lifecycle Management to control the data lifecycle, and Insider Risk Management to detect and respond to insider risks.
The first step for many organizations is to classify their sensitive data. One approach is letting users take charge and classify the data themselves. But if we want to make the most of the platform, we need Microsoft Purview to understand what sensitive data looks like in our environment.
In this session, we are going to create classifiers that enable Microsoft Purview to identify, classify, and protect sensitive data. Join me as we explore Sensitive Information Types, Custom SITs, Fingerprint SITs, Exact Data Match SITs, Trainable Classifiers, and more.
By the end of this session, you will have the skills to create classifiers in Microsoft Purview from scratch and the knowledge to know when to use which one. This will help you make the most of the platform for your organization.
Applying DLP Controls to Cloud Apps Using Edge for Business
Security controls are moving closer to where users actually work. With Edge for Business, the browser is becoming the place where you can apply Data Loss Prevention controls the moment someone interacts with a cloud app.
In this session, we will take a look at how to configure Data Loss Prevention policies and Edge for Business to apply real‑time controls when users attempt to share sensitive information from the browser. We will also cover how these controls can be applied to different types of apps when configured, including managed apps, unmanaged apps, and GenAI apps.
We will build on this by looking at some new security features available through the Edge for Business admin portal, such as protected clipboard, watermarking, extension governance, and unified policy management, and how they complement your DLP policies to provide even more protection from the browser.
By the end, you will have a clear understanding of how to apply Purview DLP controls from Edge for Business and how this approach fits into your broader data security strategy.
Workplace Ninjas NL Connect 2026
How to Protect your Business from the Threat of Unmanaged Devices
Live! 360 Tech Con Orlando 2025
Automated Data Security: Identifying Sensitive Data with Microsoft Purview
Six Methods to Protect your Business from the Threat of Unmanaged Devices
The Challenge of Providing Secure Access to External Admins
Workplace Ninja User Group Netherlands (Meetup #5 2025)
The Challenge of Providing Secure Access to External Admins
Experts Live Netherlands 2025 Sessionize Event
Dutch Data Security & Compliance Community (Meetup #4 2025)
Automated Data Security: Identifying Sensitive Data with Microsoft Purview
Workplace Ninja User Group Belgium (Meetup #3 2025)
Six Methods to Protect your Business from the Threat of Unmanaged Devices
Dutch Microsoft Security Meetup (April 2025)
Automated Data Security: Identifying Sensitive Data with Microsoft Purview
Workplace Ninjas NL Connect 2025
Six Methods to Protect your Business from the Threat of Unmanaged Devices
Scottish Summit 2024
Automated Data Security: Identifying Sensitive Data with Microsoft Purview
Experts Live Netherlands 2024 Sessionize Event
Dutch Microsoft Security Meetup (September 2023)
7 Methods to Prevent Data Leakage from Personal Devices
Workplace Ninja User Group Netherlands (Meetup #5 2023)
7 Methods to Prevent Data Leakage from Personal Devices
Experts Live Netherlands 2023 Sessionize Event
Myron Helgering
Microsoft MVP | Cyber and Data Security | Blogger | Speaker | Fantasy Geek
Almere Stad, The Netherlands
Links
Actions
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top