Blue Team

CRH05 Six Methods to Protect Your Business from the Threat of Unmanaged Devices

11/20/2025

1:00pm - 2:15pm

Level: Intermediate to Advanced

Myron Helgering

Security Consultant

Cloud Life

Today, with Microsoft 365, corporate data and apps can be accessed easily from any device, anywhere and anytime. However, allowing users to work from unmanaged devices creates a challenge for protecting the business against threats.

In this session, we will explore six methods to protect your business against threats such as data leakage, unauthorized access, and even cyber-attacks.

Let’s dive into the world of app protection policies, session policies, app enforced restrictions, and more!

Spoiler alert! Some methods during this session are effective (the good), some are not recommended (the bad), and others are downright ugly, but they continue to be used regardless.

But Myron promises you that by the end of this session, you’ll be fully prepared to choose the method that is right for you!

You will learn:

  • How to choose an effective method to protect your business against threats such as data leakage, unauthorized access, and even cyber-attacks.
  • About app protection policies, session policies, app enforced restrictions, and more!
  • Why dealing with unmanaged devices is important in 2025.