SlideShare ist ein Scribd-Unternehmen logo
1 von 53
Downloaden Sie, um offline zu lesen
MICROSOFT 365
VirtualMARATHON
May 27 &28, 2020
36 hours/2 days
MICROSOFT 365 VIRTUAL MARATHON
MicrosoftInformationProtection: Your Security and ComplianceFramework
Alistair Pugin
Head of Cloud – Tangent Solutions
@alistairpugin
Broughttoyouby:
TheGlobalMicrosoftCommunity&
M365Conf.com|#M365CONF
#M365VM
M365VirtualMarathon.com
MICROSOFT 365
VirtualMARATHON
May 27 &28, 2020
36 hours/2 days
Mark Your Calendars:
March 23-25,2021,MGM Grand Resort
Las Vegas, Nevada, USA
M365Conf.com
#M365CONF
TheSharePointConferenceisnowTheMicrosoft365CollaborationConference
#M365VM
M365VirtualMarathon.com
Broughttoyouby:
TheGlobalMicrosoftCommunity&
M365Conf.com|#M365CONF
THANK YOU TO ALL OUR GENEROUS SPONSORS
 Visit the Vendors Booth, Sessions and Watch the Videos
 Submit Your Answers to Enter the Raffle
 You need at least 5 correct answers then submit for a chance to win one of 3
(One in each Americas, APAC, EMEA)
ARE YOU READY FOR A RAFFLE?
WE ARE GIVING AWAY 3 OCULUS QUEST ALL IN ONE!
https://bit.ly/m365raffle
CONSIDER DONATING TO THE FOLLOWING CHARITY RELIEF FUNDS:
UNITED WAY: HTTPS://GIVE.UWKC.ORG/M365VM
INTERNATIONAL MEDICAL CORPS: HTTPS://BIT.LY/MEDICALCORPSFUND
10%OFFUNDSFROMSPONSORSGOTOSUPPORTCOMMUNITYRELIEF.
FORMOREINFORMATIONWRITETOINFO@M365VIRTUALMARATHON.COM
Certified Microsoft
Service Adoption
Specialist
Alistair Pugin @alistairpugin – Head of Cloud Services:
Tangent Solutions
Office MVP | Blogger | Podcaster | Speaker | Strategic
Advisor
IN THE PAST, THE FIREWALL
WAS THE SECURITY PERIMETER
devices datausers apps
On-premises /
Private cloud
Data is exploding across the digital estate
Energy
systems
Supply
chains
Citizens
Sensors
Cloud
Mobile
devices
On-premises
Partners
Customers
Manufacturers
Marketplaces
Equipment
Vehicles
Smart cities
Office 365
Information Protection
Windows
Information Protection
Azure
Information Protection
What
Where
How
What
Where
How
Office 365
Information Protection
Windows
Information Protection
Azure
Information Protection
MICROSOFT CLOUD APP SECURITY
Visibility into 15k+ cloud apps, data access & usage,
potential abuse
AZURE SECURITY CENTER INFORMATION PROTECTION
Classify & label sensitive structured data in Azure SQL, SQL
Server and other Azure repositories
OFFICE APPS
Protect sensitive information while working in Excel, Word,
PowerPoint, Outlook
AZURE INFORMATION PROTECTION
Classify, label & protect files – beyond Office 365, including
on-premises & hybrid
OFFICE 365 DATA LOSS PREVENTION
Prevent data loss across Exchange Online, SharePoint Online,
OneDrive for Business
SHAREPOINT & GROUPS
Protect files in libraries and lists
OFFICE 365 ADVANCED DATA GOVERNANCE
Apply retention and deletion policies to sensitive and
important data in Office 365
ADOBE PDFs
Natively view and protect PDFs on Adobe Acrobat Reader
WINDOWS INFORMATION PROTECTION
Separate personal vs. work data on Windows 10 devices,
prevent work data from traveling to non-work locations
OFFICE 365 MESSAGE ENCRYPTION
Send encrypted emails in Office 365 to anyone
inside or outside of the company
CONDITIONAL ACCESS
Control access to files based on policy, such as identity, machine
configuration, geo location
Discover | Classify | Protect | Monitor
SDK FOR PARTNER ECOSYSTEM & ISVs
Enable ISVs to consume labels, apply protection
Protect Content
Scan & detect sensitive
data based on policy
Classify and label data
based on sensitivity
Apply protection actions,
including encryption,
access restrictions
LabelDiscover Classify
Sensitivity Retention
Data growing at exponential rate
 Encryption
 Restrict Access
 Watermark
 Header/Footer
 Retention
 Deletion
 Records Management
 Archiving
 Sensitive data discovery
 Data at risk
 Policy violations
 Policy recommendations
 Proactive alerts
Comprehensive policies to protect and govern your
most important data – throughout its lifecycle
Unified approach to discover, classify & label
Automatically apply policy-based actions
Proactive monitoring to identify risks
Broad coverage across locations
Apply label
Unified approach
Monitor
Customizable
Persists as container
metadata or file metadata
Readable by other systems
Determines DLP policy
based on labels
Extensible to partner solutions
Manual or Automated Labels
Apply to content or
containers
Label data at rest, data in use,
or data in transit
Enable protection actions
based on labels
Seamless end user experience
across productivity applications
CONFIDENTIAL
Drill down to a file-level view
Classify and label
data in on-prem
repositories
Label and protect
Office files natively
across Windows,
Mac, iOS, Android
and Web Clients
Label and protect
sensitive SharePoint
Sites, Teams, Office
365 Groups, PowerBI
artifacts
Automatically label
and protect sensitive
files in SharePoint
Online and OneDrive
for Business
Extend protection
through Microsoft
Cloud App Security
to third party clouds
and SaaS apps
Automatically label
and protect sensitive
emails in Exchange
Online
Unified Label Management in Microsoft 365 Compliance center
On-prem SharePoint
Online
Non-Microsoft
Clouds and
SaaS apps
Exchange
Online
SharePoint Sites
Teams, Office 365
Groups
Office Apps
Across
Platforms
• Think about data as an important layer of an overall protection strategy.
• Be clear on how you are protecting your content vs. containers.
• Create policies considering each layers part in acting as sensors, gates or both.
• Enforce policy in places where protection matters; think ingress and egress points
ServiceDeviceIdentity Network
DataUser
Services
Devices
Intelligence
Audit &
Analytics
Corporate Egress
MIP
Data
Balance data security and productivity
Enforce conditional access to sensitive data
DLP actions to block sharing
Encrypt files and emails based on sensitivity label
Prevent data leakage through DLP policies based on
sensitivity label
Business data separation on devices
Secure email with encryption & permissions
Manually apply sensitivity label consistently across apps
applications and endpoints
Show recommendations and tooltips for sensitivity labels with
auto-labeling and DLP
Visual markings to indicate sensitive documents across apps and
services (e.g. watermark, lock icons, sensitivity column in SPO)
Co-author and collaborate with sensitive documents
Enable searching of encrypted files in SharePoint
Allow users to open and share encrypted pdf files in Edge in
addition to Adobe Acrobat Reader
Compliance
Integrated tools leveraging intelligence to reduce risk
Simplify assessment of
compliance risk and posture with
actionable insights
Integrated protection and
governance of sensitive data across
devices, apps and cloud services
Intelligently respond to data
discovery requests by leveraging
AI to find the most relevant data
Compliance Manager
Service Trust Portal
Information
Protection &
Governance
Encryption
Search &
Discovery
Auditing
Access Control
Microsoft Compliance Score
Continuous assessments
Detect and monitor control effectiveness
automatically with a risk-based score
Recommended actions
Reduce compliance risks with actionable
guidance
Built-in control mapping
Scale your compliance efforts with built-in
mapping across regulations and standards
Simplify compliance and reduce risk
Compliance Score is a dashboard that provides your Compliance Score and a summary of
your data protection and compliance posture. It also includes recommendations to improve
data protection and compliance. This is a recommendation, it is up to you to evaluate and
validate the effectiveness of customer controls as per your regulatory environment.
Recommendations from Compliance Manager and Compliance Score should not be
interpreted as a guarantee of compliance.
800-171 800-53 Cybersecurity
Framework
NEW!
Data Subject Requests
Data Privacy tab within the Compliance Center
GDPR dashboard with GDPR toolbox, guidance and quick
access to top tasks
Data Subject Requests portal to manage DSRs for Office
365 content
 Create your Data Subject Request
 Search across Office 365 content
 Refine your search with labels, keywords and other conditions
 Review and export the content of your search
Discover
Content
Scan & detect sensitive
data based on policy
Classify and label data
based on sensitivity
Apply protection actions,
including encryption,
access restrictions
WHERE WE WERE
• Collect data out of Office 365
and export to 3rd party tools
Search
& export
WHERE WE ARE NOW
• Single eDiscovery process across
Office 365 and non-Office 365
• Minimize the data you export
out of Office 365
Advanced
eDiscovery:
Analytics,
search &
tagging
WHERE WE’LL BE IN Q1 CY 2019
• Custodian management
• Document review and redact
• Enhanced search
• Enhanced processing
• Early intelligence
Solutions
for ECA &
investigations
Reduce risk with archiving and holds
on data in place
Reduce cost with advanced analytics
Review and annotate prior to export
Solutions beyond litigation, including
DSRs, Investigations and more
Search Across Locations
Other 1st Party
apps, …
SharePoint Online,
OneDrive for
Business, Teams,
Groups, etc.
Exchange Online
Non-Office 365 Data
File shares, sites and other apps
Deep crawling and indexing
Deep processing (e.g. much higher size limits, file types, …)
to extract and index text & metadata
Pre-collection analytics
Scope content to be collected within a case, and tune
queries to minimize collection volumes
Collection into document working sets
Manage static sets of documents within a case, that can be
independently searched, analyzed, shared, and acted upon.
Support additional Office 365 workloads &
content types
First class support for Teams, Yammer, Planner, Forms,
Stream, …
Defensible process
Static working sets, transparency (e.g. error reporting, item
level auditing, …) and additional controls (e.g. error
remediation, …)
Custodian notifications
Manage legally required workflows around
notifications to custodians and their
acknowledgments
Manage custodians and legal holds
Add and remove custodians into a case, and apply
legal holds to their data in-place if needed
Custodian intelligence
Identify shared data e.g. SharePoint sites / Teams
that custodians had access to or were active on.
Identify likely custodians based on AD criteria.
Organize and minimize
Use near duplicate detection to organize the data
and email threading to reconstruct email
conversations from unstructured data
Increase productivity
Use predictive coding to train the system to find
likely relevant documents and reduce what’s sent
to review
Recognize
Use Themes to understand the topics represented
in the data set
ML based content classification
Let the system identify potential high value content
such as attorney client privilege or offensive
language
Native, near-native and text viewer
Built in document viewers for Microsoft & Non-
Microsoft file types, viewing options so users can fully
understand a document, and easy navigation for
search hits within a document
Annotations and redactions
Manual annotations and redactions, with automated
redactions for sensitive content
Document level insights
Information panels e.g. Duplicates & Near-duplicates,
Email threads & family, Conceptually similar, History,
‘Who Knows This’, Metadata & properties, … etc.
Document coding, screening & approvals
Tag documents with issue coding, automated privilege
screening, and multi-level approval workflows, …
Manage Access
Scan & detect sensitive
data based on policy
Classify and label data
based on sensitivity
Apply protection actions,
including encryption,
access restrictions
Password itself does
not matter in most
attacks
*********
Corporate
Network
Geo-location
Microsoft
Cloud App SecurityMacOS
Android
iOS
Windows
Windows
Defender ATP
Client apps
Browser apps
Google ID
MSA
Azure AD
ADFS
Require
MFA
Allow/block
access
Block legacy
authentication
Force
password
reset******
Limited
access
Controls
Employee & Partner
Users and Roles
Trusted &
Compliant Devices
Physical &
Virtual Location
Client apps &
Auth Method
Conditions
Machine
learning
Policies
Real time
Evaluation
Engine
Session
Risk
3
40TB
Effective
policy
Azure AD Conditional Access
Gratuitous Slide
Top 5 benefits
of adopting
Microsoft
Information
Protection
Existing AIP customers
should move their labels
and policies to M365
Compliance center. Here
are the top 5 benefits of
adopting MIP
Classify and label documents manually and automatically
in Web apps (Word, Excel, PowerPoint) and Outlook for
web access.
Co-author and search label and protected documents on
the Web
Start using labels across Microsoft Teams, SPO sites,
Groups and PowerBI
Leverage the new know your data tools – unified analytics,
content and activity explorer
Build your own trainable classifiers with machine learning
and use it to protect content with sensitivity labels.
01
02
03
04
05
New Microsoft 365 Specialized Workspaces
security.microsoft.com compliance.microsoft.com
Resources
Learn more about Azure Information Protection
Intro to Microsoft Cloud App Security (video)
Overview of Office 365 Data Loss Prevention (DLP)
Protect your enterprise data using Windows Information
Protection
Blog: Information protection capabilities in preview
Blog: Consistent labeling and protection in Office 365 and Azure
Information Protection
Blog: Information Protection SDK Preview
Blog: New GDPR sensitive information types
Blog: Office 365 Message Encryption updates
MICROSOFT 365
VirtualMARATHON
May 27 &28, 2020
36 hours/2 days
THANK YOU FOR JOINING US!
DO YOU HAVE ANY QUESTIONS?
Speaker feedback
https://bit.ly/M365VMSpeakerFeedback
Eventfeedback
https://bit.ly/M365VMFeedback

Weitere ähnliche Inhalte

Was ist angesagt?

Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionDavid J Rosenthal
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedAlbert Hoitingh
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewDavid J Rosenthal
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceVignesh Ganesan I Microsoft MVP
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection Syed Sabhi Haider
 
Microsoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghMicrosoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghAlbert Hoitingh
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)Radhakrishnan Govindan
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsVignesh Ganesan I Microsoft MVP
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityAlbert Hoitingh
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
 
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...Jasper Oosterveld
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
 

Was ist angesagt? (20)

Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat Protection
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystified
 
Data Loss Prevention in Office 365
Data Loss Prevention in Office 365Data Loss Prevention in Office 365
Data Loss Prevention in Office 365
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Microsoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghMicrosoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert Hoitingh
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
Office 365 Security Best Practices
Office 365 Security Best PracticesOffice 365 Security Best Practices
Office 365 Security Best Practices
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App Security
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
 

Ähnlich wie Microsoft Information Protection: Your Security and Compliance Framework

One name unify them all
One name unify them allOne name unify them all
One name unify them allBizTalk360
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarRobert Crane
 
Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365Drew Madelung
 
Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365Chris Bortlik
 
Proteccion de datos (DLP) usando MS 365-
Proteccion de datos (DLP) usando MS 365-Proteccion de datos (DLP) usando MS 365-
Proteccion de datos (DLP) usando MS 365-RalSejas
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceJoanne Klein
 
Proteccion de datos contra pérdida de los mismos con MS365
Proteccion de datos contra pérdida de los mismos  con MS365Proteccion de datos contra pérdida de los mismos  con MS365
Proteccion de datos contra pérdida de los mismos con MS365RalSejas
 
May 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarMay 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarRobert Crane
 
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMSecuring Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMDrew Madelung
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Richard Harbridge
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?Albert Hoitingh
 
Melbourne Office 365 User Group - October 2014
Melbourne Office 365 User Group - October 2014Melbourne Office 365 User Group - October 2014
Melbourne Office 365 User Group - October 2014Michael Frank
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365Joanne Klein
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information ProtectionMicrosoft Österreich
 
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsSecuring SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsDrew Madelung
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...☁️ Gustavo Magella
 

Ähnlich wie Microsoft Information Protection: Your Security and Compliance Framework (20)

One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know Webinar
 
Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365
 
Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365
 
Proteccion de datos (DLP) usando MS 365-
Proteccion de datos (DLP) usando MS 365-Proteccion de datos (DLP) usando MS 365-
Proteccion de datos (DLP) usando MS 365-
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern Workplace
 
Proteccion de datos contra pérdida de los mismos con MS365
Proteccion de datos contra pérdida de los mismos  con MS365Proteccion de datos contra pérdida de los mismos  con MS365
Proteccion de datos contra pérdida de los mismos con MS365
 
May 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarMay 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know Webinar
 
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMSecuring Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
 
Melbourne Office 365 User Group - October 2014
Melbourne Office 365 User Group - October 2014Melbourne Office 365 User Group - October 2014
Melbourne Office 365 User Group - October 2014
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsSecuring SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 

Mehr von Alistair Pugin

M365SA UG – WEDNESDAY 13th July 2022 – What's new in Microsoft 365 - 6 months
M365SA UG – WEDNESDAY 13th July 2022 – What's new in Microsoft 365 - 6 monthsM365SA UG – WEDNESDAY 13th July 2022 – What's new in Microsoft 365 - 6 months
M365SA UG – WEDNESDAY 13th July 2022 – What's new in Microsoft 365 - 6 monthsAlistair Pugin
 
Top 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxTop 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxAlistair Pugin
 
Top tips for successfully migrating from SharePoint and file servers to Micro...
Top tips for successfully migrating from SharePoint and file servers to Micro...Top tips for successfully migrating from SharePoint and file servers to Micro...
Top tips for successfully migrating from SharePoint and file servers to Micro...Alistair Pugin
 
Effective Document Capture in SharePoint - SharePoint Saturday Cape Town - 22...
Effective Document Capture in SharePoint - SharePoint Saturday Cape Town - 22...Effective Document Capture in SharePoint - SharePoint Saturday Cape Town - 22...
Effective Document Capture in SharePoint - SharePoint Saturday Cape Town - 22...Alistair Pugin
 
Office 365 Disruption - Metalogix Roadshow - 20th October 2016
Office 365 Disruption - Metalogix Roadshow - 20th October 2016Office 365 Disruption - Metalogix Roadshow - 20th October 2016
Office 365 Disruption - Metalogix Roadshow - 20th October 2016Alistair Pugin
 
SharePoint Governance and Compliance
SharePoint Governance and ComplianceSharePoint Governance and Compliance
SharePoint Governance and ComplianceAlistair Pugin
 
The Evolution of Forms for SharePoint/O365
The Evolution of Forms for SharePoint/O365The Evolution of Forms for SharePoint/O365
The Evolution of Forms for SharePoint/O365Alistair Pugin
 
Effective SharePoint Architecture - SharePoint Saturday Stockholm 2016
Effective SharePoint Architecture - SharePoint Saturday Stockholm 2016Effective SharePoint Architecture - SharePoint Saturday Stockholm 2016
Effective SharePoint Architecture - SharePoint Saturday Stockholm 2016Alistair Pugin
 
Must have tools for SharePoint
Must have tools for SharePointMust have tools for SharePoint
Must have tools for SharePointAlistair Pugin
 
Document Lifecycle Management spscpt2015
Document Lifecycle Management spscpt2015Document Lifecycle Management spscpt2015
Document Lifecycle Management spscpt2015Alistair Pugin
 

Mehr von Alistair Pugin (10)

M365SA UG – WEDNESDAY 13th July 2022 – What's new in Microsoft 365 - 6 months
M365SA UG – WEDNESDAY 13th July 2022 – What's new in Microsoft 365 - 6 monthsM365SA UG – WEDNESDAY 13th July 2022 – What's new in Microsoft 365 - 6 months
M365SA UG – WEDNESDAY 13th July 2022 – What's new in Microsoft 365 - 6 months
 
Top 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxTop 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptx
 
Top tips for successfully migrating from SharePoint and file servers to Micro...
Top tips for successfully migrating from SharePoint and file servers to Micro...Top tips for successfully migrating from SharePoint and file servers to Micro...
Top tips for successfully migrating from SharePoint and file servers to Micro...
 
Effective Document Capture in SharePoint - SharePoint Saturday Cape Town - 22...
Effective Document Capture in SharePoint - SharePoint Saturday Cape Town - 22...Effective Document Capture in SharePoint - SharePoint Saturday Cape Town - 22...
Effective Document Capture in SharePoint - SharePoint Saturday Cape Town - 22...
 
Office 365 Disruption - Metalogix Roadshow - 20th October 2016
Office 365 Disruption - Metalogix Roadshow - 20th October 2016Office 365 Disruption - Metalogix Roadshow - 20th October 2016
Office 365 Disruption - Metalogix Roadshow - 20th October 2016
 
SharePoint Governance and Compliance
SharePoint Governance and ComplianceSharePoint Governance and Compliance
SharePoint Governance and Compliance
 
The Evolution of Forms for SharePoint/O365
The Evolution of Forms for SharePoint/O365The Evolution of Forms for SharePoint/O365
The Evolution of Forms for SharePoint/O365
 
Effective SharePoint Architecture - SharePoint Saturday Stockholm 2016
Effective SharePoint Architecture - SharePoint Saturday Stockholm 2016Effective SharePoint Architecture - SharePoint Saturday Stockholm 2016
Effective SharePoint Architecture - SharePoint Saturday Stockholm 2016
 
Must have tools for SharePoint
Must have tools for SharePointMust have tools for SharePoint
Must have tools for SharePoint
 
Document Lifecycle Management spscpt2015
Document Lifecycle Management spscpt2015Document Lifecycle Management spscpt2015
Document Lifecycle Management spscpt2015
 

Kürzlich hochgeladen

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 

Kürzlich hochgeladen (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 

Microsoft Information Protection: Your Security and Compliance Framework

  • 1. MICROSOFT 365 VirtualMARATHON May 27 &28, 2020 36 hours/2 days MICROSOFT 365 VIRTUAL MARATHON MicrosoftInformationProtection: Your Security and ComplianceFramework Alistair Pugin Head of Cloud – Tangent Solutions @alistairpugin Broughttoyouby: TheGlobalMicrosoftCommunity& M365Conf.com|#M365CONF #M365VM M365VirtualMarathon.com
  • 2. MICROSOFT 365 VirtualMARATHON May 27 &28, 2020 36 hours/2 days Mark Your Calendars: March 23-25,2021,MGM Grand Resort Las Vegas, Nevada, USA M365Conf.com #M365CONF TheSharePointConferenceisnowTheMicrosoft365CollaborationConference #M365VM M365VirtualMarathon.com Broughttoyouby: TheGlobalMicrosoftCommunity& M365Conf.com|#M365CONF
  • 3. THANK YOU TO ALL OUR GENEROUS SPONSORS
  • 4.  Visit the Vendors Booth, Sessions and Watch the Videos  Submit Your Answers to Enter the Raffle  You need at least 5 correct answers then submit for a chance to win one of 3 (One in each Americas, APAC, EMEA) ARE YOU READY FOR A RAFFLE? WE ARE GIVING AWAY 3 OCULUS QUEST ALL IN ONE! https://bit.ly/m365raffle
  • 5. CONSIDER DONATING TO THE FOLLOWING CHARITY RELIEF FUNDS: UNITED WAY: HTTPS://GIVE.UWKC.ORG/M365VM INTERNATIONAL MEDICAL CORPS: HTTPS://BIT.LY/MEDICALCORPSFUND 10%OFFUNDSFROMSPONSORSGOTOSUPPORTCOMMUNITYRELIEF. FORMOREINFORMATIONWRITETOINFO@M365VIRTUALMARATHON.COM
  • 6. Certified Microsoft Service Adoption Specialist Alistair Pugin @alistairpugin – Head of Cloud Services: Tangent Solutions Office MVP | Blogger | Podcaster | Speaker | Strategic Advisor
  • 7. IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devices datausers apps On-premises / Private cloud
  • 8. Data is exploding across the digital estate Energy systems Supply chains Citizens Sensors Cloud Mobile devices On-premises Partners Customers Manufacturers Marketplaces Equipment Vehicles Smart cities
  • 9. Office 365 Information Protection Windows Information Protection Azure Information Protection What Where How
  • 11. MICROSOFT CLOUD APP SECURITY Visibility into 15k+ cloud apps, data access & usage, potential abuse AZURE SECURITY CENTER INFORMATION PROTECTION Classify & label sensitive structured data in Azure SQL, SQL Server and other Azure repositories OFFICE APPS Protect sensitive information while working in Excel, Word, PowerPoint, Outlook AZURE INFORMATION PROTECTION Classify, label & protect files – beyond Office 365, including on-premises & hybrid OFFICE 365 DATA LOSS PREVENTION Prevent data loss across Exchange Online, SharePoint Online, OneDrive for Business SHAREPOINT & GROUPS Protect files in libraries and lists OFFICE 365 ADVANCED DATA GOVERNANCE Apply retention and deletion policies to sensitive and important data in Office 365 ADOBE PDFs Natively view and protect PDFs on Adobe Acrobat Reader WINDOWS INFORMATION PROTECTION Separate personal vs. work data on Windows 10 devices, prevent work data from traveling to non-work locations OFFICE 365 MESSAGE ENCRYPTION Send encrypted emails in Office 365 to anyone inside or outside of the company CONDITIONAL ACCESS Control access to files based on policy, such as identity, machine configuration, geo location Discover | Classify | Protect | Monitor SDK FOR PARTNER ECOSYSTEM & ISVs Enable ISVs to consume labels, apply protection
  • 12.
  • 14. Scan & detect sensitive data based on policy Classify and label data based on sensitivity Apply protection actions, including encryption, access restrictions
  • 15. LabelDiscover Classify Sensitivity Retention Data growing at exponential rate  Encryption  Restrict Access  Watermark  Header/Footer  Retention  Deletion  Records Management  Archiving  Sensitive data discovery  Data at risk  Policy violations  Policy recommendations  Proactive alerts Comprehensive policies to protect and govern your most important data – throughout its lifecycle Unified approach to discover, classify & label Automatically apply policy-based actions Proactive monitoring to identify risks Broad coverage across locations Apply label Unified approach Monitor
  • 16. Customizable Persists as container metadata or file metadata Readable by other systems Determines DLP policy based on labels Extensible to partner solutions Manual or Automated Labels Apply to content or containers Label data at rest, data in use, or data in transit Enable protection actions based on labels Seamless end user experience across productivity applications CONFIDENTIAL
  • 17.
  • 18.
  • 19. Drill down to a file-level view
  • 20.
  • 21.
  • 22. Classify and label data in on-prem repositories Label and protect Office files natively across Windows, Mac, iOS, Android and Web Clients Label and protect sensitive SharePoint Sites, Teams, Office 365 Groups, PowerBI artifacts Automatically label and protect sensitive files in SharePoint Online and OneDrive for Business Extend protection through Microsoft Cloud App Security to third party clouds and SaaS apps Automatically label and protect sensitive emails in Exchange Online Unified Label Management in Microsoft 365 Compliance center On-prem SharePoint Online Non-Microsoft Clouds and SaaS apps Exchange Online SharePoint Sites Teams, Office 365 Groups Office Apps Across Platforms
  • 23. • Think about data as an important layer of an overall protection strategy. • Be clear on how you are protecting your content vs. containers. • Create policies considering each layers part in acting as sensors, gates or both. • Enforce policy in places where protection matters; think ingress and egress points ServiceDeviceIdentity Network DataUser
  • 25. Balance data security and productivity Enforce conditional access to sensitive data DLP actions to block sharing Encrypt files and emails based on sensitivity label Prevent data leakage through DLP policies based on sensitivity label Business data separation on devices Secure email with encryption & permissions Manually apply sensitivity label consistently across apps applications and endpoints Show recommendations and tooltips for sensitivity labels with auto-labeling and DLP Visual markings to indicate sensitive documents across apps and services (e.g. watermark, lock icons, sensitivity column in SPO) Co-author and collaborate with sensitive documents Enable searching of encrypted files in SharePoint Allow users to open and share encrypted pdf files in Edge in addition to Adobe Acrobat Reader
  • 27. Integrated tools leveraging intelligence to reduce risk Simplify assessment of compliance risk and posture with actionable insights Integrated protection and governance of sensitive data across devices, apps and cloud services Intelligently respond to data discovery requests by leveraging AI to find the most relevant data Compliance Manager Service Trust Portal Information Protection & Governance Encryption Search & Discovery Auditing Access Control
  • 28. Microsoft Compliance Score Continuous assessments Detect and monitor control effectiveness automatically with a risk-based score Recommended actions Reduce compliance risks with actionable guidance Built-in control mapping Scale your compliance efforts with built-in mapping across regulations and standards Simplify compliance and reduce risk Compliance Score is a dashboard that provides your Compliance Score and a summary of your data protection and compliance posture. It also includes recommendations to improve data protection and compliance. This is a recommendation, it is up to you to evaluate and validate the effectiveness of customer controls as per your regulatory environment. Recommendations from Compliance Manager and Compliance Score should not be interpreted as a guarantee of compliance.
  • 30.
  • 31.
  • 32. Data Subject Requests Data Privacy tab within the Compliance Center GDPR dashboard with GDPR toolbox, guidance and quick access to top tasks Data Subject Requests portal to manage DSRs for Office 365 content  Create your Data Subject Request  Search across Office 365 content  Refine your search with labels, keywords and other conditions  Review and export the content of your search
  • 34. Scan & detect sensitive data based on policy Classify and label data based on sensitivity Apply protection actions, including encryption, access restrictions
  • 35. WHERE WE WERE • Collect data out of Office 365 and export to 3rd party tools Search & export WHERE WE ARE NOW • Single eDiscovery process across Office 365 and non-Office 365 • Minimize the data you export out of Office 365 Advanced eDiscovery: Analytics, search & tagging WHERE WE’LL BE IN Q1 CY 2019 • Custodian management • Document review and redact • Enhanced search • Enhanced processing • Early intelligence Solutions for ECA & investigations
  • 36. Reduce risk with archiving and holds on data in place Reduce cost with advanced analytics Review and annotate prior to export Solutions beyond litigation, including DSRs, Investigations and more Search Across Locations Other 1st Party apps, … SharePoint Online, OneDrive for Business, Teams, Groups, etc. Exchange Online Non-Office 365 Data File shares, sites and other apps
  • 37. Deep crawling and indexing Deep processing (e.g. much higher size limits, file types, …) to extract and index text & metadata Pre-collection analytics Scope content to be collected within a case, and tune queries to minimize collection volumes Collection into document working sets Manage static sets of documents within a case, that can be independently searched, analyzed, shared, and acted upon. Support additional Office 365 workloads & content types First class support for Teams, Yammer, Planner, Forms, Stream, … Defensible process Static working sets, transparency (e.g. error reporting, item level auditing, …) and additional controls (e.g. error remediation, …)
  • 38. Custodian notifications Manage legally required workflows around notifications to custodians and their acknowledgments Manage custodians and legal holds Add and remove custodians into a case, and apply legal holds to their data in-place if needed Custodian intelligence Identify shared data e.g. SharePoint sites / Teams that custodians had access to or were active on. Identify likely custodians based on AD criteria.
  • 39. Organize and minimize Use near duplicate detection to organize the data and email threading to reconstruct email conversations from unstructured data Increase productivity Use predictive coding to train the system to find likely relevant documents and reduce what’s sent to review Recognize Use Themes to understand the topics represented in the data set ML based content classification Let the system identify potential high value content such as attorney client privilege or offensive language
  • 40. Native, near-native and text viewer Built in document viewers for Microsoft & Non- Microsoft file types, viewing options so users can fully understand a document, and easy navigation for search hits within a document Annotations and redactions Manual annotations and redactions, with automated redactions for sensitive content Document level insights Information panels e.g. Duplicates & Near-duplicates, Email threads & family, Conceptually similar, History, ‘Who Knows This’, Metadata & properties, … etc. Document coding, screening & approvals Tag documents with issue coding, automated privilege screening, and multi-level approval workflows, …
  • 42. Scan & detect sensitive data based on policy Classify and label data based on sensitivity Apply protection actions, including encryption, access restrictions
  • 43.
  • 44. Password itself does not matter in most attacks *********
  • 45. Corporate Network Geo-location Microsoft Cloud App SecurityMacOS Android iOS Windows Windows Defender ATP Client apps Browser apps Google ID MSA Azure AD ADFS Require MFA Allow/block access Block legacy authentication Force password reset****** Limited access Controls Employee & Partner Users and Roles Trusted & Compliant Devices Physical & Virtual Location Client apps & Auth Method Conditions Machine learning Policies Real time Evaluation Engine Session Risk 3 40TB Effective policy Azure AD Conditional Access
  • 46.
  • 47.
  • 49. Top 5 benefits of adopting Microsoft Information Protection Existing AIP customers should move their labels and policies to M365 Compliance center. Here are the top 5 benefits of adopting MIP Classify and label documents manually and automatically in Web apps (Word, Excel, PowerPoint) and Outlook for web access. Co-author and search label and protected documents on the Web Start using labels across Microsoft Teams, SPO sites, Groups and PowerBI Leverage the new know your data tools – unified analytics, content and activity explorer Build your own trainable classifiers with machine learning and use it to protect content with sensitivity labels. 01 02 03 04 05
  • 50. New Microsoft 365 Specialized Workspaces security.microsoft.com compliance.microsoft.com
  • 51. Resources Learn more about Azure Information Protection Intro to Microsoft Cloud App Security (video) Overview of Office 365 Data Loss Prevention (DLP) Protect your enterprise data using Windows Information Protection Blog: Information protection capabilities in preview Blog: Consistent labeling and protection in Office 365 and Azure Information Protection Blog: Information Protection SDK Preview Blog: New GDPR sensitive information types Blog: Office 365 Message Encryption updates
  • 52.
  • 53. MICROSOFT 365 VirtualMARATHON May 27 &28, 2020 36 hours/2 days THANK YOU FOR JOINING US! DO YOU HAVE ANY QUESTIONS? Speaker feedback https://bit.ly/M365VMSpeakerFeedback Eventfeedback https://bit.ly/M365VMFeedback

Hinweis der Redaktion

  1. This is the world that many of our customers are moving to in their digital transformation. And when it comes to being compliant in the intelligent cloud, intelligent edge era, we really have to consider what is our digital estate? How do we think about where our most sensitive data is? How do we protect it? How do we find what’s most relevant? This is a little bit different now than it was 5 or 10 years ago. IT organizations now find themselves responsible for finding and protecting data across a wide spectrum of devices and environments. For example, user-owned mobile devices that access corporate data. It also includes systems and devices that your partners and customers use to access your information. And any one of these situations can be a point of compliance risk for your overall estate. That changes the game when it comes to compliance: You can no longer draw perimeters around your organization. This is the challenge that we all struggle with in compliance. And it's a challenge we at Microsoft think that we can uniquely fix.
  2. 11
  3. EMS Overview
  4. 15
  5. 18
  6. This slide is a combination of a framework on thinking about this + some practical advice. You apply this framework when thinking through how to apply policy to each label as part of your overall protection strategy. For example - - The data I am wanting to protect may reside in OneDrive. So there is 1 container. If I am using the sync client it may also exist in the device as 2nd container. You can decide to apply a sensor on the device that flags what type of labeled content exists on it. You may also enforce it to remain work content. In the OneDrive container you may also decide you don’t want certain types of content uploaded there. You can create that gate through DLP policy against the service. If container protections aren’t enough for that content type. Think about automatic encryption of the content with certain labels. Egress points are a great place to leverage label policies.
  7. Once data is understood, labeled and classified, the benefits unlocked can improve security and compliance outcomes. Services - Block or remove emails and attachments with sensitive labels (egress point) Exchange transport rules for Exchange Online mailboxes MCAS Content Inspection for AIP protected files stored in SPO or OneDrive Office Message Encryption with EXO Devices - Encrypt files with sensitivity labels (egress point) MDATP on Windows 10 endpoints, apply Protection Policy based on documents tagged with sensitivity label Intelligence - Auto-Classify content based on sensitivity SCC ML Classifier model delivered through compliance solutions (such as auto-classification and DLP) Apply policy and enforcement across all major egress points
  8. Microsoft 365 is uniquely positioned to help you meet your compliance obligations. Our vision is centered around the idea of “built-in” compliance, providing integrated, intelligent tools for our customers to reduce risks. Our capabilities allow you to better assess your risk, govern and protect sensitive and business critical data, and respond to regulatory requests with intelligence and efficiency. Let’s dive into these areas and discuss the various capabilities we have in more detail.
  9. New Data Subject Request management within Office 365 Security & Compliance Center
  10. Key Messages: Find the information you need when you need it effectively and efficiently. With more and more information stored in the cloud, ability to drill into, discover, reason over and respond to requests for that data are more important than ever. Microsoft 365 provides a unique approach to address your discovery needs. Microsoft 365 provides provide rich built-in, suite wide search and discovery tools to reduce your risk and exposure of multiple copies of data in multiple places. Identify custodians or shared locations, search based on conditions and keywords, and refine content with advanced analytics to de-duplicate, reduce threads and further minimize the responsive data set. With a new update to Advanced eDiscovery, you can now review and redact content prior to export to ensure that only most relevant data is being shared, and that any business confidential pieces of that data are redacted in advance of any response. This toolset can help reduce the costs of eDiscovery in your organization significantly. In fact, at Microsoft, while average data per custodian has grown 20x, the cost per custodian of eDiscovery has been reduced 85% with the use of the built-in capabilities. And these tools are not only relevant to litigation but to a host of other scenarios as well including components of GDPR such as Data Subject Requests, investigations and internal policies, early case assessments and others. Key capabilities of our solution to mention if appropriate: Granular permissions Case management Put custodial and shared locations on hold and send communications to custodians (Coming soon) Tenant wide Search Refine with conditions and advanced analytics (Equivio capabilities) Search & tag case documents for follow up Export prepared load file Key Messages:
  11. 40
  12. 45
  13. 50