SlideShare ist ein Scribd-Unternehmen logo
1 von 70
1
SM
February 27, 2020
Webinar:
Microsoft 365:
Your Gateway to Data Loss Prevention
2
SM
Withum | BE IN A POSITION OF STRENGTH
Housekeeping
• Webinar is being recorded
• 50 minute session
• 10 minute Q&A session at the end
• Send in your questions!
• Type your questions in the Questions
Pane of the GotoWebinar Panel
• Slides and recording will be emailed
after the webinar
3
SM
About Daniel
Daniel Cohen-Dumani
@dcohendumani
dcohendumani@withum.com
Partner,
Market
Leader
15+ years of Digital Transformation
Expertise with Office 365, SharePoint and
Dynamics
SharePoint Visionary
Interests: Productivity in
the Modern Workplace.
Work 2.0
Started working with
SharePoint when nobody
could spell it
4
SM
About Chris
Chris Ertz
@CCErtz
certz@withum.com
Practice
Leader
Our managed services team moves all types of
workloads to the Microsoft cloud including
applications and infrastructure. We then optimize
cloud subscriptions to drive the most value.
Expertise:
Innovative Digital Solutions
Technology Platforms
Security and Compliance
Managed Cloud Services
Fun Fact:
I participated on stage for a
Microsoft Windows and Office
launch event from Windows 95 to
Windows 8
5
SM
About Max
Max Hervé
mherve@withum.com
Lead
Consultant
- 10+ years of Microsoft Services
Architecture and Implementation
- Expertise in deploying Cloud and
Hybrid Environments
Expertise:
- Office 365/Azure
- Exchange
- SharePoint
- Skype/Teams
Fun Fact:
My first MSFT Cloud project was to
move on-premises services to BPOS
(Office 365 v1)
6
SM
Withum | BE IN A POSITION OF STRENGTH
What to
Expect From
Today’s
Webinar
• Understand the security threat
landscape
• Discuss how Microsoft 365 can help
project your digital estate by:
• 1. Protecting and governing data
where it lives
• 2. Identifying and remediating
critical insider risks
• 3. Investigating and responding
with relevant data
7
SM
POLL
8
SM
Withum | BE IN A POSITION OF STRENGTH
Security Challenges in 2020
• Data regulations are increasing around
the world (GDPR, CCPR)
• Security compliance is becoming standard
(SOC 3, NIST 800.171, CMMC)
• Security breaches and attacks are
mounting
• Businesses need to protect their
intellectual property and limit data leaks
• Security and compliance market is
fragmented with many vendor solutions
that don’t integrate well
9
SM
Cyberspace is the
new battlefield
Security skills are in
short supply
Virtually anything
can be attacked
The cybersecurity landscape is rapidly changing
10
SM
11
SM
12
SM
Secure identities to
reach zero trust
Identity & access
management
Security
management
Strengthen your security
posture with insights
and guidance
Threat
protection
Help stop damaging
attacks with integrated and
automated security
Locate and classify
information anywhere
it lives
Information
protection
Infrastructure security
13
SM
Securing Privileged Access
Office 365 Security
Rapid Cyberattacks
(Wannacrypt/Petya)
Office 365
Dynamics 365
+Monitor
Azure Sentinel – Cloud Native SIEM and SOAR (Preview)
SQL Encryption &
Data Masking
Data Loss Protection
Data Governance
eDiscovery
(https://aka.ms/MCRA)
14
SM
Fewer vendors and products
to manage
Less end-user friction
and resistance
Lower integration costs
Reduced blind spots
15
SM
Category Competition Does Microsoft 365 do it?
Identity & access
management
Threat protection
Information protection
Unified endpoint
management
Okta, Ping, Centrify, Duo, OneLogin, SailPoint
Symantec, FireEye, McAfee, Crowd Strike, Cylance, Fortinet,
Kaspersky Lab, Proof Point, Mimecast, TrendMicro, Javelin,
Preempt, CyberArk, Exabeam, Rapid 7
Symantec, Titus, Bolden James, Zix, Virtru
VMware, Cisco, IBM, MobileIron
CASB McAfee, Netskope, Symantec, Bitglass
16
SM
Security solutions
Microsoft 365 E5 covers
Security solutions other
Microsoft solutions cover
What Microsoft
Services/MSSPs/
ISVs cover
What Microsoft
integrates with
What Microsoft doesn’t do
can replace
up to 26
other security
vendors
SingleSign-on(SSO)
Reportin
g
Pen Testing/ Risk Assessment
17
SM
Identity & access
management
18
SM
Identity and access management
Conditional access Identity protection
Secure
authentication
19
SM
Secure authentication
Getting to a world without passwords
Microsoft Authenticator FIDO2 Security KeysWindows Hello for Business
20
SM
Azure AD
Conditional Access
User and location Device
Application Real time risk
Conditional
access
21
SM
Identity protection
An integral component of Microsoft Threat Protection
Azure AD
Identity
Protection
Azure
ATP
Microsoft
Cloud App
Security
22
SM
Passwordless Authentication Demo
23
SM
24
SM
25
SM
26
SM
27
SM
28
SM
Conditional Access Session Control Demo
29
SM
30
SM
31
SM
32
SM
Threat
protection
33
SM
Office 365 Advanced Threat Protection
Actionable
insights
Automated
response
Industry-leading
protection
Training &
awareness
34
SM
Threat Protection Demo
35
SM
36
SM
37
SM
38
SM
39
SM
40
SM
41
SM
42
SM
43
SM
44
SM
45
SM
Information
protection
46
SM
Microsoft Information Protection
Discover & classify
sensitive information
Apply protection
based on policy
Monitor &
remediate
Apps On-premisesCloud servicesDevices
Across
Accelerate
Compliance
47
SM
Follow the data—throughout its lifecycle
Apply protection
based on policy
Have you defined what “sensitive data” means
for your company?
Do you have a way to detect sensitive data
across your company?
Do you have a way to ensure that labels persist
with the data—wherever it travels?
Which regulations and compliance factors impact you?
Are you able to empower end-users to classify and label
content themselves, or apply automatically based on
company policies?
Detect &
classify sensitive
information
Monitor &
remediate
Do you have visibility into how sensitive data is being access and shared, even across
3rd-party SaaS apps and cloud services?
Are you able to remediate actions immediately, such as quarantine data or block access?
Are you able to integrate event information into your SIEM system or other tools?
48
SM
49
SM
50
SM
51
SM
52
SM
53
SM
54
SM
55
SM
56
SM
57
SM
58
SM
59
SM
60
SM
61
SM
62
SM
65
SM
Strengthen your
security posture with
insights and guidance
Understand your current security position
across your organization (Assessment,
Workshops)
Establish products required to meet
compliance and security level
Use the built-in recommendations to find the
right balance of security. Enable continuous
monitoring
Create policies, configure policies and enable
controls to better define your security position
66
SM
Shared responsibility model
Customer management of risk
Data classification and data accountability
Shared management of risk
Identity & access management | End point devices
Provider management of risk
Physical | Networking
Responsibility On-Prem IaaS PaaS SaaS
Data classification
and accountability
Client & end-point
protection
Identity & access
management
Application
level controls
Network controls
Host infrastructure
Physical security
67
SM
Examples of shared responsibilities: NIST
800-171
Access to production environment
Set up access controls that strictly limit
standing access to customer’s data or
production environment Organization
responsibility
Access to production environment
Set up access control policy and SOP,
leveraging Customer Lockbox / identity
management solutions
Protect data
Encrypt data at rest and in transit
based on industrial standards (BitLocker,
TLS, etc.)
responsibility
Protect data
Encrypt data based on org’s
compliance obligations. E.g.
encrypt PII in transit between users,
using its own encryption key, etc.
Personnel control
Strict screening for employees, vendors,
and contractors, and conduct trainings
through onboarding process
Personnel control
Allocate and staff sufficient resources
to operate an organization-wide
privacy program, including awareness-
raising and training
68
SM
Compliance Manager
Manage your compliance from one place
Ongoing risk assessment
An intelligent score reflects your compliance posture
against regulations or standards
Actionable insights
Recommended actions to improve your data
protection capabilities
Simplified compliance
Streamlined workflow across teams and richly detailed
reports for auditing preparation
Compliance Manager is a dashboard that provides the Compliance Score and a
summary of your data protection and compliance stature as well as recommendations
to improve data protection and compliance. This is a recommendation, it is up to you
to evaluate and validate the effectiveness of customer controls as per your regulatory
environment. Recommendations from Compliance Manager and Compliance Score
should not be interpreted as a guarantee of compliance.
70
SM
How do you get there?
71
SM
Security Workshop Funding
Offer up to
$5Kper engagement
• Must have > 1000 Exchange Online
qualified entitlements, OR
> 1000 PC Install Base for non-Office
365 customers
• Threat Check only: Exchange Online
usage > 25%
Customer Requirements
Program Dates
• Last day to nominate customers:
April 30, 2020
• Proof of execution must be returned
by: June 1, 2020
• $5,000 for completion of the workshop
including Threat Check
• $2,000 for completion of workshop only
Funding Options
Partner funding is available for eligible partners and customers. Funding is designed to help partners drive
Microsoft 365 conversations and customer intent to deploy security workloads.
72
SM
Questions?
73
SM
We are offering a
complimentary Security and
Compliance workshop for
qualifying organizations.
SIGN UP HERE

Weitere ähnliche Inhalte

Was ist angesagt?

Webinar: Top 2020 Digital Workplace Trends
Webinar: Top 2020 Digital Workplace Trends Webinar: Top 2020 Digital Workplace Trends
Webinar: Top 2020 Digital Workplace Trends Withum
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsCommunity IT Innovators
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to CyberthreatsIBM Security
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Community IT Innovators
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaborationcentralohioissa
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment swedenIBM Sverige
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataIBM Security
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022lior mazor
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication Precisely
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsIBM Security
 

Was ist angesagt? (20)

Webinar: Top 2020 Digital Workplace Trends
Webinar: Top 2020 Digital Workplace Trends Webinar: Top 2020 Digital Workplace Trends
Webinar: Top 2020 Digital Workplace Trends
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 

Ähnlich wie Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention

MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architectureangelohammond
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfSymptai Consulting Limited
 
Microsoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterpriseMicrosoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterprisessuserd58af7
 
Top 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxTop 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxAlistair Pugin
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice Corporation
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 DefenderMighty Guides, Inc.
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Secure Communication System
Secure Communication SystemSecure Communication System
Secure Communication Systemayeshaurooj104
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
Respond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business ResilienceRespond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business ResilienceDavid J Rosenthal
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StoryCloudLock
 
Office 365 Security And Compliance
Office 365 Security And ComplianceOffice 365 Security And Compliance
Office 365 Security And ComplianceMicrosoft
 

Ähnlich wie Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention (20)

MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architecture
 
go secure cloud.pdf
go secure cloud.pdfgo secure cloud.pdf
go secure cloud.pdf
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdf
 
Microsoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterpriseMicrosoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterprise
 
Top 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxTop 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptx
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
SIEM Buyer's Guide
SIEM Buyer's GuideSIEM Buyer's Guide
SIEM Buyer's Guide
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Secure Communication System
Secure Communication SystemSecure Communication System
Secure Communication System
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Respond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business ResilienceRespond-Recover-Reimagine: Building Business Resilience
Respond-Recover-Reimagine: Building Business Resilience
 
NG-Brochure
NG-BrochureNG-Brochure
NG-Brochure
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
 
Office 365 Security And Compliance
Office 365 Security And ComplianceOffice 365 Security And Compliance
Office 365 Security And Compliance
 

Mehr von WithumSmith+Brown, formerly Portal Solutions

Webinar: Office 365 & Knowledge Management— Creating A Strategy For The Enter...
Webinar: Office 365 & Knowledge Management— Creating A Strategy For The Enter...Webinar: Office 365 & Knowledge Management— Creating A Strategy For The Enter...
Webinar: Office 365 & Knowledge Management— Creating A Strategy For The Enter...WithumSmith+Brown, formerly Portal Solutions
 

Mehr von WithumSmith+Brown, formerly Portal Solutions (20)

Webinar: Stay Productive at Home with Microsoft 365
Webinar: Stay Productive at Home with Microsoft 365Webinar: Stay Productive at Home with Microsoft 365
Webinar: Stay Productive at Home with Microsoft 365
 
Webinar: Adding Intelligence to Process Automation
Webinar: Adding Intelligence to Process AutomationWebinar: Adding Intelligence to Process Automation
Webinar: Adding Intelligence to Process Automation
 
Webinar: Top 8 Must Haves for Your Office 365 Intranet
Webinar: Top 8 Must Haves for Your Office 365 Intranet Webinar: Top 8 Must Haves for Your Office 365 Intranet
Webinar: Top 8 Must Haves for Your Office 365 Intranet
 
Webinar: Jumpstart to Microsoft Teams
Webinar: Jumpstart to Microsoft Teams Webinar: Jumpstart to Microsoft Teams
Webinar: Jumpstart to Microsoft Teams
 
Webinar: Is Microsoft Teams Turned On, But Not Rolled Out? Reining in the Wi...
Webinar: Is Microsoft Teams Turned On, But Not Rolled Out?  Reining in the Wi...Webinar: Is Microsoft Teams Turned On, But Not Rolled Out?  Reining in the Wi...
Webinar: Is Microsoft Teams Turned On, But Not Rolled Out? Reining in the Wi...
 
Webinar: Microsoft Teams: Your Light Weight Project Management Toolkit
Webinar: Microsoft Teams: Your Light Weight Project Management ToolkitWebinar: Microsoft Teams: Your Light Weight Project Management Toolkit
Webinar: Microsoft Teams: Your Light Weight Project Management Toolkit
 
Webinar: Video Conferencing Made Easy With Microsoft Teams, Skype for Busines...
Webinar: Video Conferencing Made Easy With Microsoft Teams, Skype for Busines...Webinar: Video Conferencing Made Easy With Microsoft Teams, Skype for Busines...
Webinar: Video Conferencing Made Easy With Microsoft Teams, Skype for Busines...
 
Microsoft ignite 2018 key takeaways - webinar
Microsoft ignite 2018   key takeaways - webinarMicrosoft ignite 2018   key takeaways - webinar
Microsoft ignite 2018 key takeaways - webinar
 
Webinar: Office 365 Turns 5! Does Modern Equal Mature?
Webinar: Office 365 Turns 5! Does Modern Equal Mature?Webinar: Office 365 Turns 5! Does Modern Equal Mature?
Webinar: Office 365 Turns 5! Does Modern Equal Mature?
 
Webinar: Workforce Modernization - Embrace Change without Compromising
Webinar: Workforce Modernization - Embrace Change without CompromisingWebinar: Workforce Modernization - Embrace Change without Compromising
Webinar: Workforce Modernization - Embrace Change without Compromising
 
Webinar: Building Your Document Management Strategy for Office 365
Webinar: Building Your Document Management Strategy for Office 365Webinar: Building Your Document Management Strategy for Office 365
Webinar: Building Your Document Management Strategy for Office 365
 
Webinar: Benefits of an ERP Solution for Wholesale Distributors
Webinar:  Benefits of an ERP Solution for Wholesale DistributorsWebinar:  Benefits of an ERP Solution for Wholesale Distributors
Webinar: Benefits of an ERP Solution for Wholesale Distributors
 
Webinar: ERP - When Paying Too Little Can Cost Too Much
Webinar: ERP - When Paying Too Little Can Cost Too MuchWebinar: ERP - When Paying Too Little Can Cost Too Much
Webinar: ERP - When Paying Too Little Can Cost Too Much
 
Webinar: Breaking Down Barriers to Achieve Sustainable Growth
Webinar: Breaking Down Barriers to Achieve Sustainable GrowthWebinar: Breaking Down Barriers to Achieve Sustainable Growth
Webinar: Breaking Down Barriers to Achieve Sustainable Growth
 
Webinar: Introduction to GDPR - What It Is and How It Will Affect Your Business
Webinar: Introduction to GDPR - What It Is and How It Will Affect Your BusinessWebinar: Introduction to GDPR - What It Is and How It Will Affect Your Business
Webinar: Introduction to GDPR - What It Is and How It Will Affect Your Business
 
Webinar: Office 365 & Knowledge Management— Creating A Strategy For The Enter...
Webinar: Office 365 & Knowledge Management— Creating A Strategy For The Enter...Webinar: Office 365 & Knowledge Management— Creating A Strategy For The Enter...
Webinar: Office 365 & Knowledge Management— Creating A Strategy For The Enter...
 
[Webinar] Understanding Microsoft Teams: What You Need to Know
[Webinar] Understanding Microsoft Teams: What You Need to Know[Webinar] Understanding Microsoft Teams: What You Need to Know
[Webinar] Understanding Microsoft Teams: What You Need to Know
 
Webinar: Digital Transformation for Healthcare
Webinar: Digital Transformation for HealthcareWebinar: Digital Transformation for Healthcare
Webinar: Digital Transformation for Healthcare
 
Webinar: What's New with SharePoint and OneDrive
Webinar: What's New with SharePoint and OneDriveWebinar: What's New with SharePoint and OneDrive
Webinar: What's New with SharePoint and OneDrive
 
Creating a Game Plan for Your Digital Transformation
Creating a Game Plan for Your Digital TransformationCreating a Game Plan for Your Digital Transformation
Creating a Game Plan for Your Digital Transformation
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention

  • 1. 1 SM February 27, 2020 Webinar: Microsoft 365: Your Gateway to Data Loss Prevention
  • 2. 2 SM Withum | BE IN A POSITION OF STRENGTH Housekeeping • Webinar is being recorded • 50 minute session • 10 minute Q&A session at the end • Send in your questions! • Type your questions in the Questions Pane of the GotoWebinar Panel • Slides and recording will be emailed after the webinar
  • 3. 3 SM About Daniel Daniel Cohen-Dumani @dcohendumani dcohendumani@withum.com Partner, Market Leader 15+ years of Digital Transformation Expertise with Office 365, SharePoint and Dynamics SharePoint Visionary Interests: Productivity in the Modern Workplace. Work 2.0 Started working with SharePoint when nobody could spell it
  • 4. 4 SM About Chris Chris Ertz @CCErtz certz@withum.com Practice Leader Our managed services team moves all types of workloads to the Microsoft cloud including applications and infrastructure. We then optimize cloud subscriptions to drive the most value. Expertise: Innovative Digital Solutions Technology Platforms Security and Compliance Managed Cloud Services Fun Fact: I participated on stage for a Microsoft Windows and Office launch event from Windows 95 to Windows 8
  • 5. 5 SM About Max Max Hervé mherve@withum.com Lead Consultant - 10+ years of Microsoft Services Architecture and Implementation - Expertise in deploying Cloud and Hybrid Environments Expertise: - Office 365/Azure - Exchange - SharePoint - Skype/Teams Fun Fact: My first MSFT Cloud project was to move on-premises services to BPOS (Office 365 v1)
  • 6. 6 SM Withum | BE IN A POSITION OF STRENGTH What to Expect From Today’s Webinar • Understand the security threat landscape • Discuss how Microsoft 365 can help project your digital estate by: • 1. Protecting and governing data where it lives • 2. Identifying and remediating critical insider risks • 3. Investigating and responding with relevant data
  • 8. 8 SM Withum | BE IN A POSITION OF STRENGTH Security Challenges in 2020 • Data regulations are increasing around the world (GDPR, CCPR) • Security compliance is becoming standard (SOC 3, NIST 800.171, CMMC) • Security breaches and attacks are mounting • Businesses need to protect their intellectual property and limit data leaks • Security and compliance market is fragmented with many vendor solutions that don’t integrate well
  • 9. 9 SM Cyberspace is the new battlefield Security skills are in short supply Virtually anything can be attacked The cybersecurity landscape is rapidly changing
  • 10. 10 SM
  • 11. 11 SM
  • 12. 12 SM Secure identities to reach zero trust Identity & access management Security management Strengthen your security posture with insights and guidance Threat protection Help stop damaging attacks with integrated and automated security Locate and classify information anywhere it lives Information protection Infrastructure security
  • 13. 13 SM Securing Privileged Access Office 365 Security Rapid Cyberattacks (Wannacrypt/Petya) Office 365 Dynamics 365 +Monitor Azure Sentinel – Cloud Native SIEM and SOAR (Preview) SQL Encryption & Data Masking Data Loss Protection Data Governance eDiscovery (https://aka.ms/MCRA)
  • 14. 14 SM Fewer vendors and products to manage Less end-user friction and resistance Lower integration costs Reduced blind spots
  • 15. 15 SM Category Competition Does Microsoft 365 do it? Identity & access management Threat protection Information protection Unified endpoint management Okta, Ping, Centrify, Duo, OneLogin, SailPoint Symantec, FireEye, McAfee, Crowd Strike, Cylance, Fortinet, Kaspersky Lab, Proof Point, Mimecast, TrendMicro, Javelin, Preempt, CyberArk, Exabeam, Rapid 7 Symantec, Titus, Bolden James, Zix, Virtru VMware, Cisco, IBM, MobileIron CASB McAfee, Netskope, Symantec, Bitglass
  • 16. 16 SM Security solutions Microsoft 365 E5 covers Security solutions other Microsoft solutions cover What Microsoft Services/MSSPs/ ISVs cover What Microsoft integrates with What Microsoft doesn’t do can replace up to 26 other security vendors SingleSign-on(SSO) Reportin g Pen Testing/ Risk Assessment
  • 18. 18 SM Identity and access management Conditional access Identity protection Secure authentication
  • 19. 19 SM Secure authentication Getting to a world without passwords Microsoft Authenticator FIDO2 Security KeysWindows Hello for Business
  • 20. 20 SM Azure AD Conditional Access User and location Device Application Real time risk Conditional access
  • 21. 21 SM Identity protection An integral component of Microsoft Threat Protection Azure AD Identity Protection Azure ATP Microsoft Cloud App Security
  • 23. 23 SM
  • 24. 24 SM
  • 25. 25 SM
  • 26. 26 SM
  • 27. 27 SM
  • 29. 29 SM
  • 30. 30 SM
  • 31. 31 SM
  • 33. 33 SM Office 365 Advanced Threat Protection Actionable insights Automated response Industry-leading protection Training & awareness
  • 35. 35 SM
  • 36. 36 SM
  • 37. 37 SM
  • 38. 38 SM
  • 39. 39 SM
  • 40. 40 SM
  • 41. 41 SM
  • 42. 42 SM
  • 43. 43 SM
  • 44. 44 SM
  • 46. 46 SM Microsoft Information Protection Discover & classify sensitive information Apply protection based on policy Monitor & remediate Apps On-premisesCloud servicesDevices Across Accelerate Compliance
  • 47. 47 SM Follow the data—throughout its lifecycle Apply protection based on policy Have you defined what “sensitive data” means for your company? Do you have a way to detect sensitive data across your company? Do you have a way to ensure that labels persist with the data—wherever it travels? Which regulations and compliance factors impact you? Are you able to empower end-users to classify and label content themselves, or apply automatically based on company policies? Detect & classify sensitive information Monitor & remediate Do you have visibility into how sensitive data is being access and shared, even across 3rd-party SaaS apps and cloud services? Are you able to remediate actions immediately, such as quarantine data or block access? Are you able to integrate event information into your SIEM system or other tools?
  • 48. 48 SM
  • 49. 49 SM
  • 50. 50 SM
  • 51. 51 SM
  • 52. 52 SM
  • 53. 53 SM
  • 54. 54 SM
  • 55. 55 SM
  • 56. 56 SM
  • 57. 57 SM
  • 58. 58 SM
  • 59. 59 SM
  • 60. 60 SM
  • 61. 61 SM
  • 62. 62 SM
  • 63. 65 SM Strengthen your security posture with insights and guidance Understand your current security position across your organization (Assessment, Workshops) Establish products required to meet compliance and security level Use the built-in recommendations to find the right balance of security. Enable continuous monitoring Create policies, configure policies and enable controls to better define your security position
  • 64. 66 SM Shared responsibility model Customer management of risk Data classification and data accountability Shared management of risk Identity & access management | End point devices Provider management of risk Physical | Networking Responsibility On-Prem IaaS PaaS SaaS Data classification and accountability Client & end-point protection Identity & access management Application level controls Network controls Host infrastructure Physical security
  • 65. 67 SM Examples of shared responsibilities: NIST 800-171 Access to production environment Set up access controls that strictly limit standing access to customer’s data or production environment Organization responsibility Access to production environment Set up access control policy and SOP, leveraging Customer Lockbox / identity management solutions Protect data Encrypt data at rest and in transit based on industrial standards (BitLocker, TLS, etc.) responsibility Protect data Encrypt data based on org’s compliance obligations. E.g. encrypt PII in transit between users, using its own encryption key, etc. Personnel control Strict screening for employees, vendors, and contractors, and conduct trainings through onboarding process Personnel control Allocate and staff sufficient resources to operate an organization-wide privacy program, including awareness- raising and training
  • 66. 68 SM Compliance Manager Manage your compliance from one place Ongoing risk assessment An intelligent score reflects your compliance posture against regulations or standards Actionable insights Recommended actions to improve your data protection capabilities Simplified compliance Streamlined workflow across teams and richly detailed reports for auditing preparation Compliance Manager is a dashboard that provides the Compliance Score and a summary of your data protection and compliance stature as well as recommendations to improve data protection and compliance. This is a recommendation, it is up to you to evaluate and validate the effectiveness of customer controls as per your regulatory environment. Recommendations from Compliance Manager and Compliance Score should not be interpreted as a guarantee of compliance.
  • 67. 70 SM How do you get there?
  • 68. 71 SM Security Workshop Funding Offer up to $5Kper engagement • Must have > 1000 Exchange Online qualified entitlements, OR > 1000 PC Install Base for non-Office 365 customers • Threat Check only: Exchange Online usage > 25% Customer Requirements Program Dates • Last day to nominate customers: April 30, 2020 • Proof of execution must be returned by: June 1, 2020 • $5,000 for completion of the workshop including Threat Check • $2,000 for completion of workshop only Funding Options Partner funding is available for eligible partners and customers. Funding is designed to help partners drive Microsoft 365 conversations and customer intent to deploy security workloads.
  • 70. 73 SM We are offering a complimentary Security and Compliance workshop for qualifying organizations. SIGN UP HERE