Whether you are already utilizing Office 365 or are planning to move, it's important to understand the ever-changing security threat landscape and how you can protect your digital estate.
Don't miss our webinar to learn how to proactively safeguard your company against threats with the help of Microsoft 365.
Int his webinar we address the security challenges we are seeing in 2020 and show you areas of Microsoft 365 that can help you:
- Protect and govern data where it lives
- Identify and remediate critical insider risks
- Investigate and respond with relevant data
2. 2
SM
Withum | BE IN A POSITION OF STRENGTH
Housekeeping
• Webinar is being recorded
• 50 minute session
• 10 minute Q&A session at the end
• Send in your questions!
• Type your questions in the Questions
Pane of the GotoWebinar Panel
• Slides and recording will be emailed
after the webinar
4. 4
SM
About Chris
Chris Ertz
@CCErtz
certz@withum.com
Practice
Leader
Our managed services team moves all types of
workloads to the Microsoft cloud including
applications and infrastructure. We then optimize
cloud subscriptions to drive the most value.
Expertise:
Innovative Digital Solutions
Technology Platforms
Security and Compliance
Managed Cloud Services
Fun Fact:
I participated on stage for a
Microsoft Windows and Office
launch event from Windows 95 to
Windows 8
5. 5
SM
About Max
Max Hervé
mherve@withum.com
Lead
Consultant
- 10+ years of Microsoft Services
Architecture and Implementation
- Expertise in deploying Cloud and
Hybrid Environments
Expertise:
- Office 365/Azure
- Exchange
- SharePoint
- Skype/Teams
Fun Fact:
My first MSFT Cloud project was to
move on-premises services to BPOS
(Office 365 v1)
6. 6
SM
Withum | BE IN A POSITION OF STRENGTH
What to
Expect From
Today’s
Webinar
• Understand the security threat
landscape
• Discuss how Microsoft 365 can help
project your digital estate by:
• 1. Protecting and governing data
where it lives
• 2. Identifying and remediating
critical insider risks
• 3. Investigating and responding
with relevant data
8. 8
SM
Withum | BE IN A POSITION OF STRENGTH
Security Challenges in 2020
• Data regulations are increasing around
the world (GDPR, CCPR)
• Security compliance is becoming standard
(SOC 3, NIST 800.171, CMMC)
• Security breaches and attacks are
mounting
• Businesses need to protect their
intellectual property and limit data leaks
• Security and compliance market is
fragmented with many vendor solutions
that don’t integrate well
9. 9
SM
Cyberspace is the
new battlefield
Security skills are in
short supply
Virtually anything
can be attacked
The cybersecurity landscape is rapidly changing
12. 12
SM
Secure identities to
reach zero trust
Identity & access
management
Security
management
Strengthen your security
posture with insights
and guidance
Threat
protection
Help stop damaging
attacks with integrated and
automated security
Locate and classify
information anywhere
it lives
Information
protection
Infrastructure security
13. 13
SM
Securing Privileged Access
Office 365 Security
Rapid Cyberattacks
(Wannacrypt/Petya)
Office 365
Dynamics 365
+Monitor
Azure Sentinel – Cloud Native SIEM and SOAR (Preview)
SQL Encryption &
Data Masking
Data Loss Protection
Data Governance
eDiscovery
(https://aka.ms/MCRA)
14. 14
SM
Fewer vendors and products
to manage
Less end-user friction
and resistance
Lower integration costs
Reduced blind spots
16. 16
SM
Security solutions
Microsoft 365 E5 covers
Security solutions other
Microsoft solutions cover
What Microsoft
Services/MSSPs/
ISVs cover
What Microsoft
integrates with
What Microsoft doesn’t do
can replace
up to 26
other security
vendors
SingleSign-on(SSO)
Reportin
g
Pen Testing/ Risk Assessment
46. 46
SM
Microsoft Information Protection
Discover & classify
sensitive information
Apply protection
based on policy
Monitor &
remediate
Apps On-premisesCloud servicesDevices
Across
Accelerate
Compliance
47. 47
SM
Follow the data—throughout its lifecycle
Apply protection
based on policy
Have you defined what “sensitive data” means
for your company?
Do you have a way to detect sensitive data
across your company?
Do you have a way to ensure that labels persist
with the data—wherever it travels?
Which regulations and compliance factors impact you?
Are you able to empower end-users to classify and label
content themselves, or apply automatically based on
company policies?
Detect &
classify sensitive
information
Monitor &
remediate
Do you have visibility into how sensitive data is being access and shared, even across
3rd-party SaaS apps and cloud services?
Are you able to remediate actions immediately, such as quarantine data or block access?
Are you able to integrate event information into your SIEM system or other tools?
63. 65
SM
Strengthen your
security posture with
insights and guidance
Understand your current security position
across your organization (Assessment,
Workshops)
Establish products required to meet
compliance and security level
Use the built-in recommendations to find the
right balance of security. Enable continuous
monitoring
Create policies, configure policies and enable
controls to better define your security position
64. 66
SM
Shared responsibility model
Customer management of risk
Data classification and data accountability
Shared management of risk
Identity & access management | End point devices
Provider management of risk
Physical | Networking
Responsibility On-Prem IaaS PaaS SaaS
Data classification
and accountability
Client & end-point
protection
Identity & access
management
Application
level controls
Network controls
Host infrastructure
Physical security
65. 67
SM
Examples of shared responsibilities: NIST
800-171
Access to production environment
Set up access controls that strictly limit
standing access to customer’s data or
production environment Organization
responsibility
Access to production environment
Set up access control policy and SOP,
leveraging Customer Lockbox / identity
management solutions
Protect data
Encrypt data at rest and in transit
based on industrial standards (BitLocker,
TLS, etc.)
responsibility
Protect data
Encrypt data based on org’s
compliance obligations. E.g.
encrypt PII in transit between users,
using its own encryption key, etc.
Personnel control
Strict screening for employees, vendors,
and contractors, and conduct trainings
through onboarding process
Personnel control
Allocate and staff sufficient resources
to operate an organization-wide
privacy program, including awareness-
raising and training
66. 68
SM
Compliance Manager
Manage your compliance from one place
Ongoing risk assessment
An intelligent score reflects your compliance posture
against regulations or standards
Actionable insights
Recommended actions to improve your data
protection capabilities
Simplified compliance
Streamlined workflow across teams and richly detailed
reports for auditing preparation
Compliance Manager is a dashboard that provides the Compliance Score and a
summary of your data protection and compliance stature as well as recommendations
to improve data protection and compliance. This is a recommendation, it is up to you
to evaluate and validate the effectiveness of customer controls as per your regulatory
environment. Recommendations from Compliance Manager and Compliance Score
should not be interpreted as a guarantee of compliance.
68. 71
SM
Security Workshop Funding
Offer up to
$5Kper engagement
• Must have > 1000 Exchange Online
qualified entitlements, OR
> 1000 PC Install Base for non-Office
365 customers
• Threat Check only: Exchange Online
usage > 25%
Customer Requirements
Program Dates
• Last day to nominate customers:
April 30, 2020
• Proof of execution must be returned
by: June 1, 2020
• $5,000 for completion of the workshop
including Threat Check
• $2,000 for completion of workshop only
Funding Options
Partner funding is available for eligible partners and customers. Funding is designed to help partners drive
Microsoft 365 conversations and customer intent to deploy security workloads.