SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Downloaden Sie, um offline zu lesen
• Microsoft MVP | CISSP | CISM |
CCISO | MCSE | PMP………….
• EC-Council CCISO Advisory Board
• CISO100 and CISO50 Award
Winner
• Speaker (ITCamp, MS Ignite Tour,
CISO Africa, SharePoint Saturday,
CSCAMP…….)
• Blogger @ https://itcalls.net
• /AhmedNabilMahmoud
• @ITCalls_anabil
Data is
exploding
It’s created, stored, and
shared everywhere
Platforms
SaaS
Remote
Corporate
Structured
Private cloud
SMS
Vendors
Unstructured
Public
Emails
Documents
Records
Discovering and managing data is challenging
88%
of organizations no
longer have confidence
to detect and prevent
loss of sensitive data¹
>80%
of corporate data is
“dark” – it’s not classified,
protected or governed²
#1
Protecting and
governing sensitive
data is biggest
concern in complying
with regulations
1. Forrester. Security Concerns, Approaches and Technology Adoption. December 2018
2. IBM. Future of Cognitive Computing. November 2015
3. Microsoft GDPR research, 2017
Data regulations
are increasing
around the world
Protection of Personal
Information Act 2013
(POPI)
Australia Privacy Principles
2014
General Data Privacy Law
Data Protection in Act
(pending)
Federal Data Protection
Law 2000
California Consumer
Privacy Act (CCPA) 2018
Personal Information
Protection and Electronic
Documents Act (PIPEDA)
Act on Protection of
Personal Information
(APPI) 2017
Personal Information
Protection Act (PIPA) 2011
Personal Information
Security Specification 2018
Personal Data Protection
Act (PDPA 2012)
Personal Data Protection
Bill 2018
The Privacy Protection
Act (PPA) 2017
General Data Protection
Regulation (GDPR 2016)
What’s your strategy for protecting and
governing sensitive and business critical data?
Do you know where your business critical and
sensitive data resides and what is being done
with it?
Do you have control of this data as it travels
inside and outside of your organization?
Are you using multiple solutions to classify,
label, and protect this data?
Information
Protection &
Governance
Protect and govern data
—wherever it lives 88%
Understand your data landscape and identify
important data across your hybrid environment
Automatically retain,
delete, and store
data and records in
compliant manner
Apply flexible
protection actions
including encryption,
access restrictions
and visual markings
Powered by an intelligent platform
KNOW
YOUR DATA
88%
GOVERN
YOUR DATA
PROTECT
YOUR DATA
Unified approach to automatic data classification, policy
management, analytics and APIs
Information
Protection &
Governance
Protect and govern data
—anywhere it lives 88%
KNOW
YOUR DATA
88%
GOVERN
YOUR DATA
PROTECT
YOUR DATA
Customer lifecycle for Classification, Labeling and
Protection of sensitive files
DEFINE CLASSIFICATION
SCHEME
DEFINE ALL
CLASSIFICATION POLICY
CONDITIONS
CREATE/TEST AND
DEPLOY
CLASSIFICATION POLICY
ONGOING USAGE,
MONITORING AND
REMEDIATION
Office 365
Information Protection
Windows
Information Protection
Azure
Information Protection
What
Where
How
Microsoft information protection—the way it was
What
Where
How
Office 365
Information Protection
Windows
Information Protection
Azure
Information Protection
Microsoft information protection—now
Demo
How Client Look like ?
Know Your Data
How can I see what happens to my data over its lifecycle?
Where can I classify my data?
What methods can I use to classify my data?
Know your Data
Know your data – Top of mind questions
Where is my sensitive data
located?
What are the risky activities
happening in my organization
– files shared externally, across
1st and 3rd party apps?
I need to comply with a new
regulation? Where is my PII
data located & where is it
being generated?
How do I control data
sprawl and build a strategy
for dark data disposal
before I bring data to the
cloud from on-premise?
How do I see activity around
classification and labeling across
retention and sensitivity labels once
they have been used across
governance and retention outcomes?
?? ?
??
How do I monitor
ongoing risk around
label activity?
?
Flexible options to know your data
Scanner: Spanning on-premises to cloud Content explorer
Activity explorer
Use built-in classification methods
Auto-classification
using trainable
classifiers
Understand what’s sensitive, what’s business critical & across your environment
Discover and classify on-premises files
Helps you manage sensitive data prior to
migrating to Office 365 or other cloud services
Use discover mode to identify and report on
files containing sensitive data
Use enforce mode to automatically classify,
label and protect files with sensitive data
Can be configured to scan:
• CIFS file shares
• SharePoint Server 2016
• SharePoint Server 2013
Discover and classify cloud services using Microsoft cloud
app security
Detect content in cloud storage services
Inspect files for sensitive information – based
on policy
Apply sensitivity labels
Automatically apply labels to sensitive files
identified in cloud apps
Enforce protection policies
Use sensitivity labels to apply policy, such as
restricting access to sensitive information,
blocking uploads, blocking downloads
Multiple classification methods
Built-in
90+ information types provided out of
the box to get started
Flexible
Use regex, keywords, and exact data
match for data identification
Organized
Mapped to different industry
regulations
Trainable classifiers
Leverage machine learning to automatically classify unique data
Built-in
Resume, source code, offensive
language provided out-of-box
Build-your-own
Train the system to look for specific
types of data
Integrated
Attach to sensitivity and retention
labels with associated policies
Demo
Built-in Classification
Protect Your Data
How can I balance data security and productivity?
Where can I protect my sensitive data?
How can I protect my sensitive data?
Protect your Data
Customizable
Persists as container
metadata or file metadata
Readable by other systems
Determines DLP policy
based on labels
Extensible to partner solutions
Protect your data using sensitivity labels
Manual or Automated Labels
Apply to content or
containers
Label data at rest, data in use,
or data in transit
Enable protection actions
based on labels
Seamless end user experience
across productivity applications
CONFIDENTIAL
Balance data security and productivity
Enforce conditional access to sensitive data
DLP actions to block sharing
Encrypt files and emails based on sensitivity label
Prevent data leakage through DLP policies based on
sensitivity label
Business data separation on devices
Secure email with encryption & permissions
Manually apply sensitivity label consistently across apps
applications and endpoints
Show recommendations and tooltips for sensitivity labels with
auto-labeling and DLP
Visual markings to indicate sensitive documents across apps and
services (e.g. watermark, lock icons, sensitivity column in SPO)
Co-author and collaborate with sensitive documents
Enable searching of encrypted files in SharePoint
Allow users to open and share encrypted pdf files in Edge in
addition to Adobe Acrobat Reader
Protect your data across environments
Classify and label
data in on-prem
repositories,
including file servers
and SharePoint
Label and protect
Office files natively
across Windows,
Mac, iOS, Android
and Web Clients
Label and protect
sensitive data
manually and
automatically across
content and
container
Automatically label
and protect sensitive
emails in Exchange
Online
Unified Label Management in Microsoft 365 Compliance center
On-prem Exchange
Online
SharePoint,
Teams, Groups,
PowerBI
Office Apps
Across
Platforms
Extend protection
through Microsoft
Cloud App Security
to third party clouds
and SaaS apps
Non-Microsoft
Clouds and
SaaS apps
Unified policy configuration & management
Centralized
Single destination to configure
policies for data protection and
data governance,
across locations
Customized
Customize conditions, rules and
exceptions to granularly define
policy actions
Consistent
Consistent enforcement using
common policy engine
 Native Manual labeling in Office apps across all platforms
 Automated labeling in Office ProPlus and Office on the Web
 Label SharePoint sites, Teams sites, Office 365 Groups, and PowerBI
artifacts at a container level
 Coauthor and collaborate on encrypted files in SharePoint Online
 Enable protected pdf workflows in Outlook and Edge
 Label and protect CAD artifacts with Microsoft Information Protection
Available and Preview since November
Deployment guidelines
for new and existing
Azure information
protection users
New customer: experience
Existing Azure information protection customers:
migration path
Why should I activate unified labeling?
Demo: migrate your AIP
labels to Unified Labels
CONFIDENTIAL
Clients
Android, iOS, Mac, Windows, Web
Windows Explorer
Right-click scenario
PowerShell
End user automation
Power BI
During export from a Power BI report
MCAS
Data at rest and in transit
SDK/3rd party
Adobe, Symantec, etc.
O365 DLP
Preview
PowerShell
Automation
MIP Scanner
Based on policy or All sensitivity
types
Exchange Transport Rules
Begin your data
classification journey
Proactively protect
information against
common threats
Monitor, report and protect
against complex security &
compliance challenges
CONFIDENTIAL CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
Discovery
Deploy MIP Scanner in discovery mode
Design your First Labels
Start with top 3-4 most broadly applicable
labels (General, Internal, Confidential)
Manual Labeling
Start with manual labeling/classification
Set Default Label
Set a default label (General)
User Awareness
No Protection
Go for Unified Labels
Classification is a journey. Start simple.
Begin your data
classification journey
Proactively protect
information against
common threats
Monitor, report and protect
against complex security &
compliance challenges
CONFIDENTIAL CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
Introduce Encryption
Apply encryption on your most sensitive label
Configure Recommendations
Configure recommendations for some labels
Labeling with Scanner
Start labeling with the MIP Scanner
Labeling via MCAS
Configure policy to apply labels in cloud locations
• Apply label based on conditions
Classification is a journey. Start simple.
Begin your data
classification journey
Proactively protect
information against
common threats
Monitor, report and protect
against complex security &
compliance challenges
CONFIDENTIAL CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
Automation/Encryption
Configure automatic labeling via:
• Clients
• Scanner
• O365 DLP (preview at Ignite)
Design Key Management Option
• Microsoft managed
• BYOK
Classification is a journey. Start simple.
References
http://aka.ms/Azure Information protection dag
https://myignite.techcommunity.microsoft.com/
https://aka.ms/UL-Explained
https://aka.ms/aipulvsclassic
@ITCalls_ANabil
/in/ahmednabilmahmoud/
https://itcalls.net/

Weitere ähnliche Inhalte

Was ist angesagt?

Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionaMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionAlbert Hoitingh
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementRiwut Libinuko
 
Azure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team ApproachAzure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team ApproachJoanne Klein
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
 
Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018Albert Hoitingh
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Syed Sabhi Haider
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Radhakrishnan Govindan
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSDavid J Rosenthal
 
Thread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal
 
SPS Geneva - Azure information protection
SPS Geneva - Azure information protectionSPS Geneva - Azure information protection
SPS Geneva - Azure information protectionAlbert Hoitingh
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveDavid J Rosenthal
 
From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...Joris Faure
 
Advanced data governance in Office 365
Advanced data governance in Office 365Advanced data governance in Office 365
Advanced data governance in Office 365Albert Hoitingh
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through WebEric Inch
 

Was ist angesagt? (20)

Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionaMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights Management
 
Azure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team ApproachAzure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team Approach
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
Thread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 Security
 
SPS Geneva - Azure information protection
SPS Geneva - Azure information protectionSPS Geneva - Azure information protection
SPS Geneva - Azure information protection
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
 
From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...
 
Advanced data governance in Office 365
Advanced data governance in Office 365Advanced data governance in Office 365
Advanced data governance in Office 365
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
 

Ähnlich wie One name unify them all

Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceJoanne Klein
 
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsSecuring SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsDrew Madelung
 
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Joanne Klein
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information ProtectionMicrosoft Österreich
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Chirag Patel
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarRobert Crane
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365Joanne Klein
 
Proteccion de datos contra pérdida de los mismos con MS365
Proteccion de datos contra pérdida de los mismos  con MS365Proteccion de datos contra pérdida de los mismos  con MS365
Proteccion de datos contra pérdida de los mismos con MS365RalSejas
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Ravikumar Sathyamurthy
 
Azure Information Protection - Taking a Team Approach - SPS Montreal
Azure Information Protection - Taking a Team Approach - SPS MontrealAzure Information Protection - Taking a Team Approach - SPS Montreal
Azure Information Protection - Taking a Team Approach - SPS MontrealJoanne Klein
 
Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365Drew Madelung
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 

Ähnlich wie One name unify them all (20)

Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern Workplace
 
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsSecuring SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
 
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know Webinar
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
Proteccion de datos contra pérdida de los mismos con MS365
Proteccion de datos contra pérdida de los mismos  con MS365Proteccion de datos contra pérdida de los mismos  con MS365
Proteccion de datos contra pérdida de los mismos con MS365
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
Azure Information Protection - Taking a Team Approach - SPS Montreal
Azure Information Protection - Taking a Team Approach - SPS MontrealAzure Information Protection - Taking a Team Approach - SPS Montreal
Azure Information Protection - Taking a Team Approach - SPS Montreal
 
Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365Securing SharePoint & OneDrive in Office 365
Securing SharePoint & OneDrive in Office 365
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 

Mehr von BizTalk360

Optimise Business Activity Tracking – Insights from Smurfit Kappa
Optimise Business Activity Tracking – Insights from Smurfit KappaOptimise Business Activity Tracking – Insights from Smurfit Kappa
Optimise Business Activity Tracking – Insights from Smurfit KappaBizTalk360
 
Optimise Business Activity Tracking – Insights from Smurfit Kappa
Optimise Business Activity Tracking – Insights from Smurfit KappaOptimise Business Activity Tracking – Insights from Smurfit Kappa
Optimise Business Activity Tracking – Insights from Smurfit KappaBizTalk360
 
What's inside "migrating to biz talk server 2020" Book (BizTalk360 Webinar)
What's inside "migrating to biz talk server 2020" Book (BizTalk360 Webinar)What's inside "migrating to biz talk server 2020" Book (BizTalk360 Webinar)
What's inside "migrating to biz talk server 2020" Book (BizTalk360 Webinar)BizTalk360
 
Integration Monday - Logic Apps: Development Experiences
Integration Monday - Logic Apps: Development ExperiencesIntegration Monday - Logic Apps: Development Experiences
Integration Monday - Logic Apps: Development ExperiencesBizTalk360
 
Integration Monday - BizTalk Migrator Deep Dive
Integration Monday - BizTalk Migrator Deep DiveIntegration Monday - BizTalk Migrator Deep Dive
Integration Monday - BizTalk Migrator Deep DiveBizTalk360
 
Testing for Logic App Solutions | Integration Monday
Testing for Logic App Solutions | Integration MondayTesting for Logic App Solutions | Integration Monday
Testing for Logic App Solutions | Integration MondayBizTalk360
 
System Integration using Reactive Programming | Integration Monday
System Integration using Reactive Programming | Integration MondaySystem Integration using Reactive Programming | Integration Monday
System Integration using Reactive Programming | Integration MondayBizTalk360
 
Building workflow solution with Microsoft Azure and Cloud | Integration Monday
Building workflow solution with Microsoft Azure and Cloud | Integration MondayBuilding workflow solution with Microsoft Azure and Cloud | Integration Monday
Building workflow solution with Microsoft Azure and Cloud | Integration MondayBizTalk360
 
Serverless Minimalism: How to architect your apps to save 98% on your Azure b...
Serverless Minimalism: How to architect your apps to save 98% on your Azure b...Serverless Minimalism: How to architect your apps to save 98% on your Azure b...
Serverless Minimalism: How to architect your apps to save 98% on your Azure b...BizTalk360
 
Migrating BizTalk Solutions to Azure: Mapping Messages | Integration Monday
Migrating BizTalk Solutions to Azure: Mapping Messages | Integration MondayMigrating BizTalk Solutions to Azure: Mapping Messages | Integration Monday
Migrating BizTalk Solutions to Azure: Mapping Messages | Integration MondayBizTalk360
 
Integration-Monday-Infrastructure-As-Code-With-Terraform
Integration-Monday-Infrastructure-As-Code-With-TerraformIntegration-Monday-Infrastructure-As-Code-With-Terraform
Integration-Monday-Infrastructure-As-Code-With-TerraformBizTalk360
 
Integration-Monday-Stateful-Programming-Models-Serverless-Functions
Integration-Monday-Stateful-Programming-Models-Serverless-FunctionsIntegration-Monday-Stateful-Programming-Models-Serverless-Functions
Integration-Monday-Stateful-Programming-Models-Serverless-FunctionsBizTalk360
 
Integration-Monday-Serverless-Slackbots-with-Azure-Durable-Functions
Integration-Monday-Serverless-Slackbots-with-Azure-Durable-FunctionsIntegration-Monday-Serverless-Slackbots-with-Azure-Durable-Functions
Integration-Monday-Serverless-Slackbots-with-Azure-Durable-FunctionsBizTalk360
 
Integration-Monday-Building-Stateful-Workloads-Kubernetes
Integration-Monday-Building-Stateful-Workloads-KubernetesIntegration-Monday-Building-Stateful-Workloads-Kubernetes
Integration-Monday-Building-Stateful-Workloads-KubernetesBizTalk360
 
Integration-Monday-Logic-Apps-Tips-Tricks
Integration-Monday-Logic-Apps-Tips-TricksIntegration-Monday-Logic-Apps-Tips-Tricks
Integration-Monday-Logic-Apps-Tips-TricksBizTalk360
 
Integration-Monday-Terraform-Serverless
Integration-Monday-Terraform-ServerlessIntegration-Monday-Terraform-Serverless
Integration-Monday-Terraform-ServerlessBizTalk360
 
Integration-Monday-Microsoft-Power-Platform
Integration-Monday-Microsoft-Power-PlatformIntegration-Monday-Microsoft-Power-Platform
Integration-Monday-Microsoft-Power-PlatformBizTalk360
 
Securely Publishing Azure Services
Securely Publishing Azure ServicesSecurely Publishing Azure Services
Securely Publishing Azure ServicesBizTalk360
 
Integration-Monday-BizTalk-Server-2020
Integration-Monday-BizTalk-Server-2020Integration-Monday-BizTalk-Server-2020
Integration-Monday-BizTalk-Server-2020BizTalk360
 

Mehr von BizTalk360 (20)

Optimise Business Activity Tracking – Insights from Smurfit Kappa
Optimise Business Activity Tracking – Insights from Smurfit KappaOptimise Business Activity Tracking – Insights from Smurfit Kappa
Optimise Business Activity Tracking – Insights from Smurfit Kappa
 
Optimise Business Activity Tracking – Insights from Smurfit Kappa
Optimise Business Activity Tracking – Insights from Smurfit KappaOptimise Business Activity Tracking – Insights from Smurfit Kappa
Optimise Business Activity Tracking – Insights from Smurfit Kappa
 
What's inside "migrating to biz talk server 2020" Book (BizTalk360 Webinar)
What's inside "migrating to biz talk server 2020" Book (BizTalk360 Webinar)What's inside "migrating to biz talk server 2020" Book (BizTalk360 Webinar)
What's inside "migrating to biz talk server 2020" Book (BizTalk360 Webinar)
 
Integration Monday - Logic Apps: Development Experiences
Integration Monday - Logic Apps: Development ExperiencesIntegration Monday - Logic Apps: Development Experiences
Integration Monday - Logic Apps: Development Experiences
 
Integration Monday - BizTalk Migrator Deep Dive
Integration Monday - BizTalk Migrator Deep DiveIntegration Monday - BizTalk Migrator Deep Dive
Integration Monday - BizTalk Migrator Deep Dive
 
Testing for Logic App Solutions | Integration Monday
Testing for Logic App Solutions | Integration MondayTesting for Logic App Solutions | Integration Monday
Testing for Logic App Solutions | Integration Monday
 
No-Slides
No-SlidesNo-Slides
No-Slides
 
System Integration using Reactive Programming | Integration Monday
System Integration using Reactive Programming | Integration MondaySystem Integration using Reactive Programming | Integration Monday
System Integration using Reactive Programming | Integration Monday
 
Building workflow solution with Microsoft Azure and Cloud | Integration Monday
Building workflow solution with Microsoft Azure and Cloud | Integration MondayBuilding workflow solution with Microsoft Azure and Cloud | Integration Monday
Building workflow solution with Microsoft Azure and Cloud | Integration Monday
 
Serverless Minimalism: How to architect your apps to save 98% on your Azure b...
Serverless Minimalism: How to architect your apps to save 98% on your Azure b...Serverless Minimalism: How to architect your apps to save 98% on your Azure b...
Serverless Minimalism: How to architect your apps to save 98% on your Azure b...
 
Migrating BizTalk Solutions to Azure: Mapping Messages | Integration Monday
Migrating BizTalk Solutions to Azure: Mapping Messages | Integration MondayMigrating BizTalk Solutions to Azure: Mapping Messages | Integration Monday
Migrating BizTalk Solutions to Azure: Mapping Messages | Integration Monday
 
Integration-Monday-Infrastructure-As-Code-With-Terraform
Integration-Monday-Infrastructure-As-Code-With-TerraformIntegration-Monday-Infrastructure-As-Code-With-Terraform
Integration-Monday-Infrastructure-As-Code-With-Terraform
 
Integration-Monday-Stateful-Programming-Models-Serverless-Functions
Integration-Monday-Stateful-Programming-Models-Serverless-FunctionsIntegration-Monday-Stateful-Programming-Models-Serverless-Functions
Integration-Monday-Stateful-Programming-Models-Serverless-Functions
 
Integration-Monday-Serverless-Slackbots-with-Azure-Durable-Functions
Integration-Monday-Serverless-Slackbots-with-Azure-Durable-FunctionsIntegration-Monday-Serverless-Slackbots-with-Azure-Durable-Functions
Integration-Monday-Serverless-Slackbots-with-Azure-Durable-Functions
 
Integration-Monday-Building-Stateful-Workloads-Kubernetes
Integration-Monday-Building-Stateful-Workloads-KubernetesIntegration-Monday-Building-Stateful-Workloads-Kubernetes
Integration-Monday-Building-Stateful-Workloads-Kubernetes
 
Integration-Monday-Logic-Apps-Tips-Tricks
Integration-Monday-Logic-Apps-Tips-TricksIntegration-Monday-Logic-Apps-Tips-Tricks
Integration-Monday-Logic-Apps-Tips-Tricks
 
Integration-Monday-Terraform-Serverless
Integration-Monday-Terraform-ServerlessIntegration-Monday-Terraform-Serverless
Integration-Monday-Terraform-Serverless
 
Integration-Monday-Microsoft-Power-Platform
Integration-Monday-Microsoft-Power-PlatformIntegration-Monday-Microsoft-Power-Platform
Integration-Monday-Microsoft-Power-Platform
 
Securely Publishing Azure Services
Securely Publishing Azure ServicesSecurely Publishing Azure Services
Securely Publishing Azure Services
 
Integration-Monday-BizTalk-Server-2020
Integration-Monday-BizTalk-Server-2020Integration-Monday-BizTalk-Server-2020
Integration-Monday-BizTalk-Server-2020
 

Kürzlich hochgeladen

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Kürzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

One name unify them all

  • 1.
  • 2. • Microsoft MVP | CISSP | CISM | CCISO | MCSE | PMP…………. • EC-Council CCISO Advisory Board • CISO100 and CISO50 Award Winner • Speaker (ITCamp, MS Ignite Tour, CISO Africa, SharePoint Saturday, CSCAMP…….) • Blogger @ https://itcalls.net • /AhmedNabilMahmoud • @ITCalls_anabil
  • 3. Data is exploding It’s created, stored, and shared everywhere Platforms SaaS Remote Corporate Structured Private cloud SMS Vendors Unstructured Public Emails Documents Records
  • 4. Discovering and managing data is challenging 88% of organizations no longer have confidence to detect and prevent loss of sensitive data¹ >80% of corporate data is “dark” – it’s not classified, protected or governed² #1 Protecting and governing sensitive data is biggest concern in complying with regulations 1. Forrester. Security Concerns, Approaches and Technology Adoption. December 2018 2. IBM. Future of Cognitive Computing. November 2015 3. Microsoft GDPR research, 2017
  • 5. Data regulations are increasing around the world Protection of Personal Information Act 2013 (POPI) Australia Privacy Principles 2014 General Data Privacy Law Data Protection in Act (pending) Federal Data Protection Law 2000 California Consumer Privacy Act (CCPA) 2018 Personal Information Protection and Electronic Documents Act (PIPEDA) Act on Protection of Personal Information (APPI) 2017 Personal Information Protection Act (PIPA) 2011 Personal Information Security Specification 2018 Personal Data Protection Act (PDPA 2012) Personal Data Protection Bill 2018 The Privacy Protection Act (PPA) 2017 General Data Protection Regulation (GDPR 2016)
  • 6. What’s your strategy for protecting and governing sensitive and business critical data? Do you know where your business critical and sensitive data resides and what is being done with it? Do you have control of this data as it travels inside and outside of your organization? Are you using multiple solutions to classify, label, and protect this data?
  • 7. Information Protection & Governance Protect and govern data —wherever it lives 88% Understand your data landscape and identify important data across your hybrid environment Automatically retain, delete, and store data and records in compliant manner Apply flexible protection actions including encryption, access restrictions and visual markings Powered by an intelligent platform KNOW YOUR DATA 88% GOVERN YOUR DATA PROTECT YOUR DATA Unified approach to automatic data classification, policy management, analytics and APIs
  • 8. Information Protection & Governance Protect and govern data —anywhere it lives 88% KNOW YOUR DATA 88% GOVERN YOUR DATA PROTECT YOUR DATA
  • 9. Customer lifecycle for Classification, Labeling and Protection of sensitive files DEFINE CLASSIFICATION SCHEME DEFINE ALL CLASSIFICATION POLICY CONDITIONS CREATE/TEST AND DEPLOY CLASSIFICATION POLICY ONGOING USAGE, MONITORING AND REMEDIATION
  • 10. Office 365 Information Protection Windows Information Protection Azure Information Protection What Where How Microsoft information protection—the way it was
  • 11. What Where How Office 365 Information Protection Windows Information Protection Azure Information Protection Microsoft information protection—now
  • 14. How can I see what happens to my data over its lifecycle? Where can I classify my data? What methods can I use to classify my data? Know your Data
  • 15. Know your data – Top of mind questions Where is my sensitive data located? What are the risky activities happening in my organization – files shared externally, across 1st and 3rd party apps? I need to comply with a new regulation? Where is my PII data located & where is it being generated? How do I control data sprawl and build a strategy for dark data disposal before I bring data to the cloud from on-premise? How do I see activity around classification and labeling across retention and sensitivity labels once they have been used across governance and retention outcomes? ?? ? ?? How do I monitor ongoing risk around label activity? ?
  • 16. Flexible options to know your data Scanner: Spanning on-premises to cloud Content explorer Activity explorer Use built-in classification methods Auto-classification using trainable classifiers Understand what’s sensitive, what’s business critical & across your environment
  • 17. Discover and classify on-premises files Helps you manage sensitive data prior to migrating to Office 365 or other cloud services Use discover mode to identify and report on files containing sensitive data Use enforce mode to automatically classify, label and protect files with sensitive data Can be configured to scan: • CIFS file shares • SharePoint Server 2016 • SharePoint Server 2013
  • 18. Discover and classify cloud services using Microsoft cloud app security Detect content in cloud storage services Inspect files for sensitive information – based on policy Apply sensitivity labels Automatically apply labels to sensitive files identified in cloud apps Enforce protection policies Use sensitivity labels to apply policy, such as restricting access to sensitive information, blocking uploads, blocking downloads
  • 19. Multiple classification methods Built-in 90+ information types provided out of the box to get started Flexible Use regex, keywords, and exact data match for data identification Organized Mapped to different industry regulations
  • 20. Trainable classifiers Leverage machine learning to automatically classify unique data Built-in Resume, source code, offensive language provided out-of-box Build-your-own Train the system to look for specific types of data Integrated Attach to sensitivity and retention labels with associated policies
  • 23. How can I balance data security and productivity? Where can I protect my sensitive data? How can I protect my sensitive data? Protect your Data
  • 24. Customizable Persists as container metadata or file metadata Readable by other systems Determines DLP policy based on labels Extensible to partner solutions Protect your data using sensitivity labels Manual or Automated Labels Apply to content or containers Label data at rest, data in use, or data in transit Enable protection actions based on labels Seamless end user experience across productivity applications CONFIDENTIAL
  • 25. Balance data security and productivity Enforce conditional access to sensitive data DLP actions to block sharing Encrypt files and emails based on sensitivity label Prevent data leakage through DLP policies based on sensitivity label Business data separation on devices Secure email with encryption & permissions Manually apply sensitivity label consistently across apps applications and endpoints Show recommendations and tooltips for sensitivity labels with auto-labeling and DLP Visual markings to indicate sensitive documents across apps and services (e.g. watermark, lock icons, sensitivity column in SPO) Co-author and collaborate with sensitive documents Enable searching of encrypted files in SharePoint Allow users to open and share encrypted pdf files in Edge in addition to Adobe Acrobat Reader
  • 26. Protect your data across environments Classify and label data in on-prem repositories, including file servers and SharePoint Label and protect Office files natively across Windows, Mac, iOS, Android and Web Clients Label and protect sensitive data manually and automatically across content and container Automatically label and protect sensitive emails in Exchange Online Unified Label Management in Microsoft 365 Compliance center On-prem Exchange Online SharePoint, Teams, Groups, PowerBI Office Apps Across Platforms Extend protection through Microsoft Cloud App Security to third party clouds and SaaS apps Non-Microsoft Clouds and SaaS apps
  • 27. Unified policy configuration & management Centralized Single destination to configure policies for data protection and data governance, across locations Customized Customize conditions, rules and exceptions to granularly define policy actions Consistent Consistent enforcement using common policy engine
  • 28.  Native Manual labeling in Office apps across all platforms  Automated labeling in Office ProPlus and Office on the Web  Label SharePoint sites, Teams sites, Office 365 Groups, and PowerBI artifacts at a container level  Coauthor and collaborate on encrypted files in SharePoint Online  Enable protected pdf workflows in Outlook and Edge  Label and protect CAD artifacts with Microsoft Information Protection Available and Preview since November
  • 29. Deployment guidelines for new and existing Azure information protection users
  • 31. Existing Azure information protection customers: migration path
  • 32. Why should I activate unified labeling?
  • 33. Demo: migrate your AIP labels to Unified Labels
  • 34. CONFIDENTIAL Clients Android, iOS, Mac, Windows, Web Windows Explorer Right-click scenario PowerShell End user automation Power BI During export from a Power BI report MCAS Data at rest and in transit SDK/3rd party Adobe, Symantec, etc. O365 DLP Preview PowerShell Automation MIP Scanner Based on policy or All sensitivity types Exchange Transport Rules
  • 35. Begin your data classification journey Proactively protect information against common threats Monitor, report and protect against complex security & compliance challenges CONFIDENTIAL CONFIDENTIAL CONFIDENTIAL
  • 36. CONFIDENTIAL Discovery Deploy MIP Scanner in discovery mode Design your First Labels Start with top 3-4 most broadly applicable labels (General, Internal, Confidential) Manual Labeling Start with manual labeling/classification Set Default Label Set a default label (General) User Awareness No Protection Go for Unified Labels Classification is a journey. Start simple.
  • 37. Begin your data classification journey Proactively protect information against common threats Monitor, report and protect against complex security & compliance challenges CONFIDENTIAL CONFIDENTIAL CONFIDENTIAL
  • 38. CONFIDENTIAL Introduce Encryption Apply encryption on your most sensitive label Configure Recommendations Configure recommendations for some labels Labeling with Scanner Start labeling with the MIP Scanner Labeling via MCAS Configure policy to apply labels in cloud locations • Apply label based on conditions Classification is a journey. Start simple.
  • 39. Begin your data classification journey Proactively protect information against common threats Monitor, report and protect against complex security & compliance challenges CONFIDENTIAL CONFIDENTIAL CONFIDENTIAL
  • 40. CONFIDENTIAL Automation/Encryption Configure automatic labeling via: • Clients • Scanner • O365 DLP (preview at Ignite) Design Key Management Option • Microsoft managed • BYOK Classification is a journey. Start simple.
  • 41. References http://aka.ms/Azure Information protection dag https://myignite.techcommunity.microsoft.com/ https://aka.ms/UL-Explained https://aka.ms/aipulvsclassic