SlideShare a Scribd company logo
1 of 79
Download to read offline
Slide
‹#›1
Black	Belting	Office	365	Security	with	Secure	Score	
Andy	Malone	MVP
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
Andy Malone MVP, MCT (UK)
• Microsoft MVP (Enterprise Security)
• Microsoft Certified Trainer (20 years)
• Founder: Cybercrime Security Forum
• Worldwide Event Speaker
• Author: The Seventh Day
• www.AndyMalone.org
2
Slide
‹#›
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
This session will talk about …
• Current Cybersecurity Trends
• Understand your GDPR Responsibilities
• The Importance of Risk Planning
• Microsoft Secure Score
• Evaluating your Secure Score Assessment
• Secure Score for Developers
• Office 365 Threat Intelligence
• Review
4
“Look your data is
in the Cloud. It’s
Safe, It’s Secure.
Honestly”
Lessons I learned for Cloud Security from
Slide
‹#›
Protect	the	King!
Slide
‹#›
Or the Queen J
Next! Build a Castle
Adopt Physical Security Solutions
Slide
‹#›
Protect from
Insider Threat
Slide
‹#›
Defend against
Threats in Transit!
Slide
‹#›
Deploy an Intrusion
Prevention System
Pray it’s not
too Late!)
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
Firstly: A Word about GDPR
Responsibilities & Why I Should care!
17
Slide
‹#›T R A D I T I O N A L H I E R A R C H I E S R E S P O N S I V E N E T W O R K S
The Constantly Changing Shape of Data
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
CIA Triad
Slide
‹#›
Providing clarity and consistency
for the protection of personal data
Enhanced personal privacy rights
Increased duty for protecting data
Mandatory breach reporting
Significant penalties for non-compliance
The EU General Data
Protection Regulation
(GDPR) imposes new rules on
organizations that offer goods and
services to people in the European
Union (EU), or that collect and analyze
data tied to EU residents, no matter
where they are located.
Slide
‹#›
Personal
privacy
Individuals have the right to:
• Access their personal data
• Correct errors in their
personal data
• Erase their personal data
• Object to processing of
their personal data
• Export personal data
Controls and
notifications
• Strict security requirements
• Breach notification
obligation
• Appropriate consents for
data processing
• Confidentiality
• Recordkeeping
Transparent
policies
Transparent and easily
accessible policies
regarding:
• Notice of data collection
• Notice of processing
• Processing details
• Data retention/deletion
IT and
training
Need to invest in:
• Privacy personnel and
employee training
• Data policies
• Data Protection Officer
(larger organizations)
• Processor/Vendor
contract
What are the key changes with the GDPR?
Slide
‹#›
What’s the Impact of GDPR?
Source:
1 http://blogs.forrester.com/enza_iannopollo/16-04-20-the_eu_general_data_protection_regulation_gdpr_is_here, Enza Iannopollo, April 20, 2016
2 Forrester’s Predictions 2017: Six Ways Privacy Will Rock Global Business, By Fatemeh Khatibloo with Christopher McClean, Heidi Shey, Enza Iannopollo, Laura Koetzle,
Srividya Sridharan, Alexander Spiliotes, Christian Austin, Nov 1, 2016
The regulation applies
to companies that trade
products or services
with European
customers or in
European market1.
Potential Global
Impact
GDPR policies require
privacy-by-design and
by-default.
Partners can become
privacy consultants or
implementers to
support customer
GDPR journey.
Operational
Complexity
Fines for non-
compliance can be up
to 4% of your global
revenues or €20
million, whichever is
greater.
A fine of this magnitude
could put many
companies out of
business1.
Significant Fines
There will be a serious
resource shortfall of
Privacy Professionals.
Professional Services
vendors will pick up the
slack2.
Need for Privacy
Professionals
Slide
‹#›
How you can Prepare for GDPR
1 2 3 4 5
Discover
Identify what
personal data
they have and
where it resides.
Control
Manage how
personal data is
used and accessed
Protect
Establish security
controls to prevent,
detect, and
respond to
vulnerabilities &
data breaches
Report
Action data
requests and
keep required
documentation
Review
Analyze data and
systems, stay
compliant and
reduce risk
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
GDPR in a Nutshell
1. This is a regulation, not a directive, i.e. It’s LAW!
2. Data processors will be held responsible for data protection
3. The regulation has global ramifications
4. Users will be able make compensation claims
5. There are tighter rules on transferring data on EU citizens outside the EU
6. Harmonized user request rights
7. New erasure rights
8. It is the controllers responsibility to inform users of their rights
9. Tougher sanctions and streamlined incident reporting
10. Encryption and tokenisation can come to your rescue
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
How Microsoft are Preparing for GDPR?
25
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
New Localized Data Centre Deployments
• Two new datacenter regions, located in
Magdeburg and Frankfurt am Main,
Germany
• German data centers controlled by Deutsche
Telekom & Microsoft
• Offers a choice in how their data is handled
and where it is stored
• Adopts a new German data trustee model
• Designed specifically for region, local or
industry sensitive data
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
New UK Data Centre Deployment
• Allows Microsoft to now bid for cloud computing
contracts involving sensitive government data,
which it was restricted from providing before
• Amazon to also to open new data center's in UK
& Germany
• Offers a choice in how their data is handled and
where it is stored
• should address highly regulated organization's
privacy concerns
• Designed specifically for UK sensitive data
Slide
‹#›
User	log-ins
Unauthorized	data	access
Data	encryption
Malware
System	updates
Enterprise	security
Attacks
Phishing Denial	of	service
User	accounts
Device	log-ins
Multi-factor	authentication
Slide
‹#›
300B
1B
200B
Microsoft intelligence
Slide
‹#› 3
0
The Traditional Data Governance Model
Challenges
Point in time data
Captures data at a point in time which miss any edits in place
or from transport agents in flight
Increased risks
Content may be compromised moving from one environment
to another
Increased time
Waiting for indexing increases time required to find relevant
data
Increased costs
Having a separate copy of the data being stored significantly
increases costs
No service wide insights
Unable to leverage service wide machine learning to draw
correlations between the data
Exchange Data Outsourced Data Journaling
Third party
outsourced
journaling
Many organizations transfer data to a third party hosted archiving service which has challenges
Slide
‹#›
3
1
In-Place Office 365 Data Governance
Office 365 In-Place Data Governance
In-Place Compliance over Traditional Journaling
Location, query or policy based
Apply preservation to mailbox or SharePoint site, apply a
query to hold less content, or use preservation policies
Higher fidelity and lower costs
Content stays in Exchange and SharePoint, which results
in lower storage costs, and higher fidelity data
No impact to users
Seamlessly create, edit, and delete without knowing
data is being preserved
Reduce risk
Data is not duplicated to another provider or compliance
boundary. Record all actions taken on the data
Insights
Insights to enable you to keep what’s important, delete
what’s not, and to share according to policy
Data stays in-place and does not need to be continually transferred out of Office 365 providing benefits
Slide
‹#›
Office 365 In-place Compliance Solutions
Ensuring data compliance
Preserve vital data
Organization needs
Find relevant data Monitor activity
Data Governance
Import, store, preserve and expire data
eDiscovery
Quickly identify the most relevant data
Auditing
Monitor and investigate actions taken on data
Security & Compliance Center
Manage compliance for all your data across Office 365
Slide
‹#›
Office 365: Where do I go to enable security features?
Slide
‹#›
Demo
Office 365 Security Centre
34
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
How can Secure Score Help?
35
Slide
‹#›
Getting Started with Office 365 Secure Score
All Cloud Security Controls in one place, with a score-based framework to determine
what the highest impact actions are, and an easy way to do them.
Slide
‹#›
Getting	
Started	with	
Office	365	
Secure	Score
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
Risk analysis
• Accurate Risk Analysis is a
critical skill for an information
security professional.
• Risk decisions dictate which
safeguards we deploy to
protect our assets, and the
amount of money and
resources we spend doing so
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
Assets
Vulnerabilities
Threats and
Controls
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
Assets Vulnerabilities Threats and Controls
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
Threats
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
The Risk Triad Assets Vulnerabilities and Threats
• Assets :- are the valuable resources you are trying to protect ,
• People, buildings, property. Intellectual property etc.
• The value or criticality of the asset dictates the safeguards you deploy.
• A threat is a potentially harmful occurrence, such as
• Natural Threats :- Earthquake, Flood, Fire
• Technical Threats :- Power outage, or a network-based worm like
WanaCrypt0r
• Human Threats :- Malicious activity by a disgruntled ex-employee
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
The Risk Triad Assets Vulnerabilities and Threats
• A vulnerability is a weakness that allows a threat to cause harm.
• Examples of vulnerabilities are
• Buildings that are not built to withstand earthquakes,
• A data centre without proper backup power
• A Microsoft Windows system that has not been patched in a few
years.
• Or if it automatically runs software on a USB token when inserted.
• A Linux system has no vulnerability to a virus therefore runs no risk
from it.
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
• Quantitative and Qualitative Risk Analysis are two
methods for analysing risk.
• Quantitative Risk Analysis uses hard metrics, such as
cost.
• Qualitative Risk Analysais uses simple approximante
values and estimations.
• Quantitative is more objective;
• Qualitative is more subjective.
Qualitative and Quantitative Risk Analysis methods
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
Choosing How to Deal with Risk
• Acceptable ways to deal with risk
include:
• Accept:
• Organization believes the benefits
outweigh the potential loss
• Transfer:
• Insurance, outsourcing
• Mitigate (Reduce):
• Choose remedial measures to
counteract each risk
• Countermeasure selections
4
6
Ingestion of data outside Office 365 In-Place data creation, retention and archiving In-Place eDiscovery
Auditing
Export
Office 365 Compliance Data Lifecycle
Slide
‹#›
Secure Score
Insights into your security position
One place to understand your security
position and what features you have
enabled.
Guidance to increase your security level
Learn what security features are available
to reduce risk while helping you balance
productivity and security.
Slide
‹#›
Demo
Performing a Risk Assessment with Secure Score
48
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
What’s	the	Risk?
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
Slide
‹#›
Example Secure
ScoreAssessment
Current state
Key recommendations
Partner opportunity to help
Sample agenda
Slide
‹#›
Complete,
93
Incomplete,
357
Current State
0
50
100
150
200
250
Account Data Device
Total
Office	365	Secure	Score
Security	Action	
Score	Summary
Office	365	Secure	Score
Security	Action	Prioritization	Summary
Office	365	Secure	Score
Security	Action	Category	Summary
0
50
100
150
200
250
Low
Low
Moderate
Low
Low
Moderate
Moderate
Moderate
Total
User	Impact
Implementation	Cost
Slide
‹#›
Key Recommendations
Quick Wins
0-3 Months
• Low	user	impact
• Low	implementation	cost
3-6 Months
• Low	user	impact
• Moderate	implementation	cost
6 Months and
beyond
• Moderate	user	impact
• Low	and	moderate	implementation	cost
Enable	MFA	for	all	global	admins
Set	strong	outbound	spam	policy
Review	signs-ins	after	multiple	failures	report	weekly
Enable	audit	data	recording
Review	signs-ins	from	multiple	geographies	report	weekly
Enable	Information	Rights	Management	(IRM)	services
Enable	Advanced	Security	Management	Console
Enable	MFA	for	all	users
Enable	Advanced	Threat	Protection	safe	attachments	policy
Enable	Advanced	Threat	Protection	safe	links	policy
Do	not	allow	anonymous	calendar	sharing
Require	passwords	to	be	reset	at	least	every	60	days
Enable	mobile	device	management	services
Enable	Data	Loss	Prevention	policies
SPO	Sites	have	classification	policies
IRM	protections	applied	to	documents
IRM	protections	applied	to	email
Slide
‹#›
How Secure Score can help
0-3 Months 3-6 Months 6 Months and beyond
Protect
Detect
Respond
Managed security service : Threat detection
Managed security service : Incident response
Establish education program for IT staff and end-users
On-going service: Security Assessment
ModerateLowUser	impact:
Implementation	cost:
Enable	MFA	for	all	
global	admins
Enable	audit	data	
recording
Enable	Advanced	Threat	
Protection	safe	links	
policy
Enable	Advanced	
Security	
Management	
Console
Enable	mobile	device	
management	
services
Enable	Data	Loss	
Prevention	policies
IRM	protections	
applied	to	
documents
Enable	MFA	for	
all	users
Enable	Advanced	Threat	
Protection	safe	
attachments	policy
Managed security service : Reporting
Managed security service: Monitoring, account and credential abuse
IRM	protections	
applied	to	email
Set	strong	
outbound	spam	
policy
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
Recently Updated Features
• Ability to ignore a control - Office 365 Secure Score
will support the option to allow a customer to ignore a
control and have it not count towards the denominator
of their score.
• Ability to tag a control as met by a 3rd party
solution - Office 365 Secure Score will support the
option to tag a security control as met by a 3rd party
product and give you the points assigned to that
control
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
Integrated Security Solution
• Advanced Analytics
• Multi Factor Authentication
• Crypto Recommendations
• Azure Rights Management
• Security & Compliance Centre
• Azure Identity Protection
• Azure AD Privileged Identity
Protection
• Auditing, Health & Much More …
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
Secure Score for Developers
57
Slide
‹#›
Office 365 Secure ScoreAPI
• Monitor and report on customers secure score in downstream reporting tools
• Examine your customers security configuration baseline
• Integrate the data into compliance or cybersecurity applications
• Integrate Secure Score data into SIEM or CASB to drive a hybrid or multi-cloud
framework for security analytics
Resources:
• Using the Office 365 Secure Score API: http://aka.ms/SecureScoreAPI
Slide
‹#›
From a Developers Perspective Why use Secure ScoreAPI
1. Monitor and report on your secure
score in downstream reporting tools.
2. Track your security configuration
baseline.
3. Integrate the data into compliance or
cybersecurity insurance applications.
4. Integrate Secure Score data into your
SIEM or CASB to drive a hybrid or
multi-cloud framework for security
analytics.
Slide
‹#›
Walkthrough
Getting your App to work with Secure Score
60
Slide
‹#›
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
Taking Secure Score further with
Advanced Threat Intelligence
67
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
Threat intelligence is
evidence-based knowledge,
including context,
mechanisms, indicators,
implications and actionable
advice, about an existing or
emerging menace or
hazard to assets that can
be used to inform decisions
regarding the subject's
response to that menace or
hazard.
– Gartner
Mail
Metadata
Malware
Phish
Spoof
Activity
Audit	activities
Click	trace
TI	Sources
GeoIP
Threat	indicators
DLP	hits
Machine	
infections
Information
Insight/Analysis
A Word about Threat intelligence?
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
Remediation is costly
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
What type of attack to launch…
Who to target in attacks…
When to launch an attack…
Hackers How often to attack…
What type of attacks are happening…
Who is attacking them…
When attackers strike…
Analyst
s How often to attacks occur…
A hacker’s advantage is preparation & knowledge
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
Knowledge is built on visibility
Who	is	
the	target?
Breach	
origination
Frequency	
of	attack
Time	of	attackAttack	type
Breach	
perpetrator
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
Visibility enables preparation
Strategy & Best
Practices
Security Implementation
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
Finance
Important
Locky
Targeted
Credit cards
Infected
Linda
Malware
Sensitive
Phish
Infected
Gopi
Office 365 threat intelligence built on Microsoft Security Graph
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
Office 365 Threat Intelligence
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
Threat Intelligence
Proactively detect advanced attacks
before they reach your organization.
Gain insights drawn from Microsoft’s
broad global presence.
Systematically protect your
organization with dynamic policies.
Respond to changing malware
threats in real time.
Get an integrated view of security
through an intuitive interface.
Slide
‹#›
Demo
Discovering Threat Intelligence
76
Slide
‹#›
Session	Title	(Keep	title	BOLD)		|		Presenter	Name	(normal)		|		Time	and	Date	of	Session	(normal)	[CHANGE	THIS	IN	THE	MASTER]
Compliance	solutions	for	
Office	365
E1 E3 E5
eDiscovery	Search X X X
eDiscovery	Export X X
Advance	eDiscovery X
Manual	retention/deletion	
policies,	manual	
classifications	
X X X
Advanced	Data	Governance X
Advanced Data Governance
Capabilities in E3 vs. E5
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
Session Review
• Current Cybersecurity Trends
• Understand your GDPR Responsibilities
• The Importance of Risk Planning
• Microsoft Secure Score
• Evaluating your Secure Score Assessment
• Secure Score for Developers
• Office 365 Threat Intelligence
• Review
78
Slide
‹#›
Black	Belting	Office	365	Security	with	Secure	Score		|		Andy	Malone)		|		21st June	2017	]	10.45am		– 12.00pm
Follow	us:
#O365ENGAGE17
Questions? | Thank You!
Andy Malone
Andrew.malone@quality-training.co.uk
We’d	like	to	know	what	you	think!
Please	fill	out	the	evaluation	form	you	
received	at	the	registration	desk	for	this	
session
Session	recordings	and	materials:
Materials	will	be	available	on	
Office365Engage.com	soon

More Related Content

What's hot

O365Engage17 - 20,000 leagues under azure ad connect
O365Engage17 - 20,000 leagues under azure ad connectO365Engage17 - 20,000 leagues under azure ad connect
O365Engage17 - 20,000 leagues under azure ad connectNCCOMMS
 
O365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldO365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldNCCOMMS
 
O365Engage17 - Identity in the cloud foundation for o365
O365Engage17 - Identity in the cloud foundation for o365O365Engage17 - Identity in the cloud foundation for o365
O365Engage17 - Identity in the cloud foundation for o365NCCOMMS
 
O365Engage17 - The Latest and Greatest on Hybrid Exchange
O365Engage17 - The Latest and Greatest on Hybrid ExchangeO365Engage17 - The Latest and Greatest on Hybrid Exchange
O365Engage17 - The Latest and Greatest on Hybrid ExchangeNCCOMMS
 
O365Engage17 - Making sense of the office 365 audit data mart
O365Engage17 - Making sense of the office 365 audit data martO365Engage17 - Making sense of the office 365 audit data mart
O365Engage17 - Making sense of the office 365 audit data martNCCOMMS
 
O365Engage17 - Modern collaboration in teams and projects powered by office 365
O365Engage17 - Modern collaboration in teams and projects powered by office 365O365Engage17 - Modern collaboration in teams and projects powered by office 365
O365Engage17 - Modern collaboration in teams and projects powered by office 365NCCOMMS
 
O365Engage17 - Options for staying compliant in exchange online
O365Engage17 - Options for staying compliant in exchange onlineO365Engage17 - Options for staying compliant in exchange online
O365Engage17 - Options for staying compliant in exchange onlineNCCOMMS
 
O365Engage17 - Azure 101 terminology
O365Engage17 - Azure 101 terminologyO365Engage17 - Azure 101 terminology
O365Engage17 - Azure 101 terminologyNCCOMMS
 
O365Engage17 - Ins and outs of monitoring office 365
O365Engage17 - Ins and outs of monitoring office 365O365Engage17 - Ins and outs of monitoring office 365
O365Engage17 - Ins and outs of monitoring office 365NCCOMMS
 
O365Engage17 - Using Exchange Online to Classify and Secure Mail
O365Engage17 - Using Exchange Online to Classify and Secure MailO365Engage17 - Using Exchange Online to Classify and Secure Mail
O365Engage17 - Using Exchange Online to Classify and Secure MailNCCOMMS
 
O365Engage17 - Exchange hybrid in a complex environment
O365Engage17 - Exchange hybrid in a complex environmentO365Engage17 - Exchange hybrid in a complex environment
O365Engage17 - Exchange hybrid in a complex environmentNCCOMMS
 
O365Engage17 - Architecting cloud only solutions with office 365, azure, and ...
O365Engage17 - Architecting cloud only solutions with office 365, azure, and ...O365Engage17 - Architecting cloud only solutions with office 365, azure, and ...
O365Engage17 - Architecting cloud only solutions with office 365, azure, and ...NCCOMMS
 
O365Engage17 - Automating office 365 external sharing
O365Engage17 - Automating office 365 external sharingO365Engage17 - Automating office 365 external sharing
O365Engage17 - Automating office 365 external sharingNCCOMMS
 
Good to Great SharePoint Governance
Good to Great SharePoint GovernanceGood to Great SharePoint Governance
Good to Great SharePoint GovernanceNCCOMMS
 
O365Engage17 - What You Need to Know About Migrating to Exchange Online in 2017
O365Engage17 - What You Need to Know About Migrating to Exchange Online in 2017O365Engage17 - What You Need to Know About Migrating to Exchange Online in 2017
O365Engage17 - What You Need to Know About Migrating to Exchange Online in 2017NCCOMMS
 
O365Engage17 - How to get valuable insights with log parser and excel
O365Engage17 - How to get valuable insights with log parser and excelO365Engage17 - How to get valuable insights with log parser and excel
O365Engage17 - How to get valuable insights with log parser and excelNCCOMMS
 
O365Engage17 - Microsoft certifications from zero to certified!
O365Engage17 - Microsoft certifications   from zero to certified!O365Engage17 - Microsoft certifications   from zero to certified!
O365Engage17 - Microsoft certifications from zero to certified!NCCOMMS
 
O365Engage17 - Supercharge Your Applications with the Microsoft Graph API
O365Engage17 - Supercharge Your Applications with the Microsoft Graph APIO365Engage17 - Supercharge Your Applications with the Microsoft Graph API
O365Engage17 - Supercharge Your Applications with the Microsoft Graph APINCCOMMS
 
O365Engage17 - Mastering power shell with office 365
O365Engage17 - Mastering power shell with office 365O365Engage17 - Mastering power shell with office 365
O365Engage17 - Mastering power shell with office 365NCCOMMS
 
O365Engage17 - Building portals with microsoft graph api
O365Engage17 - Building portals with microsoft graph apiO365Engage17 - Building portals with microsoft graph api
O365Engage17 - Building portals with microsoft graph apiNCCOMMS
 

What's hot (20)

O365Engage17 - 20,000 leagues under azure ad connect
O365Engage17 - 20,000 leagues under azure ad connectO365Engage17 - 20,000 leagues under azure ad connect
O365Engage17 - 20,000 leagues under azure ad connect
 
O365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldO365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern World
 
O365Engage17 - Identity in the cloud foundation for o365
O365Engage17 - Identity in the cloud foundation for o365O365Engage17 - Identity in the cloud foundation for o365
O365Engage17 - Identity in the cloud foundation for o365
 
O365Engage17 - The Latest and Greatest on Hybrid Exchange
O365Engage17 - The Latest and Greatest on Hybrid ExchangeO365Engage17 - The Latest and Greatest on Hybrid Exchange
O365Engage17 - The Latest and Greatest on Hybrid Exchange
 
O365Engage17 - Making sense of the office 365 audit data mart
O365Engage17 - Making sense of the office 365 audit data martO365Engage17 - Making sense of the office 365 audit data mart
O365Engage17 - Making sense of the office 365 audit data mart
 
O365Engage17 - Modern collaboration in teams and projects powered by office 365
O365Engage17 - Modern collaboration in teams and projects powered by office 365O365Engage17 - Modern collaboration in teams and projects powered by office 365
O365Engage17 - Modern collaboration in teams and projects powered by office 365
 
O365Engage17 - Options for staying compliant in exchange online
O365Engage17 - Options for staying compliant in exchange onlineO365Engage17 - Options for staying compliant in exchange online
O365Engage17 - Options for staying compliant in exchange online
 
O365Engage17 - Azure 101 terminology
O365Engage17 - Azure 101 terminologyO365Engage17 - Azure 101 terminology
O365Engage17 - Azure 101 terminology
 
O365Engage17 - Ins and outs of monitoring office 365
O365Engage17 - Ins and outs of monitoring office 365O365Engage17 - Ins and outs of monitoring office 365
O365Engage17 - Ins and outs of monitoring office 365
 
O365Engage17 - Using Exchange Online to Classify and Secure Mail
O365Engage17 - Using Exchange Online to Classify and Secure MailO365Engage17 - Using Exchange Online to Classify and Secure Mail
O365Engage17 - Using Exchange Online to Classify and Secure Mail
 
O365Engage17 - Exchange hybrid in a complex environment
O365Engage17 - Exchange hybrid in a complex environmentO365Engage17 - Exchange hybrid in a complex environment
O365Engage17 - Exchange hybrid in a complex environment
 
O365Engage17 - Architecting cloud only solutions with office 365, azure, and ...
O365Engage17 - Architecting cloud only solutions with office 365, azure, and ...O365Engage17 - Architecting cloud only solutions with office 365, azure, and ...
O365Engage17 - Architecting cloud only solutions with office 365, azure, and ...
 
O365Engage17 - Automating office 365 external sharing
O365Engage17 - Automating office 365 external sharingO365Engage17 - Automating office 365 external sharing
O365Engage17 - Automating office 365 external sharing
 
Good to Great SharePoint Governance
Good to Great SharePoint GovernanceGood to Great SharePoint Governance
Good to Great SharePoint Governance
 
O365Engage17 - What You Need to Know About Migrating to Exchange Online in 2017
O365Engage17 - What You Need to Know About Migrating to Exchange Online in 2017O365Engage17 - What You Need to Know About Migrating to Exchange Online in 2017
O365Engage17 - What You Need to Know About Migrating to Exchange Online in 2017
 
O365Engage17 - How to get valuable insights with log parser and excel
O365Engage17 - How to get valuable insights with log parser and excelO365Engage17 - How to get valuable insights with log parser and excel
O365Engage17 - How to get valuable insights with log parser and excel
 
O365Engage17 - Microsoft certifications from zero to certified!
O365Engage17 - Microsoft certifications   from zero to certified!O365Engage17 - Microsoft certifications   from zero to certified!
O365Engage17 - Microsoft certifications from zero to certified!
 
O365Engage17 - Supercharge Your Applications with the Microsoft Graph API
O365Engage17 - Supercharge Your Applications with the Microsoft Graph APIO365Engage17 - Supercharge Your Applications with the Microsoft Graph API
O365Engage17 - Supercharge Your Applications with the Microsoft Graph API
 
O365Engage17 - Mastering power shell with office 365
O365Engage17 - Mastering power shell with office 365O365Engage17 - Mastering power shell with office 365
O365Engage17 - Mastering power shell with office 365
 
O365Engage17 - Building portals with microsoft graph api
O365Engage17 - Building portals with microsoft graph apiO365Engage17 - Building portals with microsoft graph api
O365Engage17 - Building portals with microsoft graph api
 

Similar to Black Belting Office 365 Security with Secure Score

Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution Google
 
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Ragnar Heil
 
azureinfoprotection.pptx
azureinfoprotection.pptxazureinfoprotection.pptx
azureinfoprotection.pptxpurwantoid1
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion
 
Why care about GDPR and avoid over $20 million fines, even outside EU ?
Why care about GDPR and avoid over $20 million fines, even outside EU ?Why care about GDPR and avoid over $20 million fines, even outside EU ?
Why care about GDPR and avoid over $20 million fines, even outside EU ?FactoVia
 
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore
 
SPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandSPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandNCCOMMS
 
Azure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management WorldAzure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management WorldJP Clementi
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationDenodo
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
The Art of Data Science - event slides
The Art of Data Science - event slidesThe Art of Data Science - event slides
The Art of Data Science - event slidesRedPixie
 
Analyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision MakingAnalyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision MakingDenodo
 
Rencore Webinar: Myth-busting GDPR in Office 365 & Azure
Rencore Webinar: Myth-busting GDPR in Office 365 & AzureRencore Webinar: Myth-busting GDPR in Office 365 & Azure
Rencore Webinar: Myth-busting GDPR in Office 365 & AzureRencore
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPRJuan Niekerk
 
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Denodo
 
GDPR Scotland 2017
GDPR Scotland 2017GDPR Scotland 2017
GDPR Scotland 2017Ray Bugg
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
 

Similar to Black Belting Office 365 Security with Secure Score (20)

Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
 
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
 
GDPR
GDPRGDPR
GDPR
 
azureinfoprotection.pptx
azureinfoprotection.pptxazureinfoprotection.pptx
azureinfoprotection.pptx
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Why care about GDPR and avoid over $20 million fines, even outside EU ?
Why care about GDPR and avoid over $20 million fines, even outside EU ?Why care about GDPR and avoid over $20 million fines, even outside EU ?
Why care about GDPR and avoid over $20 million fines, even outside EU ?
 
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
 
SPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandSPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud Deutschland
 
Azure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management WorldAzure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management World
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
The Art of Data Science - event slides
The Art of Data Science - event slidesThe Art of Data Science - event slides
The Art of Data Science - event slides
 
Analyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision MakingAnalyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision Making
 
Rencore Webinar: Myth-busting GDPR in Office 365 & Azure
Rencore Webinar: Myth-busting GDPR in Office 365 & AzureRencore Webinar: Myth-busting GDPR in Office 365 & Azure
Rencore Webinar: Myth-busting GDPR in Office 365 & Azure
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPR
 
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
 
GDPR Scotland 2017
GDPR Scotland 2017GDPR Scotland 2017
GDPR Scotland 2017
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 

More from NCCOMMS

O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...NCCOMMS
 
O365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
O365Con19 - Model-driven Apps or Canvas Apps? - Rick BakkerO365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
O365Con19 - Model-driven Apps or Canvas Apps? - Rick BakkerNCCOMMS
 
O365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
O365Con19 - Office 365 Groups Surviving the Real World - Jasper OosterveldO365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
O365Con19 - Office 365 Groups Surviving the Real World - Jasper OosterveldNCCOMMS
 
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis JugoO365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis JugoNCCOMMS
 
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis JugoO365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis JugoNCCOMMS
 
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul HuntO365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul HuntNCCOMMS
 
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...NCCOMMS
 
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...NCCOMMS
 
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...NCCOMMS
 
O365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
O365Con19 - Lets Get Started with Azure Container Instances - Jussi RoineO365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
O365Con19 - Lets Get Started with Azure Container Instances - Jussi RoineNCCOMMS
 
O365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi RoineO365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi RoineNCCOMMS
 
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna LinsO365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna LinsNCCOMMS
 
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna LinsO365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna LinsNCCOMMS
 
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...NCCOMMS
 
O365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
O365Con19 - Sharing Code Efficiently in your Organisation - Elio StruyfO365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
O365Con19 - Sharing Code Efficiently in your Organisation - Elio StruyfNCCOMMS
 
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...NCCOMMS
 
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de JagerO365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de JagerNCCOMMS
 
O365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
O365Con19 - Kaizala a Dive Into the Unknown - Rick van RousseltO365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
O365Con19 - Kaizala a Dive Into the Unknown - Rick van RousseltNCCOMMS
 
O365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
O365Con19 - How to Inspire Users to Unstick from Email - Luise FreeseO365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
O365Con19 - How to Inspire Users to Unstick from Email - Luise FreeseNCCOMMS
 
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenO365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenNCCOMMS
 

More from NCCOMMS (20)

O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
 
O365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
O365Con19 - Model-driven Apps or Canvas Apps? - Rick BakkerO365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
O365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
 
O365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
O365Con19 - Office 365 Groups Surviving the Real World - Jasper OosterveldO365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
O365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
 
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis JugoO365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
 
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis JugoO365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
 
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul HuntO365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
 
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
 
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
 
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
 
O365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
O365Con19 - Lets Get Started with Azure Container Instances - Jussi RoineO365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
O365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
 
O365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi RoineO365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi Roine
 
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna LinsO365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
 
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna LinsO365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
 
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
 
O365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
O365Con19 - Sharing Code Efficiently in your Organisation - Elio StruyfO365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
O365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
 
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
 
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de JagerO365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
 
O365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
O365Con19 - Kaizala a Dive Into the Unknown - Rick van RousseltO365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
O365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
 
O365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
O365Con19 - How to Inspire Users to Unstick from Email - Luise FreeseO365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
O365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
 
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenO365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Black Belting Office 365 Security with Secure Score