Future of Digital
Workplace
Luís João
Solution Sales – Modern Workplace
lujoao@microsoft.com / (+351) 92 540 45 22
Microsoft Portugal
Manuel Faria
Product Marketing Manager – Modern Workplace
v-mafari@microsoft.com / (+351) 96 978 75 30
Microsoft Portugal
2x
Teamwork
Universal toolkit
Microsoft 365
Pervasive availability. Targeted communications.
Email
Inner Loop
People you work with
regularly on core projects
Outer Loop
People you connect with
openly across the organization
Content collaboration
Video & live events
SharePoint
Content collaboration for the modern workplace
SharePoint
hub sites
Brings together related team sites and
communication sites
Cross-site navigation
Roll up news and site activity
Search across associated sites
Consistent look-and-feel across sites
Admins create, users adopt and use
Benefits
today…
Cohesive, rich relationships in Microsoft Graph
YOU
items in a library
https://aka.ms/gartner-csp17 https://aka.ms/odsp-csf
Transforming content collaboration
Immersive and engaging mixed reality experiences for everyone, on any device
www.exploresharepointspaces.com
Display Microsoft Forms on pages
hundreds
Microsoft Graph
ALL
Microsoft 365
Office 365
Windows 10
EMS
ALL ONE
https://graph.microsoft.com
https://graph.microsoft.com
Your app Your app
Outlook Azure ADSharePoint …
your
Your app
Gateway
Your or your
customer’s
data
Office 365 Windows 10 Enterprise Mobility + Security
1Microsoft Graph
SharePoint Framework
Modern client-side development
Lightweight web and mobile responsive
On-Premises and in the Cloud
Designed for 1st and 3rd parties
Backward compatible components
Opensource tools and JavaScript web frameworks
http://aka.ms/spfx-tutorials
Intuitive sharing controls with flexible policies
for internal and external sharing
Flexible sharing controls for targeted
scenarios
alerts of suspicious behavior using
Advanced Security Management
Minimize risk with secure external sharing
without sign-in
Actionable insights and management control
Control users
Manage
Restrict
Conditional access
Granular policies
Prevent
HIPAA /
HITECH Act
FERPA
GxP
21 CFR Part 11
Singapore
MTCS
UK
G-Cloud
Australia
IRAP/CCSL
FISC Japan
New Zealand
GCIO
China
GB 18030
EU
Model Clauses
ENISA
IAF
Argentina
PDPA
Japan CS
Mark Gold
CDSA
Shared
Assessments
Japan My
Number Act
FACT UK GLBA
Spain
ENS
PCI DSS
Level 1 MARS-E FFIEC
China
TRUCS
Canada
Privacy Laws
MPAA
Privacy
Shield
India
MeitY
Germany IT
Grundschutz
workbook
Spain
DPA
HITRUST IG Toolkit UK
China
DJCP
ITAR
Section 508
VPAT
SP 800-171 FIPS 140-2
High
JAB P-ATO
CJIS
DoD DISA
SRG Level 2
DoD DISA
SRG Level 4
IRS 1075
DoD DISA
SRG Level 5
Moderate
JAB P-ATO
GLOBALUSGOVINDUSTRYREGIONAL
ISO 27001
SOC 1
Type 2ISO 27018
CSA STAR
Self-AssessmentISO 27017
SOC 2
Type 2
SOC 3ISO 22301
CSA STAR
Certification
CSA STAR
AttestationISO 9001
The deepest and most comprehensive compliance coverage in the industry
Supporting you
with contractual
commitments
We will provide documentation
to help you demonstrate
compliance with GDPR
requirements applicable
to processors.
Our cloud services will meet
stringent security requirements.
We will help you manage data
subject requests.
Simplify GDPR
compliance with
Microsoft
3. Streamline processes
1. Assess and manage
compliance risk
2. Protect personal data
1. Assess and manage
compliance risk
Compliance Manager
View your compliance posture against
evolving regulations in real-time.
Take recommended actions to improve
your data protection capabilities.
Conduct pre-audits to prepare for
external audits.
Manage your compliance in one place
2. Protect personal data
Identity and
Access Management
Threat
Protection
Information
Protection
Protecting personal data at the identity,
document, and network levels
Secure personal data at the
front door through proper
access controls across apps,
services and devices.
Identity and Access
Management
Apps
Devices
Users
Data
On-premises /
Private cloud
Microsoft Azure
Active Directory
On-premises /
Private cloud
Protect resources through identity
Hardware protection
for credentials
Privileged Identity
Management
Multifactor
authentication
Conditional
access
Easy to use passwordless authentication
Replace passwords with an easy to use, strong and
multifactor credential
Reduce risk from compromised credentials
Multifactor: your device plus biometric or PIN
Single sign-on to resources protected with
conditional access
Coming soon: use portable security keys
and authenticate to a shared device
******
Require MFA
Allow access
Deny access
Force
password reset
Limit access
Controls
Users
Devices
Location
Apps
Conditions
Machine
learning
Policies
Real time
Evaluation
Engine
Session
Risk
3
10TB
Effective
policy
Conditional access
Limit access for the right
users from the right devices
and locations
Information protection
Govern sensitive data across
devices, apps, cloud services,
and on-premises.
Enable data governance
practices and processes
organization wide.
Search for and identify sensitive
and personal data.
Automatically classify and label
data with security policies.
Corporate
Public
Private
cloud
Vendors SaaS
Ex-
employees
Online
backup
Graphic
designer
Offshore
teams
Legal review
Agency
teams
Project
Lead
Sales teams
Project
Manager
Project
Lead
Remote
teamPersonal
Data is shared more often
and more widely than ever.
Create, import, or
modify data
Detect data
Classify and label
sensitive data
Protect data
based on policy
Send, share,
move data
Monitor data
Retain, expire,
delete data
Protect sensitive data throughout its lifecycle
DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
respond
LABELINGCLASSIFICATION
Classification
& labeling
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
SECRET
CONFIDENTIAL
INTERNAL
NOT RESTRICTED
IT admin sets policies,
templates, and rules
PERSONAL
Classify data based on sensitivity
Start with the data that is most
sensitive
IT can set automatic rules; users can
complement it
Associate actions such as visual
markings and protection
Reclassification
You can override a
classification and
optionally be required
to provide a justification
Automatic
Policies can be set by IT
Admins for automatically
applying classification and
protection to data
Recommended
Based on the content you’re
working on, you can be
prompted with suggested
classification
User set
Users can choose to apply a
sensitivity label to the email
or file they are working on
with a single click
Due Diligence Documentation
Due Diligence
Category Documentation Task Owner Status
Business Plan, Corporate Structure, Financing
Business plan Current five-year business plan
Prior business plan
Corporate
organization
Articles of incorporation
Bylaws
Recent changes in corporate structure
Parent, subsidiaries, and affiliates
Shareholders’ agreements
Minutes from board meetings
Label and protect any file through
the windows shell-explorer
Select either one file, multiple files
or a folder and apply a label
Recognize known attacks and
suspicious behavior.
Threat protection
Recover quickly when attacked by
configuring automated responses.
Detect breaches and attackers
moving laterally.
Detect
suspicious
behavior
and threats
Alert
Remediate
Analyze
signals
Learn
common
behaviors
Protect against threats with behavioral analytics
Internal and incoming
network traffic
Unique insights, informed
by trillions of signals
Microsoft intelligent
security graph
450B
monthly
authentications
18+B
Bing web pages
scanned750M+
Azure user
accounts
Enterprise
security for
90%
of Fortune 500
Malware data
from Windows
Defender
Shared threat
data from partners,
researchers and law
Enforcement
worldwide
Botnet data from
Microsoft Digital
Crimes Unit
1.2B
devices scanned
each month
400B
emails analyzed
200+
global cloud
consumer and
Commercial
services
Detect threats with Advanced Threat Analytics
Suspicious logons
Multiple failed log-on
attempts, privileged
user/admin activity
Suspicious activities
Access from suspicious
devices or IPs,
new high volume
app, new risky app
Sensitive data
Mass file transfers, sensitive
and financial data
Suspicious sessions
Impossible travel, data
transfer to remote locations,
unfamiliar IP or location
Possible threats
Unique file extensions indicating
ransomware, known attacks
3. Streamline processes
Manage data subject requests
Search across Exchange Online, SharePoint
Online, OneDrive for business (including
Teams and Groups) and public folders
Search for 80+ supported sensitive data
types or create custom types
Download results for further review prior
to providing reports to requestors
Find data associated with an individual
with Office 365 Content Search
Simplify GDPR
compliance with
Microsoft 365
Enterprise
3. Streamline processes
1. Assess and manage
compliance risk
2. Protect personal data
- Identity and Access Mgmt.
- Information Protection
- Threat Protection
Content collaboration for the modern workplace
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security

2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security