Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
Are you classifying your data in Microsoft 365? You can add data classifications using sensitivity and retention labels but they do two very different things. In this session I will break down what the label options are, how you can use them, and why you should deploy them in your organization to keep your content compliant and secure.
March 2023 CIAOPS Need to Know WebinarRobert Crane
Slides from CIAOPS March 2023 webinar that provided Microsoft 365 news update, open Q & A as well as a focus session on Microsoft 365 Information Protection best practices. Video recording is available at www.ciaopsacademy.com
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint SitesDrew Madelung
With the hosts of Microsoft MVP Vlad Catrinescu & Drew Madelung along with Senior Program Manager Sanjoyan Mustafi on May 26th at 1 PM ET (10 AM PT) for a free webinar covering Sensitivity Labels across Office 365!
In this webinar we talked about the upcoming features around enabling more Office 365 workloads with sensitivity labels. This includes new abilities to classify the containers of Office 365 Groups, Microsoft Teams, and SharePoint sites and the ability to enable sensitivity labels for Office files in SharePoint and OneDrive.
IRMS UG Principles of Retention in Microsoft 365Joanne Klein
There's only 4 of them, but they're important. Really important.
This session will talk about why it's essential for Records Managers and Information Management teams to have an authoritative understanding of the principles. They inform the retention and deletion processes and actions which are the technical underpinning of your Information Governance/Records Management (IG/RM) implementation. This is what ultimately determines the retention and deletion actions taken on each piece of content.
Understanding the principles of retention is an important prerequisite to a holistic IG/RM design and implementation. It can help ensure you are deleting content when you no longer need/require it and retaining content for as long as you are required to meet your corporate governance requirements and your legal, business, and regulatory obligations.
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMDrew Madelung
As part of the M365 Virtual Marathon, this is a presentation that includes security options for securing your overall collaboration environment including data loss prevention, sharing, sensitivity labels and more.
What’s Office 365 data loss prevention (DLP)? How does DLP function? How to configure and deploy DLP? What else you can do to protect data besides DLP?
How to Successfully Manage OneDrive for BusinessDrew Madelung
OneDrive for Business is an integral part of your collaboration strategy and Microsoft 365 roll out. Being able to mange and administer OneDrive is essential to ensure your files are safe and secure.
Whether you are looking to roll-out OneDrive for Business or are already are utilizing it, there are a lot of important things that you should know about administration. This session will go through things such as:
• Admin centers
• Sync capabilities and restrictions
• Security capabilities from the user to the tenant
• Overall limits, guidance, and best practices
• Reporting
• What’s new for administration
This session will be a technical focused session which will provide you the information and tools you need to ensure your OneDrive for Business deployment is solid and secured.
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
Are you classifying your data in Microsoft 365? You can add data classifications using sensitivity and retention labels but they do two very different things. In this session I will break down what the label options are, how you can use them, and why you should deploy them in your organization to keep your content compliant and secure.
March 2023 CIAOPS Need to Know WebinarRobert Crane
Slides from CIAOPS March 2023 webinar that provided Microsoft 365 news update, open Q & A as well as a focus session on Microsoft 365 Information Protection best practices. Video recording is available at www.ciaopsacademy.com
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint SitesDrew Madelung
With the hosts of Microsoft MVP Vlad Catrinescu & Drew Madelung along with Senior Program Manager Sanjoyan Mustafi on May 26th at 1 PM ET (10 AM PT) for a free webinar covering Sensitivity Labels across Office 365!
In this webinar we talked about the upcoming features around enabling more Office 365 workloads with sensitivity labels. This includes new abilities to classify the containers of Office 365 Groups, Microsoft Teams, and SharePoint sites and the ability to enable sensitivity labels for Office files in SharePoint and OneDrive.
IRMS UG Principles of Retention in Microsoft 365Joanne Klein
There's only 4 of them, but they're important. Really important.
This session will talk about why it's essential for Records Managers and Information Management teams to have an authoritative understanding of the principles. They inform the retention and deletion processes and actions which are the technical underpinning of your Information Governance/Records Management (IG/RM) implementation. This is what ultimately determines the retention and deletion actions taken on each piece of content.
Understanding the principles of retention is an important prerequisite to a holistic IG/RM design and implementation. It can help ensure you are deleting content when you no longer need/require it and retaining content for as long as you are required to meet your corporate governance requirements and your legal, business, and regulatory obligations.
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMDrew Madelung
As part of the M365 Virtual Marathon, this is a presentation that includes security options for securing your overall collaboration environment including data loss prevention, sharing, sensitivity labels and more.
What’s Office 365 data loss prevention (DLP)? How does DLP function? How to configure and deploy DLP? What else you can do to protect data besides DLP?
How to Successfully Manage OneDrive for BusinessDrew Madelung
OneDrive for Business is an integral part of your collaboration strategy and Microsoft 365 roll out. Being able to mange and administer OneDrive is essential to ensure your files are safe and secure.
Whether you are looking to roll-out OneDrive for Business or are already are utilizing it, there are a lot of important things that you should know about administration. This session will go through things such as:
• Admin centers
• Sync capabilities and restrictions
• Security capabilities from the user to the tenant
• Overall limits, guidance, and best practices
• Reporting
• What’s new for administration
This session will be a technical focused session which will provide you the information and tools you need to ensure your OneDrive for Business deployment is solid and secured.
Microsoft Information Protection demystified Albert HoitinghAlbert Hoitingh
This session was presented at the North American Collaboration Summit 2022. It covers the many technical aspects of Microsoft Purview Information Protection.
Understanding Security and Compliance in Microsoft Teams M365 North 2023Chirag Patel
Presented at M365 North on 16 May 2023.
Did you know there are about 25 key security and privacy features in Microsoft Teams to keep your organisation secure and compliant? We will cover what these features are as overview and deep dive with some of them so you can apply it to your Microsoft Teams environment.
SharePoint and Office 365 Data Compliance Made Easy: Site Classifications, La...Joel Oleson
Struggling with where to begin with data compliance in SharePoint?
Gain expert, practical insight to get you started.
Hosts: Joel Oleson, MVP Office Apps & Services / Roland Reddekop, Colligo
In this webinar we’ll break down the built-in SharePoint features for site classification that support a structure for automated compliance plus tools for users to easily add labels and classify their data today.
Over 60-minutes we’ll review 4 Easy Steps for Compliance:
How to determine label names
How to create, publish and apply labels to libraries
How to create and apply data loss prevention (DLP) policies to warn users and block data from risk
How to make it easy for users to save and classify files to SharePoint without leaving Outlook and Office 365.
Join Joel Oleson, a Microsoft MVP/RD and 19-year SharePoint veteran with 7 years of experience at Microsoft as he shares practical guidance to keep your data secure and compliant. Colligo’s Roland Reddekop will show how users can save, classify and label emails and files right from the applications they primarily work in like Outlook and Office 365.
In this webinar, we will walk-through Data Loss Prevention in Office 365. We will see how to create DLP policy with Labels as a condition. We will also go through Document fingerprint in Exchange Online DLP and DLP reports.
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
Its one thing encrypting and protecting your data from prying eyes but what use is it, if it is not retained or protected against loss. With Microsoft Information Protection, Microsoft provides organisations the ability to:
• Protection content from deletion
• Adhere to compliance standards (GDPR, HIPAA, etc)
• Discover content for litigation
• Manage access to content based on rules
By implementing the correct rules, organisations are able to mitigate risk and remain compliant and at the same time ensure that content is identified, classified, retained and disposed of accordingly.
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
Are you protecting your data at rest and in transit?
In this session we will go through all the different types of DLP in Microsoft Purview including endpoint, Exchange, Teams, SharePoint, OneDrive, and more. We will discuss the configuration options, why it is important, and the best practices to get started while going through a collection of demos.
You will leave this sessions with a deeper understanding of the technology and how it can impact your employee's experience
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsDrew Madelung
How do you protect your confidential content from being exposed? Being able to secure your files and content across workloads is a necessity and the tools are available to you today in the Microsoft 365 Security admin center. Microsoft 365 Sensitivity Labels are the evolution of Azure Information Protection and more within the Microsoft Information Protection suite.
OneDrive is a key workload in Microsoft 365 and is an integral part of your collaboration strategy. OneDrive provides a cloud location to store, share, and sync your work files and then work with them from any device. Whether you are looking to roll-out OneDrive or are already are utilizing it, there are a lot of important things that you should know about management
Microsoft Teams Governance and Security Best Practices - Joel OlesonJoel Oleson
In this session we will focus on the recommendations from the field - what we have learned in the trenches along with recommended best practices related to Teams management, provisioning, OneDrive and SharePoint sharing, as well as retention and sensitivity labelling strategies and common industry considerations for financial data, healthcare and legal holds.
Agenda:
We will walk through these key points:
1. Getting started with classifications, retention, and sensitivity.
2. Best practices in setting retention policy durations
3. Industry practices in setting archiving policies
4. When to use a suffix or prefix? Which is better?
5. Data backup and its importance with relevant policy settings
6. Best practices for auditing security and settings
7. Maximizing Teams Security
8. Best practices for global administration
9. Best practices for Teams administration
Register Now
I'm looking forward to seeing everyone on the webinar.
Joel Oleson
Microsoft MVP and Regional Director
We live in a time where digital technology is profoundly impacting our lives, from the way we connect with each other to how we interpret our world. First and foremost, this digital transformation is causing a tsunami of data. In fact, IDC estimates that in 2025, the world will create and replicate 163ZB of data, representing a tenfold increase from the amount of data created in 2016. In the past, organizations primarily dealt with documents and emails. But now they’re also dealing with instant messaging, text messaging, video files, images, and DIO files. The internet of things, or IOT, will only add to this explosion in data.
Managing this data overload and the variety of devices from which it is created is complicated and onerous as the market for solutions is fragmented and confusing. There are many categories of solutions, and within each, there are even more solutions to choose from. Many companies are struggling to decide how many of those solutions they need and where to start. Additionally, using multiple solutions means they won’t be integrated, so companies end up managing multiple applications from multiple disparate interfaces.
The question we often get asked is, “How can Microsoft 365 help me?”
Identity— Help protect against identity compromise and identify potential breaches before they cause damage
Devices—Enhance device security while enabling mobile work and BYOD
Apps and Data—Boost productivity with cloud access while keeping information protected
Infrastructure—Take a new approach to security across your hybrid environment
This is Microsoft Azure Information Protection which helps you out to protect your data being accessible to the unauthorized users. This is an overview for the AIP
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...Jasper Oosterveld
Although Microsoft Teams is an incredibly powerful solution, it comes with a challenge around data security. The data generated and stored within Microsoft Teams is unfragmented and different in nature. Varying from chat & channel messages, documents, images, recordings, and meetings. Combining this with the ever-changing regulations, organizations have a serious compliance risk on their hands. Microsoft understands these risks and with the help of Microsoft Purview offers comprehensive solutions to help protect and govern your sensitive data.
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022Nikki Chapple
5 October 2022: CollabDays Bletchley Park 2022 - October edition | In-person event United Kingdom
Governance, Risk and Compliance and you – Microsoft Purview and beyond | Simon Hudson & Nikki Chapple
Governance, Risk and Compliance; it’s not nice to have, It’s The Law. Every organisation needs to pay attention to GRC, but not everyone has the tools, expertise or strategy. Microsoft Purview is a surprisingly capable tool in your organisation’s GRC tool bag when combined with a broad & competent approach. This session will provide: – an overview of GRC obligations and approaches – what’s in Purview – pragmatic approaches to elevating your Compliance Score – wider technical and business thinking for de-risking your operations and organisation – thoughts on using the Maturity Model for Microsoft 365 GRC Competency to set your objectives.
Intelligent compliance and risk management solutions.
First, we understand ‘compliance’ can have different meanings to various teams across enterprise. Compliance is an outcome of continuous risk management, involving compliance, risk, legal, privacy, security, IT and often even HR and finance teams which requires integrated approach to manage risk.
Let's start with the base pillar Compliance Management: compliance management is all about simplify risk assessment and mitigation in more automated way, providing visibility and insights to help meet compliance requirements.
Information Protection and Governance: we believe there is a huge opportunity for Microsoft to help our customers to know their data better, protect and govern data throughout its lifecycle in heterogenous environment. This is often the key starting point for many of our customers in their modern compliance journey – knowing what sensitive data they have, putting flexible, end-user friendly policies for both security and compliance outcomes, using more automation and intelligence.
Internal Risk Management: Internal risks are often what keeps business leaders up at night – regardless of negligent or malicious, identifying and being able to take action on internal risks are critical. The ability to quickly identify and manage risks from insiders (employees or contractors with corporate access) and minimize the negative impact on corporate compliance, competitive business position and brand reputation is a priority for organizations worldwide.
Last but not least, Discover and Respond: being able to discover relevant data for internal investigations, litigation, or regulatory requests and respond to them efficiently, and doing so without having to use multiple solutions and moving data in and out of systems to increase risk – is critical.
We are living a complete digital transformation where people are not restricted by apps or devices or even location. Work can be done anywhere and on any device which leads to greater security concerns regarding this business data living on mobile devices and shared with external (sometimes not trusted users). Microsoft Unified Labeling protection leverages the power of the cloud and ease of use (a few clicks for implementation) to provide a complete Information Protection solution. Now with the new unified Azure label client, users can administer the labels from one location while being integrated across the whole Microsoft platform. Attendees will learn how to configure Unified labels with real case scenarios.
Microsoft Viva governance and compliance implications | Viva Explorers Commun...Nikki Chapple
12 November: Viva Explorers Community Day | In-person: Manchester United Kingdom
Microsoft Viva governance and compliance implications
This session demystifies security & compliance in Microsoft Viva to help you understand the following:
- What are the Viva modules
- How Microsoft ensures security & compliance in Microsoft Viva
- Why governance is essential
- Why employee adoption & sponsor communications are critical
Microsoft Information Protection demystified Albert HoitinghAlbert Hoitingh
This session was presented at the North American Collaboration Summit 2022. It covers the many technical aspects of Microsoft Purview Information Protection.
Understanding Security and Compliance in Microsoft Teams M365 North 2023Chirag Patel
Presented at M365 North on 16 May 2023.
Did you know there are about 25 key security and privacy features in Microsoft Teams to keep your organisation secure and compliant? We will cover what these features are as overview and deep dive with some of them so you can apply it to your Microsoft Teams environment.
SharePoint and Office 365 Data Compliance Made Easy: Site Classifications, La...Joel Oleson
Struggling with where to begin with data compliance in SharePoint?
Gain expert, practical insight to get you started.
Hosts: Joel Oleson, MVP Office Apps & Services / Roland Reddekop, Colligo
In this webinar we’ll break down the built-in SharePoint features for site classification that support a structure for automated compliance plus tools for users to easily add labels and classify their data today.
Over 60-minutes we’ll review 4 Easy Steps for Compliance:
How to determine label names
How to create, publish and apply labels to libraries
How to create and apply data loss prevention (DLP) policies to warn users and block data from risk
How to make it easy for users to save and classify files to SharePoint without leaving Outlook and Office 365.
Join Joel Oleson, a Microsoft MVP/RD and 19-year SharePoint veteran with 7 years of experience at Microsoft as he shares practical guidance to keep your data secure and compliant. Colligo’s Roland Reddekop will show how users can save, classify and label emails and files right from the applications they primarily work in like Outlook and Office 365.
In this webinar, we will walk-through Data Loss Prevention in Office 365. We will see how to create DLP policy with Labels as a condition. We will also go through Document fingerprint in Exchange Online DLP and DLP reports.
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
Its one thing encrypting and protecting your data from prying eyes but what use is it, if it is not retained or protected against loss. With Microsoft Information Protection, Microsoft provides organisations the ability to:
• Protection content from deletion
• Adhere to compliance standards (GDPR, HIPAA, etc)
• Discover content for litigation
• Manage access to content based on rules
By implementing the correct rules, organisations are able to mitigate risk and remain compliant and at the same time ensure that content is identified, classified, retained and disposed of accordingly.
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
Are you protecting your data at rest and in transit?
In this session we will go through all the different types of DLP in Microsoft Purview including endpoint, Exchange, Teams, SharePoint, OneDrive, and more. We will discuss the configuration options, why it is important, and the best practices to get started while going through a collection of demos.
You will leave this sessions with a deeper understanding of the technology and how it can impact your employee's experience
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsDrew Madelung
How do you protect your confidential content from being exposed? Being able to secure your files and content across workloads is a necessity and the tools are available to you today in the Microsoft 365 Security admin center. Microsoft 365 Sensitivity Labels are the evolution of Azure Information Protection and more within the Microsoft Information Protection suite.
OneDrive is a key workload in Microsoft 365 and is an integral part of your collaboration strategy. OneDrive provides a cloud location to store, share, and sync your work files and then work with them from any device. Whether you are looking to roll-out OneDrive or are already are utilizing it, there are a lot of important things that you should know about management
Microsoft Teams Governance and Security Best Practices - Joel OlesonJoel Oleson
In this session we will focus on the recommendations from the field - what we have learned in the trenches along with recommended best practices related to Teams management, provisioning, OneDrive and SharePoint sharing, as well as retention and sensitivity labelling strategies and common industry considerations for financial data, healthcare and legal holds.
Agenda:
We will walk through these key points:
1. Getting started with classifications, retention, and sensitivity.
2. Best practices in setting retention policy durations
3. Industry practices in setting archiving policies
4. When to use a suffix or prefix? Which is better?
5. Data backup and its importance with relevant policy settings
6. Best practices for auditing security and settings
7. Maximizing Teams Security
8. Best practices for global administration
9. Best practices for Teams administration
Register Now
I'm looking forward to seeing everyone on the webinar.
Joel Oleson
Microsoft MVP and Regional Director
We live in a time where digital technology is profoundly impacting our lives, from the way we connect with each other to how we interpret our world. First and foremost, this digital transformation is causing a tsunami of data. In fact, IDC estimates that in 2025, the world will create and replicate 163ZB of data, representing a tenfold increase from the amount of data created in 2016. In the past, organizations primarily dealt with documents and emails. But now they’re also dealing with instant messaging, text messaging, video files, images, and DIO files. The internet of things, or IOT, will only add to this explosion in data.
Managing this data overload and the variety of devices from which it is created is complicated and onerous as the market for solutions is fragmented and confusing. There are many categories of solutions, and within each, there are even more solutions to choose from. Many companies are struggling to decide how many of those solutions they need and where to start. Additionally, using multiple solutions means they won’t be integrated, so companies end up managing multiple applications from multiple disparate interfaces.
The question we often get asked is, “How can Microsoft 365 help me?”
Identity— Help protect against identity compromise and identify potential breaches before they cause damage
Devices—Enhance device security while enabling mobile work and BYOD
Apps and Data—Boost productivity with cloud access while keeping information protected
Infrastructure—Take a new approach to security across your hybrid environment
This is Microsoft Azure Information Protection which helps you out to protect your data being accessible to the unauthorized users. This is an overview for the AIP
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...Jasper Oosterveld
Although Microsoft Teams is an incredibly powerful solution, it comes with a challenge around data security. The data generated and stored within Microsoft Teams is unfragmented and different in nature. Varying from chat & channel messages, documents, images, recordings, and meetings. Combining this with the ever-changing regulations, organizations have a serious compliance risk on their hands. Microsoft understands these risks and with the help of Microsoft Purview offers comprehensive solutions to help protect and govern your sensitive data.
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022Nikki Chapple
5 October 2022: CollabDays Bletchley Park 2022 - October edition | In-person event United Kingdom
Governance, Risk and Compliance and you – Microsoft Purview and beyond | Simon Hudson & Nikki Chapple
Governance, Risk and Compliance; it’s not nice to have, It’s The Law. Every organisation needs to pay attention to GRC, but not everyone has the tools, expertise or strategy. Microsoft Purview is a surprisingly capable tool in your organisation’s GRC tool bag when combined with a broad & competent approach. This session will provide: – an overview of GRC obligations and approaches – what’s in Purview – pragmatic approaches to elevating your Compliance Score – wider technical and business thinking for de-risking your operations and organisation – thoughts on using the Maturity Model for Microsoft 365 GRC Competency to set your objectives.
Intelligent compliance and risk management solutions.
First, we understand ‘compliance’ can have different meanings to various teams across enterprise. Compliance is an outcome of continuous risk management, involving compliance, risk, legal, privacy, security, IT and often even HR and finance teams which requires integrated approach to manage risk.
Let's start with the base pillar Compliance Management: compliance management is all about simplify risk assessment and mitigation in more automated way, providing visibility and insights to help meet compliance requirements.
Information Protection and Governance: we believe there is a huge opportunity for Microsoft to help our customers to know their data better, protect and govern data throughout its lifecycle in heterogenous environment. This is often the key starting point for many of our customers in their modern compliance journey – knowing what sensitive data they have, putting flexible, end-user friendly policies for both security and compliance outcomes, using more automation and intelligence.
Internal Risk Management: Internal risks are often what keeps business leaders up at night – regardless of negligent or malicious, identifying and being able to take action on internal risks are critical. The ability to quickly identify and manage risks from insiders (employees or contractors with corporate access) and minimize the negative impact on corporate compliance, competitive business position and brand reputation is a priority for organizations worldwide.
Last but not least, Discover and Respond: being able to discover relevant data for internal investigations, litigation, or regulatory requests and respond to them efficiently, and doing so without having to use multiple solutions and moving data in and out of systems to increase risk – is critical.
We are living a complete digital transformation where people are not restricted by apps or devices or even location. Work can be done anywhere and on any device which leads to greater security concerns regarding this business data living on mobile devices and shared with external (sometimes not trusted users). Microsoft Unified Labeling protection leverages the power of the cloud and ease of use (a few clicks for implementation) to provide a complete Information Protection solution. Now with the new unified Azure label client, users can administer the labels from one location while being integrated across the whole Microsoft platform. Attendees will learn how to configure Unified labels with real case scenarios.
Microsoft Viva governance and compliance implications | Viva Explorers Commun...Nikki Chapple
12 November: Viva Explorers Community Day | In-person: Manchester United Kingdom
Microsoft Viva governance and compliance implications
This session demystifies security & compliance in Microsoft Viva to help you understand the following:
- What are the Viva modules
- How Microsoft ensures security & compliance in Microsoft Viva
- Why governance is essential
- Why employee adoption & sponsor communications are critical
70% of all security breaches are due to an organization’s own staff. Register for this webinar and find out how not to become a statistic. Security is increasingly becoming a significant challenge, regarding how ensuring unstructured and semi-structured content is protected, and also the security rights of the individuals within the organization that need to be given or denied rights to organizational assets.
This Concept Searching webinar will focus on all aspects of security in a SharePoint environment, using native SharePoint tools, conceptClassifier for SharePoint, or integrated with your security application. conceptClassifier for SharePoint and conceptClassifier for Office 365 deliver semantic metadata generation, auto-classification, and taxonomy tools integrated natively with the SharePoint Term Store.
How does it work with privacy and confidential content? The products identify unknown security or confidential exposures in real-time from diverse repositories. Identification of not only standard descriptors but also organizationally defined vocabulary can also be identified. Once identified they are routed to a repository and removed from unauthorized access and portability.
Microsoft Teams in the Modern WorkplaceJoanne Klein
Joanne Klein delves into Microsoft Teams to give a glimpse of its features, its underlying architecture, and what’s in it for the modern worker and the data protection, data retention, and legal/compliance teams across your organization.
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
Recently, Microsoft introduced Microsoft 365, which brings together Office 365, Windows 10, and Enterprise Mobility + Security. We’ll explore what this combination of products means for an organisation looking to ensure GDPR compliance and additional Office 365 products that you can layer to help you meet your obligations.
Microsoft Teams is the fastest-growing product in Microsoft history, providing a powerful platform for collaboration and communication. However, because Teams was built on the backs of two leading workloads: SharePoint and Exchange, managing the security, compliance, and governance of Teams comes with some additional complexity. In this session, Christian walks through 10 essentials for effective Teams governance to help you 'know where to go' to meet your organizational requirements.
Cracking the Code- Expert Tips for Mastering GRC CollabDays Bletchley Sept 23...Nikki Chapple
Adopting successful Governance, Risk, and Compliance (GRC) can be challenging and risky, especially with data risks, regulatory exposure, and managing sensitive information. But with the right tools and implementation programmes, you can crack the code of GRC.
In this session, our experts will provide insider tips and quick wins, as well as useful resources, for building an effective GRC posture using the tools across the Microsoft cloud, including Microsoft Purview and other Microsoft 365 tools and services. We'll share real-world experiences on implementing effective GRC strategies and provide practical guidance on how to overcome key challenges organizations face with GRC.
You'll leave the session with 3 key takeaways: how to get started, where to find quick wins, and how to build GRC momentum and demonstrate improvements in your organization's GRC posture. You'll gain valuable insights and best practices for decoding the complexities of GRC in Microsoft 365.
Most Office 365 organizations think they are safe because they are ‘only’ using collaboration in the cloud. Think again.
Join Concept Searching for a 15 minute webinar that describes the challenge of cyber security and shows you how we solve it. conceptClassifier for Office 365 identifies unknown security or confidential exposures in real-time from diverse repositories. Identification of not only standard descriptors but also organizationally defined vocabulary are also be identified. Once identified they are routed to a repository and removed from unauthorized access and portability.
Use stand-alone or integrate with your security package. We invite you to see how it works.
SPSTC18 Laying Down the Law - Governing Your Data in O365David Broussard
Have you ever wanted to tell your users "I am the LAW!" when they ask why they have to tag a file in SharePoint? This session looks at what governance is, why its important, why our data is like laundry, and what tools Microsoft gives us to help you rein in your users and lay down the law!
Intelligent Compliance to Optimize Energy Sector Enterprise Content Managemen...Concept Searching, Inc
We explored how SharePoint can be enhanced to establish an ECM framework that ensures the availability, usability, integrity, and security of an enterprise’s information, and enables information consumers to:
• Find trusted and relevant information regarding health and safety, asset maintenance, and compliance guidelines such as OSHA, for key information for decision making
• Ensure accurate records management, regulatory compliance, and improve eDiscovery, and litigation support processes
• Identify and secure potential confidential or sensitive information exposures
• Rapidly address unexpected failures in processes, such as pipeline leaks or natural disasters
• Enable multinational content asset protection and authorization to assets
• Automate application and enforcement of policies
• Quickly react to deploy project-based hybrid cloud and on-premise collaborative solutions
Do you have customers residing in California? If so, you need to prepare yourself for the California Consumer Privacy Act (CCPA) going into effect in January 2020. CCPA mandates data privacy protection for California consumers much like GDPR. Personal information for consumers, households, and devices is covered and it is broadly applied. It’s not just names and addresses or personal identifiers like driver’s license and social security number but includes: geolocation data; records of personal property; products or services purchased, obtained, or even considered for purchase; browsing history; education information; professional information; and more. And you need to know where all that information is.
In order to ensure compliance, it’s time to put data profiling to work! You need rapid insight into your data sources whether on traditional platforms or in your data lake, and you need to find the outliers, not just cursory review of data samples, that help you ensure you’ve identified all the places this information has spread to as the information has been copied, reported, and delivered from central data stores.
View this webinar on-demand where we talk through some of the salient points of CCPA and show you how to leverage Trillium Discovery to profile, assess, and evaluate the data sources to find this data at risk.
Webinar presented on Oct 21st (US) and Oct 23rd (EMEA), 2014 by Christian Buckley, Managing Director at GTconsult and Steve Marsh, Director of Product Marketing at Metalogix.
Top 10 use cases for Microsoft Purview.pptxAlistair Pugin
So what is Microsoft Purview really?
How is it supposed to help organisations with their overall Cloud Security Posture?
In this session, we cover:
- Data classification
- Data loss prevention
- Data lifecyle management
- Data privacy management
By approaching security from a compliance perspective, companies can manage governance and mitigate risk by using out of the box compliance solutions from Microsoft Purview
Similar to Labelling in Microsoft 365 - Retention & Sensitivity (20)
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
In this session, we will delve into strategic approaches for optimizing knowledge management within Microsoft 365, amidst the evolving landscape of Copilot. From leveraging automatic metadata classification and permission governance with SharePoint Premium, to unlocking Viva Engage for the cultivation of knowledge and communities, you will gain actionable insights to bolster your organization's knowledge-sharing initiatives. In this session, we will also explore how to facilitate solutions to enable your employees to find answers and expertise within Microsoft 365. You will leave equipped with practical techniques and a deeper understanding of how there is more to effective knowledge management than just enabling Copilot, but building actual solutions to prepare the knowledge that Copilot and your employees can use.
Microsoft Syntex brings advanced content AI solutions into your existing Microsoft 365 investment but is it something that will help you?
In this session, we will go through what Microsoft Syntex is, how it works, and why it could be an important part of your enterprise in Microsoft 365.
Viva Topics brings advanced content services solutions into your existing Microsoft 365 environment. If you are struggling with content or knowledge management, deploying Viva Topics could help your employee's experience for finding content and people.
In this session we will go through what Viva Topics is, how it works, and how to effectively deploy it in your organization.
Have you seen all the new features in OneDrive for Business lately? Are you getting ready to roll-out OneDrive to your enterprise? Or are you just looking to see what you’re missing if you aren’t on OneDrive yet? OneDrive for Business in Office 365 is changing quickly and we as end-users and IT professionals need to try keep up.
Getting started with with SharePoint SyntexDrew Madelung
SharePoint Syntex brings advanced content services solutions into your existing SharePoint environment but is it something that will help you? In this session we will go through what SharePoint Syntex is, how it works, and why it could be an important part of your enterprise in Microsoft 365.
In this session we will go through the new Microsoft Teams Shared Channel functionality from start to finish. We will discuss the configuration of it, how it works, how it differs from the previous guest experience, and why it is a better experience for the employee experience.
OneDrive for Business is an integral part of your collaboration strategy and Microsoft 365 roll out. Being able to mange or administer OneDrive is essential to ensure files safe and secure. OneDrive as it provides a cloud location to store, share, discover and sync your files and work with them from any device.
Whether you are looking to roll-out OneDrive for Business or are already are utilizing it, there are a lot of important things that you should know about administration.
This session will go through things such as:
• Admin centers
• Sync capabilities and restrictions
• Security capabilities from the user to the tenant
• Overall limits, guidance, and best practices
• Reporting
• What’s new for administration
Have you seen all the new features in OneDrive for Business lately? Are you getting ready to roll-out OneDrive to your enterprise? Or are you just looking to see what you’re missing if you aren’t on OneDrive yet? OneDrive for Business in Office 365 is changing quickly and we as end-users and IT professionals need to try keep up.
M365 Records Management Community WebinarDrew Madelung
Information governance is necessary for enterprises. The management of content lifecycles is needed to be compliant and secure. Records management in M365 has many new features and capabilities that we will highlight in this webinar. We will also have real-world conversations on use cases of moving to modern records management in M365 and the challenges, opportunities, and overall guidance for this process. Bring your questions to this exciting webinar!
Enabling Sharing & Collaboration in OneDrive & SharePointDrew Madelung
In this webinar, we dived into sharing and discussing how it works, how it can be managed, and what’s new and upcoming in the world of sharing and collaboration in OneDrive and SharePoint. We were joined by Stephen Rice from Microsoft as we broke down the details and background of sharing.
Following the Evolution of Office 365 Groups to Microsoft 365 GroupsDrew Madelung
In this webinar, we were be joined by Mike McLean from the Microsoft 365 Groups product team to discuss the evolution of Office 365 Groups to Microsoft 365 Groups. We reviewed the Office 365 Groups journey, and provide a behind-the-scenes look at the vision and strategy around the platform. Mike will also share details on improvements recently shipped that enhance how groups are managed across the Microsoft 365 suite and through Microsoft Graph.
Review of the new Managed Metadata experience in SharePoint OnlineDrew Madelung
As part of the Vlad and Drew Microsoft cloud webinar series we welcomed members of the Microsoft team to review of the new taxonomy, content types, UX, functionality, and APIs.
Getting Started with Site Designs and Site Scripts - SPSChiDrew Madelung
The concept of building SharePoint site templates has evolved. We now have site scripts and site designs that we can utilize to build templates for modern SharePoint sites. With these solutions we can empower the end users or administrators to drive consistent SharePoint experiences. In this session I will break down what site designs and site scripts are and how you can get started using them today within your enterprise.
Microsoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & DrewDrew Madelung
Join Microsoft MVPs Vlad Catrinescu and Drew Madelung after Ignite for a recap of the most important Security and Compliance news that was announced. With the dust and excitement from Ignite settled, and the most important features potentially out and tested, Vlad and Drew will cover the biggest and most important news from Ignite!
Microsoft Ignite Recap: Microsoft Teams & Yammer with Vlad & DrewDrew Madelung
Join Microsoft MVPs Vlad Catrinescu and Drew Madelung the week after Ignite for a recap of the most important Microsoft Teams and Yammer news that were announced. With the dust and excitement from Ignite settled, and the most important features potentially out and tested, Vlad and Drew will cover the biggest and most important news from Ignite!
Microsoft Ignite Recap: SharePoint & OneDrive for Business with Vlad & DrewDrew Madelung
Join Microsoft MVPs Vlad Catrinescu and Drew Madelung and special guest Mark Kashman the week after Ignite for a recap of the most important SharePoint and OneDrive for Business news that was announced. With the dust and excitement from Ignite settled, and the most important features out and tested, Vlad and Drew will cover the biggest and most important news from Ignite!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
6. Data Classification
Labelling in M365
Sensitivity Labels
Retention Labels
Labelling in Microsoft
365: Retention &
Sensitivity
M365 Chicago 2021
Demos on Demos
9. The market is fragmented
and confusing
Breach
notification
Supervision
GDPR
Information
governance
Data loss
prevention
Archiving
Fraud
prevention
Information
protection
eDiscovery
Privacy
Records
management
Access
management
Hundreds of compliance controls
Hundreds of vendors
13. 163 zettabytes of data a year will
be created by 2025
Cost of compliance continues to
increase year over year
200+ updates per day from 750
regulatory bodies
14. Adopt a comprehensive data governance
strategy
Leverage the shared responsibility model
Use integrated tools that span end to
end scenarios
163 zettabytes of data a year will
be created by 2025
200+ updates per day from 750
regulatory bodies
Cost of compliance continues to
increase year over year
15. Unified approach to discover,
classify & label
Automatically apply policy-based actions
Proactive monitoring to identify risks
Broad coverage across locations and
applications
Data growing at exponential rate
Label
Discover Classify
Unified approach
Devices Apps Cloud services On-premises ISVs, 3rd-party
Sensitive data discovery
Data at risk
Policy violations
Monitor
Label Analytics
Proactive alerts
Supervision
Protection Governance
Encryption
Restrict access
Watermark
Header/Footer
Archiving
Retention & deletion
Records management
Event based
Apply policy
Comprehensive policies to protect and govern your most
important data – throughout its lifecycle
17. Powered by
Sensitivity labels Retention labels
Description Labels to classify and protect emails,
documents, Sites, Groups
Labels to classify and preserve emails &
documents in M365 – Exchange, SPO, Groups
Label Settings
• Encryption
• Content Marking
• DLP
• Conditional Access Controls
• Retention
• Deletion
Label Persistence Yes No
Deployed to User Container
18. Get to know the admin center(s)
Centralized administration for controlling
your Microsoft 365 technologies
Split into
• security.microsoft.com
• compliance.microsoft.com
Protection.office.com is still used and you will still need it
31. Do you have a
strategy for retaining
and managing
regulatory and
business critical
data?
Do you know what your regulatory
requirements are for your organization?
Do you know where the data resides
requiring retention?
Do you have established guidelines on
the information lifecycle of this data
from creation thru disposal?
32. Retain Retain and Delete Delete
Retention can…
Keep Access Requests for
at least 5 years
Keep customer information
for 10 years and then
delete
Keep Team collaboration
content no longer than 8
years
33. Classify and govern data and records intelligently
Manual
Location
SharePoint, OneDrive, Exchange, Teams,
Skype, Yammer, Groups
Metadata and property
E.g., Content type
Trainable classifiers
6 OOTB + built your own
E.g., resumes, contracts, those that are not
easily found by pattern recognition
Sensitive information types
100+ OOTB + custom
E.g., financial, healthcare, privacy
Keywords and queries
E.g., “Project Foo”, “change management”
Classify
Automated
Policy
Retention period
E.g., 7 years retain + delete;
7 days delete
Level of immutability
Retention, record, or
regulatory record labels
Actions
Only retain, delete automatically,
disposition review
Enforcement point
Event-based or when content
was created, last modified,
labeled
Document understanding
SharePoint Syntex
Machine teaching models part of business
processes
Does
it
look
like…
Does
it
contain…
34. Keeping data longer than needed or required…
• imposes significant costs and risks for your organization
Removing data sooner than you should…
• may cause undue hardship if it’s required for business reasons
• may make you non-compliant with policies and government regulations
tools to manage retention and policy-based deletion are needed to balance these
needs in a uniform way
36. • Best for targeted retention scenarios
• Can be applied automatically or by end-
users
• Have more choices than a Retention
Policy for timing
• Can trigger a disposition review before
removal
• Can add metadata to label to enhance
administration
37. Site
Document
library
Folder
Document
• Retention Labels are published to a site making
it available to all lists and libraries on the site
• Document Libraries, Folders, and Document
Sets can have a DEFAULT retention label
• End user can manually apply a Retention Label
on a document or folder
• Labels can be auto-applied
• Labels can make a document a ‘Record’
38. Can be age-based or event-based
Age-based:
- From created date
- From last modified date
- From date it was labeled
Event-based:
- From an event date
- Examples:
- When a contract expires
- When an employee leaves
44. Problems of security
Users need to access data from any device, location
End user
Data admin/Compliance admin
Challenge in training users on security policies
Bottomline: Protect data & have happy users
Who should I share and what kind of data?
Where can I save what kind of data?
What are my company policies and how
do I remember those?
Bottomline: Just need to get the work done
45. Crawl-Walk-Run Strategy
Goals Ideas for each phase Time to get started
“A measured, gradual approach to adopting something new
allowing for incremental improvements along the way.”
46. What’s the advantage of Crawl-Walk-Run?
Allows you to start
without having it all
figured out
Allows for
incremental
improvements
Eases information
workers into the
world of protection
and retention
Some protection
and retention is
better than nothing