I presented this session during SharePoint Saturday Lisbon in november 2017. Subjects include data governance, data loss prevention and PowerShell in regards to Office 365. Azure Information Protection was covered briefly.
Please note a typo in one of the slides. It should read "ComplianceTag".
Azure Information Protection - Taking a Team ApproachJoanne Klein
There's a lot more to implementing Azure Information Protection(AIP) than meets the eye simply because it goes far beyond the technical implementation of labels. In this practical session, we'll walk thru some steps to help set your organization up for a successful AIP rollout. These steps include:
how to plan your organization's AIP labels
how to configure them for your tenant
how to ensure information workers in your organization have adopted their use.
Each step is critical to the overall success of your AIP program and the reason why it cannot be done by the IT-Pro alone. Joanne and Charmaine team up for this session to share some practical advice and creative tips and tricks for rolling out AIP and will cover topics for the IT Pro, Information Manager, and Adoption specialist – all required resources on an AIP rollout team! You might even see an AIP bot!
Microsoft TechDays Netherlands 2017 - Azure Information Protection ScannerAlbert Hoitingh
These slides were used at TechDays NL in oktober 2017. The subject is the (still in private preview) Azure Information Protection (#AzureIP) scanner client.
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Sonja Madsen
Office 365 provides access to information from different devices not only from secure office locations,
but also from just about any location in the world. Data security, governance and compliance are the biggest concerns.
This talk is about the robust security that is built into Office 365: data loss prevention,
mobile device management, password and multi-factor authentication, message encryption,
EU General Data Protection Regulation (GDPR) and Rights Management Service.
The Security Gap: Protecting Healthcare Data in Office 365Bitglass
One in three healthcare organizations had a cloud app like Office 365 deployed in 2015, driven by ease of deployment, cost effectiveness, and improved productivity among employees. While cloud app vendors like Microsoft have built robust infrastructure-level security, data security is the enterprise's responsibility. Healthcare organizations need a cloud security solution that protects PHI end-to-end, from cloud to device.
I presented this session during SharePoint Saturday Lisbon in november 2017. Subjects include data governance, data loss prevention and PowerShell in regards to Office 365. Azure Information Protection was covered briefly.
Please note a typo in one of the slides. It should read "ComplianceTag".
Azure Information Protection - Taking a Team ApproachJoanne Klein
There's a lot more to implementing Azure Information Protection(AIP) than meets the eye simply because it goes far beyond the technical implementation of labels. In this practical session, we'll walk thru some steps to help set your organization up for a successful AIP rollout. These steps include:
how to plan your organization's AIP labels
how to configure them for your tenant
how to ensure information workers in your organization have adopted their use.
Each step is critical to the overall success of your AIP program and the reason why it cannot be done by the IT-Pro alone. Joanne and Charmaine team up for this session to share some practical advice and creative tips and tricks for rolling out AIP and will cover topics for the IT Pro, Information Manager, and Adoption specialist – all required resources on an AIP rollout team! You might even see an AIP bot!
Microsoft TechDays Netherlands 2017 - Azure Information Protection ScannerAlbert Hoitingh
These slides were used at TechDays NL in oktober 2017. The subject is the (still in private preview) Azure Information Protection (#AzureIP) scanner client.
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Sonja Madsen
Office 365 provides access to information from different devices not only from secure office locations,
but also from just about any location in the world. Data security, governance and compliance are the biggest concerns.
This talk is about the robust security that is built into Office 365: data loss prevention,
mobile device management, password and multi-factor authentication, message encryption,
EU General Data Protection Regulation (GDPR) and Rights Management Service.
The Security Gap: Protecting Healthcare Data in Office 365Bitglass
One in three healthcare organizations had a cloud app like Office 365 deployed in 2015, driven by ease of deployment, cost effectiveness, and improved productivity among employees. While cloud app vendors like Microsoft have built robust infrastructure-level security, data security is the enterprise's responsibility. Healthcare organizations need a cloud security solution that protects PHI end-to-end, from cloud to device.
Microsoft TechDays Netherlands 2017 - Azure Information ProtectionAlbert Hoitingh
These slides were used at TechDays NL in oktober 2017. The subject is Azure Information Protection (#AzureIP) from the functional and management level.
IRMS UG Principles of Retention in Microsoft 365Joanne Klein
There's only 4 of them, but they're important. Really important.
This session will talk about why it's essential for Records Managers and Information Management teams to have an authoritative understanding of the principles. They inform the retention and deletion processes and actions which are the technical underpinning of your Information Governance/Records Management (IG/RM) implementation. This is what ultimately determines the retention and deletion actions taken on each piece of content.
Understanding the principles of retention is an important prerequisite to a holistic IG/RM design and implementation. It can help ensure you are deleting content when you no longer need/require it and retaining content for as long as you are required to meet your corporate governance requirements and your legal, business, and regulatory obligations.
In this webinar, we will walk-through Data Loss Prevention in Office 365. We will see how to create DLP policy with Labels as a condition. We will also go through Document fingerprint in Exchange Online DLP and DLP reports.
In this session I go over the functional and management side of Azure Information Protection. The new Office 365 Sensitvity labels were also discussed and demonstrated.
The implications for employers of GDPR are many and varied and the responsibility lies with each business owner to ensure that they are compliant. With this in mind Sara Marrett from HR Department will help you understand the key facts to help you prepare for this big change
Overview of Data Loss Prevention Policies in Office 365Dock 365
Presentation about identifying, monitoring, and automatically protect sensitive information across Office 365.
With a DLP Policy, you can:
- Identify sensitive information across many locations, such as SharePoint Online and OneDrive for Business.
- Prevent the accidental sharing of sensitive information.
- Monitor and protect sensitive information in the desktop versions of Excel 2016, PowerPoint 2016, and Word 2016.
- Help users learn how to stay compliant without interrupting their workflow.
- View DLP reports showing content that matches your organization's DLP policies.
Visit www.mydock365.com to learn more about SharePoint with Dock.
Here's the slide deck from my session titled "Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps" which was presented on the Modern Workplace Conference Paris 2022 Virtual event.
In this webinar, we will walk-through Data Governance in Office 365 Security & Compliance Center. We will see how to archive mails, use Retention policy for documents, use Labels as a Retention, Disposition and monitoring emails with Supervision.
Office 365 Security - MacGyver, Ninja or Swat teamAntonioMaio2
Do you know the tools and tricks in your MacGyver kit for Office 365 Security? Would you consider yourself a Security Ninja, fully versed and prepared to take advantage of the Office 365 Security and Compliance Center?
Is your SWAT Team prepared to take down adversaries in worst-case scenarios? Join Antonio Maio, 5-time Microsoft MVP and 20-year security professional, as he reviews the recommended game plan to enable your inner MacGyver, execute tactical strikes like a Ninja and arm your team with information governance and security practices in use at global 100 companies. Through customer case studies and hands-on demonstrations of capabilities such as alerts, data loss prevention policies, activity audit logs, advanced security management and advanced threat protection, Antonio will show you the tools and tricks you need to effectively secure your information in Office 365.
Office 365 Security - Its 2am do you know whos in your office 365Jack Nichelson
You’ve entrusted all of your company’s data to Microsoft’s cloud…what could go wrong? In 2018 you’ve either moved your data to Office365, you’re thinking about it, or you’ve locked your entire business into Lotus Notes. As cloud providers eat away traditional infrastructure, IT and Security teams must either adapt to this brave new world, or be left behind. In this talk we will provide real-world examples and how to apply both traditional and new security controls/tools to secure Office 365 & Azure. We will give specific, actionable recommendations you can make to your Microsoft Office 365 and Azure tenants. Recommendations like how to prevent external threats like account takeovers, internal threats like Shadow cloud Apps, effective monitoring and processes to follow to minimize the likelihood that your company becomes the Next Big Breach. The new perimeter is identities in the cloud, so learn to protect them with Azure Active Directory.
Microsoft 365 provides holistic security across these four aspects of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Secure identities to reach zero trust
Threat Protection
Help stop damaging attacks with integrated and automated security
Information Protection
Protect sensitive information anywhere it lives
Security Management
Strengthen your security posture with insights and guidance
Microsoft TechDays Netherlands 2017 - Azure Information ProtectionAlbert Hoitingh
These slides were used at TechDays NL in oktober 2017. The subject is Azure Information Protection (#AzureIP) from the functional and management level.
IRMS UG Principles of Retention in Microsoft 365Joanne Klein
There's only 4 of them, but they're important. Really important.
This session will talk about why it's essential for Records Managers and Information Management teams to have an authoritative understanding of the principles. They inform the retention and deletion processes and actions which are the technical underpinning of your Information Governance/Records Management (IG/RM) implementation. This is what ultimately determines the retention and deletion actions taken on each piece of content.
Understanding the principles of retention is an important prerequisite to a holistic IG/RM design and implementation. It can help ensure you are deleting content when you no longer need/require it and retaining content for as long as you are required to meet your corporate governance requirements and your legal, business, and regulatory obligations.
In this webinar, we will walk-through Data Loss Prevention in Office 365. We will see how to create DLP policy with Labels as a condition. We will also go through Document fingerprint in Exchange Online DLP and DLP reports.
In this session I go over the functional and management side of Azure Information Protection. The new Office 365 Sensitvity labels were also discussed and demonstrated.
The implications for employers of GDPR are many and varied and the responsibility lies with each business owner to ensure that they are compliant. With this in mind Sara Marrett from HR Department will help you understand the key facts to help you prepare for this big change
Overview of Data Loss Prevention Policies in Office 365Dock 365
Presentation about identifying, monitoring, and automatically protect sensitive information across Office 365.
With a DLP Policy, you can:
- Identify sensitive information across many locations, such as SharePoint Online and OneDrive for Business.
- Prevent the accidental sharing of sensitive information.
- Monitor and protect sensitive information in the desktop versions of Excel 2016, PowerPoint 2016, and Word 2016.
- Help users learn how to stay compliant without interrupting their workflow.
- View DLP reports showing content that matches your organization's DLP policies.
Visit www.mydock365.com to learn more about SharePoint with Dock.
Here's the slide deck from my session titled "Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps" which was presented on the Modern Workplace Conference Paris 2022 Virtual event.
In this webinar, we will walk-through Data Governance in Office 365 Security & Compliance Center. We will see how to archive mails, use Retention policy for documents, use Labels as a Retention, Disposition and monitoring emails with Supervision.
Office 365 Security - MacGyver, Ninja or Swat teamAntonioMaio2
Do you know the tools and tricks in your MacGyver kit for Office 365 Security? Would you consider yourself a Security Ninja, fully versed and prepared to take advantage of the Office 365 Security and Compliance Center?
Is your SWAT Team prepared to take down adversaries in worst-case scenarios? Join Antonio Maio, 5-time Microsoft MVP and 20-year security professional, as he reviews the recommended game plan to enable your inner MacGyver, execute tactical strikes like a Ninja and arm your team with information governance and security practices in use at global 100 companies. Through customer case studies and hands-on demonstrations of capabilities such as alerts, data loss prevention policies, activity audit logs, advanced security management and advanced threat protection, Antonio will show you the tools and tricks you need to effectively secure your information in Office 365.
Office 365 Security - Its 2am do you know whos in your office 365Jack Nichelson
You’ve entrusted all of your company’s data to Microsoft’s cloud…what could go wrong? In 2018 you’ve either moved your data to Office365, you’re thinking about it, or you’ve locked your entire business into Lotus Notes. As cloud providers eat away traditional infrastructure, IT and Security teams must either adapt to this brave new world, or be left behind. In this talk we will provide real-world examples and how to apply both traditional and new security controls/tools to secure Office 365 & Azure. We will give specific, actionable recommendations you can make to your Microsoft Office 365 and Azure tenants. Recommendations like how to prevent external threats like account takeovers, internal threats like Shadow cloud Apps, effective monitoring and processes to follow to minimize the likelihood that your company becomes the Next Big Breach. The new perimeter is identities in the cloud, so learn to protect them with Azure Active Directory.
Microsoft 365 provides holistic security across these four aspects of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Secure identities to reach zero trust
Threat Protection
Help stop damaging attacks with integrated and automated security
Information Protection
Protect sensitive information anywhere it lives
Security Management
Strengthen your security posture with insights and guidance
Simple, Straightforward, and Jargon-Free Answers to basic questions including:
What is Office 365?
What is Office 365 used for?
How much does Office 365 cost?
Is Office 365 secure?
How does Office 365 stack up against the competition?
How difficult is it to migrate your existing files?
To help you make an informed decision about whether Office 365 is right for your business.
Microsoft cloud app security or CASB is a critical component of the Microsoft cloud security stack. It provides a comprehensive solution to give organizations improved visibility into cloud activities, uncover shadow IT, assess risks, enforce polices, investigate suspicious activities and stop threats
https://blog.ahasayen.com/microsoft-cloud-app-security-casb/
At Agile IT, we've been leading the trend in moving customers to the Microsoft Cloud. Along that roadmap is the need to secure and manage the devices that will access that data. The Microsoft Enterprise Mobility Suite (EMS) focuses on managing both the data that's accessible from the cloud as well as the devices that access it. In this webinar, we introduce you to EMS and focus on how cloud technologies work together to deliver a seamless solution for protecting your data.
The accompanying recording of the webinar can be found at https://youtu.be/NOWFI4xl-dM.
How to incorporate data classification capabilities within your applicationMicrosoft Tech Community
Learn how to utilize the capabilities of the Information Protection SDK to classify, label and protect your unstructured data within and beyond the Office 365 environment.
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
Recently, Microsoft introduced Microsoft 365, which brings together Office 365, Windows 10, and Enterprise Mobility + Security. We’ll explore what this combination of products means for an organisation looking to ensure GDPR compliance and additional Office 365 products that you can layer to help you meet your obligations.
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore
Starting from May 25, 2018 all European businesses and all worldwide businesses that are trading partners of European businesses will have to adhere to the new General Data Protection Regulation (GDPR). In this session, learn what are the main requirements of GDPR, from an IT perspective, and what are the out-of-the-box capabilities of Microsoft Office 365 and of SharePoint Online that can help you to be compliant with the GDPR rules.
Moreover, see a sample project, based on SharePoint Online, that you can use as a starter kit to satisfy the GDPR basic requirements.
Paolo Pialorsi, Microsoft Certified Master in SharePoint, MVP and SharePoint PnP Core Team Member, joined us in this webinar to talk about how GDPR is affecting your Office 365.
Securely Harden Microsoft 365 with Secure ScoreJoel Oleson
7 Ways to Harden and Secure Microsoft 365
1. Enable Secure Access for Users with Azure Active Directory MFA
2. Identify compromised identities or malicious insiders with Microsoft Defender for Identity
3. Protect and Encrypt Sensitive Data with Microsoft Information Protection
4. Manage and Protect Devices and with Secure Score for Devices
5. Prevent Unauthorized Access and Sharing with Cloud App security
6. Secure your Email and Files with Microsoft 365 Rights Management Policies and Defender for Microsoft 365
7. Use Intelligent Insights and Guidance to Strengthen Your Organizational security posture with Microsoft Secure Score
Sponsored by CoreView
“How do we operate as a multi-tenant environment while, from Microsoft’s perspective, on a single tenant? CoreView brought all of that to the table with the V-tenant capabilities. We can slice and dice administration into functional areas. We can have user managers, Teams managers, Teams administrators, or security administrators. All of those functions and feature sets are critical to the solution we have today”
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
3. Compliance Manager
general availability
for Azure, Dynamics 365, and Office 365 Business and
Enterprise customers in public clouds
Compliance Manager is a dashboard that provides a
summary of your data protection and compliance
status. It helps to meet complex obligations - but it is
also a starting point for any regulatory discussion or
audit. Compliance dashboard can proof your set of
policies, tools and procedures that the company has
deployed to meet GDPR requirements.
Article: Announcing Compliance Manager general availability
4. Compliance Score
availability
for Office 365
Compliance Score – a Compliance Manager feature –
enables you to perform ongoing risk assessments on
Microsoft Cloud services with a risk-based score
reference, giving you visibility into your compliance
performance. It can support your audit efforts.
Article: Manage Your Compliance from One Place – Announcing Compliance
Manager
5. Azure Information
Protection Scanner
general availability
for Office 365
Azure Information Protection Scanner detects PII
(Personally Identifiable Information) across files on your
file or SharePoint servers and allows you to implement
policies to automatically discover, classify, label, and
protect documents in your repositories.
Article: Consistent labeling and protection policies coming to Office 365 and Azure
Information Protection
Tech Article: Scan file servers, network shares, and SharePoint
Tech Article: Deploying the Azure Information Protection scanner to automatically
classify and protect files
Video: Information protection capabilities in Microsoft 365
6. Message Encryption
preview
for Office 365
The encrypt-only policy applies encryption to the email.
It works just out-of-the-box. No need for any 3rd party
software. You can apply the option in Outlook or in the
Exchange admin center.
Article: Encrypt only rolling out starting today in Office 365 Message Encryption
7. February
22
Data Protection
for Apple MacOS
preview
for Office 365
We are now previewing the ability to label and protect
sensitive data in Office applications on Mac devices.
This gives Mac users same Azure Information
Protection benefits as on PC.
Article: Announcing New information protection capabilities across devices, apps,
on-premises and the cloud
Video: Information protection capabilities in Microsoft 365
8. Consistent Labeling
preview
for Microsoft 365
We are unifying the labeling process for sensitive data
for O365 and Azure Information Protection. The labels
created in one service will be automatically
synchronized across the other service. No need to
create labels in two different places!
Article: Consistent labeling and protection policies coming to Office 365 and Azure
Information Protection
9. GDPR Sensitive
Information Classification
coming soon
for Microsoft 365
Today, we detect and classify over 80 types of sensitive
information automatically. Soon, we will consolidate all
of them to a single template. We will add also new
personal data types for automatic detection - such as
addresses, telephone numbers, and medical
information.
Article: What the sensitive information types look for
Article: Create a custom sensitive information type
10. Microsoft 365
Embrace the GDPR with the most
complete, secure, and intelligent solution
for digital work.
Microsoft has brought together Office 365, Windows
10, and Enterprise Mobility + Security into a single,
always-up-to-date solution called Microsoft 365 –
relieving organizations from much of the cost and
complexity of multiple, fragmented systems that were
not necessarily designed to be compliant with current
standards.
Editor's Notes
Microsoft 365 jest subskrypcją, co oznacza, że z czasem wprowadzamy do oferty nowe funkcje pakietu M365, które stają się dostępne dla Klientów. Prezentacja pokazuje nowe funkcjonalności wprowadzone 22 lutego 2018 roku oraz zapowiedzi takich funkcji, nad którymi dopiero pracujemy. Wszystkie one mają istotne znaczenie dla RODO – bezpośrednio wspierają zapisy rozporządzenia.
Aktualizacja z dnia 22 lutego wprowadza 3 funkcjonalności, które wchodzą do użytku, oraz 4 rozszerzenia funkcjonalności nad którymi właśnie pracujemy.
NOWA FUNKCJA, PUBLICZNIE DOSTĘPNA. Manager Zgodności (Compliance Manager) to pulpit, który pokazuje stan zgodności z regulacjami w zakresie ochrony danych i innych metryk / wymogów np. ISO. Pomaga zarządzić procesami dostosowania organizacji do wymogów RODO, ale również doskonale dokumentuje nasze wysiłki pokazując jakie działania podjęliśmy, czy zostały one zrealizowane, kto był za nie odpowiedzialny i kto potwierdził ich realizację. Dostarcza dowodów, że realizujemy wymagania RODO wdrażając procedury przypisane bezpośrednio do paragrafów rozporządzenia.
NOWA FUNKCJA, PUBLICZNIE DOSTĘPNA. Klienci mogą mylić Compliance Score i Security Score. Security Score, znany dotychczas, pozwala określać poziom bezpieczeństwa organizacji na podstawie zaimplementowanych polityk zabezpieczeń np. wymaganie uwierzytelniania wieloskładnikowego poza siecią firmową. Compliance Score natomiast daje widoczność na aspekty związane ze zgodnością z regulacjami typu GDPR dla produktów cloudowych Microsoft takich jak: Azure, Dynamics 365, and Office 365. Wynik pomaga zrozumieć i zwizualizować, czy udało się zaimplementować właściwą kontrolę w zakresie ochronnych danych zarówno po stronie Klienta jak i po stronie Microsoft. Narzędzie może być pomocne w rozmowie z audytorami.
NOWA FUNKCJA, PUBLICZNIE DOSTĘPNA. AIP Skaner pozwala wykrywać dane osobowe przechowywane na serwerach plików, zasobach sieciowych lub lokalnych serwerach SharePoint 2013 i 2016. Pozwala to automatycznie wykrywać, klasyfikować i nadawać etykiety dokumentom, które zawierają dane osobowe a przechowywane są w lokalnie, nie w chmurze.
WERSJA TESTOWA: Funkcja „Nie przekazuj dalej” dla wiadomości email jest doskonale znana z Outlooka. Teraz dodajemy dodatkową opcję, która szyfruje wiadomość, ale pozwala ją przesłać wydrukować, czy skopiować. Wyobraźmy sobie scenariusz przesyłania danych medycznych do pacjenta. Dzięki tej funkcji będą one zaszyfrowane (czyli bezpieczne z punktu widzenia nadawcy), ale pacjent (odbiorca) będzie mógł przekazać je innemu lekarzowi. Nie jest wymagane dodatkowe oprogramowanie szyfrujące. Funkcja nie komplikuje pracy, gdyż nie wymaga zmiany nawyków. Wystarczy jedno kliknięcie w Outlooku.
WERSJA TESTOWA. Etykiety i klasyfikacja danych będzie wkrótce dostępna dla komputerów MacOS (Apple).
WERSJA TESTOWA. Do tej pory reguły dla etykiet danych należało wprowadzać odrębnie w O365 i AIP. Teraz integrujemy usługi tak, aby reguły działały niezależnie od tego w jakim serwisie zostały utworzone.
ZAPOWIEDŹ. Dziś potrafimy wykryć i sklasyfikować 80 różnych typów informacji dla wielu języków. Np. dla PL: numer pesel, numer i seria dowodu, numer paszportu. Wkrótce wszystkie te informacje skonsolidujemy w jednym wzorcu, aby jeszcze bardziej zautomatyzować wykrywanie i klasyfikację danych osobowych zgodnie z ich definicją RODO. Planujemy także dodać nowe typy wykrywanych danych takie jak: adresy, telefony i informacje medyczne.
Połączyliśmy O365, Windows 10, i EMS w jedno rozwiązanie, które nazywa się Microsoft 365. M365 to sposób na uwolnienie organizacji od kosztów i złożoności wielu fragmentaryzowanych systemów, które niekoniecznie zostały zaprojektowane tak, aby zapewniać zgodność z aktualnymi standardami.