SlideShare a Scribd company logo
1 of 38
Download to read offline
Intelligent compliance and risk management solutions
What are your biggest challenges?
Evolving
regulations
Discovering
data
Classifying and
mapping data
Insider
risks
Responding to
audits and DSRs
Securing
data
Preventing data
leaks
Influx of data
Managing the
data lifecycle
Multiple
point solutions
Scaling workflows
and processes
Intelligent compliance and
risk management solutions
Simplify compliance
and reduce risk
Compliance
Management
Quickly investigate and
respond with relevant data
Discover &
Respond
Protect and govern
data wherever it lives
Information Protection
& Governance
Insider
Risk Management
Identify and take
action on critical
insider risks
Information Protection & Governance
Protect and govern data wherever it lives
Discovering and managing data is challenging
88%
of organizations no
longer have confidence
to detect and prevent
loss of sensitive data¹
>80%
of corporate data is
“dark” – it’s not classified,
protected or governed²
#1
Protecting and
governing sensitive
data is biggest
concern in complying
with regulations3
1. Forrester. Security Concerns, Approaches and Technology Adoption. December 2018
2. IBM. Future of Cognitive Computing. November 2015
3. Microsoft GDPR research, 2017
Information Protection & Governance
Protect and govern data – wherever it lives
88%
KNOW
YOUR DATA
88%
PROTECT
YOUR DATA
GOVERN
YOUR DATA
PREVENT
DATA LOSS
Understand your data
landscape and identify
important data across your
hybrid environment
Apply flexible
protection actions
including encryption,
access restrictions and
visual markings
Automatically retain,
delete, and store data
and records in a
compliant manner
Powered by an intelligent platform
Unified approach to automatic data classification, policy management, analytics and APIs
Prevent accidental
oversharing of sensitive
information
With Microsoft Information Protection, we better safeguard all files,
whether they’re being accessed internally or sent externally. We can
prevent unprotected files from being downloaded and viewed
anywhere. We protect our IP without our security measures getting
in the way of collaboration and innovation.
Dave Vilwock
Senior Manager of Application Development
Komatsu
Built-in
Built-in labeling and protection experience in Office apps,
Office 365 services, other MS services like Power BI, Edge, and Windows
Intelligent
Accuracy in classification via ML based trainable classifiers and exact
data match
Unified
Single admin console to configure and manage your policies and view
analytics across on-premises, Office apps, Microsoft 365 services, third-party
party services (via MCAS) and devices
Extensible
MIP development platform extends the protection experience,
in a consistent way, to popular non-Microsoft apps and services
Microsoft Information Protection
Automatically block messages which contain
sensitive information
Educate and guide end-users with notifications
and “policy tips”
Unified classification engine supporting 90+
sensitive information types and custom sensitive
info type creation
Data Loss Prevention for Microsoft Teams
Microsoft Information Governance
Intelligent and built-in data and records management
In-place management
Retain data and manage records where your users collaborate
Automated policy
Classify and govern data at scale with pattern recognition and
trainable classifiers
Ongoing data ingestion
Manage chats, social, and collaboration data beyond Microsoft with
high-fidelity import
Enhanced defensibility
Demonstrate compliance with proof of disposals, defensible disposition, and
rich audit trails
Automatically retain,
delete, and store
data and records in
a compliant manner
Information Governance
Keep what you need and delete what you don’t
Records Management
Manage high value content and meet
recordkeeping obligations
Classify and govern data and records intelligently
Manual
Location
SharePoint, OneDrive, Exchange,
Teams, Skype, Yammer, Group
Metadata and property
E.g., Content type
5 OOTB + built your own
Trainable classifiers
E.g., resumes, contracts, those that are
not easily found by pattern recognition
100+ OOTB + custom
Sensitive information types
E.g., financial, healthcare, privacy
Keywords
E.g., Project Foo
Classify
Doesitlooklike…Doesitcontain…
Automated
Policy
Retention period
E.g. 7 years retain + delete;
7 days delete
Level of immutability
Retention, record, or
regulatory record labels
Actions
E.g., delete, disposition
review
Enforcement point
E.g., when it was created,
last modified, labeled,
an event
Insider Risk Management
Identify and take action on critical insider risks
Broad range of risks and violations from insiders
Data spillage
Confidentiality
violations
IP theft
Workplace
violence
Fraud
Policy
violations
Insider trading
Conflicts of
interest
Sensitive data leaks
Workplace
harassment
Security violations
Regulatory
compliance
violations
The Microsoft Insider Risk Management solution has helped
us receive a 9.6 out 10 score from security audits. We can now
intelligently evaluate relevant insider activities and set up
actions to filter and report based on risk associated with
the data stored and escalate to relevant parties.
Chad Ergun
Chief Information Officer
DGS Law
Insider Risk Management
Identify and take action on critical insider risks
Rich insights via tailored templates
Machine learning correlates native and
third-party signals to identify insider risks
Privacy built-in
Anonymity controls ensure data
about risks is appropriately managed
End-to-end investigations
Integrated investigation workflows allow
for collaboration across IT, HR, and legal
Communication Compliance
Quickly identify and remediate corporate code-of-conduct policy violations
Intelligent customizable playbooks
Leverage machine learning to detect violations
across Teams, Exchange and third-party party content
Flexible remediation workflows
Remediation workflows to quickly act on violations
Actionable insights
Interactive dashboard with policy violations,
actions, and trends
Privileged Access Management
Controlling privileged access by Microsoft
service engineers and by your administrators
The principle of zero standing access
Just in time and just enough access
Privileged workflow
Logging and auditing
Built in Encryption and Key Mgmt
Meets rigorous industry standards
Data is encrypted by default at-rest
and in-transit
Additional customer controls for
added protection and control
Option to manage and control your
own encryption keys to help meet
compliance needs
OME/AIP
TLS
BitLocker
Service
Encryption
Discover & Respond
Quickly investigate and respond with relevant data
Data is
exploding
GDPR OSHA
CCPA
Sarbanes-
Oxley Act
Federal Data
Protection Law
General Data
Privacy Law
PPA
HIPAA
PDPA
Personal
Information
Security
Specification
PIPA
US IRS Publication 583
EU Directive
2006/24/EC
POPI
Regulations
are evolving
Data
Vendors
Platforms
Public
Remote
Private
Cloud SaaS
StructuredUnstructured
Chat
messages
SMS
Documents
Corporate
Emails
Discovering and managing data is challenging
Discovering data efficiently is top of
mind for many organizations
24
74%
orgs to shift some employees to remote
work permanently
63%
expect their company to conduct more investigations over
the next three years
71%
are considering leveraging technology and/or best
practices to improve legal operations
Risk
Cost reduction
Efficiency
Logging and auditing
from one place
Export matter-relevant content
Lower cost per
custodian average
Reduce collection activities
Review relevant Microsoft 365 and
non-Microsoft 365 content faster
Do more, in-place
eDiscovery in
Microsoft 365
25
Advanced eDiscovery
Quickly find and respond with only the relevant information
Custodian Management and Communications
Preserve content by custodian, send hold notifications
and track acknowledgements
Deep crawling and indexing
Deep processing (e.g., much higher size limits, non-Microsoft file
types) to extract and index text and metadata
Review and manage case data
Manage static sets of documents within a case, that can be independently
searched, analyzed, shared, and acted upon
Cull your data intelligently with ML
Near duplicate detection, email threading, themes, and ML models to
identify potential high value content
Advanced Audit
Power fast and effective forensic and compliance investigations
Access crucial events to investigations
Preserve audit logs granularly by
individual and event for up to a year
High bandwidth access
to data with ~2x the baseline
Compliance Management
Simplify compliance and reduce risk
Managing data and compliance risks is challenging
200+
updates per day from
1000 regulatory bodies
>50%
of organizations state
that IT and cybersecurity
risks are their biggest
concern among all risks
#1
identifying and assessing
risks is the most time-
consuming task in risk
management
1. Cost of Compliance 2019, Thomson Reuters
2. Risk management market landscape web survey, Gartner, May 2019 (n=500, buyers and influencers of IRM solutions, 1000+ employees
3. Deloitte’s 2019 survey of risk management
Shared responsibility model
Customer management of risk
Data classification and data accountability
Shared management of risk
Identity & access management | End point devices
Provider management of risk
Physical | Networking
Cloud customer Cloud provider
Responsibility On-Prem IaaS PaaS SaaS
Data classification
and accountability
Client & end-point
protection
Identity & access
management
Application
level controls
Network controls
Host infrastructure
Physical security
Examples of shared responsibilities: NIST
800-53
responsibility
Organization
responsibility
Office 365
Access to production environment
Set up access control policy and SOP,
leveraging Customer Lockbox / identity
management solutions
Protect data
Encrypt data based on org’s
compliance obligations. E.g.
encrypt PII in transit between users,
using its own encryption key, etc.
Personnel control
Allocate and staff sufficient resources
to operate an organization-wide
privacy program, including awareness-
raising and training
Access to production environment
Set up access controls that strictly limit
standing access to customer’s data or
production environment
Protect data
Encrypt data at rest and in transit
based on industrial standards (BitLocker,
TLS, etc.)
Personnel control
Strict screening for employees, vendors,
and contractors, and conduct trainings
through onboarding process
Companies need
tools and guidance
Keeping up with new and frequently
updated regulations is ongoing struggle
Point-in-time assessments fail to identify risks
between audits, a huge blindsight in a digital world
Collaboration on risk and compliance
management is inefficient and siloed
Guidance is lacking to help with designing
and implementing effective controls
“I describe my role a lot of times like playing
Whack-A-Mole at the county fair and I’m knocking
down one mole’s head which is Sarbanes-Oxley
and then PCI pops up, and I knock that one down,
then something else pops up. So trying to keep
everything going in the right direction and making
sure something doesn’t pop up and come back to
bite us is extremely challenging.”
IT decision maker,
hospitality industry
Microsoft Compliance Score
Simplify compliance and reduce risk
Continuous assessments
Detect and monitor control effectiveness
automatically with a risk-based score
Recommended actions
Reduce compliance risks
with actionable guidance
Built-in control mapping
Scale your compliance efforts with built-in
mapping across regulations and standards
Compliance Score is a dashboard that provides your Compliance Score and a
summary of your data protection and compliance posture. It also includes
recommendations to improve data protection and compliance. This is a
recommendation, it is up to you to evaluate and validate the effectiveness of
customer controls as per your regulatory environment. Recommendations from
Compliance Manager and Compliance Score should not be interpreted as a
guarantee of compliance.
Consider a different approach
Reduce number of solution vendors and
leverage shared responsibility
Know, protect and govern your sensitive
data throughout its lifecycle
Implement more intelligent, built-in
compliance solutions
Microsoft 365 Compliance
Intelligent compliance and risk
management solutions
Discussion
© 2020 Razor Technology, LLC www.razor-tech.com
 David Rosenthal
 VP & General Manager
 Digital Business
 @DavidJRosenthal
 Slideshare
 Blog: www.razor-tech.com
5 Tower Bridge
300 Barr Harbor Dr., Suite 705
West Conshohocken, PA 19428
www.razor-tech.com
David.Rosenthal@razor-tech.com
Office: 866.RZR.DATA
LETS KEEP IN TOUCH
Appendix

More Related Content

What's hot

Microsoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghMicrosoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghAlbert Hoitingh
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionDavid J Rosenthal
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security OverviewRobert Crane
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
 
Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Chirag Patel
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityAlbert Hoitingh
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsVignesh Ganesan I Microsoft MVP
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceVignesh Ganesan I Microsoft MVP
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for BusinessRobert Crane
 
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...Jasper Oosterveld
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfParishSummer
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)Radhakrishnan Govindan
 
Secure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceSecure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceVignesh Ganesan I Microsoft MVP
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022Nikki Chapple
 

What's hot (20)

Microsoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghMicrosoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert Hoitingh
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat Protection
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App Security
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
 
Secure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceSecure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity Governance
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022
 
Microsoft Purview
Microsoft PurviewMicrosoft Purview
Microsoft Purview
 

Similar to Microsoft 365 Compliance and Security Overview

[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
 
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...SafeNet
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...Ulf Mattsson
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
CIO WaterCooler Focus: GDPR Jasmit Sagoo
CIO WaterCooler Focus: GDPR   Jasmit SagooCIO WaterCooler Focus: GDPR   Jasmit Sagoo
CIO WaterCooler Focus: GDPR Jasmit SagooAndrew Pryor
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data securityKeith Braswell
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
Value Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishValue Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishGuillaume Lagache
 
M365 Records Management Community Webinar
M365 Records Management Community WebinarM365 Records Management Community Webinar
M365 Records Management Community WebinarDrew Madelung
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCapgemini
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 

Similar to Microsoft 365 Compliance and Security Overview (20)

[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
 
CC ss.pptx
CC ss.pptxCC ss.pptx
CC ss.pptx
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
CIO WaterCooler Focus: GDPR Jasmit Sagoo
CIO WaterCooler Focus: GDPR   Jasmit SagooCIO WaterCooler Focus: GDPR   Jasmit Sagoo
CIO WaterCooler Focus: GDPR Jasmit Sagoo
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Value Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishValue Microsoft 365 E5 English
Value Microsoft 365 E5 English
 
M365 Records Management Community Webinar
M365 Records Management Community WebinarM365 Records Management Community Webinar
M365 Records Management Community Webinar
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 

More from David J Rosenthal

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made SimpleDavid J Rosenthal
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021David J Rosenthal
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021David J Rosenthal
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from MicrosoftDavid J Rosenthal
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftDavid J Rosenthal
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldDavid J Rosenthal
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the EnterpriseDavid J Rosenthal
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantDavid J Rosenthal
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureDavid J Rosenthal
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelDavid J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active DirectoryDavid J Rosenthal
 

More from David J Rosenthal (20)

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made Simple
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from Microsoft
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Microsoft 365 Compliance and Security Overview

  • 1. Intelligent compliance and risk management solutions
  • 2. What are your biggest challenges? Evolving regulations Discovering data Classifying and mapping data Insider risks Responding to audits and DSRs Securing data Preventing data leaks Influx of data Managing the data lifecycle Multiple point solutions Scaling workflows and processes
  • 3.
  • 4. Intelligent compliance and risk management solutions Simplify compliance and reduce risk Compliance Management Quickly investigate and respond with relevant data Discover & Respond Protect and govern data wherever it lives Information Protection & Governance Insider Risk Management Identify and take action on critical insider risks
  • 5. Information Protection & Governance Protect and govern data wherever it lives
  • 6.
  • 7. Discovering and managing data is challenging 88% of organizations no longer have confidence to detect and prevent loss of sensitive data¹ >80% of corporate data is “dark” – it’s not classified, protected or governed² #1 Protecting and governing sensitive data is biggest concern in complying with regulations3 1. Forrester. Security Concerns, Approaches and Technology Adoption. December 2018 2. IBM. Future of Cognitive Computing. November 2015 3. Microsoft GDPR research, 2017
  • 8. Information Protection & Governance Protect and govern data – wherever it lives 88% KNOW YOUR DATA 88% PROTECT YOUR DATA GOVERN YOUR DATA PREVENT DATA LOSS Understand your data landscape and identify important data across your hybrid environment Apply flexible protection actions including encryption, access restrictions and visual markings Automatically retain, delete, and store data and records in a compliant manner Powered by an intelligent platform Unified approach to automatic data classification, policy management, analytics and APIs Prevent accidental oversharing of sensitive information
  • 9. With Microsoft Information Protection, we better safeguard all files, whether they’re being accessed internally or sent externally. We can prevent unprotected files from being downloaded and viewed anywhere. We protect our IP without our security measures getting in the way of collaboration and innovation. Dave Vilwock Senior Manager of Application Development Komatsu
  • 10. Built-in Built-in labeling and protection experience in Office apps, Office 365 services, other MS services like Power BI, Edge, and Windows Intelligent Accuracy in classification via ML based trainable classifiers and exact data match Unified Single admin console to configure and manage your policies and view analytics across on-premises, Office apps, Microsoft 365 services, third-party party services (via MCAS) and devices Extensible MIP development platform extends the protection experience, in a consistent way, to popular non-Microsoft apps and services Microsoft Information Protection
  • 11. Automatically block messages which contain sensitive information Educate and guide end-users with notifications and “policy tips” Unified classification engine supporting 90+ sensitive information types and custom sensitive info type creation Data Loss Prevention for Microsoft Teams
  • 12. Microsoft Information Governance Intelligent and built-in data and records management In-place management Retain data and manage records where your users collaborate Automated policy Classify and govern data at scale with pattern recognition and trainable classifiers Ongoing data ingestion Manage chats, social, and collaboration data beyond Microsoft with high-fidelity import Enhanced defensibility Demonstrate compliance with proof of disposals, defensible disposition, and rich audit trails Automatically retain, delete, and store data and records in a compliant manner Information Governance Keep what you need and delete what you don’t Records Management Manage high value content and meet recordkeeping obligations
  • 13. Classify and govern data and records intelligently Manual Location SharePoint, OneDrive, Exchange, Teams, Skype, Yammer, Group Metadata and property E.g., Content type 5 OOTB + built your own Trainable classifiers E.g., resumes, contracts, those that are not easily found by pattern recognition 100+ OOTB + custom Sensitive information types E.g., financial, healthcare, privacy Keywords E.g., Project Foo Classify Doesitlooklike…Doesitcontain… Automated Policy Retention period E.g. 7 years retain + delete; 7 days delete Level of immutability Retention, record, or regulatory record labels Actions E.g., delete, disposition review Enforcement point E.g., when it was created, last modified, labeled, an event
  • 14. Insider Risk Management Identify and take action on critical insider risks
  • 15.
  • 16. Broad range of risks and violations from insiders Data spillage Confidentiality violations IP theft Workplace violence Fraud Policy violations Insider trading Conflicts of interest Sensitive data leaks Workplace harassment Security violations Regulatory compliance violations
  • 17. The Microsoft Insider Risk Management solution has helped us receive a 9.6 out 10 score from security audits. We can now intelligently evaluate relevant insider activities and set up actions to filter and report based on risk associated with the data stored and escalate to relevant parties. Chad Ergun Chief Information Officer DGS Law
  • 18. Insider Risk Management Identify and take action on critical insider risks Rich insights via tailored templates Machine learning correlates native and third-party signals to identify insider risks Privacy built-in Anonymity controls ensure data about risks is appropriately managed End-to-end investigations Integrated investigation workflows allow for collaboration across IT, HR, and legal
  • 19. Communication Compliance Quickly identify and remediate corporate code-of-conduct policy violations Intelligent customizable playbooks Leverage machine learning to detect violations across Teams, Exchange and third-party party content Flexible remediation workflows Remediation workflows to quickly act on violations Actionable insights Interactive dashboard with policy violations, actions, and trends
  • 20. Privileged Access Management Controlling privileged access by Microsoft service engineers and by your administrators The principle of zero standing access Just in time and just enough access Privileged workflow Logging and auditing
  • 21. Built in Encryption and Key Mgmt Meets rigorous industry standards Data is encrypted by default at-rest and in-transit Additional customer controls for added protection and control Option to manage and control your own encryption keys to help meet compliance needs OME/AIP TLS BitLocker Service Encryption
  • 22. Discover & Respond Quickly investigate and respond with relevant data
  • 23. Data is exploding GDPR OSHA CCPA Sarbanes- Oxley Act Federal Data Protection Law General Data Privacy Law PPA HIPAA PDPA Personal Information Security Specification PIPA US IRS Publication 583 EU Directive 2006/24/EC POPI Regulations are evolving Data Vendors Platforms Public Remote Private Cloud SaaS StructuredUnstructured Chat messages SMS Documents Corporate Emails Discovering and managing data is challenging
  • 24. Discovering data efficiently is top of mind for many organizations 24 74% orgs to shift some employees to remote work permanently 63% expect their company to conduct more investigations over the next three years 71% are considering leveraging technology and/or best practices to improve legal operations
  • 25. Risk Cost reduction Efficiency Logging and auditing from one place Export matter-relevant content Lower cost per custodian average Reduce collection activities Review relevant Microsoft 365 and non-Microsoft 365 content faster Do more, in-place eDiscovery in Microsoft 365 25
  • 26. Advanced eDiscovery Quickly find and respond with only the relevant information Custodian Management and Communications Preserve content by custodian, send hold notifications and track acknowledgements Deep crawling and indexing Deep processing (e.g., much higher size limits, non-Microsoft file types) to extract and index text and metadata Review and manage case data Manage static sets of documents within a case, that can be independently searched, analyzed, shared, and acted upon Cull your data intelligently with ML Near duplicate detection, email threading, themes, and ML models to identify potential high value content
  • 27. Advanced Audit Power fast and effective forensic and compliance investigations Access crucial events to investigations Preserve audit logs granularly by individual and event for up to a year High bandwidth access to data with ~2x the baseline
  • 29. Managing data and compliance risks is challenging 200+ updates per day from 1000 regulatory bodies >50% of organizations state that IT and cybersecurity risks are their biggest concern among all risks #1 identifying and assessing risks is the most time- consuming task in risk management 1. Cost of Compliance 2019, Thomson Reuters 2. Risk management market landscape web survey, Gartner, May 2019 (n=500, buyers and influencers of IRM solutions, 1000+ employees 3. Deloitte’s 2019 survey of risk management
  • 30. Shared responsibility model Customer management of risk Data classification and data accountability Shared management of risk Identity & access management | End point devices Provider management of risk Physical | Networking Cloud customer Cloud provider Responsibility On-Prem IaaS PaaS SaaS Data classification and accountability Client & end-point protection Identity & access management Application level controls Network controls Host infrastructure Physical security
  • 31. Examples of shared responsibilities: NIST 800-53 responsibility Organization responsibility Office 365 Access to production environment Set up access control policy and SOP, leveraging Customer Lockbox / identity management solutions Protect data Encrypt data based on org’s compliance obligations. E.g. encrypt PII in transit between users, using its own encryption key, etc. Personnel control Allocate and staff sufficient resources to operate an organization-wide privacy program, including awareness- raising and training Access to production environment Set up access controls that strictly limit standing access to customer’s data or production environment Protect data Encrypt data at rest and in transit based on industrial standards (BitLocker, TLS, etc.) Personnel control Strict screening for employees, vendors, and contractors, and conduct trainings through onboarding process
  • 32. Companies need tools and guidance Keeping up with new and frequently updated regulations is ongoing struggle Point-in-time assessments fail to identify risks between audits, a huge blindsight in a digital world Collaboration on risk and compliance management is inefficient and siloed Guidance is lacking to help with designing and implementing effective controls “I describe my role a lot of times like playing Whack-A-Mole at the county fair and I’m knocking down one mole’s head which is Sarbanes-Oxley and then PCI pops up, and I knock that one down, then something else pops up. So trying to keep everything going in the right direction and making sure something doesn’t pop up and come back to bite us is extremely challenging.” IT decision maker, hospitality industry
  • 33. Microsoft Compliance Score Simplify compliance and reduce risk Continuous assessments Detect and monitor control effectiveness automatically with a risk-based score Recommended actions Reduce compliance risks with actionable guidance Built-in control mapping Scale your compliance efforts with built-in mapping across regulations and standards Compliance Score is a dashboard that provides your Compliance Score and a summary of your data protection and compliance posture. It also includes recommendations to improve data protection and compliance. This is a recommendation, it is up to you to evaluate and validate the effectiveness of customer controls as per your regulatory environment. Recommendations from Compliance Manager and Compliance Score should not be interpreted as a guarantee of compliance.
  • 34. Consider a different approach Reduce number of solution vendors and leverage shared responsibility Know, protect and govern your sensitive data throughout its lifecycle Implement more intelligent, built-in compliance solutions
  • 35. Microsoft 365 Compliance Intelligent compliance and risk management solutions
  • 37. © 2020 Razor Technology, LLC www.razor-tech.com  David Rosenthal  VP & General Manager  Digital Business  @DavidJRosenthal  Slideshare  Blog: www.razor-tech.com 5 Tower Bridge 300 Barr Harbor Dr., Suite 705 West Conshohocken, PA 19428 www.razor-tech.com David.Rosenthal@razor-tech.com Office: 866.RZR.DATA LETS KEEP IN TOUCH