Its one thing encrypting and protecting your data from prying eyes but what use is it, if it is not retained or protected against loss. With Microsoft Information Protection, Microsoft provides organisations the ability to:
• Protection content from deletion
• Adhere to compliance standards (GDPR, HIPAA, etc)
• Discover content for litigation
• Manage access to content based on rules
By implementing the correct rules, organisations are able to mitigate risk and remain compliant and at the same time ensure that content is identified, classified, retained and disposed of accordingly.
This is Microsoft Azure Information Protection which helps you out to protect your data being accessible to the unauthorized users. This is an overview for the AIP
Microsoft Information Protection demystified Albert HoitinghAlbert Hoitingh
This session was presented at the North American Collaboration Summit 2022. It covers the many technical aspects of Microsoft Purview Information Protection.
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
Are you classifying your data in Microsoft 365? You can add data classifications using sensitivity and retention labels but they do two very different things. In this session I will break down what the label options are, how you can use them, and why you should deploy them in your organization to keep your content compliant and secure.
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
Are you protecting your data at rest and in transit?
In this session we will go through all the different types of DLP in Microsoft Purview including endpoint, Exchange, Teams, SharePoint, OneDrive, and more. We will discuss the configuration options, why it is important, and the best practices to get started while going through a collection of demos.
You will leave this sessions with a deeper understanding of the technology and how it can impact your employee's experience
This is Microsoft Azure Information Protection which helps you out to protect your data being accessible to the unauthorized users. This is an overview for the AIP
Microsoft Information Protection demystified Albert HoitinghAlbert Hoitingh
This session was presented at the North American Collaboration Summit 2022. It covers the many technical aspects of Microsoft Purview Information Protection.
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
Are you classifying your data in Microsoft 365? You can add data classifications using sensitivity and retention labels but they do two very different things. In this session I will break down what the label options are, how you can use them, and why you should deploy them in your organization to keep your content compliant and secure.
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
Are you protecting your data at rest and in transit?
In this session we will go through all the different types of DLP in Microsoft Purview including endpoint, Exchange, Teams, SharePoint, OneDrive, and more. We will discuss the configuration options, why it is important, and the best practices to get started while going through a collection of demos.
You will leave this sessions with a deeper understanding of the technology and how it can impact your employee's experience
We live in a time where digital technology is profoundly impacting our lives, from the way we connect with each other to how we interpret our world. First and foremost, this digital transformation is causing a tsunami of data. In fact, IDC estimates that in 2025, the world will create and replicate 163ZB of data, representing a tenfold increase from the amount of data created in 2016. In the past, organizations primarily dealt with documents and emails. But now they’re also dealing with instant messaging, text messaging, video files, images, and DIO files. The internet of things, or IOT, will only add to this explosion in data.
Managing this data overload and the variety of devices from which it is created is complicated and onerous as the market for solutions is fragmented and confusing. There are many categories of solutions, and within each, there are even more solutions to choose from. Many companies are struggling to decide how many of those solutions they need and where to start. Additionally, using multiple solutions means they won’t be integrated, so companies end up managing multiple applications from multiple disparate interfaces.
The question we often get asked is, “How can Microsoft 365 help me?”
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected.2
Overview of Data Loss Prevention Policies in Office 365Dock 365
Presentation about identifying, monitoring, and automatically protect sensitive information across Office 365.
With a DLP Policy, you can:
- Identify sensitive information across many locations, such as SharePoint Online and OneDrive for Business.
- Prevent the accidental sharing of sensitive information.
- Monitor and protect sensitive information in the desktop versions of Excel 2016, PowerPoint 2016, and Word 2016.
- Help users learn how to stay compliant without interrupting their workflow.
- View DLP reports showing content that matches your organization's DLP policies.
Visit www.mydock365.com to learn more about SharePoint with Dock.
Intelligent compliance and risk management solutions.
First, we understand ‘compliance’ can have different meanings to various teams across enterprise. Compliance is an outcome of continuous risk management, involving compliance, risk, legal, privacy, security, IT and often even HR and finance teams which requires integrated approach to manage risk.
Let's start with the base pillar Compliance Management: compliance management is all about simplify risk assessment and mitigation in more automated way, providing visibility and insights to help meet compliance requirements.
Information Protection and Governance: we believe there is a huge opportunity for Microsoft to help our customers to know their data better, protect and govern data throughout its lifecycle in heterogenous environment. This is often the key starting point for many of our customers in their modern compliance journey – knowing what sensitive data they have, putting flexible, end-user friendly policies for both security and compliance outcomes, using more automation and intelligence.
Internal Risk Management: Internal risks are often what keeps business leaders up at night – regardless of negligent or malicious, identifying and being able to take action on internal risks are critical. The ability to quickly identify and manage risks from insiders (employees or contractors with corporate access) and minimize the negative impact on corporate compliance, competitive business position and brand reputation is a priority for organizations worldwide.
Last but not least, Discover and Respond: being able to discover relevant data for internal investigations, litigation, or regulatory requests and respond to them efficiently, and doing so without having to use multiple solutions and moving data in and out of systems to increase risk – is critical.
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected
Understanding Security and Compliance in Microsoft Teams M365 North 2023Chirag Patel
Presented at M365 North on 16 May 2023.
Did you know there are about 25 key security and privacy features in Microsoft Teams to keep your organisation secure and compliant? We will cover what these features are as overview and deep dive with some of them so you can apply it to your Microsoft Teams environment.
Microsoft 365 provides holistic security across these four aspects of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Secure identities to reach zero trust
Threat Protection
Help stop damaging attacks with integrated and automated security
Information Protection
Protect sensitive information anywhere it lives
Security Management
Strengthen your security posture with insights and guidance
March 2023 CIAOPS Need to Know WebinarRobert Crane
Slides from CIAOPS March 2023 webinar that provided Microsoft 365 news update, open Q & A as well as a focus session on Microsoft 365 Information Protection best practices. Video recording is available at www.ciaopsacademy.com
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMDrew Madelung
As part of the M365 Virtual Marathon, this is a presentation that includes security options for securing your overall collaboration environment including data loss prevention, sharing, sensitivity labels and more.
Here's the slide deck from my session titled "Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps" which was presented on the Modern Workplace Conference Paris 2022 Virtual event.
IRMS UG Principles of Retention in Microsoft 365Joanne Klein
There's only 4 of them, but they're important. Really important.
This session will talk about why it's essential for Records Managers and Information Management teams to have an authoritative understanding of the principles. They inform the retention and deletion processes and actions which are the technical underpinning of your Information Governance/Records Management (IG/RM) implementation. This is what ultimately determines the retention and deletion actions taken on each piece of content.
Understanding the principles of retention is an important prerequisite to a holistic IG/RM design and implementation. It can help ensure you are deleting content when you no longer need/require it and retaining content for as long as you are required to meet your corporate governance requirements and your legal, business, and regulatory obligations.
In this webinar, we will walk-through Data Loss Prevention in Office 365. We will see how to create DLP policy with Labels as a condition. We will also go through Document fingerprint in Exchange Online DLP and DLP reports.
Identity— Help protect against identity compromise and identify potential breaches before they cause damage
Devices—Enhance device security while enabling mobile work and BYOD
Apps and Data—Boost productivity with cloud access while keeping information protected
Infrastructure—Take a new approach to security across your hybrid environment
Being more secure using Microsoft 365 BusinessRobert Crane
Microsoft 365 Business provides a range of services to make both data and devices more secure. This webinar will take you through the range of what these services are, the best practices way in which they should be configured and how you can extend security further with additional Microsoft solutions.
Microsoft Teams Governance and Security Best Practices - Joel OlesonJoel Oleson
In this session we will focus on the recommendations from the field - what we have learned in the trenches along with recommended best practices related to Teams management, provisioning, OneDrive and SharePoint sharing, as well as retention and sensitivity labelling strategies and common industry considerations for financial data, healthcare and legal holds.
Agenda:
We will walk through these key points:
1. Getting started with classifications, retention, and sensitivity.
2. Best practices in setting retention policy durations
3. Industry practices in setting archiving policies
4. When to use a suffix or prefix? Which is better?
5. Data backup and its importance with relevant policy settings
6. Best practices for auditing security and settings
7. Maximizing Teams Security
8. Best practices for global administration
9. Best practices for Teams administration
Register Now
I'm looking forward to seeing everyone on the webinar.
Joel Oleson
Microsoft MVP and Regional Director
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022Nikki Chapple
5 October 2022: CollabDays Bletchley Park 2022 - October edition | In-person event United Kingdom
Governance, Risk and Compliance and you – Microsoft Purview and beyond | Simon Hudson & Nikki Chapple
Governance, Risk and Compliance; it’s not nice to have, It’s The Law. Every organisation needs to pay attention to GRC, but not everyone has the tools, expertise or strategy. Microsoft Purview is a surprisingly capable tool in your organisation’s GRC tool bag when combined with a broad & competent approach. This session will provide: – an overview of GRC obligations and approaches – what’s in Purview – pragmatic approaches to elevating your Compliance Score – wider technical and business thinking for de-risking your operations and organisation – thoughts on using the Maturity Model for Microsoft 365 GRC Competency to set your objectives.
We are living a complete digital transformation where people are not restricted by apps or devices or even location. Work can be done anywhere and on any device which leads to greater security concerns regarding this business data living on mobile devices and shared with external (sometimes not trusted users). Microsoft Unified Labeling protection leverages the power of the cloud and ease of use (a few clicks for implementation) to provide a complete Information Protection solution. Now with the new unified Azure label client, users can administer the labels from one location while being integrated across the whole Microsoft platform. Attendees will learn how to configure Unified labels with real case scenarios.
June 2020 Microsoft 365 Need to Know WebinarRobert Crane
Slides from CIAOPS June webinar that provided Microsoft 365 news update, open Q & A as well as a focus session on information labels. Video recording is available at www.ciaopsacademy.com
We live in a time where digital technology is profoundly impacting our lives, from the way we connect with each other to how we interpret our world. First and foremost, this digital transformation is causing a tsunami of data. In fact, IDC estimates that in 2025, the world will create and replicate 163ZB of data, representing a tenfold increase from the amount of data created in 2016. In the past, organizations primarily dealt with documents and emails. But now they’re also dealing with instant messaging, text messaging, video files, images, and DIO files. The internet of things, or IOT, will only add to this explosion in data.
Managing this data overload and the variety of devices from which it is created is complicated and onerous as the market for solutions is fragmented and confusing. There are many categories of solutions, and within each, there are even more solutions to choose from. Many companies are struggling to decide how many of those solutions they need and where to start. Additionally, using multiple solutions means they won’t be integrated, so companies end up managing multiple applications from multiple disparate interfaces.
The question we often get asked is, “How can Microsoft 365 help me?”
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected.2
Overview of Data Loss Prevention Policies in Office 365Dock 365
Presentation about identifying, monitoring, and automatically protect sensitive information across Office 365.
With a DLP Policy, you can:
- Identify sensitive information across many locations, such as SharePoint Online and OneDrive for Business.
- Prevent the accidental sharing of sensitive information.
- Monitor and protect sensitive information in the desktop versions of Excel 2016, PowerPoint 2016, and Word 2016.
- Help users learn how to stay compliant without interrupting their workflow.
- View DLP reports showing content that matches your organization's DLP policies.
Visit www.mydock365.com to learn more about SharePoint with Dock.
Intelligent compliance and risk management solutions.
First, we understand ‘compliance’ can have different meanings to various teams across enterprise. Compliance is an outcome of continuous risk management, involving compliance, risk, legal, privacy, security, IT and often even HR and finance teams which requires integrated approach to manage risk.
Let's start with the base pillar Compliance Management: compliance management is all about simplify risk assessment and mitigation in more automated way, providing visibility and insights to help meet compliance requirements.
Information Protection and Governance: we believe there is a huge opportunity for Microsoft to help our customers to know their data better, protect and govern data throughout its lifecycle in heterogenous environment. This is often the key starting point for many of our customers in their modern compliance journey – knowing what sensitive data they have, putting flexible, end-user friendly policies for both security and compliance outcomes, using more automation and intelligence.
Internal Risk Management: Internal risks are often what keeps business leaders up at night – regardless of negligent or malicious, identifying and being able to take action on internal risks are critical. The ability to quickly identify and manage risks from insiders (employees or contractors with corporate access) and minimize the negative impact on corporate compliance, competitive business position and brand reputation is a priority for organizations worldwide.
Last but not least, Discover and Respond: being able to discover relevant data for internal investigations, litigation, or regulatory requests and respond to them efficiently, and doing so without having to use multiple solutions and moving data in and out of systems to increase risk – is critical.
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected
Understanding Security and Compliance in Microsoft Teams M365 North 2023Chirag Patel
Presented at M365 North on 16 May 2023.
Did you know there are about 25 key security and privacy features in Microsoft Teams to keep your organisation secure and compliant? We will cover what these features are as overview and deep dive with some of them so you can apply it to your Microsoft Teams environment.
Microsoft 365 provides holistic security across these four aspects of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Secure identities to reach zero trust
Threat Protection
Help stop damaging attacks with integrated and automated security
Information Protection
Protect sensitive information anywhere it lives
Security Management
Strengthen your security posture with insights and guidance
March 2023 CIAOPS Need to Know WebinarRobert Crane
Slides from CIAOPS March 2023 webinar that provided Microsoft 365 news update, open Q & A as well as a focus session on Microsoft 365 Information Protection best practices. Video recording is available at www.ciaopsacademy.com
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMDrew Madelung
As part of the M365 Virtual Marathon, this is a presentation that includes security options for securing your overall collaboration environment including data loss prevention, sharing, sensitivity labels and more.
Here's the slide deck from my session titled "Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps" which was presented on the Modern Workplace Conference Paris 2022 Virtual event.
IRMS UG Principles of Retention in Microsoft 365Joanne Klein
There's only 4 of them, but they're important. Really important.
This session will talk about why it's essential for Records Managers and Information Management teams to have an authoritative understanding of the principles. They inform the retention and deletion processes and actions which are the technical underpinning of your Information Governance/Records Management (IG/RM) implementation. This is what ultimately determines the retention and deletion actions taken on each piece of content.
Understanding the principles of retention is an important prerequisite to a holistic IG/RM design and implementation. It can help ensure you are deleting content when you no longer need/require it and retaining content for as long as you are required to meet your corporate governance requirements and your legal, business, and regulatory obligations.
In this webinar, we will walk-through Data Loss Prevention in Office 365. We will see how to create DLP policy with Labels as a condition. We will also go through Document fingerprint in Exchange Online DLP and DLP reports.
Identity— Help protect against identity compromise and identify potential breaches before they cause damage
Devices—Enhance device security while enabling mobile work and BYOD
Apps and Data—Boost productivity with cloud access while keeping information protected
Infrastructure—Take a new approach to security across your hybrid environment
Being more secure using Microsoft 365 BusinessRobert Crane
Microsoft 365 Business provides a range of services to make both data and devices more secure. This webinar will take you through the range of what these services are, the best practices way in which they should be configured and how you can extend security further with additional Microsoft solutions.
Microsoft Teams Governance and Security Best Practices - Joel OlesonJoel Oleson
In this session we will focus on the recommendations from the field - what we have learned in the trenches along with recommended best practices related to Teams management, provisioning, OneDrive and SharePoint sharing, as well as retention and sensitivity labelling strategies and common industry considerations for financial data, healthcare and legal holds.
Agenda:
We will walk through these key points:
1. Getting started with classifications, retention, and sensitivity.
2. Best practices in setting retention policy durations
3. Industry practices in setting archiving policies
4. When to use a suffix or prefix? Which is better?
5. Data backup and its importance with relevant policy settings
6. Best practices for auditing security and settings
7. Maximizing Teams Security
8. Best practices for global administration
9. Best practices for Teams administration
Register Now
I'm looking forward to seeing everyone on the webinar.
Joel Oleson
Microsoft MVP and Regional Director
Governance, Risk and Compliance and you | CollabDays Bletchley Park 2022Nikki Chapple
5 October 2022: CollabDays Bletchley Park 2022 - October edition | In-person event United Kingdom
Governance, Risk and Compliance and you – Microsoft Purview and beyond | Simon Hudson & Nikki Chapple
Governance, Risk and Compliance; it’s not nice to have, It’s The Law. Every organisation needs to pay attention to GRC, but not everyone has the tools, expertise or strategy. Microsoft Purview is a surprisingly capable tool in your organisation’s GRC tool bag when combined with a broad & competent approach. This session will provide: – an overview of GRC obligations and approaches – what’s in Purview – pragmatic approaches to elevating your Compliance Score – wider technical and business thinking for de-risking your operations and organisation – thoughts on using the Maturity Model for Microsoft 365 GRC Competency to set your objectives.
We are living a complete digital transformation where people are not restricted by apps or devices or even location. Work can be done anywhere and on any device which leads to greater security concerns regarding this business data living on mobile devices and shared with external (sometimes not trusted users). Microsoft Unified Labeling protection leverages the power of the cloud and ease of use (a few clicks for implementation) to provide a complete Information Protection solution. Now with the new unified Azure label client, users can administer the labels from one location while being integrated across the whole Microsoft platform. Attendees will learn how to configure Unified labels with real case scenarios.
June 2020 Microsoft 365 Need to Know WebinarRobert Crane
Slides from CIAOPS June webinar that provided Microsoft 365 news update, open Q & A as well as a focus session on information labels. Video recording is available at www.ciaopsacademy.com
Securing SharePoint & OneDrive in Office 365Drew Madelung
There are many options to securing your content in Office 365. In this session we will walk through the solutions, features, and strategies that you can take with you to ensure your content is safe. We will walk through Classifications, Data Loss Prevention, Sharing, Conditional Access, and how all of these work together.
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
Recently, Microsoft introduced Microsoft 365, which brings together Office 365, Windows 10, and Enterprise Mobility + Security. We’ll explore what this combination of products means for an organisation looking to ensure GDPR compliance and additional Office 365 products that you can layer to help you meet your obligations.
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore
Starting from May 25, 2018 all European businesses and all worldwide businesses that are trading partners of European businesses will have to adhere to the new General Data Protection Regulation (GDPR). In this session, learn what are the main requirements of GDPR, from an IT perspective, and what are the out-of-the-box capabilities of Microsoft Office 365 and of SharePoint Online that can help you to be compliant with the GDPR rules.
Moreover, see a sample project, based on SharePoint Online, that you can use as a starter kit to satisfy the GDPR basic requirements.
Paolo Pialorsi, Microsoft Certified Master in SharePoint, MVP and SharePoint PnP Core Team Member, joined us in this webinar to talk about how GDPR is affecting your Office 365.
Microsoft Teams in the Modern WorkplaceJoanne Klein
Joanne Klein delves into Microsoft Teams to give a glimpse of its features, its underlying architecture, and what’s in it for the modern worker and the data protection, data retention, and legal/compliance teams across your organization.
May 2018 Office 365 Need to Know WebinarRobert Crane
Slides from CIAOPS May 2018 webinar that provided Office 365 news update, open Q & A as well as a focus session on Office 365 Data Loss Prevention. Video recording is available at www.ciaopsacademy.com
Security and Compliance with SharePoint and Office 365Richard Harbridge
Whether you’re new to security and compliance in Office 365 or a seasoned veteran, we’ll have something for you in this session. Hear about Microsoft’s overall security story from Microsoft MVP Richard Harbridge, and better understand how it relates to SharePoint services, catch up on new developments over the past year, and learn about the new capabilities Microsoft provides. From advanced security management and threat intelligence to sensitive content encryption, governance and sharing there is plenty to discuss.
Melbourne Office 365 User Group - October 2014Michael Frank
What's New?
Starting this month, we will have a regular update from Aaron Dinnage (Microsoft) about the latest Office 365 news and features.
Office 365 Data Loss Prevention (DLP)
There have been some recent advances in DLP for Office 365, including the addition of DLP for SharePoint Online. We will cover how DLP can identify and protect sensitive information for organizations including demonstrations and some real-world applications for the technology.
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsDrew Madelung
How do you protect your confidential content from being exposed? Being able to secure your files and content across workloads is a necessity and the tools are available to you today in the Microsoft 365 Security admin center. Microsoft 365 Sensitivity Labels are the evolution of Azure Information Protection and more within the Microsoft Information Protection suite.
M365SA UG – WEDNESDAY 13th July 2022 – What's new in Microsoft 365 - 6 monthsAlistair Pugin
We've asked our resident MVP's to highlight what has excited them about feature updates over the last 6 months.
Its our half year and we would like to take a moment to recap what updates have dropped into Microsoft 365's service portfolio.
In this session we look at what's new with:
- Microsoft Teams
- SharePoint Online
- OneDrive for Business
- Hybrid Work Scenario's
- Securing Hybrid Work
By understanding the new features deployed over the last 6 month's, organization can plan their adoption roadmap more accurately as well as consultants, engineers and end users wanting to embrace the updates.
Top 10 use cases for Microsoft Purview.pptxAlistair Pugin
So what is Microsoft Purview really?
How is it supposed to help organisations with their overall Cloud Security Posture?
In this session, we cover:
- Data classification
- Data loss prevention
- Data lifecyle management
- Data privacy management
By approaching security from a compliance perspective, companies can manage governance and mitigate risk by using out of the box compliance solutions from Microsoft Purview
Top tips for successfully migrating from SharePoint and file servers to Micro...Alistair Pugin
Want to know how to get your legacy content into SharePoint, OneDrive and Teams.
In today’s EVERYTHING remote world, customers are forced to move everything online. However, these customers have only moved their collaboration estate to the cloud while struggling to identify what to do with the on-prem Enterprise Content Management and File Management solutions.
By identifying what can be moved, and to where it can be moved to, companies will be equipped with a roadmap for migrating their disparate content silos, in a uniformed manner, to the Microsoft 365 platform.
Effective Document Capture in SharePoint - SharePoint Saturday Cape Town - 22...Alistair Pugin
Many organizations’ processes are still driven by paper based documents which provides a plethora of caveat’s for missing and uncontrolled documents. Paper invariably gets misplaces and or discarded which creates and auditing and find ability nightmare. This session covers:
• What products are available for document capture
• How to configure a proper document process
• What options there are for image cleanup, data validation, data extraction
• How OCR assists with recognition and automation
Consultants will be able to articulate the needs of companies’ still utilizing paper based processes more effectively and efficiently through the use of intelligent capture solutions.
Office 365 - Disruption or Transformation
Microsoft has been polishing its Online Service offerings since the early 2000’s through its original Business Productivity Online Suite (BPOS) which has later become what we now know as Office 365.
It’s been a shaky road since 2010 but finally we are seeing remarkable technology come through Office 365 and into the hands of all users. By unpacking what is possible within the suite, companies are fence sitting as to whether it is Disruption or Transformation.
So, what do you think it is?
Let’s unload and explore the pro’s and con’s of what customers are experiencing and the strategic direction of Microsoft.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Microsoft Information Protection: Your Security and Compliance Framework
1. MICROSOFT 365
VirtualMARATHON
May 27 &28, 2020
36 hours/2 days
MICROSOFT 365 VIRTUAL MARATHON
MicrosoftInformationProtection: Your Security and ComplianceFramework
Alistair Pugin
Head of Cloud – Tangent Solutions
@alistairpugin
Broughttoyouby:
TheGlobalMicrosoftCommunity&
M365Conf.com|#M365CONF
#M365VM
M365VirtualMarathon.com
2. MICROSOFT 365
VirtualMARATHON
May 27 &28, 2020
36 hours/2 days
Mark Your Calendars:
March 23-25,2021,MGM Grand Resort
Las Vegas, Nevada, USA
M365Conf.com
#M365CONF
TheSharePointConferenceisnowTheMicrosoft365CollaborationConference
#M365VM
M365VirtualMarathon.com
Broughttoyouby:
TheGlobalMicrosoftCommunity&
M365Conf.com|#M365CONF
4. Visit the Vendors Booth, Sessions and Watch the Videos
Submit Your Answers to Enter the Raffle
You need at least 5 correct answers then submit for a chance to win one of 3
(One in each Americas, APAC, EMEA)
ARE YOU READY FOR A RAFFLE?
WE ARE GIVING AWAY 3 OCULUS QUEST ALL IN ONE!
https://bit.ly/m365raffle
5. CONSIDER DONATING TO THE FOLLOWING CHARITY RELIEF FUNDS:
UNITED WAY: HTTPS://GIVE.UWKC.ORG/M365VM
INTERNATIONAL MEDICAL CORPS: HTTPS://BIT.LY/MEDICALCORPSFUND
10%OFFUNDSFROMSPONSORSGOTOSUPPORTCOMMUNITYRELIEF.
FORMOREINFORMATIONWRITETOINFO@M365VIRTUALMARATHON.COM
7. IN THE PAST, THE FIREWALL
WAS THE SECURITY PERIMETER
devices datausers apps
On-premises /
Private cloud
8. Data is exploding across the digital estate
Energy
systems
Supply
chains
Citizens
Sensors
Cloud
Mobile
devices
On-premises
Partners
Customers
Manufacturers
Marketplaces
Equipment
Vehicles
Smart cities
11. MICROSOFT CLOUD APP SECURITY
Visibility into 15k+ cloud apps, data access & usage,
potential abuse
AZURE SECURITY CENTER INFORMATION PROTECTION
Classify & label sensitive structured data in Azure SQL, SQL
Server and other Azure repositories
OFFICE APPS
Protect sensitive information while working in Excel, Word,
PowerPoint, Outlook
AZURE INFORMATION PROTECTION
Classify, label & protect files – beyond Office 365, including
on-premises & hybrid
OFFICE 365 DATA LOSS PREVENTION
Prevent data loss across Exchange Online, SharePoint Online,
OneDrive for Business
SHAREPOINT & GROUPS
Protect files in libraries and lists
OFFICE 365 ADVANCED DATA GOVERNANCE
Apply retention and deletion policies to sensitive and
important data in Office 365
ADOBE PDFs
Natively view and protect PDFs on Adobe Acrobat Reader
WINDOWS INFORMATION PROTECTION
Separate personal vs. work data on Windows 10 devices,
prevent work data from traveling to non-work locations
OFFICE 365 MESSAGE ENCRYPTION
Send encrypted emails in Office 365 to anyone
inside or outside of the company
CONDITIONAL ACCESS
Control access to files based on policy, such as identity, machine
configuration, geo location
Discover | Classify | Protect | Monitor
SDK FOR PARTNER ECOSYSTEM & ISVs
Enable ISVs to consume labels, apply protection
14. Scan & detect sensitive
data based on policy
Classify and label data
based on sensitivity
Apply protection actions,
including encryption,
access restrictions
15. LabelDiscover Classify
Sensitivity Retention
Data growing at exponential rate
Encryption
Restrict Access
Watermark
Header/Footer
Retention
Deletion
Records Management
Archiving
Sensitive data discovery
Data at risk
Policy violations
Policy recommendations
Proactive alerts
Comprehensive policies to protect and govern your
most important data – throughout its lifecycle
Unified approach to discover, classify & label
Automatically apply policy-based actions
Proactive monitoring to identify risks
Broad coverage across locations
Apply label
Unified approach
Monitor
16. Customizable
Persists as container
metadata or file metadata
Readable by other systems
Determines DLP policy
based on labels
Extensible to partner solutions
Manual or Automated Labels
Apply to content or
containers
Label data at rest, data in use,
or data in transit
Enable protection actions
based on labels
Seamless end user experience
across productivity applications
CONFIDENTIAL
22. Classify and label
data in on-prem
repositories
Label and protect
Office files natively
across Windows,
Mac, iOS, Android
and Web Clients
Label and protect
sensitive SharePoint
Sites, Teams, Office
365 Groups, PowerBI
artifacts
Automatically label
and protect sensitive
files in SharePoint
Online and OneDrive
for Business
Extend protection
through Microsoft
Cloud App Security
to third party clouds
and SaaS apps
Automatically label
and protect sensitive
emails in Exchange
Online
Unified Label Management in Microsoft 365 Compliance center
On-prem SharePoint
Online
Non-Microsoft
Clouds and
SaaS apps
Exchange
Online
SharePoint Sites
Teams, Office 365
Groups
Office Apps
Across
Platforms
23. • Think about data as an important layer of an overall protection strategy.
• Be clear on how you are protecting your content vs. containers.
• Create policies considering each layers part in acting as sensors, gates or both.
• Enforce policy in places where protection matters; think ingress and egress points
ServiceDeviceIdentity Network
DataUser
25. Balance data security and productivity
Enforce conditional access to sensitive data
DLP actions to block sharing
Encrypt files and emails based on sensitivity label
Prevent data leakage through DLP policies based on
sensitivity label
Business data separation on devices
Secure email with encryption & permissions
Manually apply sensitivity label consistently across apps
applications and endpoints
Show recommendations and tooltips for sensitivity labels with
auto-labeling and DLP
Visual markings to indicate sensitive documents across apps and
services (e.g. watermark, lock icons, sensitivity column in SPO)
Co-author and collaborate with sensitive documents
Enable searching of encrypted files in SharePoint
Allow users to open and share encrypted pdf files in Edge in
addition to Adobe Acrobat Reader
27. Integrated tools leveraging intelligence to reduce risk
Simplify assessment of
compliance risk and posture with
actionable insights
Integrated protection and
governance of sensitive data across
devices, apps and cloud services
Intelligently respond to data
discovery requests by leveraging
AI to find the most relevant data
Compliance Manager
Service Trust Portal
Information
Protection &
Governance
Encryption
Search &
Discovery
Auditing
Access Control
28. Microsoft Compliance Score
Continuous assessments
Detect and monitor control effectiveness
automatically with a risk-based score
Recommended actions
Reduce compliance risks with actionable
guidance
Built-in control mapping
Scale your compliance efforts with built-in
mapping across regulations and standards
Simplify compliance and reduce risk
Compliance Score is a dashboard that provides your Compliance Score and a summary of
your data protection and compliance posture. It also includes recommendations to improve
data protection and compliance. This is a recommendation, it is up to you to evaluate and
validate the effectiveness of customer controls as per your regulatory environment.
Recommendations from Compliance Manager and Compliance Score should not be
interpreted as a guarantee of compliance.
32. Data Subject Requests
Data Privacy tab within the Compliance Center
GDPR dashboard with GDPR toolbox, guidance and quick
access to top tasks
Data Subject Requests portal to manage DSRs for Office
365 content
Create your Data Subject Request
Search across Office 365 content
Refine your search with labels, keywords and other conditions
Review and export the content of your search
34. Scan & detect sensitive
data based on policy
Classify and label data
based on sensitivity
Apply protection actions,
including encryption,
access restrictions
35. WHERE WE WERE
• Collect data out of Office 365
and export to 3rd party tools
Search
& export
WHERE WE ARE NOW
• Single eDiscovery process across
Office 365 and non-Office 365
• Minimize the data you export
out of Office 365
Advanced
eDiscovery:
Analytics,
search &
tagging
WHERE WE’LL BE IN Q1 CY 2019
• Custodian management
• Document review and redact
• Enhanced search
• Enhanced processing
• Early intelligence
Solutions
for ECA &
investigations
36. Reduce risk with archiving and holds
on data in place
Reduce cost with advanced analytics
Review and annotate prior to export
Solutions beyond litigation, including
DSRs, Investigations and more
Search Across Locations
Other 1st Party
apps, …
SharePoint Online,
OneDrive for
Business, Teams,
Groups, etc.
Exchange Online
Non-Office 365 Data
File shares, sites and other apps
37. Deep crawling and indexing
Deep processing (e.g. much higher size limits, file types, …)
to extract and index text & metadata
Pre-collection analytics
Scope content to be collected within a case, and tune
queries to minimize collection volumes
Collection into document working sets
Manage static sets of documents within a case, that can be
independently searched, analyzed, shared, and acted upon.
Support additional Office 365 workloads &
content types
First class support for Teams, Yammer, Planner, Forms,
Stream, …
Defensible process
Static working sets, transparency (e.g. error reporting, item
level auditing, …) and additional controls (e.g. error
remediation, …)
38. Custodian notifications
Manage legally required workflows around
notifications to custodians and their
acknowledgments
Manage custodians and legal holds
Add and remove custodians into a case, and apply
legal holds to their data in-place if needed
Custodian intelligence
Identify shared data e.g. SharePoint sites / Teams
that custodians had access to or were active on.
Identify likely custodians based on AD criteria.
39. Organize and minimize
Use near duplicate detection to organize the data
and email threading to reconstruct email
conversations from unstructured data
Increase productivity
Use predictive coding to train the system to find
likely relevant documents and reduce what’s sent
to review
Recognize
Use Themes to understand the topics represented
in the data set
ML based content classification
Let the system identify potential high value content
such as attorney client privilege or offensive
language
40. Native, near-native and text viewer
Built in document viewers for Microsoft & Non-
Microsoft file types, viewing options so users can fully
understand a document, and easy navigation for
search hits within a document
Annotations and redactions
Manual annotations and redactions, with automated
redactions for sensitive content
Document level insights
Information panels e.g. Duplicates & Near-duplicates,
Email threads & family, Conceptually similar, History,
‘Who Knows This’, Metadata & properties, … etc.
Document coding, screening & approvals
Tag documents with issue coding, automated privilege
screening, and multi-level approval workflows, …
42. Scan & detect sensitive
data based on policy
Classify and label data
based on sensitivity
Apply protection actions,
including encryption,
access restrictions
49. Top 5 benefits
of adopting
Microsoft
Information
Protection
Existing AIP customers
should move their labels
and policies to M365
Compliance center. Here
are the top 5 benefits of
adopting MIP
Classify and label documents manually and automatically
in Web apps (Word, Excel, PowerPoint) and Outlook for
web access.
Co-author and search label and protected documents on
the Web
Start using labels across Microsoft Teams, SPO sites,
Groups and PowerBI
Leverage the new know your data tools – unified analytics,
content and activity explorer
Build your own trainable classifiers with machine learning
and use it to protect content with sensitivity labels.
01
02
03
04
05
50. New Microsoft 365 Specialized Workspaces
security.microsoft.com compliance.microsoft.com
51. Resources
Learn more about Azure Information Protection
Intro to Microsoft Cloud App Security (video)
Overview of Office 365 Data Loss Prevention (DLP)
Protect your enterprise data using Windows Information
Protection
Blog: Information protection capabilities in preview
Blog: Consistent labeling and protection in Office 365 and Azure
Information Protection
Blog: Information Protection SDK Preview
Blog: New GDPR sensitive information types
Blog: Office 365 Message Encryption updates
52.
53. MICROSOFT 365
VirtualMARATHON
May 27 &28, 2020
36 hours/2 days
THANK YOU FOR JOINING US!
DO YOU HAVE ANY QUESTIONS?
Speaker feedback
https://bit.ly/M365VMSpeakerFeedback
Eventfeedback
https://bit.ly/M365VMFeedback
Editor's Notes
This is the world that many of our customers are moving to in their digital transformation. And when it comes to being compliant in the intelligent cloud, intelligent edge era, we really have to consider what is our digital estate? How do we think about where our most sensitive data is? How do we protect it? How do we find what’s most relevant? This is a little bit different now than it was 5 or 10 years ago. IT organizations now find themselves responsible for finding and protecting data across a wide spectrum of devices and environments. For example, user-owned mobile devices that access corporate data. It also includes systems and devices that your partners and customers use to access your information. And any one of these situations can be a point of compliance risk for your overall estate. That changes the game when it comes to compliance: You can no longer draw perimeters around your organization. This is the challenge that we all struggle with in compliance. And it's a challenge we at Microsoft think that we can uniquely fix.
11
EMS Overview
15
18
This slide is a combination of a framework on thinking about this + some practical advice. You apply this framework when thinking through how to apply policy to each label as part of your overall protection strategy.
For example -
- The data I am wanting to protect may reside in OneDrive. So there is 1 container. If I am using the sync client it may also exist in the device as 2nd container. You can decide to apply a sensor on the device that flags what type of labeled content exists on it. You may also enforce it to remain work content. In the OneDrive container you may also decide you don’t want certain types of content uploaded there. You can create that gate through DLP policy against the service.
If container protections aren’t enough for that content type. Think about automatic encryption of the content with certain labels.
Egress points are a great place to leverage label policies.
Once data is understood, labeled and classified, the benefits unlocked can improve security and compliance outcomes.
Services - Block or remove emails and attachments with sensitive labels (egress point)
Exchange transport rules for Exchange Online mailboxes
MCAS Content Inspection for AIP protected files stored in SPO or OneDrive
Office Message Encryption with EXO
Devices - Encrypt files with sensitivity labels (egress point)
MDATP on Windows 10 endpoints, apply Protection Policy based on documents tagged with sensitivity label
Intelligence - Auto-Classify content based on sensitivity
SCC ML Classifier model delivered through compliance solutions (such as auto-classification and DLP)
Apply policy and enforcement across all major egress points
Microsoft 365 is uniquely positioned to help you meet your compliance obligations. Our vision is centered around the idea of “built-in” compliance, providing integrated, intelligent tools for our customers to reduce risks. Our capabilities allow you to better assess your risk, govern and protect sensitive and business critical data, and respond to regulatory requests with intelligence and efficiency. Let’s dive into these areas and discuss the various capabilities we have in more detail.
New Data Subject Request management within Office 365 Security & Compliance Center
Key Messages: Find the information you need when you need it effectively and efficiently.
With more and more information stored in the cloud, ability to drill into, discover, reason over and respond to requests for that data are more important than ever.
Microsoft 365 provides a unique approach to address your discovery needs. Microsoft 365 provides provide rich built-in, suite wide search and discovery tools to reduce your risk and exposure of multiple copies of data in multiple places.
Identify custodians or shared locations, search based on conditions and keywords, and refine content with advanced analytics to de-duplicate, reduce threads and further minimize the responsive data set.
With a new update to Advanced eDiscovery, you can now review and redact content prior to export to ensure that only most relevant data is being shared, and that any business confidential pieces of that data are redacted in advance of any response.
This toolset can help reduce the costs of eDiscovery in your organization significantly. In fact, at Microsoft, while average data per custodian has grown 20x, the cost per custodian of eDiscovery has been reduced 85% with the use of the built-in capabilities.
And these tools are not only relevant to litigation but to a host of other scenarios as well including components of GDPR such as Data Subject Requests, investigations and internal policies, early case assessments and others.
Key capabilities of our solution to mention if appropriate:
Granular permissions
Case management
Put custodial and shared locations on hold and send communications to custodians (Coming soon)
Tenant wide Search
Refine with conditions and advanced analytics (Equivio capabilities)
Search & tag case documents for follow up
Export prepared load file
Key Messages: