Microsoft Information Protection demystified Albert HoitinghAlbert Hoitingh
This session was presented at the North American Collaboration Summit 2022. It covers the many technical aspects of Microsoft Purview Information Protection.
Understanding Security and Compliance in Microsoft Teams M365 North 2023Chirag Patel
Presented at M365 North on 16 May 2023.
Did you know there are about 25 key security and privacy features in Microsoft Teams to keep your organisation secure and compliant? We will cover what these features are as overview and deep dive with some of them so you can apply it to your Microsoft Teams environment.
March 2023 CIAOPS Need to Know WebinarRobert Crane
Slides from CIAOPS March 2023 webinar that provided Microsoft 365 news update, open Q & A as well as a focus session on Microsoft 365 Information Protection best practices. Video recording is available at www.ciaopsacademy.com
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...Jasper Oosterveld
Although Microsoft Teams is an incredibly powerful solution, it comes with a challenge around data security. The data generated and stored within Microsoft Teams is unfragmented and different in nature. Varying from chat & channel messages, documents, images, recordings, and meetings. Combining this with the ever-changing regulations, organizations have a serious compliance risk on their hands. Microsoft understands these risks and with the help of Microsoft Purview offers comprehensive solutions to help protect and govern your sensitive data.
Microsoft Information Protection demystified Albert HoitinghAlbert Hoitingh
This session was presented at the North American Collaboration Summit 2022. It covers the many technical aspects of Microsoft Purview Information Protection.
Understanding Security and Compliance in Microsoft Teams M365 North 2023Chirag Patel
Presented at M365 North on 16 May 2023.
Did you know there are about 25 key security and privacy features in Microsoft Teams to keep your organisation secure and compliant? We will cover what these features are as overview and deep dive with some of them so you can apply it to your Microsoft Teams environment.
March 2023 CIAOPS Need to Know WebinarRobert Crane
Slides from CIAOPS March 2023 webinar that provided Microsoft 365 news update, open Q & A as well as a focus session on Microsoft 365 Information Protection best practices. Video recording is available at www.ciaopsacademy.com
CollabDays NL 2023 - Protect and govern your sensitive data with Microsoft Pu...Jasper Oosterveld
Although Microsoft Teams is an incredibly powerful solution, it comes with a challenge around data security. The data generated and stored within Microsoft Teams is unfragmented and different in nature. Varying from chat & channel messages, documents, images, recordings, and meetings. Combining this with the ever-changing regulations, organizations have a serious compliance risk on their hands. Microsoft understands these risks and with the help of Microsoft Purview offers comprehensive solutions to help protect and govern your sensitive data.
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
Its one thing encrypting and protecting your data from prying eyes but what use is it, if it is not retained or protected against loss. With Microsoft Information Protection, Microsoft provides organisations the ability to:
• Protection content from deletion
• Adhere to compliance standards (GDPR, HIPAA, etc)
• Discover content for litigation
• Manage access to content based on rules
By implementing the correct rules, organisations are able to mitigate risk and remain compliant and at the same time ensure that content is identified, classified, retained and disposed of accordingly.
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
Are you classifying your data in Microsoft 365? You can add data classifications using sensitivity and retention labels but they do two very different things. In this session I will break down what the label options are, how you can use them, and why you should deploy them in your organization to keep your content compliant and secure.
Microsoft Purview Information Barriers and Communication Compliance and Micro...Albert Hoitingh
In this session for the European Collaboration Summit 2023, I talked about two insider risk prevention components: information barriers and communication compliance.
Microsoft 365 provides holistic security across these four aspects of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Secure identities to reach zero trust
Threat Protection
Help stop damaging attacks with integrated and automated security
Information Protection
Protect sensitive information anywhere it lives
Security Management
Strengthen your security posture with insights and guidance
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected.2
Recording of monthly Need to Know webinar for May 2023 that focused on providing a deep dive into Exchange Online Protection. The session also includes Microsoft Cloud news and updates along with an open Q and A session around Microsoft 365. Video recording is available at www.ciaopsacademy.com
Here's the slide deck from my session titled "Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps" which was presented on the Modern Workplace Conference Paris 2022 Virtual event.
This Deck, gives you an overview of the zero trust security posture, considerations you should have while looking to adopt that posture, and the advantages of doing so.
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
Are you protecting your data at rest and in transit?
In this session we will go through all the different types of DLP in Microsoft Purview including endpoint, Exchange, Teams, SharePoint, OneDrive, and more. We will discuss the configuration options, why it is important, and the best practices to get started while going through a collection of demos.
You will leave this sessions with a deeper understanding of the technology and how it can impact your employee's experience
Securing sensitive data with Azure Key VaultTom Kerkhove
As a developer you often have to use & store a lot of sensitive data going from service credentials to connection strings or even encryption keys. But how do I store these in a secure way? How do I know who has access to them and how do I prevent people from copying them and abusing them? On the other hand, SaaS customers have no clue how you store their sensitive data and how they use it. How can they monitor that? How can they revoke your access easily?
Watch the recording here - http://azug.be/2015-05-05---securing-sensitive-data-with-azure-key-vault
Teams Day Online V - Information Barriers - Communication Compliance and Micr...Albert Hoitingh
In this session you will learn about more complex Microsoft 365 (E5) compliance functionality - information barriers (Chinese Walls) and communications compliance.
In this session we will go through the new Microsoft Teams Shared Channel functionality from start to finish. We will discuss the configuration of it, how it works, how it differs from the previous guest experience, and why it is a better experience for the employee experience.
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
Its one thing encrypting and protecting your data from prying eyes but what use is it, if it is not retained or protected against loss. With Microsoft Information Protection, Microsoft provides organisations the ability to:
• Protection content from deletion
• Adhere to compliance standards (GDPR, HIPAA, etc)
• Discover content for litigation
• Manage access to content based on rules
By implementing the correct rules, organisations are able to mitigate risk and remain compliant and at the same time ensure that content is identified, classified, retained and disposed of accordingly.
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
Are you classifying your data in Microsoft 365? You can add data classifications using sensitivity and retention labels but they do two very different things. In this session I will break down what the label options are, how you can use them, and why you should deploy them in your organization to keep your content compliant and secure.
Microsoft Purview Information Barriers and Communication Compliance and Micro...Albert Hoitingh
In this session for the European Collaboration Summit 2023, I talked about two insider risk prevention components: information barriers and communication compliance.
Microsoft 365 provides holistic security across these four aspects of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Secure identities to reach zero trust
Threat Protection
Help stop damaging attacks with integrated and automated security
Information Protection
Protect sensitive information anywhere it lives
Security Management
Strengthen your security posture with insights and guidance
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected.2
Recording of monthly Need to Know webinar for May 2023 that focused on providing a deep dive into Exchange Online Protection. The session also includes Microsoft Cloud news and updates along with an open Q and A session around Microsoft 365. Video recording is available at www.ciaopsacademy.com
Here's the slide deck from my session titled "Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps" which was presented on the Modern Workplace Conference Paris 2022 Virtual event.
This Deck, gives you an overview of the zero trust security posture, considerations you should have while looking to adopt that posture, and the advantages of doing so.
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
Are you protecting your data at rest and in transit?
In this session we will go through all the different types of DLP in Microsoft Purview including endpoint, Exchange, Teams, SharePoint, OneDrive, and more. We will discuss the configuration options, why it is important, and the best practices to get started while going through a collection of demos.
You will leave this sessions with a deeper understanding of the technology and how it can impact your employee's experience
Securing sensitive data with Azure Key VaultTom Kerkhove
As a developer you often have to use & store a lot of sensitive data going from service credentials to connection strings or even encryption keys. But how do I store these in a secure way? How do I know who has access to them and how do I prevent people from copying them and abusing them? On the other hand, SaaS customers have no clue how you store their sensitive data and how they use it. How can they monitor that? How can they revoke your access easily?
Watch the recording here - http://azug.be/2015-05-05---securing-sensitive-data-with-azure-key-vault
Teams Day Online V - Information Barriers - Communication Compliance and Micr...Albert Hoitingh
In this session you will learn about more complex Microsoft 365 (E5) compliance functionality - information barriers (Chinese Walls) and communications compliance.
In this session we will go through the new Microsoft Teams Shared Channel functionality from start to finish. We will discuss the configuration of it, how it works, how it differs from the previous guest experience, and why it is a better experience for the employee experience.
ECS 2023 - Setup and implement a successful Microsoft Teams governance strate...Jasper Oosterveld
Microsoft Teams enables organizations to stay connected and access shared content at any time to learn, plan, and innovate—together. To guarantee a successful rollout and adoption of your Microsoft Teams implementation, it is crucial to set up and implement a Governance strategy. Jasper Oosterveld, Microsoft MVP & Modern Workplace Consultant, has vast experience with the implementation of Microsoft Teams governance strategies. During this session, he is going to share his hands-on approach, so after this session, you are ready to set up and implement your successful governance strategy for Microsoft Teams.
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMDrew Madelung
As part of the M365 Virtual Marathon, this is a presentation that includes security options for securing your overall collaboration environment including data loss prevention, sharing, sensitivity labels and more.
Microsoft Viva governance and compliance implications | Viva Explorers Commun...Nikki Chapple
12 November: Viva Explorers Community Day | In-person: Manchester United Kingdom
Microsoft Viva governance and compliance implications
This session demystifies security & compliance in Microsoft Viva to help you understand the following:
- What are the Viva modules
- How Microsoft ensures security & compliance in Microsoft Viva
- Why governance is essential
- Why employee adoption & sponsor communications are critical
Making a real world sharing strategy for SharePoint, OneDrive & TeamsDrew Madelung
The world of sharing has changed, and our enterprise strategies need to adapt to them. There are many ways that your users are sharing files throughout Office 365 whether you know about them or not.
In this session we will walk you through the technical options you have to configure internal and external sharing and how to establish a sharing strategy that aligns to your business processes that you can take back with you!
Viva Security and Privacy CollabDays Bletchley Sept 23.pdfNikki Chapple
Session presented at CollabDays Bletchley September 2023.
Microsoft Viva is a platform that empowers employees to thrive in the digital workplace. It integrates tools for engagement, well-being, learning, knowledge, and analytics within Microsoft Teams.
But how secure and private is Microsoft Viva?
How does Microsoft protect your data and comply with regulations?
In this session, you will learn the answers to these questions and more. You will discover how Microsoft Viva safeguards your data and respects your privacy and how you can leverage its features with confidence
SPS London 2019 Enabling External Sharing in Office 365, SharePoint and OneDriveChirag Patel
By default, Office 365 is turned for external sharing. However, without any planning and considerations some organisations turn this off and plan for later, but businesses can't wait after all collaboration is internal and external! There are plethora of settings and services to allow external sharing to your customers, partners and suppliers. With recent improvements in external sharing, this demo based session will cover the ins and outs for successful implementation of external sharing in Office 365.
Demystifying security and compliance in Viva | European Collaboration Summit ...Nikki Chapple
22-24 May 2023: European Collaboration Summit | In-person: Dusseldorf, Germany
Demystifying security and compliance in Viva
Microsoft Viva is an employee experience platform that combines tools to support employee engagement and well-being, learning and knowledge management, and experience analytics, all delivered through Microsoft Teams. Some organizations are reluctant to deploy Microsoft Viva as they are concerned about data privacy, complianceMicrosoft Viva is an employee experience platform that combines tools to support employee engagement and well-being, learning and knowledge management, and experience analytics, all delivered through Microsoft Teams., and security. This session demystifies security & compliance in Microsoft Viva to help you understand the following: - What are the Viva modules - How Microsoft ensures security and compliance in Microsoft Viva, - Why governance and employee adoption are critical
Understanding Security and Compliance in Microsoft Teams - Scottish Summit 2022Chirag Patel
Session presented at Glasgow, Scottish Summit event.
Did you know there are about 25 key security and privacy features in Microsoft Teams to keep your organisation secure and compliant? We will cover what these features are as overview and deep dive with some of them so you can apply it to your Microsoft Teams environment.
Commsverse 2023 Demystifying security and privacy in Viva | Commverse 2023Nikki Chapple
21-22 June 2023: Commsverse | In-person: Mercedes-Benz World, UK
Demystifying security & compliance in Microsoft Viva
Microsoft Viva is an employee experience platform that combines tools to support employee engagement and well-being, learning and knowledge management, and experience analytics, all delivered through Microsoft Teams.
Some organizations are reluctant to deploy Microsoft Viva due to data privacy, compliance, and security concerns.
This session demystifies Microsoft Viva to help you understand:
- How Microsoft ensures security and compliance across the different Microsoft Viva modules
- What roles are needed to manage the Viva modules
- What end user and IT controls are available
- Why communication is key
Everything you ever wanted to know about external sharing in Microsoft 365 - ...Chirag Patel
Delivered conference sessions at Microsoft 365 Friday California and at Collabdays Birmingham.
By default, Microsoft 365 is turned for external sharing. We will explore how you can plan to control for enabling and managing external sharing effectively. We will configure variety of settings and services to allow external sharing for your staff and your customers, partners and suppliers. With recent improvements in external sharing, this demo based session will cover the ins and outs for successful implementation of external sharing in Microsoft 365.
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...Toni Frankola
The number of services end-users have under their fingertips in Office 365 has been dramatically growing, and there are just a minimum number of hurdles stopping end-users to go completely wild with all these options.
This means the amount of digital data that is being stored in Office 365 and company processes that touch Office 365, has been ever-increasing and organizations and IT professionals are struggling to keep up to govern the data.
In this session, we are going to dig deep in order to discuss best practices for governing such a system, what are some of the typical use cases and scenarios and typical pitfalls with governance. We are going to review what kind of reports and tools are available at our disposal as part of the built-in Office 365 offering, and when to use the programmable approach to automate governance.
Teams Governance - SharePoint Saturday Calgary 2019Morio Kumagawa
Teams has quickly become the faster growing App in Microsoft History. But like any other new toy, there are many pit falls to avoid.
In this session we will look at the key areas of Teams you need to be aware of and how to control it. Allowing you leverage Teams, while keeping your data secure
During the 24th of October CollabDays BeNeLux, I did a session on the current and new functions for Information Protection. Including endpoint DLP. These are the slides for this session.
Microsoft Teams is the fastest-growing product in Microsoft history, providing a powerful platform for collaboration and communication. However, because Teams was built on the backs of two leading workloads: SharePoint and Exchange, managing the security, compliance, and governance of Teams comes with some additional complexity. In this session, Christian walks through 10 essentials for effective Teams governance to help you 'know where to go' to meet your organizational requirements.
Similar to NACS 2022 - Information Barriers and Communication Compliance and Microsoft Teams.pptx (20)
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Meetup DIWUG Januari 2024 - Data Loss PreventionAlbert Hoitingh
This presentation was used during the meetup of the Dutch Information Worker User Group (DIwug) on Januari 2024. It covers all aspects of Microsoft Purview Data Loss Prevention, including endpoint DLP.
Scottish Summit 2022 - Microsoft Information Protection de-mystifiedAlbert Hoitingh
In this session for the 2022 edition of the Scottish Summit in Glasgow, I presented on Microsoft Information Protection. Subjects included the different clients, auto-classification, email protection and customization options using PowerShell
Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...Albert Hoitingh
In this session, I went into any nook and cranny regarding Microsoft Information Protection. Labels, auto-classification, and PowerShell - all were part of this session.
Microsoft 365 Chicago - eDiscovery and Microsoft TeamsAlbert Hoitingh
In this session, the concepts of eDiscovery in Microsoft 365 are discussed, as well as the architecture for Microsoft Teams. We will look at how these work and don't work together.
During this session for Teams Day Online 2021 I explained the concepts of eDiscovery and showed how information from Microsoft Teams can be discovered using core and advanced eDiscovery.
Microsoft 365 Security & Compliance User Group - Microsoft Teams compliance Albert Hoitingh
In this session I discussed the storage locations for the Microsoft Teams components and how to use eDiscovery to get there. I also discussed information protection and information compliance.
Microsoft 365 UK Usergroup 2020 Sensitivity labelsAlbert Hoitingh
In this session I talked about and demo-ed new Microsoft Information Protection features as announced during Ignite 2019. Auto-classification for data at rest, Office Online integration, trainable classifiers and more.
Scottish Summit - Azure Information Protection and SharePoint 2020Albert Hoitingh
Azure Information Protection is Microsoft's solution for classifying and protecting documents, regardless of their location. As many documents are stored in SharePoint (either on-premise or Online), many organisations want to label and protect these as-well.
In order to use Azure Information Protection with SharePoint on-premise we will need the Azure Information Protection scanner. For SharePoint Online we need Cloud App Security. In this session, Albert will describe Azure Information Protection and show how the scanner and Cloud App Security allow you to label (and protect) documents. Preview functionalitity from Ignite 2019 is also part of the session.
Office 365 and SharePoint Connect 2019 - Dispose with careAlbert Hoitingh
This is the presentation used for Office 365 and SharePoint Connect 2019 in Haarlem. In this session, I explained the record management options in Office 365 - including labels, fileplans, disposition workflows and more. The presentation ends with an overview of things to consider when implementing these options.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
4. Session Objectives
During this session we will:
Look at Microsoft Purview portfolio
Licensing & requirements
Use cases for information barriers & communications compliance
See how both options work
See how to configure both options
5. Microsoft Purview portfolio
Prevent Insider Risks
Insider risk management
Communication compliance
Information barriers
Privileged access management
Customer Lockbox
Compliance management
Compliance Score
Compliance Manager
Build-in templates
Insights and auditing
Search
Core eDiscovery | Advanced eDiscovery
Microsoft Defender for Cloud Apps
Auditing
Privacy Management Dashboard
Information protection
Sensitivity labels & encryption (mails, documents,
sites, groups, PowerBI, data)
Double key encryption
Office 365 message encryption
Information governance
Data classification | Machine Learning
Sensitive Information Types
Records management & disposition
Archive 3rd party information
Metadata
Prevent data loss
Data loss prevention
Endpoint data loss prevention
On-premises data loss prevention
Non-Microsoft cloud apps
6. Licensing
Office 365 E5 | Microsoft 365 E5
M365 E3 + E5 Compliance
M365 E3 + E5 Insider Risk Management
Only users in the relevant segments
or users monitored
https://bit.ly/3Bmog7e (pdf)
8. Use cases for Communication Compliance
Corporate policies
• Acceptable use, ethical standards, other corporate policies
• Detect policy matches
• Examples: harassment, offensive language
Risk management
• Conflict of interest
• Unauthorized communications
Regulatory compliance
• Supervisory or oversight processes
• Dutch Central Bank (DNB regulations), Financial Industry
Regulatory Authority (FINRA)
9. Locations
Microsoft Teams
• Chat communications in channels
• Individual chats
Other
• All mailboxes hosted on Exchange Online (e-mails, attachments)
• Yammer
3rd party sources
• Requires connectors and licenses
• Whatsapp, Instant Bloomberg some examples
10. Getting started
Privacy
• Use settings to anonymize user information
Reviewers
• Mailboxes hosted on Exchange Online
• Communication Compliance Analyst or
Investigator role groups
• Assigned in policy
Find content - policies
• Sensitive information types
• Trainable classifiers
• Specific attributes and keywords
18. What will happen?
User access to team or channel content
Adding a user to a team or channel
Screensharing | telephone calls
User access to meetings
User access to 1:1 and group chats
Connie Control
19. Pre-requisites
Azure Active Directory
• Make sure Azure AD is up to date with relevant attributes
• Do not use Exchange Online address book policies
Licences and permissions
• Every user needs and Exchange Online license
• Information Barriers Administrator role
And do note….
• Verify that audit logging is enabled
• Use PowerShell to enforce barriers on existing groups and teams
• 250 segments per organization
• A user can only be part of one segment
• Guest users are affected – federated users are not
• Information Barriers V2 is coming!
21. Modes | Segments | Policies
Albert
Connie
Management Operations
George
Control
Peter
Segment Segment
Policy
22. Modes | Segments | Policies
Modes
• Open (no IB active)
• Owner Moderated (IB active based on
owner)
• Implicit (Default for Teams)
• Explicit (SPO only)
Segments
• Collection of users based on a limited
set of Azure AD attributes or group
membership
• Only modern groups are supported
Policy
• Used to set the permissions (Allow/Block)
for communication between two segments
23. SharePoint Online and Teams
Explicit mode
• Only for non-connected sites
Teams connected – Implicit mode
• Share with anyone link disabled
• Company-wide link disabled
• Only sharing with existing members
• New users can't be added directly
• Segments cannot be changed, even by SP
Admin or Global Admin
• Also works for private channels
• Can take up to 24 hours for the IB mode
to take effect
26. Checking for issues
Check on user-status
Get-InformationBarrierRecipientStatus -Identity <userid>
Check on segment-status
Get-OrganizationSegment –Identity <GUID>
Check on policy-status
Get-InformationBarrierPoliciesApplicationStatus
Not Started | Failed | In progress
28. Current content
Information Barriers become active on current content
User removed
• 1 on 1 chat: read only and blocked
• Group chat: user removed from participating, can read old conversations
• Team: user removed from team, cannot access content *)
• Other users will see an error when hoovering over the people card
Contacts
• Activity tab removed
• A blocked user will not appear on the org chart
• A blocked user will not appear as suggested contact
• A blocked chat/call contact can be seen in the chats contact list and
will be identified. But there is no interaction option
*) Probably based on the segment the Teams owner is in.
But what if the owner isn’t in a segment? Or both owners are part of different segments?
Still testing this….
29. Shared Channels (internal)
• Share with user - blocked
• Share with team you own: blocked if any users part of the IB
• Share with team you don’t own: blocked if other owner or any users part
of the IB
• Add user to a team that has shared channels: blocked if user is part of
the IB. But…. When the team has 6 or more shared channels – the user
can be added initially. When the IB policy detects a problem – sharing
is stopped (?!).
• An IB does not effect sharing the team with an external party
31. Beware!
• These are complex functions
• A user can only be added to one segment!
• Policies are symmetric – always requires two to function!
• Information Barriers do not work across tenants
• Information Barriers do not block bots, Azure AD apps or API’s
• Information Barriers V2 is on its way
The IB policy of the Microsoft 365 resource is determined from the resource owner's IB policy. The resource owners can invite any user to the resource based on their IB policies. This mode is useful when your company wants to allow collaboration among incompatible segment users that are moderated by the owner. Only the resource owner can add new members per their IB policy.
The IB policy of the Microsoft 365 resource is determined from the resource owner's IB policy. The resource owners can invite any user to the resource based on their IB policies. This mode is useful when your company wants to allow collaboration among incompatible segment users that are moderated by the owner. Only the resource owner can add new members per their IB policy.
The IB policy of the Microsoft 365 resource is determined from the resource owner's IB policy. The resource owners can invite any user to the resource based on their IB policies. This mode is useful when your company wants to allow collaboration among incompatible segment users that are moderated by the owner. Only the resource owner can add new members per their IB policy.
The IB policy of the Microsoft 365 resource is determined from the resource owner's IB policy. The resource owners can invite any user to the resource based on their IB policies. This mode is useful when your company wants to allow collaboration among incompatible segment users that are moderated by the owner. Only the resource owner can add new members per their IB policy.
The IB policy of the Microsoft 365 resource is determined from the resource owner's IB policy. The resource owners can invite any user to the resource based on their IB policies. This mode is useful when your company wants to allow collaboration among incompatible segment users that are moderated by the owner. Only the resource owner can add new members per their IB policy.
The IB policy of the Microsoft 365 resource is determined from the resource owner's IB policy. The resource owners can invite any user to the resource based on their IB policies. This mode is useful when your company wants to allow collaboration among incompatible segment users that are moderated by the owner. Only the resource owner can add new members per their IB policy.
The IB policy of the Microsoft 365 resource is determined from the resource owner's IB policy. The resource owners can invite any user to the resource based on their IB policies. This mode is useful when your company wants to allow collaboration among incompatible segment users that are moderated by the owner. Only the resource owner can add new members per their IB policy.