Edge Pereira will demonstrate in this session why Office 365 DLP is making security cool again. With several demos and samples this session is great for you to understand how DLP works and how to setup one yourself.
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
Did you know that as smartphone use increases in a particular industry, the number of data breaches rise as well? Enterprises want their employees to use mobile devices, but the data security concerns can be overwhelming. How do enterprise IT departments enable secure mobile productivity amongst their workers?
View The Effects of Mobile on the Enterprise to learn more.
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
Did you know that as smartphone use increases in a particular industry, the number of data breaches rise as well? Enterprises want their employees to use mobile devices, but the data security concerns can be overwhelming. How do enterprise IT departments enable secure mobile productivity amongst their workers?
View The Effects of Mobile on the Enterprise to learn more.
Presentation by Dominic White at ISSA in 2010.
This presentation is about online privacy.
The presentation begins with a look at what privacy is. Where online privacy leaks occur and the implications of the leaks are discussed. The presentation ends with a brief discussion on how you can protect your online privacy.
What is Information Security and why you should care ...James Mulhern
An interactive introduction to Information Security and Cyber Security for BTEC students studying IT at Swindon College in the UK. The session illustrates the breadth and diversity of the subject and opportunities it can offer. The session illustrates things might not always be as they seem and the impacts can be far more reaching than at first imagined.
New regulations and the evolving cybersecurity technology landscapeUlf Mattsson
As the cyber threat landscape continues to evolve, organizations worldwide are increasing their spend on cybersecurity technology. We have a transition from 3rd party security providers into native cloud security services. The challenge of securing enterprise data assets is increasing. What’s needed to control Cyber Risk and stay Compliant in this evolving landscape?
We will discuss evolving industry standards, how to keep track of your data assets, protect your sensitive data and maintain compliance to new regulations.
Gdpr demystified - making sense of the regulationJames Mulhern
Slightly out dated introduction to GDPR, that tries to move away from the headlines on fines and emphasises the global nature of the regulation, the numerous forms of lawful processing and the absolute need to manage privacy and be transparent. Goes on to show how using public cloud can help solve part of the problem.
Emerging application and data protection for multi cloudUlf Mattsson
Emerging Application and Data Protection for Multi-Cloud
Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data. The good news is that these data privacy regulations compel businesses to get a handle on personal data - how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers. The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value. This session will discuss Emerging Application and Data Protection for Multi-cloud and review Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation.
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10Ulf Mattsson
Big Data systems like Hadoop provide analysis of massive amounts of data to open up “Big Answers”, identifying trends and new business opportunities. The massive scalability and economical storage also provides the opportunity to monetize collected data by selling it to a third party.
However, the biggest issue with Big Data remains security. Like any other system, the data must be protected according to regulatory mandates, such as PCI, HIPAA and Privacy laws; from both external and internal threats – including privileged users.
So how can we bridge the gap between access to vast amounts of data, and security of more and more types of data, in this rapidly evolving new environment?
In this webinar, Ulf Mattsson explores the issues and provide solutions to bring together data insight and security in Big Data. With deep knowledge in advanced data security technologies, Ulf explains the best practices in order to safely unlock the power of Big Data.
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By DesignJohn Eckman
At the start, the web was purely stateless – every request was the beginning (and every response the end) of a new conversation. Then we got cookies, so that servers could remember clients, and SSL so we could share information with servers that wasn't seen by all the servers it passed through en route. These two technologies enabled e-commerce and are so foundational now it is hard to imagine the web without them. The problem is the way we'e evolved the web has been down a path of increasingly aggressive data collection and reduced transparency for users.
We should have always been doing privacy by design, data portability, data transparency, and the right to be forgotten. We should not have become dependent on invasive ad tech and aggregated third-party data; we should not have handed over ownership of our own social graphs and connections so cheaply to private commercial interests.
While many (particularly in the US) may be uncomfortable with the legalistic and regulatory approach, preferring a more laissez-faire, self-governing model for virtually everything, the GDPR can be seen as an opportunity to start doing things right – applying the core principles of privacy by design not just where mandated by regulation but as a standard business practice.
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced data privacy and security solutions has become even more critical. French regulators cited GDPR in fining Google $57 million and the U.K.'s Information Commissioner's Office is seeking a $230 million fine against British Airways and seeking $124 million from Marriott. Facebook is setting aside $3 billion to cover the costs of a privacy investigation launched by US regulators.
This session will take a practical approach to address guidance and standards from the Federal Financial Institutions Examination Council (FFIEC), EU GDPR, California CCPA, NIST Risk Management Framework, COBIT and the ISO 31000 Risk management Principles and Guidelines.
Learn how new data privacy and security techniques can help with compliance and data breaches, on-premises, and in public and private clouds.
SharePoint Saturday Philadelphia presentation 2/4/2012. Special thanks to CipherPoint Software and AvePoint for preparation and sharing panel time.
Best practices in planning and design of enterprise security and master data management strategies for HITECH compliance of both SharePoint 2010 on premise and Office 365 instances for use in covered healthcare entities.
Reinforcement of Information Privacy and Security NowadaysGoutama Bachtiar
Delivered in a guest lecture session conducted for Faculty of Communication Science, Padjadjaran University, West Java, Indonesia. It includes the topic on Indonesia's Laws #14 Year of 2008 on Disclosure of Public Information.
Office 365 Makes Data Protection Cool AgainEdge Pereira
The most important assets of an organization are: people and data. Up to noa, you can (mostly) control your data, but in the age of the social media, can you control the data your people put in internet?
Come to this session to learn what controls Office 365 has to offer to make sure your data is protected, compliant and your social media efforts are aligned with your organizational policies
Presentation by Dominic White at ISSA in 2010.
This presentation is about online privacy.
The presentation begins with a look at what privacy is. Where online privacy leaks occur and the implications of the leaks are discussed. The presentation ends with a brief discussion on how you can protect your online privacy.
What is Information Security and why you should care ...James Mulhern
An interactive introduction to Information Security and Cyber Security for BTEC students studying IT at Swindon College in the UK. The session illustrates the breadth and diversity of the subject and opportunities it can offer. The session illustrates things might not always be as they seem and the impacts can be far more reaching than at first imagined.
New regulations and the evolving cybersecurity technology landscapeUlf Mattsson
As the cyber threat landscape continues to evolve, organizations worldwide are increasing their spend on cybersecurity technology. We have a transition from 3rd party security providers into native cloud security services. The challenge of securing enterprise data assets is increasing. What’s needed to control Cyber Risk and stay Compliant in this evolving landscape?
We will discuss evolving industry standards, how to keep track of your data assets, protect your sensitive data and maintain compliance to new regulations.
Gdpr demystified - making sense of the regulationJames Mulhern
Slightly out dated introduction to GDPR, that tries to move away from the headlines on fines and emphasises the global nature of the regulation, the numerous forms of lawful processing and the absolute need to manage privacy and be transparent. Goes on to show how using public cloud can help solve part of the problem.
Emerging application and data protection for multi cloudUlf Mattsson
Emerging Application and Data Protection for Multi-Cloud
Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data. The good news is that these data privacy regulations compel businesses to get a handle on personal data - how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers. The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value. This session will discuss Emerging Application and Data Protection for Multi-cloud and review Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation.
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10Ulf Mattsson
Big Data systems like Hadoop provide analysis of massive amounts of data to open up “Big Answers”, identifying trends and new business opportunities. The massive scalability and economical storage also provides the opportunity to monetize collected data by selling it to a third party.
However, the biggest issue with Big Data remains security. Like any other system, the data must be protected according to regulatory mandates, such as PCI, HIPAA and Privacy laws; from both external and internal threats – including privileged users.
So how can we bridge the gap between access to vast amounts of data, and security of more and more types of data, in this rapidly evolving new environment?
In this webinar, Ulf Mattsson explores the issues and provide solutions to bring together data insight and security in Big Data. With deep knowledge in advanced data security technologies, Ulf explains the best practices in order to safely unlock the power of Big Data.
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By DesignJohn Eckman
At the start, the web was purely stateless – every request was the beginning (and every response the end) of a new conversation. Then we got cookies, so that servers could remember clients, and SSL so we could share information with servers that wasn't seen by all the servers it passed through en route. These two technologies enabled e-commerce and are so foundational now it is hard to imagine the web without them. The problem is the way we'e evolved the web has been down a path of increasingly aggressive data collection and reduced transparency for users.
We should have always been doing privacy by design, data portability, data transparency, and the right to be forgotten. We should not have become dependent on invasive ad tech and aggregated third-party data; we should not have handed over ownership of our own social graphs and connections so cheaply to private commercial interests.
While many (particularly in the US) may be uncomfortable with the legalistic and regulatory approach, preferring a more laissez-faire, self-governing model for virtually everything, the GDPR can be seen as an opportunity to start doing things right – applying the core principles of privacy by design not just where mandated by regulation but as a standard business practice.
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced data privacy and security solutions has become even more critical. French regulators cited GDPR in fining Google $57 million and the U.K.'s Information Commissioner's Office is seeking a $230 million fine against British Airways and seeking $124 million from Marriott. Facebook is setting aside $3 billion to cover the costs of a privacy investigation launched by US regulators.
This session will take a practical approach to address guidance and standards from the Federal Financial Institutions Examination Council (FFIEC), EU GDPR, California CCPA, NIST Risk Management Framework, COBIT and the ISO 31000 Risk management Principles and Guidelines.
Learn how new data privacy and security techniques can help with compliance and data breaches, on-premises, and in public and private clouds.
SharePoint Saturday Philadelphia presentation 2/4/2012. Special thanks to CipherPoint Software and AvePoint for preparation and sharing panel time.
Best practices in planning and design of enterprise security and master data management strategies for HITECH compliance of both SharePoint 2010 on premise and Office 365 instances for use in covered healthcare entities.
Reinforcement of Information Privacy and Security NowadaysGoutama Bachtiar
Delivered in a guest lecture session conducted for Faculty of Communication Science, Padjadjaran University, West Java, Indonesia. It includes the topic on Indonesia's Laws #14 Year of 2008 on Disclosure of Public Information.
Office 365 Makes Data Protection Cool AgainEdge Pereira
The most important assets of an organization are: people and data. Up to noa, you can (mostly) control your data, but in the age of the social media, can you control the data your people put in internet?
Come to this session to learn what controls Office 365 has to offer to make sure your data is protected, compliant and your social media efforts are aligned with your organizational policies
-“Facts” about NSA/Snowden/Prism
-data classification
-guideline to Safe use of “Cloud”:
-choosing and using Cloud
-open source, alternative cloud services
What I learned at the Infosecurity ISACA North America Conference 2019Ulf Mattsson
The 2019 Infosecurity ISACA North America Expo and Conference was held in New York City’s Javits Convention Center on November 20-21. With more than 50 sessions spanning 5 tracks, this conference offered the best-in-class educational content ISACA members and certification holders depend on, plus unprecedented access to leaders in the security industry.
Join Ulf Mattsson, Head of Innovation at TokenX for a conference recap webinar on the biggest takeaways
Top tips for protecting your business online (updated) Feb 14Vanguard Visions
You know you should be using more online business services in ‘the Cloud’ but you’re worried about being cyber-scammed?
This presentation provides you with the top tips of protecting your online business operations through a few simple and effective cyber-safety steps.
Data Protection & Privacy During the Coronavirus PandemicUlf Mattsson
Remote work is quickly becoming the new normal and criminals are taking advantage of this chaotic situation.
The EU Agency for Cybersecurity's providing guidance for the huge increases in the number of people working remotely, using tele-health it is vital that we also take care of our cyber hygiene.
Viewers will learn more about:
- How to use encryption, controlling new storage of regulated data and data sharing in this new situation.
- Anonymization leaves personal data open to re-identification, which exposes firms to GDPR non-compliance risks.
- How are the HIPAA rules changing in this situation?
- GDPR prescribing pseudonymization and how is that work.
- How is CCPA changing the rules?
- How to secure wi-fi connections preventing snooping of your traffic and fully updated anti-virus and security software, also on mobile phones.
- How important files can be backed up remote or locally. In a worst case scenario, staff could fall foul of ransomware for instance.
- What apps are secure to use in this new era?
- Should we use MFA, PW managers or local PW management?
We will also discuss how to use the CERT-EU News Monitor to stay updated on the latest threats and check the following basics.
Better to Ask Permission? Best Practices for Privacy and SecurityEric Kavanagh
Hot Technologies with The Bloor Group and IDERA
If security was once a nice-to-have, those days have long gone. Between data breaches and privacy regulations, organizations today face immense pressure to protect their systems and their sensitive data. When giants like Yahoo! and Target can get hacked, so can any other company. What can you do about it? How can you protect your company and clients?
Register for this episode of Hot Technologies to hear Analysts Eric Kavanagh and Dr. Robin Bloor provide insights about the many ways that companies can buttress their defenses and stay ahead of the bad guys. They'll be briefed by Vicky Harp of IDERA who will demonstrate how to identify vulnerabilities, track sensitive data, successfully pass audits, and protect your SQL Server databases.
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io
Two years after Cambridge Analytica, personal data is still at the forefront of the conversation. Consumers all vehemently care about what companies do with their data. Privacy is on everyone’s mind (not just the older, wealthier bracket). The pandemic has only accelerated these concerns, which marked 2020 as a significant year for data management. As businesses face new technological challenges amid COVID-19, the topic of privacy has drawn an increasingly bright spotlight. This sensitivity regarding data privacy has only been growing — and companies are responding accordingly.
Digital Finance Africa 2022 - https://itnewsafrica.com/event/ -hosted by IT News Africa is the definitive annual event on technology leadership in the
financial services industry. It asks the hard questions not asked in other
conferences, and identifies the skills required to steer a course in an age
where the entire industry is transforming rapidly. This is a Summit for bold,
visionary leaders who are willing to take calculated risks as much as they
are willing to consolidate, who know what to give up as much as what they
expect to gain.
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
Cyber terrorists are sophisticated, organized and disruptive to your business. How prepared are you? Explore the landscape of malicious actors most likely to strike your business and what you can do about it.
Leading Practices in Information Security & PrivacyDonny Shimamoto
Many not-for-profits are operating in an environment in which there is a tremendous amount of electronic documents, communications, and confidential data sits on computers and networks that are connected to the Internet. Privacy and security threats are also increasing, putting Internet communications and computer data at risk at an alarming rate. At the same time, laws and regulations with significant penalties have been passed or are being passed by states, the Federal government, and industry groups (e.g. PCI DSS) increasing the consequences of data breaches and privacy violations.
Whether you’re an executive director, program manager, or IT manager, this non-technical presentation will help you learn about the threats, requirements, and leading practices related to information security you need to help protect your donors and constituents.
2017 Collab365 - How the Jedi Use Project Online to Manage ProjectsEdge Pereira
A city-planet, Coruscant is the vibrant heart and capital of the galaxy, home of the Jedi. Let's have a look how they use Project Online to manage government projects. From citizen's ideas list to final infrastructure delivery.
You Will Learn : What is and how can you use Project Online
How to manage projects using Project Online
How Project Online integrates with other systems
The project manager track from newbie to expert
2017 Collab365 Conference - 10 myths about moving your project management to ...Edge Pereira
Most companies that go to the cloud do so because they need business agility and cost savings. But how can you know if you're getting all the benefits? Or worse, what are you missing? Let's separate fact from fiction and bust these 10 myths about moving your projects to the cloud.
You Will Learn : How to make your projects more agile and effective
How to increase savings on your projects
Cloud security
Protecting your business against hackers in the cloud
Suitable For : Business Analyst
Microsoft project usergroup brisbane - australia - march 2017. Let's talk about what is and how infopath can help your organization deliver a more appealing experience and if you are using infopath what is the future of it in the office 365 cloud
Project portfolio management in the cloudEdge Pereira
Australia: Surf, quality of life, sunny days and now add to that project portfolio management in the cloud. Let’s discuss a typical city council journey, migrating their projects and portfolios, from Excel to Project and then to Project Online plus Azure and next taking it up to the next level using PowerApps and Flow. Infrastructure Saturday Australia 2017 - Brisbane - Edge Pereira
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Edge Pereira
Microsoft has solution to help you to protect your data, manage mobile devices, unify environments across OSs all this while enabling seamless collaboration. In this session we will talk about the Enterprise Mobility Suite and how it plays together with the current needs of the modern workplace. This is a DEMO HEAVY session. Bring your devices. You will be part of the demo.
When a Data Breach Happens, What's Your Plan?Edge Pereira
Ashley Madison, Sony, Kapersky Labs, LastPass, CentreLink, G20 event in Brisbane…What do they all have in common? They were victims of data breaches. And as you probably know by now, some were handled better than others. In this session we will talk about strategies, from mitigation to handling, used when a data breach happens (not “if”) and what controls do we have if you are using Office 365.
Office 365 Canberra - eDiscovery and Privacy: All your data are belong to usEdge Pereira
In the 90s, Legal and IT professionals began compiling computer data and legislation, eDiscovery had its first steps. Back then, nobody would believe that email, let alone social media, could be used in court. 20 years later, eDiscovery is here to stay, but is the industry prepared?
In this session, we will talk about the biggest challenges for eDiscovery and some solutions in the works, with focus on Office 365 technologies.
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge Pereira
Edge Pereira presentation at Microsoft TechEd Australia. Session OSS304 Regulatory Compliance and Microsoft Office 365 - data leakage protection, dlp, privacy, sharepoint
Office 365 : Data leakage control, privacy, compliance and regulations in the...Edge Pereira
If you are considering Microsoft Office 365 you need to understand what compliance features and capabilities are available. These features may replace existing compliance functionality or create new opportunities to meet compliance obligations. This session will explore features and capabilities, such as data retention, data leakage protection and discovery and demonstrate usages. The information presented is this session will help you navigate an organisational journey to Microsoft Office 365 by providing knowledge and examples to smooth the transition, whilst maintaining or enhancing your industry's regulatory compliance.
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsRosie Wells
Insight: In a landscape where traditional narrative structures are giving way to fragmented and non-linear forms of storytelling, there lies immense potential for creativity and exploration.
'Collapsing Narratives: Exploring Non-Linearity' is a micro report from Rosie Wells.
Rosie Wells is an Arts & Cultural Strategist uniquely positioned at the intersection of grassroots and mainstream storytelling.
Their work is focused on developing meaningful and lasting connections that can drive social change.
Please download this presentation to enjoy the hyperlinks!
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...SkillCertProExams
• For a full set of 760+ questions. Go to
https://skillcertpro.com/product/databricks-certified-data-engineer-associate-exam-questions/
• SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
• It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
• SkillCertPro updates exam questions every 2 weeks.
• You will get life time access and life time free updates
• SkillCertPro assures 100% pass guarantee in first attempt.
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
Obesity causes and management and associated medical conditions
Office 365 DLP Makes Data Protection Cool Again!
1. Office 365 User Group – Brisbane - Australia
Office 365 DLP Makes Data Protection Cool Again!
Edge Pereira – Senior Consultant - Avanade
edge@superedge.net
4. Define: Cool
Space Shuttle Endeavour attached to the International Space Station, May 23, 2011
Source: http://www.esa.int/spaceinvideos/Videos/2011/06/ISS_with_Space_Shuttle_Endeavour_and_ATV-2_Docked
7. “By far, the most common record type exposed in 2014 were passwords, followed by usernames, email addresses,
and PII (name, address, SSN, DOB, phone number, etc.)…”
1 Billion
Criminals are starting to favour PII
over financial information, because
it's easier to sell and leverage
Source: http://www.cio.com/article/2848593/data-breach/nearly-a-billion-records-were-compromised-in-2014.html
Records Compromised in 2014
8. “It was often said that people were the weakest link in any security chain—and that was true when attacks were less
sophisticated. But today, no amount of education will stop hackers from getting into your network.”
$400
Million
There were 2,122 confirmed data
breaches in 2014
Source: http://www.forbes.com/sites/gilpress/2015/05/22/stopping-data-breaches-whose-job-is-it-anyway/
Losses Due to Data Breaches
9. “SCAMS strip Australians of at least $80 million a year and gathering a vault of personal information that can be used in
fraud sprees.”
$80
Million
Criminals are buying and selling
names, addresses, birth dates, bank
account and other personal details
on the black market to commit
identity fraud or find scam victims,
a report warns.
Source: http://www.heraldsun.com.au/news/law-order/scammers-steal-80-million-a-year-and-personal-information-from-australians/story-fni0fee2-1227358157405
Individual Losses Due to Scammers
13. “The personal details of world leaders – including David Cameron, Barack Obama and Vladimir Putin – have been
accidentally revealed in an embarrassing privacy breach.”
It has been discovered that an employee at the Australian immigration department mistakenly sent personal information of all
world leaders attending the G20 Summit to organisers of the Asian Cup football tournament.
And the heads of government were kept in the dark about the employee’s blunder.
The passport numbers and visa details of United States president, Barack Obama, the Russian president, Vladimir Putin, the
German chancellor, Angela Merkel, the Chinese president, Xi Jinping, the Indian prime minister, Narendra Modi, the Japanese
prime minister, Shinzo Abe, the Indonesian president, Joko Widodo, and the British prime minister, David Cameron, were all
exposed.
Source: http://www.independent.co.uk/news/world/personal-details-of-obama-putin-cameron-and-merkel-sent-to-wrong-email-address-by-g20-summit-organiser-10142539.html
Leaks and Training
18. 50%
Of the IT organizations will use security services firms that
specialize in data protection, security risk management and
security infrastructure management to enhance their security
postures
Source: http://www.gartner.com/newsroom/id/2828722
By 2018, Data Leakage Protection
19. Archiving for Non-Microsoft Data
Social — Twitter, Facebook, Yammer, LinkedIn, etc.
Instant messaging — Yahoo Messenger, GoogleTalk, Jabber, etc.
Document collaboration — Box, DropBox, etc.
Verticals — SalesForce Chatter, Thomson Reuters, Bloomberg, etc.
SMS/text messaging — BlackBerry, MobileGuard, etc.
29. Content Analysis Process
Joseph F. Foster
Visa: 4485 3647 3952 7352
Expires: 2/2012
Get
Content
4485 3647 3952 7352 a 16 digit number
is detected
RegEx
Analysis
1. 4485 3647 3952 7352 matches checksum
2. 1234 1234 1234 1234 does NOT match
Function
Analysis
1. Keyword Visa is near the number
2. A regular expression for date (2/2012)
is near the number
Additional
Evidence
1. There is a regular expression that matches
a check sum
2. Additional evidence increases confidence
Verdict
30. Force the DLP Updates
# Office 365 UserGroup – Brisbane – Australia
# Edge Pereira – edge@superedge.net
#
# Force the DLP down to the users using remote powershell
#
$cred = get-credential
$session = new-pssession -configurationname Microsoft.Exchange -connectionuri
https://ps.outlook.com/powershell/ -credential $cred -authentication basic -allowredirection
Import-pssession $session
Set-executionpolicy unrestricted
Start-managedfolderassistant <username>
Get-pssession | remove-pssession