SlideShare a Scribd company logo
1 of 66
Download to read offline
Security for the productive enterprise
in a mobile-first cloud-first world
Khalid Hussain
MCT | Cloud Solution Architect | Microsoft | AWS | GCP @ Bechtle AG
Microsoft 365 Security and Compliance
On-premises /
Private cloud
devices datausers apps
THE WORLD BEFORE
MOBILITY & CLOUD
On-premises /
Private cloud
CLOUD APPS & SAAS SERVICES
On-premises /
Private cloud
MOBILE AND PERSONAL DEVICES
On-premises /
Private cloud
ORGANIZATION & SOCIAL IDENTITIES
On-premises /
Private cloud
Microsoft 365 Security and Compliance
Digital transformation
Protect at the front door
Protect your data, anywhere
Detect and remediate attacks
Agenda
of employees say mobile business
apps change how they work
80%
of employees use non-approved
SaaS apps for work
41%
85%
of enterprise organizations keep
sensitive information in the cloud
On-premises
Devices AppsIdentity Data
On-premises
On-premises
THE PROBLEM
The security you need integrated
with the productivity tools you want
Productivity
Secure
On-premises
OR
Security
It’s a delicate balance
Information
Rights
Management
Mobile Device
& Application
Management
Cloud Access
Security
Broker
SIEM
Data Loss
Prevention
User &
Entity
Behavioral
Analytics
Mobile
Data Loss
Prevention
Threat
Detection
Identity
governance
Single-
sign on
Cloud
Data Loss
Prevention
Conditional
access
Discovery
Cloud
visibility
Secure
collaboration
Cloud
anomaly
detection
Identity & Access
Management
Identity & Access
Management
Mobile Device
& Application
Management
Data Loss
Prevention
User &
Entity
Behavioral
Analytics
Cloud Access
Security
Broker
Information
Rights
Management
Protect at the
front door
Detect &
remediate attacks
Protect your
data anywhere
Cloud Access Security Broker
Mobile Device &
App Management
Identity & Access
Management
User & Entity
Behavioral Analytics
Data Loss Prevention
Cloud Access Security Broker
Protect at the
front door
Detect &
remediate attacks
Protect your
data anywhere
Mobile device &
app management
Information
protection
Identity and access
management
Threat
protection
Holistic and innovative solutions for protection across users, devices, apps and data
Protect at the
front door
Detect &
remediate attacks
Protect your
data anywhere
Microsoft 365 Security and Compliance
Protect at the
front door
Detect &
remediate attacks
Protect your
data anywhere
Protect at the
front door
Detect &
remediate attacks
Protect your
data anywhere
Microsoft 365 Security and Compliance
of hacking breaches
leverage stolen and/or
weak passwords
81%
Microsoft 365 Security and
Compliance
Protect at the
front door
Verizon 2017 Data Breach Investigation Report
EXE
To: gopi@contoso.com
Check out this URL.
ZAP
Who is accessing? What is their role?
Is the account compromised?
Where is the user based? From where is
the user signing in? Is the IP anonymous?
Which app is being accessed?
What is the business impact?
Is the device healthy? Is it managed?
Has it been in a botnet?
What data is being accessed?
Is it classified? Is it allowed off premises?
Bing
Xbox Live
OneDrive
Microsoft Digital
Crimes Unit
Microsoft Cyber Defense
Operations Center
Azure
Microsoft
Accounts
Skype Enterprise Mobility
+ Security
Azure Active Directory
IF
Privileged user?
Credentials found in public?
Accessing sensitive app?
Unmanaged device?
Malware detected?
IP detected in Botnet?
Impossible travel?
Anonymous client?
High
Medium
Low
User risk
10TB
per day
THEN
Require MFA
Allow access
Deny access
Force password reset******
Limit access
High
Medium
Low
Session risk
Enforce on-demand,just-in-time administrative access when needed
Use Alert, Audit Reports and Access Review
Domain
User
Global
Administrator
Discover, restrict, and monitor privileged identities
Domain
User
Administrator
privileges expire after
a specified interval
USER
Role: Sales Account Rep
Group: London Users
Client: Mobile
Config: Corp Proxy
Location: London, UK
Last Sign-in: 5 hrs ago
CONDITIONAL
ACCESS RISK
Health:Fully patched
Config:Managed
Last seen: London, UK
High
Medium
Low Allow access
TRAVEL EXPENSE
APP
USER
Role: VP Marketing
Group: Executive Users
Client: Mobile
Config: Corp Proxy
Location: London, UK
Last Sign-in: 5 hrs ago
CONDITIONAL
ACCESS RISK
Health:Fully patched
Config:Managed
Last seen: London, UK
High
Medium
Low Require MFA
CONFIDENTIAL
SALES APP
CONDITIONAL
ACCESS POLICY
User is a member of
a sensitive group.
Application is classified
High Business Impact.
USER
Role: Sales Account Representative
Group: London Users
Client: Mobile
Config: Corp Proxy
Location: London, UK
Last Sign-in: 5 hrs ago
SALES APP
CONDITIONAL
ACCESS RISK
Health: Unknown
Client: Browser
Config: Anonymous
Last seen: Asia
High
Medium
Low
Anonymous IP
Unfamiliar sign-in location for this user
Block access
Force password
reset
Microsoft 365 Security and
Compliance
Protect at the
front door
Demo
Protect at the
front door
Detect &
remediate attacks
Protect your
data anywhere
Microsoft 365 Security and Compliance
Microsoft 365 Security and
Compliance
Protect your
data anywhere
of workers have
accidentally shared
sensitive data to
the wrong person
58%
Stroz Friedberg
How much control do
you have over data?
OUT OF YOUR CONTROL
Who is accessing? What is their role?
Is the account compromised?
Where is the user based? From where is
the user signing in? Is the IP anonymous?
Which app is being accessed?
What is the business impact?
Is the device healthy? Is it managed?
Has it been in a botnet?
What data is being accessed?
Is it classified? Is it allowed off premises?
How do I protect corporate
files on mobile devices?
How do I protect the data
that’s shared externally?
How do I discover and
protect data in SaaS apps?
How do I protect sensitive data
on premises and in the cloud?
OUT OF YOUR CONTROL
Classification, labeling, and
protection for sensitive data
on-premises and in the cloud
Data protection
on mobile devices
Data visibility and
protection in cloud
and SaaS applications
Protect sensitive data on-premises and in the cloud
Classification
and labeling
Classify data based on
sensitivity and add labels—
manually or automatically.
Protection
Encrypt your sensitive
data and define usage
rights or add visual
markings when
needed.
Monitoring
Use detailed tracking
and reporting to see
what’s happening with
your shared data and
maintain control over it.
Gain visibility and control over data in cloud apps
Cloud discovery
Discover cloud apps used in your
organization, get a risk assessment
and alerts on risky usage.
Data visibility
Gain deep visibility into where
data travels by investigating all
activities, files and accounts for
managed apps.
Data control
Monitor and protect personal and
sensitive data stored in cloud apps
using granular policies.
Role: Finance
Group: Contoso Finance
Office: London, UK
INTERNAL
Azure information
protection
Identifies document tagged
INTERNAL being shared publicly
Move to
quarantine
Restricted
to owner
USER
Uploaded to
public share
Admin notified
about problem.
CLOUD APP
SECURITY PORTAL
Advanced device
management
Enforce device encryption,
password/PIN requirements,
jailbreak/root detection, etc.
Device security configuration
Restrict access to specific
applications or URL
addresses on mobile
devices and PCs.
Restrict apps and URLs
Managed apps
Personal appsPersonal apps
MDM (3rd party or Intune) optional
Managed apps
Corporate
data
Personal
data
Multi-identity policy
Control company data after
it has been accessed, and
separate it from personal
data.
Data control / separation
USER
User is prompted
to create a PIN
User edits
document stored
in OneDrive for
Business
User saves
document to…
User adds
business account
to OneDrive app
Intune configures
app protection policy
OneDrive
for Business
Allow
access
• Copy/Paste/SaveAs controls
• PIN required
• Encrypt storage
Microsoft 365 Security and
Compliance
Protect your
data anywhere
Demo
Protect at the
front door
Detect &
remediate attacks
Protect your
data anywhere
Microsoft 365 Security and Compliance
Detect &
remediate attacks
Microsoft 365 Security and
Compliance
PhishMe 2016
of cyberattacks and
the resulting data
breach begin with a
spear phishing email
91%
How quickly are you
able to detect attacks?
How do I detect attackers moving
laterally in my environment?
How do I detect Pass-the-Hash?
Pass-the-Ticket?
How do I detect compromised
credentials?
Aren’t rules-based security solutions
enough?
How can I remediate in real-time?
Automatically?
On-premises abnormal behavior
and advanced threat detection
Identity-based attack
and threat detection
Anomaly detection
for cloud apps
!
!
!
Monitors behaviors of users and other entities
by using multiple data-sources
Profiles behavior and detects anomalies
by using machine learning algorithms
Evaluates the activity of users and other entities
to detect advanced attacks
Credit card companies monitor cardholders’ behavior.
By observing purchases, behavioral analytics learn what behavior is typical for each buyer.
If there is any abnormal activity, they will notify the cardholder to verify charge.
$$$
$
3 hours
USER
Anonymous user behavior
Unfamiliar sign-in location
ATTACKER
Phishing attack
User account
is compromised
#
Attacker attempts
lateral movement
Attacker
accesses
sensitive data
Privileged
account
compromised
Anonymous user behavior
Lateral movement attacks
Escalation of privileges
Account impersonation
Data exfiltration
Attacker steals
sensitive data
Cloud data &
SaaS apps
Zero-day /
brute-force attack
Detect &
remediate attacks
Microsoft 365 Security and
Compliance
Demo
Apps
Risk
MICROSOFT INTUNE
Make sure your devices are
compliant and secure, while
protecting data at the
application level
AZURE ACTIVE
DIRECTORY
Ensure only authorized
users are granted access
to personal data using
risk-based conditional
access
MICROSOFT CLOUD
APP SECURITY
Gain deep visibility, strong
controls and enhanced
threat protection for data
stored in cloud apps
AZURE INFORMATION
PROTECTION
Classify, label, protect and
audit data for persistent
security throughout the
complete data lifecycle
MICROSOFT ADVANCED
THREAT ANALYTICS
Detect breaches before they
cause damage by identifying
abnormal behavior, known
malicious attacks and security
issues
!
Device
!
Access
granted
to data
CONDITIONAL
ACCESS
Classify
LabelAudit
Protect
!
!
Location
Mobile device &
app management
Information
protection
Holistic and innovative solutions for protection across users, devices, apps and data
Azure Active Directory
Premium
Microsoft
Intune
Azure Information
Protection
Microsoft Cloud
App Security
Microsoft Advanced
Threat Analytics
Identity and access
management
Threat
protection
Power Saturday 2019 E1 - Office 365 security

More Related Content

What's hot

Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldOneLogin
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Syed Sabhi Haider
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Robert Crane
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protectionxband
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
 
The 15 best cloud security practices
The 15 best cloud security practices The 15 best cloud security practices
The 15 best cloud security practices Cloudride LTD
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionBitglass
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASBAmmar Hasayen
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityCloudLock
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIBM Security
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesBitglass
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365AntonioMaio2
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information ProtectionMicrosoft Österreich
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust ModelYash
 
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockBe A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockCloudLock
 

What's hot (20)

Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
The 15 best cloud security practices
The 15 best cloud security practices The 15 best cloud security practices
The 15 best cloud security practices
 
SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
Cloud App Security
Cloud App SecurityCloud App Security
Cloud App Security
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockBe A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
 

Similar to Power Saturday 2019 E1 - Office 365 security

Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSDavid J Rosenthal
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureEuropean Collaboration Summit
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Richard Harbridge
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Ravikumar Sathyamurthy
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Kjetil Lund-Paulsen
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Karim Vaes
 
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...Patrick Guimonet
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimend
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)IAMCP Canada
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessRobert Crane
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologyDavid J Rosenthal
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfErikHof4
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsBitglass
 

Similar to Power Saturday 2019 E1 - Office 365 security (20)

Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdf
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 

More from PowerSaturdayParis

Power Saturday 2019 S2 - Version avancée de création de Teams en libre service
Power Saturday 2019 S2 - Version avancée de création de Teams en libre servicePower Saturday 2019 S2 - Version avancée de création de Teams en libre service
Power Saturday 2019 S2 - Version avancée de création de Teams en libre servicePowerSaturdayParis
 
Power Saturday 2019 F2 - La combinaison de Dynamics 365 avec la Power Platform
Power Saturday 2019 F2 - La combinaison de Dynamics 365 avec la Power PlatformPower Saturday 2019 F2 - La combinaison de Dynamics 365 avec la Power Platform
Power Saturday 2019 F2 - La combinaison de Dynamics 365 avec la Power PlatformPowerSaturdayParis
 
Power Saturday 2019 E6 - Day-to-day processes optimization in Office 365
Power Saturday 2019 E6 - Day-to-day processes optimization in Office 365Power Saturday 2019 E6 - Day-to-day processes optimization in Office 365
Power Saturday 2019 E6 - Day-to-day processes optimization in Office 365PowerSaturdayParis
 
Power Saturday 2019 F6 - I developed a SPFx solution, what to do next and how...
Power Saturday 2019 F6 - I developed a SPFx solution, what to do next and how...Power Saturday 2019 F6 - I developed a SPFx solution, what to do next and how...
Power Saturday 2019 F6 - I developed a SPFx solution, what to do next and how...PowerSaturdayParis
 
Power Saturday 2019 F4 - The rise of the citizen developer
Power Saturday 2019 F4 - The rise of the citizen developerPower Saturday 2019 F4 - The rise of the citizen developer
Power Saturday 2019 F4 - The rise of the citizen developerPowerSaturdayParis
 
Power Saturday 2019 F3 - Enabling external sharing in Office365 SharePoint an...
Power Saturday 2019 F3 - Enabling external sharing in Office365 SharePoint an...Power Saturday 2019 F3 - Enabling external sharing in Office365 SharePoint an...
Power Saturday 2019 F3 - Enabling external sharing in Office365 SharePoint an...PowerSaturdayParis
 
Power Saturday 2019 E5 - Spice up your SharePoint lists with PowerApps forms
Power Saturday 2019 E5 - Spice up your SharePoint lists with PowerApps formsPower Saturday 2019 E5 - Spice up your SharePoint lists with PowerApps forms
Power Saturday 2019 E5 - Spice up your SharePoint lists with PowerApps formsPowerSaturdayParis
 
Power Saturday 2019 E3 - SharePoint unexplained
Power Saturday 2019 E3 - SharePoint unexplainedPower Saturday 2019 E3 - SharePoint unexplained
Power Saturday 2019 E3 - SharePoint unexplainedPowerSaturdayParis
 
Power Saturday 2019 - D6 - Design thinking and innovation accounting
Power Saturday 2019 - D6 - Design thinking and innovation accountingPower Saturday 2019 - D6 - Design thinking and innovation accounting
Power Saturday 2019 - D6 - Design thinking and innovation accountingPowerSaturdayParis
 
Power Saturday 2019 - D4 - Doctor Fow best practices
Power Saturday 2019 - D4 - Doctor Fow best practicesPower Saturday 2019 - D4 - Doctor Fow best practices
Power Saturday 2019 - D4 - Doctor Fow best practicesPowerSaturdayParis
 
Power Saturday 2019 C4 - CALCULATE the Swiss Army Knife in DAX
Power Saturday 2019 C4 - CALCULATE the Swiss Army Knife in DAXPower Saturday 2019 C4 - CALCULATE the Swiss Army Knife in DAX
Power Saturday 2019 C4 - CALCULATE the Swiss Army Knife in DAXPowerSaturdayParis
 
Power Saturday 2019 C1 - Power BI embedded
Power Saturday 2019 C1 - Power BI embeddedPower Saturday 2019 C1 - Power BI embedded
Power Saturday 2019 C1 - Power BI embeddedPowerSaturdayParis
 
Power Saturday 2019 D3 - Contruisons une solution de OnBoarding avec Graph et...
Power Saturday 2019 D3 - Contruisons une solution de OnBoarding avec Graph et...Power Saturday 2019 D3 - Contruisons une solution de OnBoarding avec Graph et...
Power Saturday 2019 D3 - Contruisons une solution de OnBoarding avec Graph et...PowerSaturdayParis
 
Power Saturday 2019 D2 - Capture your store visit with PowerApps
Power Saturday 2019 D2 - Capture your store visit with PowerAppsPower Saturday 2019 D2 - Capture your store visit with PowerApps
Power Saturday 2019 D2 - Capture your store visit with PowerAppsPowerSaturdayParis
 
Power Saturday 2019 C6 - Power BI + Machine Learning = AutoML
Power Saturday 2019 C6 - Power BI + Machine Learning = AutoMLPower Saturday 2019 C6 - Power BI + Machine Learning = AutoML
Power Saturday 2019 C6 - Power BI + Machine Learning = AutoMLPowerSaturdayParis
 
Power Saturday 2019 C5 - Driving Power BI automation through monitoring
Power Saturday 2019 C5 - Driving Power BI automation through monitoringPower Saturday 2019 C5 - Driving Power BI automation through monitoring
Power Saturday 2019 C5 - Driving Power BI automation through monitoringPowerSaturdayParis
 
Power Saturday 2019 A6 - les nouveautés SQL Server 2019 et le Big Data
Power Saturday 2019 A6 - les nouveautés SQL Server 2019 et le Big DataPower Saturday 2019 A6 - les nouveautés SQL Server 2019 et le Big Data
Power Saturday 2019 A6 - les nouveautés SQL Server 2019 et le Big DataPowerSaturdayParis
 
Power Saturday 2019 A3 - Azure Data Factory deep dive
Power Saturday 2019 A3 - Azure Data Factory deep divePower Saturday 2019 A3 - Azure Data Factory deep dive
Power Saturday 2019 A3 - Azure Data Factory deep divePowerSaturdayParis
 
Power Saturday 2019 B6 - SQL Server installation cookbook
Power Saturday 2019 B6 - SQL Server installation cookbookPower Saturday 2019 B6 - SQL Server installation cookbook
Power Saturday 2019 B6 - SQL Server installation cookbookPowerSaturdayParis
 
Power Saturday 2019 B4 - From relational to Multimodel Azure Cosmos DB
Power Saturday 2019 B4 - From relational to Multimodel Azure Cosmos DBPower Saturday 2019 B4 - From relational to Multimodel Azure Cosmos DB
Power Saturday 2019 B4 - From relational to Multimodel Azure Cosmos DBPowerSaturdayParis
 

More from PowerSaturdayParis (20)

Power Saturday 2019 S2 - Version avancée de création de Teams en libre service
Power Saturday 2019 S2 - Version avancée de création de Teams en libre servicePower Saturday 2019 S2 - Version avancée de création de Teams en libre service
Power Saturday 2019 S2 - Version avancée de création de Teams en libre service
 
Power Saturday 2019 F2 - La combinaison de Dynamics 365 avec la Power Platform
Power Saturday 2019 F2 - La combinaison de Dynamics 365 avec la Power PlatformPower Saturday 2019 F2 - La combinaison de Dynamics 365 avec la Power Platform
Power Saturday 2019 F2 - La combinaison de Dynamics 365 avec la Power Platform
 
Power Saturday 2019 E6 - Day-to-day processes optimization in Office 365
Power Saturday 2019 E6 - Day-to-day processes optimization in Office 365Power Saturday 2019 E6 - Day-to-day processes optimization in Office 365
Power Saturday 2019 E6 - Day-to-day processes optimization in Office 365
 
Power Saturday 2019 F6 - I developed a SPFx solution, what to do next and how...
Power Saturday 2019 F6 - I developed a SPFx solution, what to do next and how...Power Saturday 2019 F6 - I developed a SPFx solution, what to do next and how...
Power Saturday 2019 F6 - I developed a SPFx solution, what to do next and how...
 
Power Saturday 2019 F4 - The rise of the citizen developer
Power Saturday 2019 F4 - The rise of the citizen developerPower Saturday 2019 F4 - The rise of the citizen developer
Power Saturday 2019 F4 - The rise of the citizen developer
 
Power Saturday 2019 F3 - Enabling external sharing in Office365 SharePoint an...
Power Saturday 2019 F3 - Enabling external sharing in Office365 SharePoint an...Power Saturday 2019 F3 - Enabling external sharing in Office365 SharePoint an...
Power Saturday 2019 F3 - Enabling external sharing in Office365 SharePoint an...
 
Power Saturday 2019 E5 - Spice up your SharePoint lists with PowerApps forms
Power Saturday 2019 E5 - Spice up your SharePoint lists with PowerApps formsPower Saturday 2019 E5 - Spice up your SharePoint lists with PowerApps forms
Power Saturday 2019 E5 - Spice up your SharePoint lists with PowerApps forms
 
Power Saturday 2019 E3 - SharePoint unexplained
Power Saturday 2019 E3 - SharePoint unexplainedPower Saturday 2019 E3 - SharePoint unexplained
Power Saturday 2019 E3 - SharePoint unexplained
 
Power Saturday 2019 - D6 - Design thinking and innovation accounting
Power Saturday 2019 - D6 - Design thinking and innovation accountingPower Saturday 2019 - D6 - Design thinking and innovation accounting
Power Saturday 2019 - D6 - Design thinking and innovation accounting
 
Power Saturday 2019 - D4 - Doctor Fow best practices
Power Saturday 2019 - D4 - Doctor Fow best practicesPower Saturday 2019 - D4 - Doctor Fow best practices
Power Saturday 2019 - D4 - Doctor Fow best practices
 
Power Saturday 2019 C4 - CALCULATE the Swiss Army Knife in DAX
Power Saturday 2019 C4 - CALCULATE the Swiss Army Knife in DAXPower Saturday 2019 C4 - CALCULATE the Swiss Army Knife in DAX
Power Saturday 2019 C4 - CALCULATE the Swiss Army Knife in DAX
 
Power Saturday 2019 C1 - Power BI embedded
Power Saturday 2019 C1 - Power BI embeddedPower Saturday 2019 C1 - Power BI embedded
Power Saturday 2019 C1 - Power BI embedded
 
Power Saturday 2019 D3 - Contruisons une solution de OnBoarding avec Graph et...
Power Saturday 2019 D3 - Contruisons une solution de OnBoarding avec Graph et...Power Saturday 2019 D3 - Contruisons une solution de OnBoarding avec Graph et...
Power Saturday 2019 D3 - Contruisons une solution de OnBoarding avec Graph et...
 
Power Saturday 2019 D2 - Capture your store visit with PowerApps
Power Saturday 2019 D2 - Capture your store visit with PowerAppsPower Saturday 2019 D2 - Capture your store visit with PowerApps
Power Saturday 2019 D2 - Capture your store visit with PowerApps
 
Power Saturday 2019 C6 - Power BI + Machine Learning = AutoML
Power Saturday 2019 C6 - Power BI + Machine Learning = AutoMLPower Saturday 2019 C6 - Power BI + Machine Learning = AutoML
Power Saturday 2019 C6 - Power BI + Machine Learning = AutoML
 
Power Saturday 2019 C5 - Driving Power BI automation through monitoring
Power Saturday 2019 C5 - Driving Power BI automation through monitoringPower Saturday 2019 C5 - Driving Power BI automation through monitoring
Power Saturday 2019 C5 - Driving Power BI automation through monitoring
 
Power Saturday 2019 A6 - les nouveautés SQL Server 2019 et le Big Data
Power Saturday 2019 A6 - les nouveautés SQL Server 2019 et le Big DataPower Saturday 2019 A6 - les nouveautés SQL Server 2019 et le Big Data
Power Saturday 2019 A6 - les nouveautés SQL Server 2019 et le Big Data
 
Power Saturday 2019 A3 - Azure Data Factory deep dive
Power Saturday 2019 A3 - Azure Data Factory deep divePower Saturday 2019 A3 - Azure Data Factory deep dive
Power Saturday 2019 A3 - Azure Data Factory deep dive
 
Power Saturday 2019 B6 - SQL Server installation cookbook
Power Saturday 2019 B6 - SQL Server installation cookbookPower Saturday 2019 B6 - SQL Server installation cookbook
Power Saturday 2019 B6 - SQL Server installation cookbook
 
Power Saturday 2019 B4 - From relational to Multimodel Azure Cosmos DB
Power Saturday 2019 B4 - From relational to Multimodel Azure Cosmos DBPower Saturday 2019 B4 - From relational to Multimodel Azure Cosmos DB
Power Saturday 2019 B4 - From relational to Multimodel Azure Cosmos DB
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Power Saturday 2019 E1 - Office 365 security

  • 1. Security for the productive enterprise in a mobile-first cloud-first world Khalid Hussain MCT | Cloud Solution Architect | Microsoft | AWS | GCP @ Bechtle AG Microsoft 365 Security and Compliance
  • 2. On-premises / Private cloud devices datausers apps THE WORLD BEFORE MOBILITY & CLOUD
  • 3. On-premises / Private cloud CLOUD APPS & SAAS SERVICES
  • 4. On-premises / Private cloud MOBILE AND PERSONAL DEVICES
  • 7. Microsoft 365 Security and Compliance Digital transformation Protect at the front door Protect your data, anywhere Detect and remediate attacks Agenda
  • 8. of employees say mobile business apps change how they work 80% of employees use non-approved SaaS apps for work 41% 85% of enterprise organizations keep sensitive information in the cloud On-premises
  • 11. THE PROBLEM The security you need integrated with the productivity tools you want Productivity Secure On-premises OR Security It’s a delicate balance
  • 12. Information Rights Management Mobile Device & Application Management Cloud Access Security Broker SIEM Data Loss Prevention User & Entity Behavioral Analytics Mobile Data Loss Prevention Threat Detection Identity governance Single- sign on Cloud Data Loss Prevention Conditional access Discovery Cloud visibility Secure collaboration Cloud anomaly detection Identity & Access Management
  • 13. Identity & Access Management Mobile Device & Application Management Data Loss Prevention User & Entity Behavioral Analytics Cloud Access Security Broker Information Rights Management Protect at the front door Detect & remediate attacks Protect your data anywhere Cloud Access Security Broker Mobile Device & App Management Identity & Access Management User & Entity Behavioral Analytics Data Loss Prevention Cloud Access Security Broker
  • 14. Protect at the front door Detect & remediate attacks Protect your data anywhere
  • 15. Mobile device & app management Information protection Identity and access management Threat protection Holistic and innovative solutions for protection across users, devices, apps and data Protect at the front door Detect & remediate attacks Protect your data anywhere
  • 16. Microsoft 365 Security and Compliance Protect at the front door Detect & remediate attacks Protect your data anywhere
  • 17. Protect at the front door Detect & remediate attacks Protect your data anywhere Microsoft 365 Security and Compliance
  • 18. of hacking breaches leverage stolen and/or weak passwords 81% Microsoft 365 Security and Compliance Protect at the front door Verizon 2017 Data Breach Investigation Report
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. EXE
  • 24.
  • 26. ZAP
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Who is accessing? What is their role? Is the account compromised? Where is the user based? From where is the user signing in? Is the IP anonymous? Which app is being accessed? What is the business impact? Is the device healthy? Is it managed? Has it been in a botnet? What data is being accessed? Is it classified? Is it allowed off premises?
  • 34. Bing Xbox Live OneDrive Microsoft Digital Crimes Unit Microsoft Cyber Defense Operations Center Azure Microsoft Accounts Skype Enterprise Mobility + Security Azure Active Directory
  • 35. IF Privileged user? Credentials found in public? Accessing sensitive app? Unmanaged device? Malware detected? IP detected in Botnet? Impossible travel? Anonymous client? High Medium Low User risk 10TB per day THEN Require MFA Allow access Deny access Force password reset****** Limit access High Medium Low Session risk
  • 36. Enforce on-demand,just-in-time administrative access when needed Use Alert, Audit Reports and Access Review Domain User Global Administrator Discover, restrict, and monitor privileged identities Domain User Administrator privileges expire after a specified interval
  • 37. USER Role: Sales Account Rep Group: London Users Client: Mobile Config: Corp Proxy Location: London, UK Last Sign-in: 5 hrs ago CONDITIONAL ACCESS RISK Health:Fully patched Config:Managed Last seen: London, UK High Medium Low Allow access TRAVEL EXPENSE APP
  • 38. USER Role: VP Marketing Group: Executive Users Client: Mobile Config: Corp Proxy Location: London, UK Last Sign-in: 5 hrs ago CONDITIONAL ACCESS RISK Health:Fully patched Config:Managed Last seen: London, UK High Medium Low Require MFA CONFIDENTIAL SALES APP CONDITIONAL ACCESS POLICY User is a member of a sensitive group. Application is classified High Business Impact.
  • 39. USER Role: Sales Account Representative Group: London Users Client: Mobile Config: Corp Proxy Location: London, UK Last Sign-in: 5 hrs ago SALES APP CONDITIONAL ACCESS RISK Health: Unknown Client: Browser Config: Anonymous Last seen: Asia High Medium Low Anonymous IP Unfamiliar sign-in location for this user Block access Force password reset
  • 40. Microsoft 365 Security and Compliance Protect at the front door Demo
  • 41. Protect at the front door Detect & remediate attacks Protect your data anywhere Microsoft 365 Security and Compliance
  • 42. Microsoft 365 Security and Compliance Protect your data anywhere of workers have accidentally shared sensitive data to the wrong person 58% Stroz Friedberg
  • 43. How much control do you have over data? OUT OF YOUR CONTROL
  • 44. Who is accessing? What is their role? Is the account compromised? Where is the user based? From where is the user signing in? Is the IP anonymous? Which app is being accessed? What is the business impact? Is the device healthy? Is it managed? Has it been in a botnet? What data is being accessed? Is it classified? Is it allowed off premises?
  • 45. How do I protect corporate files on mobile devices? How do I protect the data that’s shared externally? How do I discover and protect data in SaaS apps? How do I protect sensitive data on premises and in the cloud?
  • 46. OUT OF YOUR CONTROL Classification, labeling, and protection for sensitive data on-premises and in the cloud Data protection on mobile devices Data visibility and protection in cloud and SaaS applications
  • 47. Protect sensitive data on-premises and in the cloud Classification and labeling Classify data based on sensitivity and add labels— manually or automatically. Protection Encrypt your sensitive data and define usage rights or add visual markings when needed. Monitoring Use detailed tracking and reporting to see what’s happening with your shared data and maintain control over it.
  • 48. Gain visibility and control over data in cloud apps Cloud discovery Discover cloud apps used in your organization, get a risk assessment and alerts on risky usage. Data visibility Gain deep visibility into where data travels by investigating all activities, files and accounts for managed apps. Data control Monitor and protect personal and sensitive data stored in cloud apps using granular policies.
  • 49. Role: Finance Group: Contoso Finance Office: London, UK INTERNAL Azure information protection Identifies document tagged INTERNAL being shared publicly Move to quarantine Restricted to owner USER Uploaded to public share Admin notified about problem. CLOUD APP SECURITY PORTAL
  • 50. Advanced device management Enforce device encryption, password/PIN requirements, jailbreak/root detection, etc. Device security configuration Restrict access to specific applications or URL addresses on mobile devices and PCs. Restrict apps and URLs Managed apps Personal appsPersonal apps MDM (3rd party or Intune) optional Managed apps Corporate data Personal data Multi-identity policy Control company data after it has been accessed, and separate it from personal data. Data control / separation
  • 51. USER User is prompted to create a PIN User edits document stored in OneDrive for Business User saves document to… User adds business account to OneDrive app Intune configures app protection policy OneDrive for Business Allow access • Copy/Paste/SaveAs controls • PIN required • Encrypt storage
  • 52. Microsoft 365 Security and Compliance Protect your data anywhere Demo
  • 53. Protect at the front door Detect & remediate attacks Protect your data anywhere Microsoft 365 Security and Compliance
  • 54. Detect & remediate attacks Microsoft 365 Security and Compliance PhishMe 2016 of cyberattacks and the resulting data breach begin with a spear phishing email 91%
  • 55. How quickly are you able to detect attacks?
  • 56. How do I detect attackers moving laterally in my environment? How do I detect Pass-the-Hash? Pass-the-Ticket? How do I detect compromised credentials? Aren’t rules-based security solutions enough? How can I remediate in real-time? Automatically?
  • 57. On-premises abnormal behavior and advanced threat detection Identity-based attack and threat detection Anomaly detection for cloud apps ! ! !
  • 58. Monitors behaviors of users and other entities by using multiple data-sources Profiles behavior and detects anomalies by using machine learning algorithms Evaluates the activity of users and other entities to detect advanced attacks Credit card companies monitor cardholders’ behavior. By observing purchases, behavioral analytics learn what behavior is typical for each buyer. If there is any abnormal activity, they will notify the cardholder to verify charge. $$$ $ 3 hours
  • 59.
  • 60.
  • 61.
  • 62. USER Anonymous user behavior Unfamiliar sign-in location ATTACKER Phishing attack User account is compromised # Attacker attempts lateral movement Attacker accesses sensitive data Privileged account compromised Anonymous user behavior Lateral movement attacks Escalation of privileges Account impersonation Data exfiltration Attacker steals sensitive data Cloud data & SaaS apps Zero-day / brute-force attack
  • 63. Detect & remediate attacks Microsoft 365 Security and Compliance Demo
  • 64. Apps Risk MICROSOFT INTUNE Make sure your devices are compliant and secure, while protecting data at the application level AZURE ACTIVE DIRECTORY Ensure only authorized users are granted access to personal data using risk-based conditional access MICROSOFT CLOUD APP SECURITY Gain deep visibility, strong controls and enhanced threat protection for data stored in cloud apps AZURE INFORMATION PROTECTION Classify, label, protect and audit data for persistent security throughout the complete data lifecycle MICROSOFT ADVANCED THREAT ANALYTICS Detect breaches before they cause damage by identifying abnormal behavior, known malicious attacks and security issues ! Device ! Access granted to data CONDITIONAL ACCESS Classify LabelAudit Protect ! ! Location
  • 65. Mobile device & app management Information protection Holistic and innovative solutions for protection across users, devices, apps and data Azure Active Directory Premium Microsoft Intune Azure Information Protection Microsoft Cloud App Security Microsoft Advanced Threat Analytics Identity and access management Threat protection