SlideShare a Scribd company logo
Aptera Presents:
Security and
Compliance in
Office 365
Mark Gordon
Enterprise Architect
How storing your data in the cloud
can be even more secure than
storing them on premises
Agenda
• Businesses Security and Compliance needs
• Office 365 Security and Compliance
• Demonstration of Compliance Capabilities
• Next Steps
Common Examples of Compliance Regulations
Transparency/Audit
• 21 CFR Part 11 AuditTrail
• SEC
• SAS 70Type I andType II
Privacy/Non Disclosure
•HIPAA
•ITAR
•FISMA
•FERPA
•EU model clauses
•Gramm-Leach-Blily
Legal
• Hold and E Discovery
• Three common types of
compliance concerns
• Most businesses will have
some of all three
• Office 365 can be part of
compliant solutions for these
regulations
Common Compliance Requirements that can be met in Office
365
SeeTHIS link for a framework to build your compliance plan
Healthcare
• HIPAA
• FISMA
• Legal Discovery
• 21 CFR Part 11 AuditTrail
HighTech/Manufacturing
• ITAR
• ISO 27001
• Legal Discovery
• EU Model Clauses
Finance
• PCI
• Gramm–Leach–Bliley Act
• Legal Discovery
• Internal/External Audit
• Compliance starts with and is
most importantly corporate
policy
• Compliance is implemented
through IT systems
• If your technology is not
compliant you are not compliant
• Just because your technology is
compliant does not make you
compliant
Office 365Trust Center – http:trustoffice365.com
Office 365 Compliance
• HIPAA Business Associate Agreement
• ISO 27001
• EU Model Clauses
• DPA-Data Processing Agreement
• FISMA
• ITAR
• FERPA
• External Audit
Office 365 Security
• Modular Datacenters
– No access to individual computing
components
– Very small IT staff onsite
• PhysicalAccess Controls
– Biometric
– RFID – Location known and recorded
at all times
• Physical Security
• Redundancy and Disaster Recovery
• Network
SecurityThreats and Countermeasures
Threats
• Stolen Password
• Data Leakage
• UnsecureTransport
• Lost Devices
– Computer
– Mobile
– USB Drive
• Disk Failures
• Internal theft of Data
• Blind Subpoena
• DOS / Unavailability
Countermeasures
• Two FactorAuthentication
• Mail Encryption
• DLP Policy
• Remote DeviceWipe
• Hard Drive Encryption
• Portable File Encryption
• Redundant Storage
• Physical and Employee Security
• Encryption inTransit
• Encryption at Rest
• Throttling / 99.98 quarterly uptime
Protecting from Stolen Passwords:
Multi-factor Authentication
Implementation
• Built in to Office 365
• Works with your locally managed AD
accounts
• Simple to implement
• Implement forGlobal Administrators
or any other users who have access
to high risk information
• User can change 2nd factor method
Requirements
• Access to phone or mobile device
• Options
– Text
– Application
– Phone Call
Multi-factor Authentication
Demo
Protecting e-mail and documents in transit:
Encryption Options
• E-mail
– Office 365 Mail Encryption
– TLSTransport Rules
• Documents/Communications
– All client traffic encrypted
• Lync
• Outlook
• Office
• Browser
• Encrypted mail is hosted on a
web server from the Microsoft
Datacenter
• Recipients get e-mail with a
link to the message
• TLS is easier for the recipient
and can be secure
DLP - Encrypted E-mail andTLS
Demo
Protecting against lost or stolen devices
Device Security Policy
• Device Password
• Remote DeviceWipe
• Bad Password Count Lockout
• Bad Password Count Reset
RemoteWipe
• Can be done from any browser
by the device owner or an
administrator
Remote DeviceWipe
Demo
Protecting Files on any media or device
Information Rights Management
• Portable Encryption
– Works on any device or storage medium
• Access to document can be revoked
– Person leaves company or project
– Document can expire
• Granular access rights
– Read
– Copy
– Print
– Forward
Portable File Encryption
Demo
E-Discovery – Hold – Retention Policy
E-Discovery
• DiscoveryAgents
• Email, Documents, Lync
• Search options
• Exporting results
In Place Hold
• By search criteria
• Mailbox legal hold
– Retention period
Retention Policy
• Defines when items are destroyed or
moved
• Can be managed by user and/or set by
policy
Discovery-Hold-Retention
Demo
Encryption at Rest
BYOE – BringYour Own Encryption
Provider Encryption at Rest
• Protects against
– Physical access to disks
• Does not protect against
– Blind Subpoena
– Programmatic Access to your Data
– Administrator Access to your Data
• Native Support for
– Read/Write
– Search and Index
– Remote Access
BYOE
• Protects against
– Physical access to disks
– Blind Subpoena
– Programmatic Access to your Data
– Administrator Access to your Data
• Must Allow Support for
– Read/Write
– Search and Index
– Remote Access
BYOE Architecture e-mail
From: Mia To:Vincent
Vincent, attached is the
customer’s SSN and Credit-
Card information.
From: Mia To:Vincent
躎疓拺鴵鍔漼軴唺傖듌鐴
給섐럑蜖虝私乴諡䂸䄙舅
矇潹솴湶썙鑡㨜争껎㾔뻚
From: Mia To:Vincent
躎疓拺鴵鍔漼軴唺傖듌鐴
給섐럑蜖虝私乴諡䂸䄙舅
矇潹솴湶썙鑡㨜争껎㾔뻚
From: Mia To:Vincent
Vincent, attached is the
customer’s SSN and Credit-
Card information.
From: Mia To:Vincent
躎疓拺鴵鍔漼軴唺傖듌鐴
給섐럑蜖虝私乴諡䂸䄙舅
矇潹솴湶썙鑡㨜争껎㾔뻚
Action Plan
Identify Owners for
• Document/mail retention
• Legal Hold/Discovery
• Compliance
• Security Policy
• Disaster Recovery
Define your Corporate
• Compliance requirements
• Security Policy
• Retention Policy
• Legal/Discovery-Hold Policy
• Disaster Recovery Plan
Match against currently
systems
• Compliance capabilities
• Security capabilities
• Retention capabilities
• Legal/Discovery-Hold capabilities
Evaluate Office 365 Capabilities
• Compliance
• Security
• Availability/Recovery
• Retention
• Legal
Next Step:
Free Aptera
Compliance and
Security Strategy
Review
SurfaceWinner!
Questions?
Email:
secure@apterainc.com
Phone:
260-739-1949
References
• Free 30 day Office 365Trial
• Office 365 Service Updates
• Office 365 Service Descriptions
• Office 365 Privacy, Security and Compliance
• Office 365 security white paper

More Related Content

What's hot

Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
Avi Networks
 
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays
 
SharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceSharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and Compliance
Matthew R. Barrett
 
Guide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaGuide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in China
Alibaba Cloud
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
Courion Corporation
 
Работење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементираРаботење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементира
Metamorphosis
 
Salesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data Protection
CipherCloud
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
ForgeRock
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
Dock 365
 
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Bitglass
 
The Share Responsibility Model of Cloud Computing - ILTA Philadelphia
The Share Responsibility Model of Cloud Computing - ILTA PhiladelphiaThe Share Responsibility Model of Cloud Computing - ILTA Philadelphia
The Share Responsibility Model of Cloud Computing - ILTA Philadelphia
Patrick Sklodowski
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
Bitglass
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maio
AntonioMaio2
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
Michelangelo van Dam
 
SIEM & IAM
SIEM & IAMSIEM & IAM
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Sonja Madsen
 
Sirius for business
Sirius for business Sirius for business
Sirius for business
Mandy Collings
 
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWSAWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
Amazon Web Services
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
Bitglass
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
David J Rosenthal
 

What's hot (20)

Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
 
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
 
SharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceSharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and Compliance
 
Guide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaGuide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in China
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
 
Работење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементираРаботење во облак – Демо на Office 365 и како да се имплементира
Работење во облак – Демо на Office 365 и како да се имплементира
 
Salesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data Protection
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
 
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
 
The Share Responsibility Model of Cloud Computing - ILTA Philadelphia
The Share Responsibility Model of Cloud Computing - ILTA PhiladelphiaThe Share Responsibility Model of Cloud Computing - ILTA Philadelphia
The Share Responsibility Model of Cloud Computing - ILTA Philadelphia
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maio
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
SIEM & IAM
SIEM & IAMSIEM & IAM
SIEM & IAM
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
 
Sirius for business
Sirius for business Sirius for business
Sirius for business
 
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWSAWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 

Similar to Learning about Security and Compliance in Office 365

Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
Nicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Nicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
Nicholas Davis
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
Christopher Kranich
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
Precisely
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Precisely
 
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
Waterstons Ltd
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
TechSoup
 
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
Health IT Conference – iHT2
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Robert Crane
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
Andy Talbot
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365
Miguel Isidoro
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
MongoDB
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking About
Quest
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
Precisely
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
Andris Soroka
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
Quest
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Precisely
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)
Igor Zboran
 

Similar to Learning about Security and Compliance in Office 365 (20)

Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
 
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking About
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)
 

More from Aptera Inc

Gdd geoff daigle-june2016
Gdd geoff daigle-june2016Gdd geoff daigle-june2016
Gdd geoff daigle-june2016
Aptera Inc
 
Theres no quick fix to your seo
Theres no quick fix to your seoTheres no quick fix to your seo
Theres no quick fix to your seo
Aptera Inc
 
Enterprise Mobile Apps. Cross-Platform that Works
Enterprise Mobile Apps. Cross-Platform that WorksEnterprise Mobile Apps. Cross-Platform that Works
Enterprise Mobile Apps. Cross-Platform that Works
Aptera Inc
 
Designing your Website to Match Business Goals
Designing your Website to Match Business GoalsDesigning your Website to Match Business Goals
Designing your Website to Match Business Goals
Aptera Inc
 
SharePoint Governance with Aptera
SharePoint Governance with ApteraSharePoint Governance with Aptera
SharePoint Governance with Aptera
Aptera Inc
 
How to Capitalize on the Growth of Data
How to Capitalize on the Growth of DataHow to Capitalize on the Growth of Data
How to Capitalize on the Growth of Data
Aptera Inc
 
6 Mobile Strategy Priorities to Consider for 2015
6 Mobile Strategy Priorities to Consider for 20156 Mobile Strategy Priorities to Consider for 2015
6 Mobile Strategy Priorities to Consider for 2015
Aptera Inc
 
Inbound Methodology: The Secret to Digital Marketing Success
Inbound Methodology: The Secret to Digital Marketing SuccessInbound Methodology: The Secret to Digital Marketing Success
Inbound Methodology: The Secret to Digital Marketing Success
Aptera Inc
 
How to Encourage SharePoint User Adoption
How to Encourage SharePoint User AdoptionHow to Encourage SharePoint User Adoption
How to Encourage SharePoint User Adoption
Aptera Inc
 
Better Decision-Making with Power BI
Better Decision-Making with Power BIBetter Decision-Making with Power BI
Better Decision-Making with Power BI
Aptera Inc
 
Testing Your Mobility in SharePoint 2013
Testing Your Mobility in SharePoint 2013Testing Your Mobility in SharePoint 2013
Testing Your Mobility in SharePoint 2013
Aptera Inc
 
Little Steps to BIG Data
Little Steps to BIG DataLittle Steps to BIG Data
Little Steps to BIG Data
Aptera Inc
 
OneDrive to Rule Them All
OneDrive to Rule Them AllOneDrive to Rule Them All
OneDrive to Rule Them All
Aptera Inc
 
The Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureThe Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft Azure
Aptera Inc
 
What is Office 365? A Simple Answer
What is Office 365? A Simple AnswerWhat is Office 365? A Simple Answer
What is Office 365? A Simple Answer
Aptera Inc
 
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & ApteraWhat's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
Aptera Inc
 
Aptera Cloud Event 2013 - Mobile Services using Azure - Matt Noggle
Aptera Cloud Event 2013 - Mobile Services using Azure - Matt NoggleAptera Cloud Event 2013 - Mobile Services using Azure - Matt Noggle
Aptera Cloud Event 2013 - Mobile Services using Azure - Matt Noggle
Aptera Inc
 
Aptera Cloud Event 2013 - Windows Intune - Eric Rupp
Aptera Cloud Event 2013 - Windows Intune - Eric RuppAptera Cloud Event 2013 - Windows Intune - Eric Rupp
Aptera Cloud Event 2013 - Windows Intune - Eric Rupp
Aptera Inc
 
Aptera Cloud Event 2013 - Deploying Active Directory - Andy Miller
Aptera Cloud Event 2013 - Deploying Active Directory - Andy MillerAptera Cloud Event 2013 - Deploying Active Directory - Andy Miller
Aptera Cloud Event 2013 - Deploying Active Directory - Andy Miller
Aptera Inc
 
New Hosting Options for SharePoint 2013
New Hosting Options for SharePoint 2013New Hosting Options for SharePoint 2013
New Hosting Options for SharePoint 2013
Aptera Inc
 

More from Aptera Inc (20)

Gdd geoff daigle-june2016
Gdd geoff daigle-june2016Gdd geoff daigle-june2016
Gdd geoff daigle-june2016
 
Theres no quick fix to your seo
Theres no quick fix to your seoTheres no quick fix to your seo
Theres no quick fix to your seo
 
Enterprise Mobile Apps. Cross-Platform that Works
Enterprise Mobile Apps. Cross-Platform that WorksEnterprise Mobile Apps. Cross-Platform that Works
Enterprise Mobile Apps. Cross-Platform that Works
 
Designing your Website to Match Business Goals
Designing your Website to Match Business GoalsDesigning your Website to Match Business Goals
Designing your Website to Match Business Goals
 
SharePoint Governance with Aptera
SharePoint Governance with ApteraSharePoint Governance with Aptera
SharePoint Governance with Aptera
 
How to Capitalize on the Growth of Data
How to Capitalize on the Growth of DataHow to Capitalize on the Growth of Data
How to Capitalize on the Growth of Data
 
6 Mobile Strategy Priorities to Consider for 2015
6 Mobile Strategy Priorities to Consider for 20156 Mobile Strategy Priorities to Consider for 2015
6 Mobile Strategy Priorities to Consider for 2015
 
Inbound Methodology: The Secret to Digital Marketing Success
Inbound Methodology: The Secret to Digital Marketing SuccessInbound Methodology: The Secret to Digital Marketing Success
Inbound Methodology: The Secret to Digital Marketing Success
 
How to Encourage SharePoint User Adoption
How to Encourage SharePoint User AdoptionHow to Encourage SharePoint User Adoption
How to Encourage SharePoint User Adoption
 
Better Decision-Making with Power BI
Better Decision-Making with Power BIBetter Decision-Making with Power BI
Better Decision-Making with Power BI
 
Testing Your Mobility in SharePoint 2013
Testing Your Mobility in SharePoint 2013Testing Your Mobility in SharePoint 2013
Testing Your Mobility in SharePoint 2013
 
Little Steps to BIG Data
Little Steps to BIG DataLittle Steps to BIG Data
Little Steps to BIG Data
 
OneDrive to Rule Them All
OneDrive to Rule Them AllOneDrive to Rule Them All
OneDrive to Rule Them All
 
The Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureThe Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft Azure
 
What is Office 365? A Simple Answer
What is Office 365? A Simple AnswerWhat is Office 365? A Simple Answer
What is Office 365? A Simple Answer
 
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & ApteraWhat's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
 
Aptera Cloud Event 2013 - Mobile Services using Azure - Matt Noggle
Aptera Cloud Event 2013 - Mobile Services using Azure - Matt NoggleAptera Cloud Event 2013 - Mobile Services using Azure - Matt Noggle
Aptera Cloud Event 2013 - Mobile Services using Azure - Matt Noggle
 
Aptera Cloud Event 2013 - Windows Intune - Eric Rupp
Aptera Cloud Event 2013 - Windows Intune - Eric RuppAptera Cloud Event 2013 - Windows Intune - Eric Rupp
Aptera Cloud Event 2013 - Windows Intune - Eric Rupp
 
Aptera Cloud Event 2013 - Deploying Active Directory - Andy Miller
Aptera Cloud Event 2013 - Deploying Active Directory - Andy MillerAptera Cloud Event 2013 - Deploying Active Directory - Andy Miller
Aptera Cloud Event 2013 - Deploying Active Directory - Andy Miller
 
New Hosting Options for SharePoint 2013
New Hosting Options for SharePoint 2013New Hosting Options for SharePoint 2013
New Hosting Options for SharePoint 2013
 

Recently uploaded

OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
Hironori Washizaki
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 

Recently uploaded (20)

OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 

Learning about Security and Compliance in Office 365

  • 1. Aptera Presents: Security and Compliance in Office 365 Mark Gordon Enterprise Architect How storing your data in the cloud can be even more secure than storing them on premises
  • 2. Agenda • Businesses Security and Compliance needs • Office 365 Security and Compliance • Demonstration of Compliance Capabilities • Next Steps
  • 3. Common Examples of Compliance Regulations Transparency/Audit • 21 CFR Part 11 AuditTrail • SEC • SAS 70Type I andType II Privacy/Non Disclosure •HIPAA •ITAR •FISMA •FERPA •EU model clauses •Gramm-Leach-Blily Legal • Hold and E Discovery • Three common types of compliance concerns • Most businesses will have some of all three • Office 365 can be part of compliant solutions for these regulations
  • 4. Common Compliance Requirements that can be met in Office 365 SeeTHIS link for a framework to build your compliance plan Healthcare • HIPAA • FISMA • Legal Discovery • 21 CFR Part 11 AuditTrail HighTech/Manufacturing • ITAR • ISO 27001 • Legal Discovery • EU Model Clauses Finance • PCI • Gramm–Leach–Bliley Act • Legal Discovery • Internal/External Audit • Compliance starts with and is most importantly corporate policy • Compliance is implemented through IT systems • If your technology is not compliant you are not compliant • Just because your technology is compliant does not make you compliant
  • 5. Office 365Trust Center – http:trustoffice365.com Office 365 Compliance • HIPAA Business Associate Agreement • ISO 27001 • EU Model Clauses • DPA-Data Processing Agreement • FISMA • ITAR • FERPA • External Audit
  • 6. Office 365 Security • Modular Datacenters – No access to individual computing components – Very small IT staff onsite • PhysicalAccess Controls – Biometric – RFID – Location known and recorded at all times • Physical Security • Redundancy and Disaster Recovery • Network
  • 7. SecurityThreats and Countermeasures Threats • Stolen Password • Data Leakage • UnsecureTransport • Lost Devices – Computer – Mobile – USB Drive • Disk Failures • Internal theft of Data • Blind Subpoena • DOS / Unavailability Countermeasures • Two FactorAuthentication • Mail Encryption • DLP Policy • Remote DeviceWipe • Hard Drive Encryption • Portable File Encryption • Redundant Storage • Physical and Employee Security • Encryption inTransit • Encryption at Rest • Throttling / 99.98 quarterly uptime
  • 8. Protecting from Stolen Passwords: Multi-factor Authentication Implementation • Built in to Office 365 • Works with your locally managed AD accounts • Simple to implement • Implement forGlobal Administrators or any other users who have access to high risk information • User can change 2nd factor method Requirements • Access to phone or mobile device • Options – Text – Application – Phone Call
  • 10. Protecting e-mail and documents in transit: Encryption Options • E-mail – Office 365 Mail Encryption – TLSTransport Rules • Documents/Communications – All client traffic encrypted • Lync • Outlook • Office • Browser • Encrypted mail is hosted on a web server from the Microsoft Datacenter • Recipients get e-mail with a link to the message • TLS is easier for the recipient and can be secure
  • 11. DLP - Encrypted E-mail andTLS Demo
  • 12. Protecting against lost or stolen devices Device Security Policy • Device Password • Remote DeviceWipe • Bad Password Count Lockout • Bad Password Count Reset RemoteWipe • Can be done from any browser by the device owner or an administrator
  • 14. Protecting Files on any media or device Information Rights Management • Portable Encryption – Works on any device or storage medium • Access to document can be revoked – Person leaves company or project – Document can expire • Granular access rights – Read – Copy – Print – Forward
  • 16. E-Discovery – Hold – Retention Policy E-Discovery • DiscoveryAgents • Email, Documents, Lync • Search options • Exporting results In Place Hold • By search criteria • Mailbox legal hold – Retention period Retention Policy • Defines when items are destroyed or moved • Can be managed by user and/or set by policy
  • 18. Encryption at Rest BYOE – BringYour Own Encryption Provider Encryption at Rest • Protects against – Physical access to disks • Does not protect against – Blind Subpoena – Programmatic Access to your Data – Administrator Access to your Data • Native Support for – Read/Write – Search and Index – Remote Access BYOE • Protects against – Physical access to disks – Blind Subpoena – Programmatic Access to your Data – Administrator Access to your Data • Must Allow Support for – Read/Write – Search and Index – Remote Access
  • 19. BYOE Architecture e-mail From: Mia To:Vincent Vincent, attached is the customer’s SSN and Credit- Card information. From: Mia To:Vincent 躎疓拺鴵鍔漼軴唺傖듌鐴 給섐럑蜖虝私乴諡䂸䄙舅 矇潹솴湶썙鑡㨜争껎㾔뻚 From: Mia To:Vincent 躎疓拺鴵鍔漼軴唺傖듌鐴 給섐럑蜖虝私乴諡䂸䄙舅 矇潹솴湶썙鑡㨜争껎㾔뻚 From: Mia To:Vincent Vincent, attached is the customer’s SSN and Credit- Card information. From: Mia To:Vincent 躎疓拺鴵鍔漼軴唺傖듌鐴 給섐럑蜖虝私乴諡䂸䄙舅 矇潹솴湶썙鑡㨜争껎㾔뻚
  • 20. Action Plan Identify Owners for • Document/mail retention • Legal Hold/Discovery • Compliance • Security Policy • Disaster Recovery Define your Corporate • Compliance requirements • Security Policy • Retention Policy • Legal/Discovery-Hold Policy • Disaster Recovery Plan Match against currently systems • Compliance capabilities • Security capabilities • Retention capabilities • Legal/Discovery-Hold capabilities Evaluate Office 365 Capabilities • Compliance • Security • Availability/Recovery • Retention • Legal
  • 21. Next Step: Free Aptera Compliance and Security Strategy Review SurfaceWinner! Questions? Email: secure@apterainc.com Phone: 260-739-1949
  • 22. References • Free 30 day Office 365Trial • Office 365 Service Updates • Office 365 Service Descriptions • Office 365 Privacy, Security and Compliance • Office 365 security white paper