SlideShare a Scribd company logo
1 of 93
Download to read offline
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Session Objectives
Challenges today
1
What to Govern
2
Develop
your strategy
3
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Unstructured content is all over
On-premises
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
We don’t know what we don’t know
What is this?
What you use…
What you need to keep…
Dark Data
We need to establish confidence
Cost of ignoring this problem
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Balancing Act
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Information is everywhere in Office 365
Planner “Outlook
“Team”
“Team”
“Team”
“Yammer
Connected”
Group”
X
X
X X=
=
=
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
What does Microsoft offer?
Protect The FileProtect The AccessProtect The System
RMSCASBDLP
• Enterprise-Wide Classification
• Data Governance Framework
• Risk Assessment
In-House Dev
Protection @
Office 365
Cloud App Security
Advanced Security
Management
Azure Information
Protection
CLP, Windows,
Office, Mobile
• Enterprise-Wide Classification
• Data Governance Framework
• Risk Assessment
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Benefits of Good Governance
Administrative efficiency
Accurate cataloging & monitoring of adoption, usage and governance attributes for collaboration workspaces
Provable compliance with internal and external policies and regulatory requirements
Repeatable and consistent service delivery
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
How containers are
requested, approved
and created
For collaborative workspaces, we want to govern:
Governance Focus
Provisioning
How are availability,
compliance and
changes over time are
managed
Management
How do I
retain/expire/dispose of
information as
appropriate
Lifecycle
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Provisioning
• Sprawl
• Duplication
• Appropriateness
• Convention
• Cataloging
How Containers
are Born
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Management
• Monitor usage and
adoption
• Ensure users aren’t doing
what they shouldn’t
• Quota enforcement
Ongoing
Operations
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Information Lifecycle
• How do I know when a
container should be expired
• How do I get rid of it “safely”
• How do I make sure
information management
policies are enforced? (ie
retention, backup)
2.
Retention,
Expiration and
Disposition
PCs, tablets, mobile
Office 365 DLPWindows Information Protection
Azure Information Protection
Exchange Online, SharePoint
Online & OneDrive for Business
Highly regulated
Microsoft Cloud App Security
Office 365 Advanced Data Governance
Datacenters, file
shares
Azure 3rd-Party SaaS
MICROSOFT’S INFORMATION PROTECTION – VISION
Common Classification and labeling policies across all Microsoft technologies
O F F I C E 3 6 5D E V I C E S C L O U D S E R V I C E S , S A A S
A P P S & O N - P R E M I S E S
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Why do you need brakes?
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
4 steps to develop your strategy
Discover and Classify
1
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Discover and map
Where is it?
File Share
SharePoint
Office 365
Databases
Who can access it?
Who owns it?
Who can read it?
Who can edit it?
What is it?
?
File Level Analysis
Content Level Analysis
• Redundant, outdated and
trivial (ROT) data
• File types (Music, log files, etc..)
• Sensitive data
• Date Created
• Owner
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Example: Duplicate file report
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
What do you need to secure?
Regulated Data
Data that requires retention / long-term archives
ITAR / export controlled data
Gold copies or replication
Sensitive Data
“Controlled Unclassified Information” (CUI)
PII / PHI / PCI data that about employees / citizens
Classified Data
Operational security (OpSec)
Intellectual Property
Classified documents
a
DETECT SENSITIVE
INFORMATION
CLOUD & SaaS APPS
MCAS
AIP scanner
Example: Heat map of sensitive data
Example: Single pane of glass for risk
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Tag and classify
Tags
Ownership Purpose
Audience Sensitivity level
Classify
Is it a record?
Is it high business
impact?
Who should have
access?Where should it live?
HIGHLY CONFIDENTIAL
CONFIDENTIAL
GENERAL
PUBLIC
PERSONAL
Business-lead policies & rules;
configured by ITAutomatic classification
Policies can be set by IT Admins for automatically applying
classification and protection to data
Recommended classification
Based on the content you’re working on, you can be
prompted with suggested classification
Manual reclassification
You can override a classification and optionally be required
to provide a justification
User-specified classification
Users can choose to apply a sensitivity label to the email or
file they are working on with a single click
CLASSIFY INFORMATION
BASED ON SENSITIVITY
FINANCE
CONFIDENTIAL
SENSITIVITY LABELS
PERSIST WITH THE
DOCUMENT
Document labeling – what is it?
Metadata written into document files
Travels with the document as it moves
In clear text so that other systems such as a DLP engine can
read it
Used for the purpose of apply a protection action or data
governance action – determined by policy
Can be customized per the organization’s needs
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Labels are persistent and readable by other systems e.g. DLP engine
Label is metadata written to data
Sensitive data is automatically detected
CLASSIFICATION & LABELING EXAMPLE – SENSITIVE DATA
Discover personal data and apply persistent labels
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Labeling can be end-user driven
or automatically applied
CLASSIFICATION & LABELING EXAMPLE – DATA GOVERNANCE
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Define Data
Governance Policies
2
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
How do you know where to park?
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Approach to defining your policy
Build “controls”
into containers
Make sure no
one messes with
your controls
Ensure the system
is used as intended
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Example: Policy for SharePoint sites
New Project Site
Site Configuration
External
Sharing
Enabled?
Classification
of Content?
Data
Sovereignty?
Security
Permission
groups?
Outside
Vendors?
Ownership
Contacts /
Stewards?
Proactively Enforce
Policies
3
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Regional Farm
Regional Farm
Regional Farm
Regional Farm
Admins, Compliance and
Governance stakeholders
Admins, Compliance and
Governance stakeholders
Admins, Compliance and
Governance stakeholders
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
PROTECT SENSITIVE INFORMATION ACROSS
CLOUD SERVICES & ON PREMISES
Data encryption built into
Azure & Office 365
Revoke app access
File-level encryption and
permissions
Policy tips to notify and
educate end users
DLP actions to block
sharing
Visual markings to indicate
sensitive documents
Control cloud app access &
usage
Retain, expire or delete
documents
Make it Easy
to Do the
Right Thing
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
PROTECTION EXAMPLE:
DLP POLICY TO LIMIT DOCUMENT SHARING
Policy tips to warn
end users
Restrict or block sharing –
internally or externally
Across Office client applications –
mobile, desktop & tablets
Inside your
organization
Between your
business partners
With any of your
customers
Alex@Myorg.ms
Sends from
Outlook Desktop,
Windows
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Proactive enforcement with automation
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Example: Automated Classification + Quarantine
• It’s Friday 5pm and Joe needs to upload his daily documents
into SharePoint
• He doesn’t have time to classify documents and wants to go
home on time
• Company policy is that everything that goes into SharePoint
MUST be classified and Restricted information must not be
shared with Everyone
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Defining policy
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Uploading files
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Violation identified
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Classification & Compliance Enforced
Admins, Compliance and
Governance stakeholders
Report and Audit
4
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Many names, same idea
“RECERTIFICATION”
“ATTESTATION”
“ANNUAL REVIEW”
Hey! take a look…
are the current
settings still
appropriate?
If no– make the
changes.
If yes– sign off on it.
Recertification drivers may be internal (company controls),
external (regulatory requirement) or both
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
Regular Recertification
Data Ownership
Who is responsible for
the stuff in here?
Are they still here and
willing to own it?
Access Permissions
Who can do what to
the stuff in here?
Does Bob still need his
access?
Classification
Tell me about the stuff
that lives in here…
Is it sensitive?
Is it important?
MONITOR INFORMATION
PROTECTION EVENTS FOR
GREATER CONTROL
Policy violations
Document access &
sharing
App usage
Anomalous activity
End-user overrides
False positives
Visibility
Tune & revise
policies
Revoke access
Quarantine file
Quarantine user
Integrate into
workflows & SIEM
Take Action
Incident management is necessary
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
4 Steps to develop your strategy
Azure Information Protection
Learn more about Azure Information Protection
Blog – Announcing Azure Information Protection
Intro to Microsoft Cloud App Security (video)
Office 365 Information Protection
Overview of Office 365 Data Loss Prevention (DLP)
Blog – Announcing the release of Office 365 Advanced
Data Governance
File Protection Solutions in Office 365
Windows Information Protection
Blog – Introducing Windows Information Protection
Protect your enterprise data using Windows
Information Protection
RESOURCES
Dux Raymond Sy
@meetdux
Linkedin.com/in/meetdux
Dux.sy@avepoint.com
[Sy] How to Develop Your Office 365 Information Governance Strategy in 4 Steps

More Related Content

What's hot

May 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarMay 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarRobert Crane
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityAlbert Hoitingh
 
O365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi RoineO365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi RoineNCCOMMS
 
Moving from SBS to Azure
Moving from SBS to AzureMoving from SBS to Azure
Moving from SBS to AzureRobert Crane
 
Cloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMSCloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMSMorgan Simonsen
 
May 2018 Azure Need to Know Webinar
May 2018 Azure Need to Know WebinarMay 2018 Azure Need to Know Webinar
May 2018 Azure Need to Know WebinarRobert Crane
 
When Your CISO Says No - Security & Compliance in Office 365
When Your CISO Says No - Security & Compliance in Office 365When Your CISO Says No - Security & Compliance in Office 365
When Your CISO Says No - Security & Compliance in Office 365Ricardo Wilkins
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanNCCOMMS
 
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenO365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenNCCOMMS
 
CollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's newCollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's newAlbert Hoitingh
 
Microsoft Azure - Office 365 Overwrite
Microsoft Azure - Office 365 OverwriteMicrosoft Azure - Office 365 Overwrite
Microsoft Azure - Office 365 OverwriteMücahid Akçay
 
Introduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 EnterpriseIntroduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 EnterpriseRobert Crane
 
Whats new in SharePoint Online
Whats new in SharePoint OnlineWhats new in SharePoint Online
Whats new in SharePoint OnlineJayanthi P
 
Cryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideCryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideDavid J Rosenthal
 
O365Con18 - New Era of Customizing - Olli Jaaskelainen
O365Con18 - New Era of Customizing - Olli JaaskelainenO365Con18 - New Era of Customizing - Olli Jaaskelainen
O365Con18 - New Era of Customizing - Olli JaaskelainenNCCOMMS
 
The Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft AzureThe Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft AzureMicrosoft Azure
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarRobert Crane
 

What's hot (20)

May 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarMay 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know Webinar
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App Security
 
O365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi RoineO365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi Roine
 
Moving from SBS to Azure
Moving from SBS to AzureMoving from SBS to Azure
Moving from SBS to Azure
 
Cloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMSCloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMS
 
May 2018 Azure Need to Know Webinar
May 2018 Azure Need to Know WebinarMay 2018 Azure Need to Know Webinar
May 2018 Azure Need to Know Webinar
 
ECS19 - Jussi Roine - Microsoft 365 Deep Dive
ECS19 - Jussi Roine - Microsoft 365 Deep DiveECS19 - Jussi Roine - Microsoft 365 Deep Dive
ECS19 - Jussi Roine - Microsoft 365 Deep Dive
 
When Your CISO Says No - Security & Compliance in Office 365
When Your CISO Says No - Security & Compliance in Office 365When Your CISO Says No - Security & Compliance in Office 365
When Your CISO Says No - Security & Compliance in Office 365
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
 
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenO365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
 
CollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's newCollabDays BeNeLux Sensitivity labels: what's new
CollabDays BeNeLux Sensitivity labels: what's new
 
Microsoft Azure - Office 365 Overwrite
Microsoft Azure - Office 365 OverwriteMicrosoft Azure - Office 365 Overwrite
Microsoft Azure - Office 365 Overwrite
 
Introduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 EnterpriseIntroduction to Microsoft 365 Enterprise
Introduction to Microsoft 365 Enterprise
 
Whats new in SharePoint Online
Whats new in SharePoint OnlineWhats new in SharePoint Online
Whats new in SharePoint Online
 
Cryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideCryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions Guide
 
Azure AD with Office 365 and Beyond!
Azure AD with Office 365 and Beyond!Azure AD with Office 365 and Beyond!
Azure AD with Office 365 and Beyond!
 
Azure Sentinel.pptx
Azure Sentinel.pptxAzure Sentinel.pptx
Azure Sentinel.pptx
 
O365Con18 - New Era of Customizing - Olli Jaaskelainen
O365Con18 - New Era of Customizing - Olli JaaskelainenO365Con18 - New Era of Customizing - Olli Jaaskelainen
O365Con18 - New Era of Customizing - Olli Jaaskelainen
 
The Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft AzureThe Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft Azure
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know Webinar
 

Similar to [Sy] How to Develop Your Office 365 Information Governance Strategy in 4 Steps

Drive Business Value with Winning Data Governance and Compliance Strategies
Drive Business Value with Winning Data Governance and Compliance StrategiesDrive Business Value with Winning Data Governance and Compliance Strategies
Drive Business Value with Winning Data Governance and Compliance StrategiesDux Raymond Sy
 
18 May 2017 - Vuzion Love Cloud
18 May 2017 - Vuzion Love Cloud18 May 2017 - Vuzion Love Cloud
18 May 2017 - Vuzion Love CloudVuzion
 
Hadoop and Manufacturing
Hadoop and ManufacturingHadoop and Manufacturing
Hadoop and ManufacturingCloudera, Inc.
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteEdgar Alejandro Villegas
 
AvePoint: Migration as Easy as 1, 2, 3
AvePoint: Migration as Easy as 1, 2, 3AvePoint: Migration as Easy as 1, 2, 3
AvePoint: Migration as Easy as 1, 2, 3AvePoint
 
How to Effectively Prepare Your Organization's SharePoint Journey Into the Cloud
How to Effectively Prepare Your Organization's SharePoint Journey Into the CloudHow to Effectively Prepare Your Organization's SharePoint Journey Into the Cloud
How to Effectively Prepare Your Organization's SharePoint Journey Into the CloudDux Raymond Sy
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Imperva
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
Beyond the hype: Management and Governance for Office 365
Beyond the hype: Management and Governance for Office 365Beyond the hype: Management and Governance for Office 365
Beyond the hype: Management and Governance for Office 365Roberto Vazquez Delgado
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?Albert Hoitingh
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information ProtectionMicrosoft Österreich
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...☁️ Gustavo Magella
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
Five ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoptionFive ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoptionGonzalo Marcos Ansoain
 
Five ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoptionFive ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoptionGonzalo Marcos
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022lior mazor
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern
Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindernWer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern
Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindernDennis Hobmaier
 

Similar to [Sy] How to Develop Your Office 365 Information Governance Strategy in 4 Steps (20)

Drive Business Value with Winning Data Governance and Compliance Strategies
Drive Business Value with Winning Data Governance and Compliance StrategiesDrive Business Value with Winning Data Governance and Compliance Strategies
Drive Business Value with Winning Data Governance and Compliance Strategies
 
AvePoint Overview 14042016 with New Sig
AvePoint Overview 14042016 with New SigAvePoint Overview 14042016 with New Sig
AvePoint Overview 14042016 with New Sig
 
You're in the cloud! Great! Now what?
You're in the cloud! Great! Now what?You're in the cloud! Great! Now what?
You're in the cloud! Great! Now what?
 
18 May 2017 - Vuzion Love Cloud
18 May 2017 - Vuzion Love Cloud18 May 2017 - Vuzion Love Cloud
18 May 2017 - Vuzion Love Cloud
 
Hadoop and Manufacturing
Hadoop and ManufacturingHadoop and Manufacturing
Hadoop and Manufacturing
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
AvePoint: Migration as Easy as 1, 2, 3
AvePoint: Migration as Easy as 1, 2, 3AvePoint: Migration as Easy as 1, 2, 3
AvePoint: Migration as Easy as 1, 2, 3
 
How to Effectively Prepare Your Organization's SharePoint Journey Into the Cloud
How to Effectively Prepare Your Organization's SharePoint Journey Into the CloudHow to Effectively Prepare Your Organization's SharePoint Journey Into the Cloud
How to Effectively Prepare Your Organization's SharePoint Journey Into the Cloud
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Beyond the hype: Management and Governance for Office 365
Beyond the hype: Management and Governance for Office 365Beyond the hype: Management and Governance for Office 365
Beyond the hype: Management and Governance for Office 365
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Five ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoptionFive ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoption
 
Five ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoptionFive ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoption
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern
Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindernWer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern
Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern
 

More from European Collaboration Summit

ECS19 - Eric Harlan - Increasing throughput of Office 365
ECS19 - Eric Harlan - Increasing throughput of Office 365ECS19 - Eric Harlan - Increasing throughput of Office 365
ECS19 - Eric Harlan - Increasing throughput of Office 365European Collaboration Summit
 
ECS19 - Ahmad Najjar - Logic Apps vs Microsoft Flow - When, how and where?
ECS19 - Ahmad Najjar - Logic Apps vs Microsoft Flow - When, how and where?ECS19 - Ahmad Najjar - Logic Apps vs Microsoft Flow - When, how and where?
ECS19 - Ahmad Najjar - Logic Apps vs Microsoft Flow - When, how and where?European Collaboration Summit
 
ECS19 - Michael Van Horenbeeck - Divide Et Imperat Office 365 Mergers, Acquis...
ECS19 - Michael Van Horenbeeck - Divide Et Imperat Office 365 Mergers, Acquis...ECS19 - Michael Van Horenbeeck - Divide Et Imperat Office 365 Mergers, Acquis...
ECS19 - Michael Van Horenbeeck - Divide Et Imperat Office 365 Mergers, Acquis...European Collaboration Summit
 
ECS19 - Christina Wheeler - Become Data Modeling Superhero
ECS19 - Christina Wheeler - Become Data Modeling SuperheroECS19 - Christina Wheeler - Become Data Modeling Superhero
ECS19 - Christina Wheeler - Become Data Modeling SuperheroEuropean Collaboration Summit
 
ECS19 - Ahmad Najjar and Serge Luca - Power Platform Tutorial
ECS19 - Ahmad Najjar and Serge Luca - Power Platform TutorialECS19 - Ahmad Najjar and Serge Luca - Power Platform Tutorial
ECS19 - Ahmad Najjar and Serge Luca - Power Platform TutorialEuropean Collaboration Summit
 
ECS19 - Vesa Juvonen - SharePoint and Office 365 Development PowerClass
ECS19 - Vesa Juvonen - SharePoint and Office 365 Development PowerClassECS19 - Vesa Juvonen - SharePoint and Office 365 Development PowerClass
ECS19 - Vesa Juvonen - SharePoint and Office 365 Development PowerClassEuropean Collaboration Summit
 
ECS19 - Paolo Pialorsi - Building Portals with modern SharePoint experiences
ECS19 - Paolo Pialorsi - Building Portals with modern SharePoint experiencesECS19 - Paolo Pialorsi - Building Portals with modern SharePoint experiences
ECS19 - Paolo Pialorsi - Building Portals with modern SharePoint experiencesEuropean Collaboration Summit
 
ECS19 - Nik Charlebois - Automate the Deployment & Monitoring of SharePoint w...
ECS19 - Nik Charlebois - Automate the Deployment & Monitoring of SharePoint w...ECS19 - Nik Charlebois - Automate the Deployment & Monitoring of SharePoint w...
ECS19 - Nik Charlebois - Automate the Deployment & Monitoring of SharePoint w...European Collaboration Summit
 
ECS19 - Mike Ammerlaan - Microsoft Graph Data Connect
ECS19 - Mike Ammerlaan - Microsoft Graph Data ConnectECS19 - Mike Ammerlaan - Microsoft Graph Data Connect
ECS19 - Mike Ammerlaan - Microsoft Graph Data ConnectEuropean Collaboration Summit
 
ECS19 - Vesa Juvonen, Paolo Pialorsi - Building “modern” portals with SharePo...
ECS19 - Vesa Juvonen, Paolo Pialorsi - Building “modern” portals with SharePo...ECS19 - Vesa Juvonen, Paolo Pialorsi - Building “modern” portals with SharePo...
ECS19 - Vesa Juvonen, Paolo Pialorsi - Building “modern” portals with SharePo...European Collaboration Summit
 
ECS19 - Vesa Juvonen - Getting Started With SharePoint Framework - Roadmap
ECS19 - Vesa Juvonen - Getting Started With SharePoint Framework - RoadmapECS19 - Vesa Juvonen - Getting Started With SharePoint Framework - Roadmap
ECS19 - Vesa Juvonen - Getting Started With SharePoint Framework - RoadmapEuropean Collaboration Summit
 
ECS19 - Bill Ayers - UNLOCK YOUR BUSINESS KNOWLEDGE WITH THE MICROSOFT GRAPH,...
ECS19 - Bill Ayers - UNLOCK YOUR BUSINESS KNOWLEDGE WITH THE MICROSOFT GRAPH,...ECS19 - Bill Ayers - UNLOCK YOUR BUSINESS KNOWLEDGE WITH THE MICROSOFT GRAPH,...
ECS19 - Bill Ayers - UNLOCK YOUR BUSINESS KNOWLEDGE WITH THE MICROSOFT GRAPH,...European Collaboration Summit
 
ECS19 - Toni Pohl - Develop intelligent apps for the Modern Workplace
ECS19 - Toni Pohl - Develop intelligent apps for the Modern WorkplaceECS19 - Toni Pohl - Develop intelligent apps for the Modern Workplace
ECS19 - Toni Pohl - Develop intelligent apps for the Modern WorkplaceEuropean Collaboration Summit
 
ECS19 - Tomislav Lulic - What is changed in product/service licensing with Cl...
ECS19 - Tomislav Lulic - What is changed in product/service licensing with Cl...ECS19 - Tomislav Lulic - What is changed in product/service licensing with Cl...
ECS19 - Tomislav Lulic - What is changed in product/service licensing with Cl...European Collaboration Summit
 
ECS19 - Thomas Vochten - ESSENTIAL DATABASE ADMINISTRATION SKILLS FOR SHAREPO...
ECS19 - Thomas Vochten - ESSENTIAL DATABASE ADMINISTRATION SKILLS FOR SHAREPO...ECS19 - Thomas Vochten - ESSENTIAL DATABASE ADMINISTRATION SKILLS FOR SHAREPO...
ECS19 - Thomas Vochten - ESSENTIAL DATABASE ADMINISTRATION SKILLS FOR SHAREPO...European Collaboration Summit
 
ECS19 - Thomas Goelles, Stephan Bisser - Unite your workplace with Microsoft'...
ECS19 - Thomas Goelles, Stephan Bisser - Unite your workplace with Microsoft'...ECS19 - Thomas Goelles, Stephan Bisser - Unite your workplace with Microsoft'...
ECS19 - Thomas Goelles, Stephan Bisser - Unite your workplace with Microsoft'...European Collaboration Summit
 
ECS19 - Steven Collier - Live Events in Teams, Yammer and Stream using Extern...
ECS19 - Steven Collier - Live Events in Teams, Yammer and Stream using Extern...ECS19 - Steven Collier - Live Events in Teams, Yammer and Stream using Extern...
ECS19 - Steven Collier - Live Events in Teams, Yammer and Stream using Extern...European Collaboration Summit
 
ECS19 - Serge Luca - MICROSOFT FLOW IN REAL WORLD PROJECTS: 3 YEARS LATER AN...
ECS19 - Serge Luca -  MICROSOFT FLOW IN REAL WORLD PROJECTS: 3 YEARS LATER AN...ECS19 - Serge Luca -  MICROSOFT FLOW IN REAL WORLD PROJECTS: 3 YEARS LATER AN...
ECS19 - Serge Luca - MICROSOFT FLOW IN REAL WORLD PROJECTS: 3 YEARS LATER AN...European Collaboration Summit
 
ECS19 - Samuel Zuercher - Do I still need an Intranet or is MS Teams just eno...
ECS19 - Samuel Zuercher - Do I still need an Intranet or is MS Teams just eno...ECS19 - Samuel Zuercher - Do I still need an Intranet or is MS Teams just eno...
ECS19 - Samuel Zuercher - Do I still need an Intranet or is MS Teams just eno...European Collaboration Summit
 
ECS19 - Rodrigo Pinto - Modernize Your Classic SharePoint Sites
ECS19 - Rodrigo Pinto - Modernize Your Classic SharePoint SitesECS19 - Rodrigo Pinto - Modernize Your Classic SharePoint Sites
ECS19 - Rodrigo Pinto - Modernize Your Classic SharePoint SitesEuropean Collaboration Summit
 

More from European Collaboration Summit (20)

ECS19 - Eric Harlan - Increasing throughput of Office 365
ECS19 - Eric Harlan - Increasing throughput of Office 365ECS19 - Eric Harlan - Increasing throughput of Office 365
ECS19 - Eric Harlan - Increasing throughput of Office 365
 
ECS19 - Ahmad Najjar - Logic Apps vs Microsoft Flow - When, how and where?
ECS19 - Ahmad Najjar - Logic Apps vs Microsoft Flow - When, how and where?ECS19 - Ahmad Najjar - Logic Apps vs Microsoft Flow - When, how and where?
ECS19 - Ahmad Najjar - Logic Apps vs Microsoft Flow - When, how and where?
 
ECS19 - Michael Van Horenbeeck - Divide Et Imperat Office 365 Mergers, Acquis...
ECS19 - Michael Van Horenbeeck - Divide Et Imperat Office 365 Mergers, Acquis...ECS19 - Michael Van Horenbeeck - Divide Et Imperat Office 365 Mergers, Acquis...
ECS19 - Michael Van Horenbeeck - Divide Et Imperat Office 365 Mergers, Acquis...
 
ECS19 - Christina Wheeler - Become Data Modeling Superhero
ECS19 - Christina Wheeler - Become Data Modeling SuperheroECS19 - Christina Wheeler - Become Data Modeling Superhero
ECS19 - Christina Wheeler - Become Data Modeling Superhero
 
ECS19 - Ahmad Najjar and Serge Luca - Power Platform Tutorial
ECS19 - Ahmad Najjar and Serge Luca - Power Platform TutorialECS19 - Ahmad Najjar and Serge Luca - Power Platform Tutorial
ECS19 - Ahmad Najjar and Serge Luca - Power Platform Tutorial
 
ECS19 - Vesa Juvonen - SharePoint and Office 365 Development PowerClass
ECS19 - Vesa Juvonen - SharePoint and Office 365 Development PowerClassECS19 - Vesa Juvonen - SharePoint and Office 365 Development PowerClass
ECS19 - Vesa Juvonen - SharePoint and Office 365 Development PowerClass
 
ECS19 - Paolo Pialorsi - Building Portals with modern SharePoint experiences
ECS19 - Paolo Pialorsi - Building Portals with modern SharePoint experiencesECS19 - Paolo Pialorsi - Building Portals with modern SharePoint experiences
ECS19 - Paolo Pialorsi - Building Portals with modern SharePoint experiences
 
ECS19 - Nik Charlebois - Automate the Deployment & Monitoring of SharePoint w...
ECS19 - Nik Charlebois - Automate the Deployment & Monitoring of SharePoint w...ECS19 - Nik Charlebois - Automate the Deployment & Monitoring of SharePoint w...
ECS19 - Nik Charlebois - Automate the Deployment & Monitoring of SharePoint w...
 
ECS19 - Mike Ammerlaan - Microsoft Graph Data Connect
ECS19 - Mike Ammerlaan - Microsoft Graph Data ConnectECS19 - Mike Ammerlaan - Microsoft Graph Data Connect
ECS19 - Mike Ammerlaan - Microsoft Graph Data Connect
 
ECS19 - Vesa Juvonen, Paolo Pialorsi - Building “modern” portals with SharePo...
ECS19 - Vesa Juvonen, Paolo Pialorsi - Building “modern” portals with SharePo...ECS19 - Vesa Juvonen, Paolo Pialorsi - Building “modern” portals with SharePo...
ECS19 - Vesa Juvonen, Paolo Pialorsi - Building “modern” portals with SharePo...
 
ECS19 - Vesa Juvonen - Getting Started With SharePoint Framework - Roadmap
ECS19 - Vesa Juvonen - Getting Started With SharePoint Framework - RoadmapECS19 - Vesa Juvonen - Getting Started With SharePoint Framework - Roadmap
ECS19 - Vesa Juvonen - Getting Started With SharePoint Framework - Roadmap
 
ECS19 - Bill Ayers - UNLOCK YOUR BUSINESS KNOWLEDGE WITH THE MICROSOFT GRAPH,...
ECS19 - Bill Ayers - UNLOCK YOUR BUSINESS KNOWLEDGE WITH THE MICROSOFT GRAPH,...ECS19 - Bill Ayers - UNLOCK YOUR BUSINESS KNOWLEDGE WITH THE MICROSOFT GRAPH,...
ECS19 - Bill Ayers - UNLOCK YOUR BUSINESS KNOWLEDGE WITH THE MICROSOFT GRAPH,...
 
ECS19 - Toni Pohl - Develop intelligent apps for the Modern Workplace
ECS19 - Toni Pohl - Develop intelligent apps for the Modern WorkplaceECS19 - Toni Pohl - Develop intelligent apps for the Modern Workplace
ECS19 - Toni Pohl - Develop intelligent apps for the Modern Workplace
 
ECS19 - Tomislav Lulic - What is changed in product/service licensing with Cl...
ECS19 - Tomislav Lulic - What is changed in product/service licensing with Cl...ECS19 - Tomislav Lulic - What is changed in product/service licensing with Cl...
ECS19 - Tomislav Lulic - What is changed in product/service licensing with Cl...
 
ECS19 - Thomas Vochten - ESSENTIAL DATABASE ADMINISTRATION SKILLS FOR SHAREPO...
ECS19 - Thomas Vochten - ESSENTIAL DATABASE ADMINISTRATION SKILLS FOR SHAREPO...ECS19 - Thomas Vochten - ESSENTIAL DATABASE ADMINISTRATION SKILLS FOR SHAREPO...
ECS19 - Thomas Vochten - ESSENTIAL DATABASE ADMINISTRATION SKILLS FOR SHAREPO...
 
ECS19 - Thomas Goelles, Stephan Bisser - Unite your workplace with Microsoft'...
ECS19 - Thomas Goelles, Stephan Bisser - Unite your workplace with Microsoft'...ECS19 - Thomas Goelles, Stephan Bisser - Unite your workplace with Microsoft'...
ECS19 - Thomas Goelles, Stephan Bisser - Unite your workplace with Microsoft'...
 
ECS19 - Steven Collier - Live Events in Teams, Yammer and Stream using Extern...
ECS19 - Steven Collier - Live Events in Teams, Yammer and Stream using Extern...ECS19 - Steven Collier - Live Events in Teams, Yammer and Stream using Extern...
ECS19 - Steven Collier - Live Events in Teams, Yammer and Stream using Extern...
 
ECS19 - Serge Luca - MICROSOFT FLOW IN REAL WORLD PROJECTS: 3 YEARS LATER AN...
ECS19 - Serge Luca -  MICROSOFT FLOW IN REAL WORLD PROJECTS: 3 YEARS LATER AN...ECS19 - Serge Luca -  MICROSOFT FLOW IN REAL WORLD PROJECTS: 3 YEARS LATER AN...
ECS19 - Serge Luca - MICROSOFT FLOW IN REAL WORLD PROJECTS: 3 YEARS LATER AN...
 
ECS19 - Samuel Zuercher - Do I still need an Intranet or is MS Teams just eno...
ECS19 - Samuel Zuercher - Do I still need an Intranet or is MS Teams just eno...ECS19 - Samuel Zuercher - Do I still need an Intranet or is MS Teams just eno...
ECS19 - Samuel Zuercher - Do I still need an Intranet or is MS Teams just eno...
 
ECS19 - Rodrigo Pinto - Modernize Your Classic SharePoint Sites
ECS19 - Rodrigo Pinto - Modernize Your Classic SharePoint SitesECS19 - Rodrigo Pinto - Modernize Your Classic SharePoint Sites
ECS19 - Rodrigo Pinto - Modernize Your Classic SharePoint Sites
 

Recently uploaded

Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 

Recently uploaded (20)

Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 

[Sy] How to Develop Your Office 365 Information Governance Strategy in 4 Steps

  • 1.
  • 2.
  • 3. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Session Objectives Challenges today 1 What to Govern 2 Develop your strategy 3
  • 4. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
  • 7. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. We don’t know what we don’t know What is this? What you use… What you need to keep… Dark Data
  • 8. We need to establish confidence
  • 9. Cost of ignoring this problem
  • 10. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Balancing Act
  • 11. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
  • 12. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Information is everywhere in Office 365 Planner “Outlook “Team” “Team” “Team” “Yammer Connected” Group” X X X X= = =
  • 13. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. What does Microsoft offer? Protect The FileProtect The AccessProtect The System RMSCASBDLP • Enterprise-Wide Classification • Data Governance Framework • Risk Assessment In-House Dev Protection @ Office 365 Cloud App Security Advanced Security Management Azure Information Protection CLP, Windows, Office, Mobile • Enterprise-Wide Classification • Data Governance Framework • Risk Assessment
  • 14. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Benefits of Good Governance Administrative efficiency Accurate cataloging & monitoring of adoption, usage and governance attributes for collaboration workspaces Provable compliance with internal and external policies and regulatory requirements Repeatable and consistent service delivery
  • 15. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. How containers are requested, approved and created For collaborative workspaces, we want to govern: Governance Focus Provisioning How are availability, compliance and changes over time are managed Management How do I retain/expire/dispose of information as appropriate Lifecycle
  • 16. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Provisioning • Sprawl • Duplication • Appropriateness • Convention • Cataloging How Containers are Born
  • 17. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Management • Monitor usage and adoption • Ensure users aren’t doing what they shouldn’t • Quota enforcement Ongoing Operations
  • 18. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Information Lifecycle • How do I know when a container should be expired • How do I get rid of it “safely” • How do I make sure information management policies are enforced? (ie retention, backup) 2. Retention, Expiration and Disposition
  • 19. PCs, tablets, mobile Office 365 DLPWindows Information Protection Azure Information Protection Exchange Online, SharePoint Online & OneDrive for Business Highly regulated Microsoft Cloud App Security Office 365 Advanced Data Governance Datacenters, file shares Azure 3rd-Party SaaS MICROSOFT’S INFORMATION PROTECTION – VISION Common Classification and labeling policies across all Microsoft technologies O F F I C E 3 6 5D E V I C E S C L O U D S E R V I C E S , S A A S A P P S & O N - P R E M I S E S
  • 20. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
  • 21. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Why do you need brakes?
  • 22.
  • 23. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. 4 steps to develop your strategy
  • 25. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
  • 26. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Discover and map Where is it? File Share SharePoint Office 365 Databases Who can access it? Who owns it? Who can read it? Who can edit it? What is it? ? File Level Analysis Content Level Analysis • Redundant, outdated and trivial (ROT) data • File types (Music, log files, etc..) • Sensitive data • Date Created • Owner
  • 27. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Example: Duplicate file report
  • 28. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. What do you need to secure? Regulated Data Data that requires retention / long-term archives ITAR / export controlled data Gold copies or replication Sensitive Data “Controlled Unclassified Information” (CUI) PII / PHI / PCI data that about employees / citizens Classified Data Operational security (OpSec) Intellectual Property Classified documents
  • 29. a DETECT SENSITIVE INFORMATION CLOUD & SaaS APPS MCAS AIP scanner
  • 30. Example: Heat map of sensitive data
  • 31. Example: Single pane of glass for risk
  • 32. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Tag and classify Tags Ownership Purpose Audience Sensitivity level Classify Is it a record? Is it high business impact? Who should have access?Where should it live?
  • 33. HIGHLY CONFIDENTIAL CONFIDENTIAL GENERAL PUBLIC PERSONAL Business-lead policies & rules; configured by ITAutomatic classification Policies can be set by IT Admins for automatically applying classification and protection to data Recommended classification Based on the content you’re working on, you can be prompted with suggested classification Manual reclassification You can override a classification and optionally be required to provide a justification User-specified classification Users can choose to apply a sensitivity label to the email or file they are working on with a single click CLASSIFY INFORMATION BASED ON SENSITIVITY
  • 34. FINANCE CONFIDENTIAL SENSITIVITY LABELS PERSIST WITH THE DOCUMENT Document labeling – what is it? Metadata written into document files Travels with the document as it moves In clear text so that other systems such as a DLP engine can read it Used for the purpose of apply a protection action or data governance action – determined by policy Can be customized per the organization’s needs
  • 35.
  • 36. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Labels are persistent and readable by other systems e.g. DLP engine Label is metadata written to data Sensitive data is automatically detected CLASSIFICATION & LABELING EXAMPLE – SENSITIVE DATA Discover personal data and apply persistent labels
  • 37. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Labeling can be end-user driven or automatically applied CLASSIFICATION & LABELING EXAMPLE – DATA GOVERNANCE
  • 38. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
  • 39. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
  • 40. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
  • 41. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
  • 43. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. How do you know where to park?
  • 44. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Approach to defining your policy Build “controls” into containers Make sure no one messes with your controls Ensure the system is used as intended
  • 45. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Example: Policy for SharePoint sites New Project Site Site Configuration External Sharing Enabled? Classification of Content? Data Sovereignty? Security Permission groups? Outside Vendors? Ownership Contacts / Stewards?
  • 47. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc.
  • 48. Regional Farm Regional Farm Regional Farm Regional Farm Admins, Compliance and Governance stakeholders
  • 51. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. PROTECT SENSITIVE INFORMATION ACROSS CLOUD SERVICES & ON PREMISES Data encryption built into Azure & Office 365 Revoke app access File-level encryption and permissions Policy tips to notify and educate end users DLP actions to block sharing Visual markings to indicate sensitive documents Control cloud app access & usage Retain, expire or delete documents
  • 52. Make it Easy to Do the Right Thing
  • 53. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. PROTECTION EXAMPLE: DLP POLICY TO LIMIT DOCUMENT SHARING Policy tips to warn end users Restrict or block sharing – internally or externally Across Office client applications – mobile, desktop & tablets
  • 54. Inside your organization Between your business partners With any of your customers
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Proactive enforcement with automation
  • 79. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Example: Automated Classification + Quarantine • It’s Friday 5pm and Joe needs to upload his daily documents into SharePoint • He doesn’t have time to classify documents and wants to go home on time • Company policy is that everything that goes into SharePoint MUST be classified and Restricted information must not be shared with Everyone
  • 80. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Defining policy
  • 81. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Uploading files
  • 82. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Violation identified
  • 83. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Classification & Compliance Enforced
  • 86. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Many names, same idea “RECERTIFICATION” “ATTESTATION” “ANNUAL REVIEW” Hey! take a look… are the current settings still appropriate? If no– make the changes. If yes– sign off on it. Recertification drivers may be internal (company controls), external (regulatory requirement) or both
  • 87. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. Regular Recertification Data Ownership Who is responsible for the stuff in here? Are they still here and willing to own it? Access Permissions Who can do what to the stuff in here? Does Bob still need his access? Classification Tell me about the stuff that lives in here… Is it sensitive? Is it important?
  • 88. MONITOR INFORMATION PROTECTION EVENTS FOR GREATER CONTROL Policy violations Document access & sharing App usage Anomalous activity End-user overrides False positives Visibility Tune & revise policies Revoke access Quarantine file Quarantine user Integrate into workflows & SIEM Take Action
  • 90. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. 4 Steps to develop your strategy
  • 91. Azure Information Protection Learn more about Azure Information Protection Blog – Announcing Azure Information Protection Intro to Microsoft Cloud App Security (video) Office 365 Information Protection Overview of Office 365 Data Loss Prevention (DLP) Blog – Announcing the release of Office 365 Advanced Data Governance File Protection Solutions in Office 365 Windows Information Protection Blog – Introducing Windows Information Protection Protect your enterprise data using Windows Information Protection RESOURCES