SlideShare a Scribd company logo
1 of 42
How Nonprofits Can Be Compliant with the
Microsoft Cloud
With Sam Chenkin, Tech Impact
April 19, 2017
. Š TechSoup Global | All rights reserved2
Using ReadyTalk
• Chat to ask questions
• If you lose your Internet connection, reconnect using
the link emailed to you.
• Your audio will play through your computer’s speakers.
Hear an echo? You may be logged in twice and will
need to close one instance of ReadyTalk
• This webinar will be available on the TechSoup
website along with past webinars:
www.techsoup.org/community/events-webinars
• You can also view recorded webinars and videos on
our YouTube channel:
https://www.youtube.com/TechSoupVideo
• Follow up email
• Tweet us @TechSoup or using hashtag: #tswebinars
Presenters
Susan Hope Bard
Training and Education Manager
TechSoup
Sam Chenkin
Tech Impact
The Need Is Global – And So Are We
TechSoup’s mission is to build a dynamic bridge that enables civil society organizations and social change
agents around the world to gain effective access to the resources they need to design and implement
solutions for a more equitable planet.
Countries Served TechSoup Partner Location NetSquared Local Group
Where are you on the map?
How Nonprofits Can Be
Compliant with the
Microsoft Cloud
DIRECTOR OF CONSULTING SERVICES
Sam Chenkin
As Director of Technology Services, I oversee our consulting staff as they
help nonprofits focus on their mission. Our team supports hundreds of
nonprofits every year as they make decisions about their technology
strategy, build data systems, and understand their data.
When I’m not at Tech Impact I’m cooking, traveling, or singing rather
poorly.
sam@techimpact.org
What We’reTalking AboutToday
• Everyone throws around the word compliance but how do
you actually achieve that? In this free, 60-minute webinar
we’ll discuss achievable goals for the nonprofit community to
keep their data safe with the Microsoft Cloud. We’ll explore
account security like two-factor authentication, data security
like encryption, and how to make sure only compliant devices
can access your data.
7
About Security & Compliance
• We are not lawyers
• We do not pretend to be lawyers
• We do not even play lawyers on TV
• Under no circumstances should you
take what we say as legal advice
• Got it?
• Good.
Now the Dirt
• Most compliance isn’t about the technology, it’s about how you use
the technology
• Most “compliance” technology is about enforcing compliance rather
than being in compliance in the first place
• You need to decide how important enforcement is
The Sad Truth
• You definitely aren’t in compliance now unless you have staff dedicated to
it.
• Are you?
• Enforcing password expiration, complexity, re-use, and sharing?
• Have an IDP device doing packet inspection?
• Monitoring security logs regularly
and taking action on events?
• Have credit card data on a
physical separate network?
• Keeping and monitoring file audit logs including file access?
• Keeping all client-related data in a restricted location?
• Encrypting all devices with sensitive data, particularly
when out of the office?
• Using two factor authentication for remote access?
• Documenting your data and know everywhere
it is stored, how it is stored and how it is transported
What to look for
• Most nonprofits deal with one of a few basic standards
• HITECH/HIPPA: patient data
• PCI: financial transaction data
• FERPA: student data
• COPPA: interactions with minors
• FISMA: governmental data
• Sarbanes-Oxley / Gramm-Leach-Bliley: financial data
• Contractual obligations from partners and funders (e.g. government)
• Check out this super old article: https://technet.microsoft.com/en-
us/magazine/2006.09.businessofit.aspx
This is Complicated but not Rocket Science
• Read the standards, this is in the
public domain
• Check to see if your cloud solutions
specifically
list compliance with these standards
• Be aware of what is happening in your
organization
• Don’t stick your head in the sand
What to think about
• These standards for the most part cover a few basic things
• Physical Security of equipment with data
• Access to Data by internal staff and external actors
• Logging & Auditing of the use of technologies
• Monitoring & Detecting of misuse and intrusions
• Retention of sensitive records
• Notification of breach
Provider
Security
Device
Security
Account
Security
Data Security
Model of
Nonprofit
Security
Provider Security is a Checkbox
• ISO 27001: Evaluates compliance with
information security standards
• SSAE 16 / SOC 1: Does the design of a system live
up to what the vendor promises?
• SOC 2: Does the design and operation of a
system live up to what the vendor promises?
• Very, very, very boring standards for information
security. Your cloud vendor should have at least
SSAE16 / SOC 1
Beyond that, it’s up to you
• Having systems that can be compliant doesn’t mean
they are
• Pay special attention to:
• Is data retained long enough? (Retention)
• Is data downloaded out of the system protected
(Encryption)
• Can you tell if people are emailing / sharing data
they shouldn’t be (Data Loss Prevention / DLP)
• How are you controlling access to data?
(Authentication, Session Management)
How Can The Microsoft Cloud Help?
Microsoft Handles Platform Security
• Office 365, if properly implemented, is HIPPA,
PCI, FERPA, COPPA, etc compliant
• It is independently audited for FISMA, SOC2 Type
II, Safe Harbor, SSAE16 SOC1 Type II, ISO 27018,
ISO 27001
• What does this mean? To get your data someone
would have to compromise your accounts or take
data when it’s sitting somewhere less secure than
Office 365 (your computer or sent via email)
How Can Microsoft Help with The Rest?
• Make sure only authorized and safe devices
are accessing your data
• Secure your accounts so that only
authorized individuals are using them
• Provide auditing tools and help you look for
worrisome patterns by authorized users or
detect unauthorized users
• Provide additional security for individual
files or emails that might contain
particularly sensitive information
20
Device Security
Account Security
Data Security
Where to Start?
Low Hanging Fruit
• Enable Two-Factor Authentication
• Enable Administrative Action Logging
• Encryption
• Train your Users
22
23
Two-Factor Authentication
• Free if enabled user-by-user.
• Purchase Enterprise Mobility +
Security E3 ($1.65/user/month)
to:
• Enforce automatically across your
entire organization
• White-list your main offices
• Annoyances:
• Works best with Office 2016
• Doesn’t work with ActiveSync
24
Administrative Action
Logging
• Tracks user account changes, document
deletions, passwords changes that have
occurred in the last 90 days
• Free, but needs to be turned on
• Helps you understand if someone is making
changes they shouldn’t be making!
You need
one of these!
Encrypt Your Devices
• Built into modern Mac OS X
(FileVault), Windows 7/8
Enterprise, Windows 10 Pro /
Enterprise
• Easy to turn on in mobile
devices (“Encrypt Storage”)
• PCs require a “Trusted Platform
Module”
26
Train Your Users
• Have an acceptable use policy that outlines what is considered sensitive data and
how to properly handle it (email is not secure)
• Subscribe to a 3rd party training and Phishing simulator service to find out who is silly
enough to hand over their credentials and force them to learn more
(https://www.knowbe4.com/ has been recommended by my clients)
What’s Next
Advanced Security Tools Aren’t Free
• To go beyond the basics, you’ll need to make some investments
• Office 365 E3 licenses ($4.50/user/month) includes some important
tools that may be necessary if you want to maintain compliance with
HIPPA, PCI, and other standards. Everything in this section requires
this license.
28
Email Encryption
• Email isn’t secure, but with
encrypted emails your recipients
are directed to a secure portal
to view and respond to sensitive
emails
• Emails are encrypted based on
Exchange Transport Rules which
can be triggered by a keyword
(“encrypt”) in the email or by
the detection of SSNs, CC#s, etc
29
Data Loss Prevention
• Create rules in Office 365 that
span email and files to look for
common kinds of sensitive
information
• Prevent content from being
shared/emailed externally,
notify managers, or lock it down
• Will work on new content and
on items that have been in
SharePoint for a while
• Enabled through the Security &
Compliance portal if you have an
E3 license
30
Retention Policies
• Tell Office 365 to keep
documents or email for
a certain period of time
• Items can be
(laboriously) retrieved
through a content
search
• Can be applied globally
or to specific mailboxes
or SharePoint /
OneDrive locations
31
Let’s Go Crazy
33
Single Sign-On
• Any 3rd party service supporting
SAML can be integrated
• When logging into these
services users are redirected to
Office 365
• Two-factor authentication can
be applied
• Disable a user in one place and
their access everywhere is
disabled
• Free for up to 10 applications
34
• Windows 10 machines can be
“Cloud Joined” to Azure instead
of to a local server
• Users log in with their Office 365
credentials
• They’ll have Single Sign On to
Office 365 and any apps you’ve
tied to Azure AD
• Free. Enterprise Mobility +
Security E3 license let’s you
specify additional admins on
local computers
Cloud Join
Conditional Access
• Devices need to be enrolled
before they can access Office 365
• Devices can’t be enrolled unless
they meet InTune policies
• Remote-wipe devices
• You can restrict access to certain
applications (OneDrive sync client,
Outlook desktop) while still
allowing basic access to a web
browser
• Requires an Enterprise Mobility +
Security E3 license
($1.65/user/month)
35
36
File Classification
• Give your users an easy way to mark documents or emails with a “Sensitivity”
rather than asking them to know what they are doing
• Automatically encrypt files or emails, prevent sharing, or take other actions based
on those policies
• Requires an Enterprise Mobility + Security License
37
Cloud App Security
• Go way beyond admin logging and
DLP security
• Look at files and emails for
sensitive content
• Look for high-risk actions
(excessive failed logins, mass
downloads of files, new locations)
• Have very granular logs for every
file and every user (file access,
shared mailbox access)
• Requires an Office 365 E5 or
Enterprise Mobility + Security E5
license
Thank You!
Sam Chenkin – sam@techimpact.org
39
Questions?
. Š TechSoup Global | All rights reserved40
Get Your TechSoup Courses!
. Š TechSoup Global | All rights reserved41
Upcoming Webinars and Events
• 4/25: Tuesday Tech30: Adobe Illustrator
• 4/26: Lights, Camera, Advocacy to Action: Digital Storytelling
for Libraries
• Explore our webinar archives for more!
. Š TechSoup Global | All rights reserved42
ReadyTalk offers dedicated product demos for
TechSoup organizations 4 times per week.
For more information: www.techsoup.org/readytalk
Please complete the post-event survey that will
pop up once you close this window.
Thank You to Our Webinar Sponsor!

More Related Content

What's hot

Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...
Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...
Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...TechSoup
 
Webinar - The Changing Landscape of Library Privacy - 2016-06-15
Webinar - The Changing Landscape of Library Privacy - 2016-06-15Webinar - The Changing Landscape of Library Privacy - 2016-06-15
Webinar - The Changing Landscape of Library Privacy - 2016-06-15TechSoup
 
Microsoft program offerings webinar 2021.11.09
Microsoft program offerings webinar 2021.11.09Microsoft program offerings webinar 2021.11.09
Microsoft program offerings webinar 2021.11.09TechSoup
 
Webinar: Introduction to Technology Planning for Nonprofits-2016-10-26
Webinar: Introduction to Technology Planning for Nonprofits-2016-10-26Webinar: Introduction to Technology Planning for Nonprofits-2016-10-26
Webinar: Introduction to Technology Planning for Nonprofits-2016-10-26TechSoup
 
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19TechSoup
 
The 2019 State of Grantseeking: Benchmarks and Trends
The 2019 State of Grantseeking: Benchmarks and TrendsThe 2019 State of Grantseeking: Benchmarks and Trends
The 2019 State of Grantseeking: Benchmarks and TrendsTechSoup
 
Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...
Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...
Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...TechSoup
 
Webinar: Is the Cloud Right for You 2016-10-18
Webinar: Is the Cloud Right for You 2016-10-18Webinar: Is the Cloud Right for You 2016-10-18
Webinar: Is the Cloud Right for You 2016-10-18TechSoup
 
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28TechSoup
 
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...TechSoup
 
Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...
Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...
Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...TechSoup
 
Webinar - Web Accessibility 101 - 2016-08-09
Webinar - Web Accessibility 101 - 2016-08-09Webinar - Web Accessibility 101 - 2016-08-09
Webinar - Web Accessibility 101 - 2016-08-09TechSoup
 
Webinar - Protecting Patron Privacy in Public Libraries - 2017-03-16
Webinar - Protecting Patron Privacy in Public Libraries - 2017-03-16Webinar - Protecting Patron Privacy in Public Libraries - 2017-03-16
Webinar - Protecting Patron Privacy in Public Libraries - 2017-03-16TechSoup
 
Webinar - Office Productivity in the Cloud - 2016-08-18
Webinar - Office Productivity in the Cloud - 2016-08-18Webinar - Office Productivity in the Cloud - 2016-08-18
Webinar - Office Productivity in the Cloud - 2016-08-18TechSoup
 
MTX Portland Office 365 Strategic Capabilities Sep2017
MTX Portland Office 365 Strategic Capabilities Sep2017MTX Portland Office 365 Strategic Capabilities Sep2017
MTX Portland Office 365 Strategic Capabilities Sep2017Owen Allen
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01TechSoup
 
Webinar - Combatting Nonprofit Burnout: Managing Tech and Email Overload - 20...
Webinar - Combatting Nonprofit Burnout: Managing Tech and Email Overload - 20...Webinar - Combatting Nonprofit Burnout: Managing Tech and Email Overload - 20...
Webinar - Combatting Nonprofit Burnout: Managing Tech and Email Overload - 20...TechSoup
 
Making sense of your Microsoft Cloud licenses part 2
Making sense of your Microsoft Cloud licenses part 2 Making sense of your Microsoft Cloud licenses part 2
Making sense of your Microsoft Cloud licenses part 2 TechSoup
 
Making sense of Microsoft Cloud Licenses Security Features
Making sense of Microsoft Cloud Licenses Security Features Making sense of Microsoft Cloud Licenses Security Features
Making sense of Microsoft Cloud Licenses Security Features TechSoup
 
Webinar: Getting Technology Donations through TechSoup - 2016-01-07
Webinar: Getting Technology Donations through TechSoup - 2016-01-07Webinar: Getting Technology Donations through TechSoup - 2016-01-07
Webinar: Getting Technology Donations through TechSoup - 2016-01-07TechSoup
 

What's hot (20)

Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...
Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...
Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...
 
Webinar - The Changing Landscape of Library Privacy - 2016-06-15
Webinar - The Changing Landscape of Library Privacy - 2016-06-15Webinar - The Changing Landscape of Library Privacy - 2016-06-15
Webinar - The Changing Landscape of Library Privacy - 2016-06-15
 
Microsoft program offerings webinar 2021.11.09
Microsoft program offerings webinar 2021.11.09Microsoft program offerings webinar 2021.11.09
Microsoft program offerings webinar 2021.11.09
 
Webinar: Introduction to Technology Planning for Nonprofits-2016-10-26
Webinar: Introduction to Technology Planning for Nonprofits-2016-10-26Webinar: Introduction to Technology Planning for Nonprofits-2016-10-26
Webinar: Introduction to Technology Planning for Nonprofits-2016-10-26
 
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
 
The 2019 State of Grantseeking: Benchmarks and Trends
The 2019 State of Grantseeking: Benchmarks and TrendsThe 2019 State of Grantseeking: Benchmarks and Trends
The 2019 State of Grantseeking: Benchmarks and Trends
 
Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...
Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...
Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...
 
Webinar: Is the Cloud Right for You 2016-10-18
Webinar: Is the Cloud Right for You 2016-10-18Webinar: Is the Cloud Right for You 2016-10-18
Webinar: Is the Cloud Right for You 2016-10-18
 
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
 
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
 
Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...
Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...
Webinar - How to Select the Right Computer Hardware for YOUR Organization - 2...
 
Webinar - Web Accessibility 101 - 2016-08-09
Webinar - Web Accessibility 101 - 2016-08-09Webinar - Web Accessibility 101 - 2016-08-09
Webinar - Web Accessibility 101 - 2016-08-09
 
Webinar - Protecting Patron Privacy in Public Libraries - 2017-03-16
Webinar - Protecting Patron Privacy in Public Libraries - 2017-03-16Webinar - Protecting Patron Privacy in Public Libraries - 2017-03-16
Webinar - Protecting Patron Privacy in Public Libraries - 2017-03-16
 
Webinar - Office Productivity in the Cloud - 2016-08-18
Webinar - Office Productivity in the Cloud - 2016-08-18Webinar - Office Productivity in the Cloud - 2016-08-18
Webinar - Office Productivity in the Cloud - 2016-08-18
 
MTX Portland Office 365 Strategic Capabilities Sep2017
MTX Portland Office 365 Strategic Capabilities Sep2017MTX Portland Office 365 Strategic Capabilities Sep2017
MTX Portland Office 365 Strategic Capabilities Sep2017
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 
Webinar - Combatting Nonprofit Burnout: Managing Tech and Email Overload - 20...
Webinar - Combatting Nonprofit Burnout: Managing Tech and Email Overload - 20...Webinar - Combatting Nonprofit Burnout: Managing Tech and Email Overload - 20...
Webinar - Combatting Nonprofit Burnout: Managing Tech and Email Overload - 20...
 
Making sense of your Microsoft Cloud licenses part 2
Making sense of your Microsoft Cloud licenses part 2 Making sense of your Microsoft Cloud licenses part 2
Making sense of your Microsoft Cloud licenses part 2
 
Making sense of Microsoft Cloud Licenses Security Features
Making sense of Microsoft Cloud Licenses Security Features Making sense of Microsoft Cloud Licenses Security Features
Making sense of Microsoft Cloud Licenses Security Features
 
Webinar: Getting Technology Donations through TechSoup - 2016-01-07
Webinar: Getting Technology Donations through TechSoup - 2016-01-07Webinar: Getting Technology Donations through TechSoup - 2016-01-07
Webinar: Getting Technology Donations through TechSoup - 2016-01-07
 

Similar to Webinar - Compliance with the Microsoft Cloud- 2017-04-19

A Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsA Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsGabriella Davis
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
O365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldO365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldNCCOMMS
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarConcept Searching, Inc
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365Don Daubert
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseTechSoup
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Reinforce business continuity - Securely share files online with Ideolve
Reinforce business continuity - Securely share files online with IdeolveReinforce business continuity - Securely share files online with Ideolve
Reinforce business continuity - Securely share files online with IdeolveMithi Software Technologies Pvt Ltd
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the CloudRichard Diver
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...Livingstone Advisory
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarConcept Searching, Inc
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022lior mazor
 

Similar to Webinar - Compliance with the Microsoft Cloud- 2017-04-19 (20)

A Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsA Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration Solutions
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
O365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldO365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern World
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint Webinar
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 
Reinforce business continuity - Securely share files online with Ideolve
Reinforce business continuity - Securely share files online with IdeolveReinforce business continuity - Securely share files online with Ideolve
Reinforce business continuity - Securely share files online with Ideolve
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
CIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento totalCIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento total
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 

More from TechSoup

Securing the Future | Public Good App House
Securing the Future | Public Good App HouseSecuring the Future | Public Good App House
Securing the Future | Public Good App HouseTechSoup
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural DifferencesTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageTechSoup
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)TechSoup
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdfTechSoup
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfTechSoup
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowTechSoup
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfTechSoup
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfTechSoup
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechSoup
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfTechSoup
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 

More from TechSoup (20)

Securing the Future | Public Good App House
Securing the Future | Public Good App HouseSecuring the Future | Public Good App House
Securing the Future | Public Good App House
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural Differences
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdf
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdf
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to Know
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdf
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdf
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdf
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 

Recently uploaded

How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 

Recently uploaded (20)

How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

Webinar - Compliance with the Microsoft Cloud- 2017-04-19

  • 1. How Nonprofits Can Be Compliant with the Microsoft Cloud With Sam Chenkin, Tech Impact April 19, 2017
  • 2. . Š TechSoup Global | All rights reserved2 Using ReadyTalk • Chat to ask questions • If you lose your Internet connection, reconnect using the link emailed to you. • Your audio will play through your computer’s speakers. Hear an echo? You may be logged in twice and will need to close one instance of ReadyTalk • This webinar will be available on the TechSoup website along with past webinars: www.techsoup.org/community/events-webinars • You can also view recorded webinars and videos on our YouTube channel: https://www.youtube.com/TechSoupVideo • Follow up email • Tweet us @TechSoup or using hashtag: #tswebinars
  • 3. Presenters Susan Hope Bard Training and Education Manager TechSoup Sam Chenkin Tech Impact
  • 4. The Need Is Global – And So Are We TechSoup’s mission is to build a dynamic bridge that enables civil society organizations and social change agents around the world to gain effective access to the resources they need to design and implement solutions for a more equitable planet. Countries Served TechSoup Partner Location NetSquared Local Group Where are you on the map?
  • 5. How Nonprofits Can Be Compliant with the Microsoft Cloud
  • 6. DIRECTOR OF CONSULTING SERVICES Sam Chenkin As Director of Technology Services, I oversee our consulting staff as they help nonprofits focus on their mission. Our team supports hundreds of nonprofits every year as they make decisions about their technology strategy, build data systems, and understand their data. When I’m not at Tech Impact I’m cooking, traveling, or singing rather poorly. sam@techimpact.org
  • 7. What We’reTalking AboutToday • Everyone throws around the word compliance but how do you actually achieve that? In this free, 60-minute webinar we’ll discuss achievable goals for the nonprofit community to keep their data safe with the Microsoft Cloud. We’ll explore account security like two-factor authentication, data security like encryption, and how to make sure only compliant devices can access your data. 7
  • 8. About Security & Compliance
  • 9. • We are not lawyers • We do not pretend to be lawyers • We do not even play lawyers on TV • Under no circumstances should you take what we say as legal advice • Got it? • Good.
  • 10. Now the Dirt • Most compliance isn’t about the technology, it’s about how you use the technology • Most “compliance” technology is about enforcing compliance rather than being in compliance in the first place • You need to decide how important enforcement is
  • 11. The Sad Truth • You definitely aren’t in compliance now unless you have staff dedicated to it. • Are you? • Enforcing password expiration, complexity, re-use, and sharing? • Have an IDP device doing packet inspection? • Monitoring security logs regularly and taking action on events? • Have credit card data on a physical separate network? • Keeping and monitoring file audit logs including file access? • Keeping all client-related data in a restricted location? • Encrypting all devices with sensitive data, particularly when out of the office? • Using two factor authentication for remote access? • Documenting your data and know everywhere it is stored, how it is stored and how it is transported
  • 12. What to look for • Most nonprofits deal with one of a few basic standards • HITECH/HIPPA: patient data • PCI: financial transaction data • FERPA: student data • COPPA: interactions with minors • FISMA: governmental data • Sarbanes-Oxley / Gramm-Leach-Bliley: financial data • Contractual obligations from partners and funders (e.g. government) • Check out this super old article: https://technet.microsoft.com/en- us/magazine/2006.09.businessofit.aspx
  • 13. This is Complicated but not Rocket Science • Read the standards, this is in the public domain • Check to see if your cloud solutions specifically list compliance with these standards • Be aware of what is happening in your organization • Don’t stick your head in the sand
  • 14. What to think about • These standards for the most part cover a few basic things • Physical Security of equipment with data • Access to Data by internal staff and external actors • Logging & Auditing of the use of technologies • Monitoring & Detecting of misuse and intrusions • Retention of sensitive records • Notification of breach
  • 16. Provider Security is a Checkbox • ISO 27001: Evaluates compliance with information security standards • SSAE 16 / SOC 1: Does the design of a system live up to what the vendor promises? • SOC 2: Does the design and operation of a system live up to what the vendor promises? • Very, very, very boring standards for information security. Your cloud vendor should have at least SSAE16 / SOC 1
  • 17. Beyond that, it’s up to you • Having systems that can be compliant doesn’t mean they are • Pay special attention to: • Is data retained long enough? (Retention) • Is data downloaded out of the system protected (Encryption) • Can you tell if people are emailing / sharing data they shouldn’t be (Data Loss Prevention / DLP) • How are you controlling access to data? (Authentication, Session Management)
  • 18. How Can The Microsoft Cloud Help?
  • 19. Microsoft Handles Platform Security • Office 365, if properly implemented, is HIPPA, PCI, FERPA, COPPA, etc compliant • It is independently audited for FISMA, SOC2 Type II, Safe Harbor, SSAE16 SOC1 Type II, ISO 27018, ISO 27001 • What does this mean? To get your data someone would have to compromise your accounts or take data when it’s sitting somewhere less secure than Office 365 (your computer or sent via email)
  • 20. How Can Microsoft Help with The Rest? • Make sure only authorized and safe devices are accessing your data • Secure your accounts so that only authorized individuals are using them • Provide auditing tools and help you look for worrisome patterns by authorized users or detect unauthorized users • Provide additional security for individual files or emails that might contain particularly sensitive information 20 Device Security Account Security Data Security
  • 22. Low Hanging Fruit • Enable Two-Factor Authentication • Enable Administrative Action Logging • Encryption • Train your Users 22
  • 23. 23 Two-Factor Authentication • Free if enabled user-by-user. • Purchase Enterprise Mobility + Security E3 ($1.65/user/month) to: • Enforce automatically across your entire organization • White-list your main offices • Annoyances: • Works best with Office 2016 • Doesn’t work with ActiveSync
  • 24. 24 Administrative Action Logging • Tracks user account changes, document deletions, passwords changes that have occurred in the last 90 days • Free, but needs to be turned on • Helps you understand if someone is making changes they shouldn’t be making!
  • 25. You need one of these! Encrypt Your Devices • Built into modern Mac OS X (FileVault), Windows 7/8 Enterprise, Windows 10 Pro / Enterprise • Easy to turn on in mobile devices (“Encrypt Storage”) • PCs require a “Trusted Platform Module”
  • 26. 26 Train Your Users • Have an acceptable use policy that outlines what is considered sensitive data and how to properly handle it (email is not secure) • Subscribe to a 3rd party training and Phishing simulator service to find out who is silly enough to hand over their credentials and force them to learn more (https://www.knowbe4.com/ has been recommended by my clients)
  • 28. Advanced Security Tools Aren’t Free • To go beyond the basics, you’ll need to make some investments • Office 365 E3 licenses ($4.50/user/month) includes some important tools that may be necessary if you want to maintain compliance with HIPPA, PCI, and other standards. Everything in this section requires this license. 28
  • 29. Email Encryption • Email isn’t secure, but with encrypted emails your recipients are directed to a secure portal to view and respond to sensitive emails • Emails are encrypted based on Exchange Transport Rules which can be triggered by a keyword (“encrypt”) in the email or by the detection of SSNs, CC#s, etc 29
  • 30. Data Loss Prevention • Create rules in Office 365 that span email and files to look for common kinds of sensitive information • Prevent content from being shared/emailed externally, notify managers, or lock it down • Will work on new content and on items that have been in SharePoint for a while • Enabled through the Security & Compliance portal if you have an E3 license 30
  • 31. Retention Policies • Tell Office 365 to keep documents or email for a certain period of time • Items can be (laboriously) retrieved through a content search • Can be applied globally or to specific mailboxes or SharePoint / OneDrive locations 31
  • 33. 33 Single Sign-On • Any 3rd party service supporting SAML can be integrated • When logging into these services users are redirected to Office 365 • Two-factor authentication can be applied • Disable a user in one place and their access everywhere is disabled • Free for up to 10 applications
  • 34. 34 • Windows 10 machines can be “Cloud Joined” to Azure instead of to a local server • Users log in with their Office 365 credentials • They’ll have Single Sign On to Office 365 and any apps you’ve tied to Azure AD • Free. Enterprise Mobility + Security E3 license let’s you specify additional admins on local computers Cloud Join
  • 35. Conditional Access • Devices need to be enrolled before they can access Office 365 • Devices can’t be enrolled unless they meet InTune policies • Remote-wipe devices • You can restrict access to certain applications (OneDrive sync client, Outlook desktop) while still allowing basic access to a web browser • Requires an Enterprise Mobility + Security E3 license ($1.65/user/month) 35
  • 36. 36 File Classification • Give your users an easy way to mark documents or emails with a “Sensitivity” rather than asking them to know what they are doing • Automatically encrypt files or emails, prevent sharing, or take other actions based on those policies • Requires an Enterprise Mobility + Security License
  • 37. 37 Cloud App Security • Go way beyond admin logging and DLP security • Look at files and emails for sensitive content • Look for high-risk actions (excessive failed logins, mass downloads of files, new locations) • Have very granular logs for every file and every user (file access, shared mailbox access) • Requires an Office 365 E5 or Enterprise Mobility + Security E5 license
  • 38. Thank You! Sam Chenkin – sam@techimpact.org
  • 40. . Š TechSoup Global | All rights reserved40 Get Your TechSoup Courses!
  • 41. . Š TechSoup Global | All rights reserved41 Upcoming Webinars and Events • 4/25: Tuesday Tech30: Adobe Illustrator • 4/26: Lights, Camera, Advocacy to Action: Digital Storytelling for Libraries • Explore our webinar archives for more!
  • 42. . Š TechSoup Global | All rights reserved42 ReadyTalk offers dedicated product demos for TechSoup organizations 4 times per week. For more information: www.techsoup.org/readytalk Please complete the post-event survey that will pop up once you close this window. Thank You to Our Webinar Sponsor!

Editor's Notes

  1. Welcome everyone to: Title Thanks so much for joining us today.
  2. Before we get started I want to make sure everyone is comfortable using Readytalk, the webinar platform we are using today. You can chat using the box in the lower left side of your screen. At any time let us know if you have any technical issues such as audio problems or being able to view the slides. You may ask questions for our presenters at any time and we will keep track of them. We will keep all lines muted so that you can get a clear recording to refer to later. You will get that full recording, slides, and any links we share today in a followup email from me by tomorrow. If you lose your connection, you can go back to your registration email to reconnect. If you were registered more than an hour ago, the reminder email has the PowerPoint slide deck attached as a link in the right hand column. Keep in mind a lot of today’s webinar will be a live shared demo so that won’t be in the slides, but will be in the recording to view later. If you are hearing an echo, you may be logged in twice, so you will need to close one of the Readytalk windows. If you have any other technical issues, dial into the 800 number.
  3. TechSoup doesn’t just help NGOs overcome barriers to effective use of technology. We also help NGOs overcome language, economic, geographic, cultural, knowledge, and access barriers. We create new ways to access technology, new paths to connect and network, and new means to learn and develop skills — all so that NGOs can operate at their full potential, more effectively deliver their programs and services, and better achieve their missions.
  4. Security should be comprised of many layers. It’s important to think about all of them! - We start with transport / provider security. Are the underlying tools you use keeping your data safe from physical access and your data being accessed while in transit. - Now we know that data with your provider is safe, but is it safe on your local devices? Are your devices secured in case they are lost or stolen? - Moving inward we get the Account security. Are our usernames and passwords secure? Can a user just log in as one of us? - Lastly, and most difficulty, is our data safe. Separate from our accounts, do we know where our sensitive data is and who has access?
  5. Most importantly, you can turn on two-factor authentication
  6. Most importantly, you can turn on two-factor authentication
  7. Bitlocker is built into Windows 7/8 Enterprise and Windows 10 Pro or Enterprise. Just click “Turn on Bitlocker.” With this physical access to the device isn’t enough. You need a TPM – trusted platform module – chip which doesn’t add any cost but needs to already be in your machine. For most modern business computers it’s included, but don’t buy a new machine without checking to make sure it has a TPM! There isn’t a good way to encrypt computers without it.
  8. Most importantly, you can turn on two-factor authentication
  9. You can tend extend these protections to most business applications using the SAML protocol
  10. The most obvious benefit is being able to log into your computer with Azure AD. If you enable this in the Office 365 management console your users can join their computers to Azure AD. Then they’ll be able to log into their computers with their Office 365 username and password. Requires Windows 10 Pro or Enterprise
  11. With Office 365 you can classify individual files and emails with an easy to understand classification level. This then drives file-based encryption and other tools. You can prevent files marked sensitive from being emailed, or use in-place encryption to protect files that have highly sensitive. Files protected in this way can’t be accessed even if they are lost.
  12. With Office 365 you can classify individual files and emails with an easy to understand classification level. This then drives file-based encryption and other tools. You can prevent files marked sensitive from being emailed, or use in-place encryption to protect files that have highly sensitive. Files protected in this way can’t be accessed even if they are lost.
  13. 42