What’s
included?
Progress tracker foreach
business scenario
Track recommended
tasks across four
stages
Read the included
instructions to use the
tracking features
Customize these for
your organization
Stakeholder teams for
each business
scenario
Example
stakeholder teams
for each business
scenario
Customize the team
for your
organization
Also download this
Excel workbook to
track owners and tasks
3.
Using the progresstrackers
Shields have three
states:
Not
Started
In
Progres
s
Compl
ete
Diamonds have two states:
Incompl
ete
Compl
ete
To change the state, delete
the icon. This will reveal the
next state underneath.
The progress bar indicates the stage on
which the client is primarily focused.
Hold shift and drag the marker to
move it along the progress bar.
“Invisible” blocks beneath the bar
can be used to precisely align the
marker to each stage.
Please familiarize
yourself with the deck
and ensure the slide is
hidden before
presenting.
This slide is for
internal use only.
When all stages are complete,
delete the line, marker, and
checkmark to reveal the
checkmark’s Finished state.
4.
Using the stakeholderslide
Stakeholder info is shown in
cards.
To change the photoClick twice on
the placeholder photo. Navigate to
Picture Format > Change Picture.
Adjust positioning with the Crop tool
if needed.
To change any textClick on the
placeholder text and replace it.
Overset text will resize to fit within
the card.
Please familiarize
yourself with the deck
and ensure the slide is
hidden before
presenting.
This slide is for
internal use only.
These cards are made for a 4x3 grid.
To add cards, copy and paste the
template or hold Ctrl and drag the
template to create a duplicate.
Six or fewer stakeholders?Leave the top
row blank.
More than nine?Add another Stakeholder
slide, repeating the primary stakeholders,
like project leads, who are shown in the
sidebar.
Want to go an extra
mile on your design?
Use Shift+Enter to keep
the last word of a
paragraph from being
alone on a line.
A description of their
responsibilities pertaining to
this project, written in two to
five lines of text.
Role
First Lastname
Identify risks toyour
organization
Stage 1
Identify gaps in your
security posture
Set leadership
expectations
Implement basic
hygiene practices
Stage 2
Visualize your security
posture using audience-
appropriate dashboards
Stage 3
Document and manage
shadow IT using
Microsoft Defender for
Cloud Apps
Stage 4
Rapidly modernize your
security posture
Continuously educate
users
Continue to manage risk
Update your scores
from Exposure
Management
Develop a methodology
for patching and
updating systems
Evolve your
organization’s SecOps
capability
Capture your initial
scores from Exposure
Management
Inventory your digital
estate
Identify regulatory
requirements
Capture your status in
Compliance Manager
Develop a response
readiness plan
7.
Overall engagement,
resources, timelineand
schedule, communications,
and other elements.
Project Lead
Name
The strategy for protecting
organization data on devices,
including managing devices
Device
management
architect
Name
Tenant environment
(preparation, testing,
configuration).
Services
admins
Name
Strategy, steering, escalation,
approvals, business
alignment, and management
coordination.
Sponsor
Name
Security and governance of
identities, devices, and apps.
Owns risk and policy
determination, tracking and
reporting
CISO
Name
Tech requirements,
architecture, reviews,
decisions, and prioritization
Architecture
Lead
Name
Your users’ needs and
feedback.
End user security
and usability
(EUC) lead
Name
Need and feedback from your
business units.
Business Unit
Representative
Name
Prioritization and tech requirements
for app investments, including
bringing apps up to standards with
modern authentication and Entra
Conditional Access policies.
App
management
lead
Name
Security
posture
stakeholders
Verify and secureevery
identity with strong
authentication
Stage 1
Integrate SaaS apps
with Entra ID for single
sign-on
Register devices with
Entra ID
Stage 2
Implement Zero Trust
starting point identity
and device access
policies
Enroll devices into
management and apply
recommended security
protections
Stage 3
Monitor device
configuration drift
Stage 4
Secure remote and hybrid work
New applications that
are deployed use
modern authentication
Use App Proxy with on-
prem apps for single
sign-on
Allow only compliant and
trusted devices to
access data
Implement passwordless
authentication
10.
Manage overall engagement,
resources,timeline and
schedule, communications,
etc.
Project Lead
Name
Implements the strategy for
protecting organization data
on devices, including
managing devices
Device
management
architect
Name
Tech requirements, and prioritization
of app investments — bringing apps
up to standards with modern
authentication and coordinating apps
with conditional access rules
App
management
lead
Name
Tenant/environment,
preparation, configuration,
testing
M365
admins
Name
Strategy, steering, escalation,
approvals, business
alignment, management
coordination
Sponsor
Name
Security and governance of
identities, devices, and apps;
risk and policy determination,
tracking and reporting
CISO
Name
Tech requirements,
architecture, reviews,
decisions, and prioritization
Arch Lead
Name
Determines required controls
to address tech and
architecture requirements;
implements these
Identity
architect
Name
Secure remote
and hybrid
work
stakeholders
Discover and identify
sensitivebusiness data
Stage 1
Discover non-sanctioned
SaaS apps
Encrypt network
communication
Develop and test a
classification schema
Stage 2
Set up secure Teams for
sharing data internally
and externally with
business partners
Add protection to labels
Stage 3
Extend labels and
protection to data in SaaS
apps, including DLP
Stage 4
Identify and protect sensitive
business data
Extend automated
classification to all
services
Extend labels and
protection to data in on-
premises repositories
Apply labels to data
across Microsoft 365
Introduce basic DLP
policies
Introduce automatic &
recommended labeling
Extend DLP policies
across Microsoft 365
Implement key insider
risk management
policies Protect organization
data in cloud
infrastructure
13.
Manage overall engagement,
resources,timeline and
schedule, communications,
etc.
Project Lead
Name
Data classification and
sensitive data identification,
controls and remediation
Information
Protection
Manager
Name
Tech requirements,
architecture, reviews,
decisions & prioritization
Arch Lead
Name
Tenant/environment,
preparation, configuration,
testing
M365
admins
Name
Strategy, steering, escalation,
approvals, business
alignment, management
coordination
Sponsor
Name
Protection and governance of
data assets and systems; risk
and policy determination,
tracking and reporting
CISO
Name
Determines required controls
to address compliance and
protection requirements
IT Compliance
Manager
Name
Investigation and reporting in
cooperation with compliance
and protection leads
Investigation
and audit roles
Name
Information
protection
stakeholders