Enviar búsqueda
Cargar
Webinar: Take Control of SharePoint Security
•
1 recomendación
•
857 vistas
A
AntonioMaio2
Seguir
Webinar with Joel Oleson and Antonio Maio: Take Control of SharePoint Security
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 33
Recomendados
Securityinsideout
Securityinsideout
gueste69f645
Extending security in the cloud network box - v4
Extending security in the cloud network box - v4
Valencell, Inc.
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
Best Practice For Public Sector Information Security And Compliance
Best Practice For Public Sector Information Security And Compliance
Oracle
Oracle a TBIZ2011
Oracle a TBIZ2011
TechnologyBIZ
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Nicholas Van Exan
Information Rights Management (IRM)
Information Rights Management (IRM)
Network Intelligence India
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
Prof. Jacques Folon (Ph.D)
Recomendados
Securityinsideout
Securityinsideout
gueste69f645
Extending security in the cloud network box - v4
Extending security in the cloud network box - v4
Valencell, Inc.
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
Best Practice For Public Sector Information Security And Compliance
Best Practice For Public Sector Information Security And Compliance
Oracle
Oracle a TBIZ2011
Oracle a TBIZ2011
TechnologyBIZ
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Nicholas Van Exan
Information Rights Management (IRM)
Information Rights Management (IRM)
Network Intelligence India
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
Prof. Jacques Folon (Ph.D)
Identity and Security in the Cloud
Identity and Security in the Cloud
Richard Diver
Personal Data Protection in Indonesia
Personal Data Protection in Indonesia
Eryk Budi Pratama
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
Andris Soroka
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
Camilo Fandiño Gómez
Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010
Andris Soroka
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk
Hacking3e ppt ch10
Hacking3e ppt ch10
Skillspire LLC
Soonr IT Buyer's Guide
Soonr IT Buyer's Guide
Reece Gaumont
Corporate Data: A Protected Asset or a Ticking Time Bomb?
Corporate Data: A Protected Asset or a Ticking Time Bomb?
Varonis
18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You
Secure Islands - Data Security Policy
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
solarisyougood
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
SafeNet
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Private Cloud
Funsec3e ppt ch05
Funsec3e ppt ch05
Skillspire LLC
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
Authentic8
Funsec3e ppt ch03
Funsec3e ppt ch03
Skillspire LLC
Information protection and compliance
Information protection and compliance
Dean Iacovelli
03 cia
03 cia
Jadavsejal
Security Awareness
Security Awareness
Dinesh O Bareja
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Source Conference
Kuntarakenne ja hyvinvointipalvelut
Kuntarakenne ja hyvinvointipalvelut
TimoAro
Suurten kaupunkien merkitys eräillä muuttujilla 2010-luvun Suomessa
Suurten kaupunkien merkitys eräillä muuttujilla 2010-luvun Suomessa
TimoAro
Más contenido relacionado
La actualidad más candente
Identity and Security in the Cloud
Identity and Security in the Cloud
Richard Diver
Personal Data Protection in Indonesia
Personal Data Protection in Indonesia
Eryk Budi Pratama
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
Andris Soroka
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
Camilo Fandiño Gómez
Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010
Andris Soroka
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk
Hacking3e ppt ch10
Hacking3e ppt ch10
Skillspire LLC
Soonr IT Buyer's Guide
Soonr IT Buyer's Guide
Reece Gaumont
Corporate Data: A Protected Asset or a Ticking Time Bomb?
Corporate Data: A Protected Asset or a Ticking Time Bomb?
Varonis
18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You
Secure Islands - Data Security Policy
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
solarisyougood
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
SafeNet
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Private Cloud
Funsec3e ppt ch05
Funsec3e ppt ch05
Skillspire LLC
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
Authentic8
Funsec3e ppt ch03
Funsec3e ppt ch03
Skillspire LLC
Information protection and compliance
Information protection and compliance
Dean Iacovelli
03 cia
03 cia
Jadavsejal
Security Awareness
Security Awareness
Dinesh O Bareja
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Source Conference
La actualidad más candente
(20)
Identity and Security in the Cloud
Identity and Security in the Cloud
Personal Data Protection in Indonesia
Personal Data Protection in Indonesia
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber Webinar
Hacking3e ppt ch10
Hacking3e ppt ch10
Soonr IT Buyer's Guide
Soonr IT Buyer's Guide
Corporate Data: A Protected Asset or a Ticking Time Bomb?
Corporate Data: A Protected Asset or a Ticking Time Bomb?
18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution Datasheet
Funsec3e ppt ch05
Funsec3e ppt ch05
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
Funsec3e ppt ch03
Funsec3e ppt ch03
Information protection and compliance
Information protection and compliance
03 cia
03 cia
Security Awareness
Security Awareness
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Destacado
Kuntarakenne ja hyvinvointipalvelut
Kuntarakenne ja hyvinvointipalvelut
TimoAro
Suurten kaupunkien merkitys eräillä muuttujilla 2010-luvun Suomessa
Suurten kaupunkien merkitys eräillä muuttujilla 2010-luvun Suomessa
TimoAro
Gypsy chic issue 4 editor lorraine stylianou
Gypsy chic issue 4 editor lorraine stylianou
Lorraine Stylianou
DBE corporate profile
DBE corporate profile
mytrainings
Платформа для разработки бизнес приложений Ark as. назначение, устройство и в...
Платформа для разработки бизнес приложений Ark as. назначение, устройство и в...
Руслан Раянов
Onnistu ohjausryhmän kanssa
Onnistu ohjausryhmän kanssa
TimoAro
Maahanmuuttostrategioiden opetukset. Case Etelä-Savo!
Maahanmuuttostrategioiden opetukset. Case Etelä-Savo!
TimoAro
Renshengguan
Renshengguan
callum0530
Как стать веб разработчиком. Курс бесплатно.
Как стать веб разработчиком. Курс бесплатно.
Руслан Раянов
Kuopion alueen menestys 2000 luvulla
Kuopion alueen menestys 2000 luvulla
TimoAro
Dance Lessons for Kids: Salsa
Dance Lessons for Kids: Salsa
RobinAge: Weekly Children's Newspaper
เรื่อง ทรัพย์ทางปัญญา
เรื่อง ทรัพย์ทางปัญญา
FUEANG Far
A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013
AntonioMaio2
7 kartogrammia suuren kaupunkiseutujen merkityksestä
7 kartogrammia suuren kaupunkiseutujen merkityksestä
TimoAro
Screen shot slideshare
Screen shot slideshare
fd2625
An Energy-Efficient Climate Control Solution for Smart Buildings Based on Pre...
An Energy-Efficient Climate Control Solution for Smart Buildings Based on Pre...
omar_afify
December 2011 - institutional presentation - dec, 2011
December 2011 - institutional presentation - dec, 2011
Arezzori
How to build a winning ig ecm or rim strategy keith atteck
How to build a winning ig ecm or rim strategy keith atteck
Keith Atteck C.Tech. ERMm
Destacado
(18)
Kuntarakenne ja hyvinvointipalvelut
Kuntarakenne ja hyvinvointipalvelut
Suurten kaupunkien merkitys eräillä muuttujilla 2010-luvun Suomessa
Suurten kaupunkien merkitys eräillä muuttujilla 2010-luvun Suomessa
Gypsy chic issue 4 editor lorraine stylianou
Gypsy chic issue 4 editor lorraine stylianou
DBE corporate profile
DBE corporate profile
Платформа для разработки бизнес приложений Ark as. назначение, устройство и в...
Платформа для разработки бизнес приложений Ark as. назначение, устройство и в...
Onnistu ohjausryhmän kanssa
Onnistu ohjausryhmän kanssa
Maahanmuuttostrategioiden opetukset. Case Etelä-Savo!
Maahanmuuttostrategioiden opetukset. Case Etelä-Savo!
Renshengguan
Renshengguan
Как стать веб разработчиком. Курс бесплатно.
Как стать веб разработчиком. Курс бесплатно.
Kuopion alueen menestys 2000 luvulla
Kuopion alueen menestys 2000 luvulla
Dance Lessons for Kids: Salsa
Dance Lessons for Kids: Salsa
เรื่อง ทรัพย์ทางปัญญา
เรื่อง ทรัพย์ทางปัญญา
A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013
7 kartogrammia suuren kaupunkiseutujen merkityksestä
7 kartogrammia suuren kaupunkiseutujen merkityksestä
Screen shot slideshare
Screen shot slideshare
An Energy-Efficient Climate Control Solution for Smart Buildings Based on Pre...
An Energy-Efficient Climate Control Solution for Smart Buildings Based on Pre...
December 2011 - institutional presentation - dec, 2011
December 2011 - institutional presentation - dec, 2011
How to build a winning ig ecm or rim strategy keith atteck
How to build a winning ig ecm or rim strategy keith atteck
Similar a Webinar: Take Control of SharePoint Security
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
Marie-Michelle Strah, PhD
Seattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and Privacy
Sabra Goldick
SPSDenver-Enforcing.SP.Governance
SPSDenver-Enforcing.SP.Governance
Mary Leigh Mackie
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
Marie-Michelle Strah, PhD
SharePoint Security Playbook [eBook]
SharePoint Security Playbook [eBook]
Imperva
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...
Andris Soroka
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Security
mferraz
Mary leigh mackie-enforcing-sp_gov-spsbe04
Mary leigh mackie-enforcing-sp_gov-spsbe04
BIWUG
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
Mary Leigh Mackie
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
Marie-Michelle Strah, PhD
Security and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: Healthcare
Marie-Michelle Strah, PhD
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
Dr. Ahmed Al Zaidy
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
SPS Paris
Cryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions Guide
David J Rosenthal
Why Information Architecture is Vital for Effective Information Management
Why Information Architecture is Vital for Effective Information Management
J. Kevin Parker, CIP
Overcoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePoint
AntonioMaio2
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
Richard Harbridge
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
MongoDB
Spca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackie
NCCOMMS
Enforcing SharePoint Governance_Tony Coppa_Detroit Roadshow
Enforcing SharePoint Governance_Tony Coppa_Detroit Roadshow
Mary Leigh Mackie
Similar a Webinar: Take Control of SharePoint Security
(20)
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
Seattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and Privacy
SPSDenver-Enforcing.SP.Governance
SPSDenver-Enforcing.SP.Governance
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
SharePoint Security Playbook [eBook]
SharePoint Security Playbook [eBook]
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Security
Mary leigh mackie-enforcing-sp_gov-spsbe04
Mary leigh mackie-enforcing-sp_gov-spsbe04
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
Security and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: Healthcare
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
Cryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions Guide
Why Information Architecture is Vital for Effective Information Management
Why Information Architecture is Vital for Effective Information Management
Overcoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePoint
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Spca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackie
Enforcing SharePoint Governance_Tony Coppa_Detroit Roadshow
Enforcing SharePoint Governance_Tony Coppa_Detroit Roadshow
Más de AntonioMaio2
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
AntonioMaio2
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
AntonioMaio2
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell antonio maio
AntonioMaio2
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat team
AntonioMaio2
Information security in office 365 a shared responsibility - antonio maio
Information security in office 365 a shared responsibility - antonio maio
AntonioMaio2
SharePoint Saturday Ottawa - How secure is my data in office 365?
SharePoint Saturday Ottawa - How secure is my data in office 365?
AntonioMaio2
Office 365 security new innovations from microsoft ignite - antonio maio
Office 365 security new innovations from microsoft ignite - antonio maio
AntonioMaio2
Real world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - published
AntonioMaio2
What’s new in SharePoint 2016!
What’s new in SharePoint 2016!
AntonioMaio2
Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365
AntonioMaio2
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
AntonioMaio2
Developing custom claim providers to enable authorization in share point an...
Developing custom claim providers to enable authorization in share point an...
AntonioMaio2
Identity management challenges when moving share point to the cloud antonio...
Identity management challenges when moving share point to the cloud antonio...
AntonioMaio2
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013 published
AntonioMaio2
Keeping SharePoint Always On
Keeping SharePoint Always On
AntonioMaio2
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
AntonioMaio2
Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013
AntonioMaio2
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
AntonioMaio2
Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013
AntonioMaio2
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
AntonioMaio2
Más de AntonioMaio2
(20)
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell antonio maio
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat team
Information security in office 365 a shared responsibility - antonio maio
Information security in office 365 a shared responsibility - antonio maio
SharePoint Saturday Ottawa - How secure is my data in office 365?
SharePoint Saturday Ottawa - How secure is my data in office 365?
Office 365 security new innovations from microsoft ignite - antonio maio
Office 365 security new innovations from microsoft ignite - antonio maio
Real world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - published
What’s new in SharePoint 2016!
What’s new in SharePoint 2016!
Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Developing custom claim providers to enable authorization in share point an...
Developing custom claim providers to enable authorization in share point an...
Identity management challenges when moving share point to the cloud antonio...
Identity management challenges when moving share point to the cloud antonio...
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013 published
Keeping SharePoint Always On
Keeping SharePoint Always On
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Último
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
Manik S Magar
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Farhan Tariq
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
itnewsafrica
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
Bernd Ruecker
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
Ravi Sanghani
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Nicole Novielli
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
Pixlogix Infotech
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
Knoldus Inc.
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
marketing932765
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
LoriGlavin3
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
Kaya Weers
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
IES VE
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
Neo4j
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Pim van der Noll
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Ingrid Airi González
Último
(20)
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Webinar: Take Control of SharePoint Security
1.
Join the Conversation
#SharePointSecurity #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
2.
joel.oleson@gmail.com Joel Oleson
sharepointjoel.com SharePoint Evangelist SharePoint Joel @joeloleson LDS Solutions Manager Antonio Maio Antonio.Maio@titus.com Microsoft SharePoint MVP Senior Product Manager TITUS @AntonioMaio2 #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
3.
Data in SharePoint…
Now What??? Visit Joel Oleson @ www,sharepointjoel.com WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
4.
Is Your Information
Architecture Plan A House of Cards? Visit Joel Oleson @ www,sharepointjoel.com WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
5.
Governance vs. Security
Governance provides structure, oversight, and management to organize a successful deployment with proper roles and responsibilities with agreed on processes on a technology Security - Preventing unauthorized access. Precautions to guard against potential leaks or crimes. WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
6.
Governance & Security
Governance Security Visit Joel Oleson @ www,sharepointjoel.com WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
7.
Why is CISO
and the Security Team Afraid of SharePoint? They see that’s where the data is or is moving Yikes! Search works Security by Obscurity doesn’t work anymore Delegation is a scary proposition Uncle Ben was right about responsibility- With power comes great responsibility WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
8.
Visit Joel Oleson
@ www,sharepointjoel.com WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
9.
Polling Question #1
Which of the following sensitive information do you need to protect in SharePoint? Check all that apply: Financial Information Human Resource Information Health Information Personally Identifiable Information Intellectual Property #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
10.
Trends in SharePoint
Content Sensitive content sitting beside non-sensitive content Content organized by nature of information, not by security level Trend in all industries, Internal Confidential including military and Public intelligence #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
11.
New Security Challenges
How do you know what data is sensitive? How do you know who Public Internal Confidential should have access? How do you control Alice Bob access to widely Finance Research dispersed information? John Partner #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
12.
SharePoint Native Security
Authentication Web Application Policies Privileged Users Permissions (ACL’s) #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
13.
Authentication Options
Authentication Options - Classic Mode (Kerberos or NTLM) - Claims-based Authentication - Forms-based Authentication Other Non-AD Sourcese WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
14.
Web Application Policies
Set policies for web Web application as a whole Application User policies and permissions Site Site Collection Collection Permission policies Authentication/sign-in Site Site Anonymous access Blocked file types Library List Web Parts #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
15.
Privileged Users
Farm Administrator Site Collection What if you have Administrator “Top Secret” information in SharePoint and admins aren’t cleared to see it? - Access everything - Access everything Integration with - Enable/disable in site collection Microsoft RMS can any configuration - Enable/disable any configuration help in this - Uninstall server- side applications in site collection situation and solutions #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
16.
Permissions (ACLs)
Permissions can apply Site to any information Collection object or container in SharePoint Site Site Hierarchical permission model: permissions inherited from level Library List above Breaking inheritance is Document Folder Item a manual process #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
17.
Fine-Grained Permissions &
Metadata The solution for sensitive content sitting with non-sensitive content Metadata to identify which data to protect User attributes (claims) to determine who should have access Automation to manage fine-grained permissions Internal Confidential Public #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
18.
Polling Question #2
What is your biggest challenge in SharePoint? Check all that apply: Controlling access to official corporate records Permissions Management and site ownerships Secure External Access (e.g. Partners, Contractors) Identity Management and Authentication Auditing for compliance #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
19.
TITUS SharePoint Security
Suite Protect sensitive information in SharePoint by enforcing access control policies that use Trusted Claims and Document Metadata Promote data governance by enforcing awareness, compliance and accountability #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
20.
Scenario
Users Store/Access Business Content in SharePoint Alice Finance Bob Research SharePoint Project Library (ex. Merger) John External Contractor #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
21.
Scenario
Users Store/Access Business Content in SharePoint Alice Finance Internal Confidential Internal Bob Research Public Public Confidential SharePoint Project Library (ex. Merger) John External Contractor #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
22.
Scenario
Alice only accesses content she is permitted to access Alice Finance Internal Confidential Internal #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
23.
Scenario
Bob only accesses content he is permitted to access Bob Research Public Public Internal #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
24.
Scenario
John only accesses content available to contractors Public Public John External Contractor #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
25.
TITUS and Claims-Based
Authorization User Environment Data SharePoint Permissions #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
26.
Administration Built into
SharePoint Simplifies SharePoint security and data governance Alice: Finance Team Access Finance docs Bob: Research Team Access Research docs John: External Contractor Access Public Research docs only #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
27.
Raise User Awareness Automatically
apply standardized security labels to MS Office and PDFs #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
28.
Promote End User
Accountability Mark documents with identifying information about a user when documents come out of SharePoint Date and Timestamp Current Username Date and Timestamp #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
29.
Protect and Securely Share Sensitive Information Implement Consistent & Effective Data Governance Enable Dynamic Fine Grained Security Automate Security using Identity and Metadata 2013 #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
30.
Next Steps
Discover TITUS SharePoint Security Solutions at www.titus.com Sign up for a Free Trial at www.titus.com Visit TITUS at Microsoft SharePoint Conference 2012 – Booth # 865 #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
31.
Q&A Joel Oleson
Antonio Maio SharePoint Expert Microsoft SharePoint MVP SharePoint Joel Senior Product Manager @joeloleson TITUS @AntonioMaio2 #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
32.
#SharePointSecurity
WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
33.
Prize Giveaway
#SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Notas del editor
Change to permissions