SlideShare una empresa de Scribd logo
1 de 33
Join the Conversation

          #SharePointSecurity



                   #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
joel.oleson@gmail.com
Joel Oleson                           sharepointjoel.com
SharePoint Evangelist
SharePoint Joel                        @joeloleson
LDS Solutions Manager




Antonio Maio
                                     Antonio.Maio@titus.com
Microsoft SharePoint MVP
Senior Product Manager
TITUS
                                      @AntonioMaio2


                           #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Data in SharePoint…




                  Now What???
                       Visit Joel Oleson @ www,sharepointjoel.com
                           WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Is Your Information Architecture Plan




               A House of Cards?
                          Visit Joel Oleson @ www,sharepointjoel.com
                              WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Governance vs. Security
   Governance provides structure, oversight, and
    management to organize a successful deployment with
    proper roles and responsibilities with agreed on
    processes on a technology
   Security - Preventing unauthorized access. Precautions
    to guard against potential leaks or crimes.




                                         WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Governance & Security




                         Governance




                        Security




                        Visit Joel Oleson @ www,sharepointjoel.com
                            WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Why is CISO and the Security Team
Afraid of SharePoint?
   They see that’s where the data is or is moving
   Yikes! Search works
   Security by Obscurity doesn’t work anymore
   Delegation is a scary proposition
   Uncle Ben was right about responsibility- With power
    comes great responsibility




                                          WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Visit Joel Oleson @ www,sharepointjoel.com
    WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Polling Question #1
 Which of the following sensitive information do you
  need to protect in SharePoint? Check all that apply:


     Financial Information
     Human Resource Information
     Health Information
     Personally Identifiable Information
     Intellectual Property

                              #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Trends in SharePoint Content
                                           Sensitive content sitting
                                            beside non-sensitive
                                            content
                                           Content organized by
                                            nature of information,
                                            not by security level
                                           Trend in all industries,
          Internal   Confidential
                                            including military and
 Public
                                            intelligence



                                #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
New Security Challenges
                                                  How do you know what
                                                   data is sensitive?
                                                  How do you know who
 Public
           Internal         Confidential           should have access?
                                                  How do you control
      Alice                     Bob                access to widely
      Finance                   Research
                                                   dispersed information?


                  John
                  Partner



                                       #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
SharePoint Native Security
   Authentication
   Web Application Policies
   Privileged Users
   Permissions (ACL’s)




                          #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Authentication Options
                          Authentication Options
                          -   Classic Mode
                              (Kerberos or
                              NTLM)
                          -   Claims-based
                              Authentication
                          -   Forms-based
                              Authentication
           Other Non-AD
             Sourcese


                                WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Web Application Policies
                                                      Set policies for web
         Web                                          application as a whole
       Application
                                                              User policies and
                                                               permissions
  Site                Site
Collection          Collection                                Permission policies
                                                              Authentication/sign-in
             Site                Site
                                                              Anonymous access
                                                              Blocked file types
                     Library            List
                                                              Web Parts


                                               #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Privileged Users
    Farm Administrator        Site Collection             What if you have
                              Administrator
                                                           “Top Secret”
                                                           information in
                                                           SharePoint and
                                                           admins aren’t
                                                           cleared to see it?

-     Access everything   -   Access everything           Integration with
-     Enable/disable          in site collection           Microsoft RMS can
      any configuration   -   Enable/disable
                              any configuration
                                                           help in this
-     Uninstall server-
      side applications       in site collection           situation
      and solutions



                                         #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Permissions (ACLs)
                                                        Permissions can apply
                    Site                                 to any information
                  Collection                             object or container in
                                                         SharePoint
           Site                Site                     Hierarchical permission
                                                         model: permissions
                                                         inherited from level
                   Library            List
                                                         above
                                                        Breaking inheritance is
Document           Folder             Item               a manual process


                                             #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Fine-Grained Permissions & Metadata
The solution for sensitive content sitting with non-sensitive content


                                             Metadata to identify which
                                              data to protect
                                             User attributes (claims) to
                                              determine who should
                                              have access
                                             Automation to manage
                                              fine-grained permissions
             Internal     Confidential
    Public




                                     #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Polling Question #2
 What is your biggest challenge in SharePoint?
  Check all that apply:


   Controlling access to official corporate records
   Permissions Management and site ownerships
   Secure External Access (e.g. Partners, Contractors)
   Identity Management and Authentication
   Auditing for compliance

                           #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
TITUS SharePoint Security Suite



    Protect sensitive information in SharePoint by enforcing access control
     policies that use Trusted Claims and Document Metadata




    Promote data governance by enforcing awareness, compliance and
     accountability




                                    #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Scenario
                                Users Store/Access Business
                                Content in SharePoint
Alice
Finance




Bob
Research


                                                          SharePoint
                                                         Project Library
                                                              (ex. Merger)
John
External Contractor


                      #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Scenario
                                             Users Store/Access Business
                                             Content in SharePoint
Alice
Finance

                 Internal         Confidential
      Internal




Bob
Research
      Public
            Public
                            Confidential                              SharePoint
                                                                     Project Library
                                                                          (ex. Merger)
John
External Contractor


                                 #SharePointSecurity    WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Scenario
                                     Alice only accesses content
                                     she is permitted to access
Alice
Finance

               Internal   Confidential
    Internal




                          #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Scenario
                                   Bob only accesses content
                                   he is permitted to access




Bob
Research

      Public
            Public
                     Internal




                         #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Scenario
                                John only accesses content
                                available to contractors




     Public
           Public




John
External Contractor


                      #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
TITUS and Claims-Based Authorization
 User    Environment             Data




                                                    SharePoint
                                                    Permissions

                   #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Administration Built into SharePoint
 Simplifies SharePoint security and data governance




                                                 Alice: Finance Team
                                                 Access Finance docs

                                                 Bob: Research Team
                                                 Access Research docs

                                                 John: External Contractor
                                                 Access Public Research docs
                                                 only



                           #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Raise User Awareness
Automatically apply standardized security labels to MS Office and PDFs




                                 #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Promote End User Accountability
Mark documents with identifying information about a user when documents
come out of SharePoint


      Date and
     Timestamp




      Current
     Username




      Date and
     Timestamp

                                 #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
   Protect and Securely Share Sensitive Information
       Implement Consistent & Effective Data Governance

       Enable Dynamic Fine Grained Security

       Automate Security using Identity and Metadata




                                                                                         2013

                              #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Next Steps

   Discover TITUS SharePoint Security
    Solutions at www.titus.com
   Sign up for a Free Trial at
    www.titus.com
   Visit TITUS at Microsoft SharePoint
    Conference 2012 – Booth # 865




                                  #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Q&A




 Joel Oleson                       Antonio Maio
 SharePoint Expert                 Microsoft SharePoint MVP
 SharePoint Joel                   Senior Product Manager
 @joeloleson                       TITUS
                                   @AntonioMaio2




                     #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
#SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Prize Giveaway




                 #SharePointSecurity   WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |

Más contenido relacionado

La actualidad más candente

Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the CloudRichard Diver
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security ThreatsDSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security ThreatsAndris Soroka
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010Andris Soroka
 
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's GuideReece Gaumont
 
Corporate Data: A Protected Asset or a Ticking Time Bomb?
Corporate Data: A Protected Asset or a Ticking Time Bomb? Corporate Data: A Protected Asset or a Ticking Time Bomb?
Corporate Data: A Protected Asset or a Ticking Time Bomb? Varonis
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...solarisyougood
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution DatasheetMicrosoft Private Cloud
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Source Conference
 

La actualidad más candente (20)

Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security ThreatsDSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010
 
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber Webinar
 
Hacking3e ppt ch10
Hacking3e ppt ch10Hacking3e ppt ch10
Hacking3e ppt ch10
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
Corporate Data: A Protected Asset or a Ticking Time Bomb?
Corporate Data: A Protected Asset or a Ticking Time Bomb? Corporate Data: A Protected Asset or a Ticking Time Bomb?
Corporate Data: A Protected Asset or a Ticking Time Bomb?
 
18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution Datasheet
 
Funsec3e ppt ch05
Funsec3e ppt ch05Funsec3e ppt ch05
Funsec3e ppt ch05
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Funsec3e ppt ch03
Funsec3e ppt ch03Funsec3e ppt ch03
Funsec3e ppt ch03
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
03 cia
03 cia03 cia
03 cia
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
 

Destacado

Kuntarakenne ja hyvinvointipalvelut
Kuntarakenne ja hyvinvointipalvelutKuntarakenne ja hyvinvointipalvelut
Kuntarakenne ja hyvinvointipalvelutTimoAro
 
Suurten kaupunkien merkitys eräillä muuttujilla 2010-luvun Suomessa
Suurten kaupunkien merkitys eräillä muuttujilla 2010-luvun SuomessaSuurten kaupunkien merkitys eräillä muuttujilla 2010-luvun Suomessa
Suurten kaupunkien merkitys eräillä muuttujilla 2010-luvun SuomessaTimoAro
 
Gypsy chic issue 4 editor lorraine stylianou
Gypsy chic issue 4 editor lorraine stylianouGypsy chic issue 4 editor lorraine stylianou
Gypsy chic issue 4 editor lorraine stylianouLorraine Stylianou
 
DBE corporate profile
DBE corporate profileDBE corporate profile
DBE corporate profilemytrainings
 
Платформа для разработки бизнес приложений Ark as. назначение, устройство и в...
Платформа для разработки бизнес приложений Ark as. назначение, устройство и в...Платформа для разработки бизнес приложений Ark as. назначение, устройство и в...
Платформа для разработки бизнес приложений Ark as. назначение, устройство и в...Руслан Раянов
 
Onnistu ohjausryhmän kanssa
Onnistu ohjausryhmän kanssaOnnistu ohjausryhmän kanssa
Onnistu ohjausryhmän kanssaTimoAro
 
Maahanmuuttostrategioiden opetukset. Case Etelä-Savo!
Maahanmuuttostrategioiden opetukset. Case Etelä-Savo!Maahanmuuttostrategioiden opetukset. Case Etelä-Savo!
Maahanmuuttostrategioiden opetukset. Case Etelä-Savo!TimoAro
 
Как стать веб разработчиком. Курс бесплатно.
Как стать веб разработчиком. Курс бесплатно. Как стать веб разработчиком. Курс бесплатно.
Как стать веб разработчиком. Курс бесплатно. Руслан Раянов
 
Kuopion alueen menestys 2000 luvulla
Kuopion alueen menestys 2000 luvullaKuopion alueen menestys 2000 luvulla
Kuopion alueen menestys 2000 luvullaTimoAro
 
เรื่อง ทรัพย์ทางปัญญา
เรื่อง ทรัพย์ทางปัญญาเรื่อง ทรัพย์ทางปัญญา
เรื่อง ทรัพย์ทางปัญญาFUEANG Far
 
A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013AntonioMaio2
 
7 kartogrammia suuren kaupunkiseutujen merkityksestä
7 kartogrammia suuren kaupunkiseutujen merkityksestä7 kartogrammia suuren kaupunkiseutujen merkityksestä
7 kartogrammia suuren kaupunkiseutujen merkityksestäTimoAro
 
Screen shot slideshare
Screen shot slideshareScreen shot slideshare
Screen shot slidesharefd2625
 
An Energy-Efficient Climate Control Solution for Smart Buildings Based on Pre...
An Energy-Efficient Climate Control Solution for Smart Buildings Based on Pre...An Energy-Efficient Climate Control Solution for Smart Buildings Based on Pre...
An Energy-Efficient Climate Control Solution for Smart Buildings Based on Pre...omar_afify
 
December 2011 - institutional presentation - dec, 2011
December 2011 - institutional presentation - dec, 2011December 2011 - institutional presentation - dec, 2011
December 2011 - institutional presentation - dec, 2011Arezzori
 
How to build a winning ig ecm or rim strategy keith atteck
How to build a winning ig ecm or rim strategy   keith atteckHow to build a winning ig ecm or rim strategy   keith atteck
How to build a winning ig ecm or rim strategy keith atteckKeith Atteck C.Tech. ERMm
 

Destacado (18)

Kuntarakenne ja hyvinvointipalvelut
Kuntarakenne ja hyvinvointipalvelutKuntarakenne ja hyvinvointipalvelut
Kuntarakenne ja hyvinvointipalvelut
 
Suurten kaupunkien merkitys eräillä muuttujilla 2010-luvun Suomessa
Suurten kaupunkien merkitys eräillä muuttujilla 2010-luvun SuomessaSuurten kaupunkien merkitys eräillä muuttujilla 2010-luvun Suomessa
Suurten kaupunkien merkitys eräillä muuttujilla 2010-luvun Suomessa
 
Gypsy chic issue 4 editor lorraine stylianou
Gypsy chic issue 4 editor lorraine stylianouGypsy chic issue 4 editor lorraine stylianou
Gypsy chic issue 4 editor lorraine stylianou
 
DBE corporate profile
DBE corporate profileDBE corporate profile
DBE corporate profile
 
Платформа для разработки бизнес приложений Ark as. назначение, устройство и в...
Платформа для разработки бизнес приложений Ark as. назначение, устройство и в...Платформа для разработки бизнес приложений Ark as. назначение, устройство и в...
Платформа для разработки бизнес приложений Ark as. назначение, устройство и в...
 
Onnistu ohjausryhmän kanssa
Onnistu ohjausryhmän kanssaOnnistu ohjausryhmän kanssa
Onnistu ohjausryhmän kanssa
 
Maahanmuuttostrategioiden opetukset. Case Etelä-Savo!
Maahanmuuttostrategioiden opetukset. Case Etelä-Savo!Maahanmuuttostrategioiden opetukset. Case Etelä-Savo!
Maahanmuuttostrategioiden opetukset. Case Etelä-Savo!
 
Renshengguan
RenshengguanRenshengguan
Renshengguan
 
Как стать веб разработчиком. Курс бесплатно.
Как стать веб разработчиком. Курс бесплатно. Как стать веб разработчиком. Курс бесплатно.
Как стать веб разработчиком. Курс бесплатно.
 
Kuopion alueen menestys 2000 luvulla
Kuopion alueen menestys 2000 luvullaKuopion alueen menestys 2000 luvulla
Kuopion alueen menestys 2000 luvulla
 
Dance Lessons for Kids: Salsa
Dance Lessons for Kids: SalsaDance Lessons for Kids: Salsa
Dance Lessons for Kids: Salsa
 
เรื่อง ทรัพย์ทางปัญญา
เรื่อง ทรัพย์ทางปัญญาเรื่อง ทรัพย์ทางปัญญา
เรื่อง ทรัพย์ทางปัญญา
 
A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013
 
7 kartogrammia suuren kaupunkiseutujen merkityksestä
7 kartogrammia suuren kaupunkiseutujen merkityksestä7 kartogrammia suuren kaupunkiseutujen merkityksestä
7 kartogrammia suuren kaupunkiseutujen merkityksestä
 
Screen shot slideshare
Screen shot slideshareScreen shot slideshare
Screen shot slideshare
 
An Energy-Efficient Climate Control Solution for Smart Buildings Based on Pre...
An Energy-Efficient Climate Control Solution for Smart Buildings Based on Pre...An Energy-Efficient Climate Control Solution for Smart Buildings Based on Pre...
An Energy-Efficient Climate Control Solution for Smart Buildings Based on Pre...
 
December 2011 - institutional presentation - dec, 2011
December 2011 - institutional presentation - dec, 2011December 2011 - institutional presentation - dec, 2011
December 2011 - institutional presentation - dec, 2011
 
How to build a winning ig ecm or rim strategy keith atteck
How to build a winning ig ecm or rim strategy   keith atteckHow to build a winning ig ecm or rim strategy   keith atteck
How to build a winning ig ecm or rim strategy keith atteck
 

Similar a Webinar: Take Control of SharePoint Security

Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceMarie-Michelle Strah, PhD
 
Seattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySeattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySabra Goldick
 
SPSDenver-Enforcing.SP.Governance
SPSDenver-Enforcing.SP.GovernanceSPSDenver-Enforcing.SP.Governance
SPSDenver-Enforcing.SP.GovernanceMary Leigh Mackie
 
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceMarie-Michelle Strah, PhD
 
SharePoint Security Playbook [eBook]
SharePoint Security Playbook [eBook]SharePoint Security Playbook [eBook]
SharePoint Security Playbook [eBook]Imperva
 
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...Andris Soroka
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Securitymferraz
 
Mary leigh mackie-enforcing-sp_gov-spsbe04
Mary leigh mackie-enforcing-sp_gov-spsbe04Mary leigh mackie-enforcing-sp_gov-spsbe04
Mary leigh mackie-enforcing-sp_gov-spsbe04BIWUG
 
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)Mary Leigh Mackie
 
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceMarie-Michelle Strah, PhD
 
Security and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: HealthcareSecurity and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: HealthcareMarie-Michelle Strah, PhD
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Dr. Ahmed Al Zaidy
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Cryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideCryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideDavid J Rosenthal
 
Why Information Architecture is Vital for Effective Information Management
Why Information Architecture is Vital for Effective Information ManagementWhy Information Architecture is Vital for Effective Information Management
Why Information Architecture is Vital for Effective Information ManagementJ. Kevin Parker, CIP
 
Overcoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePointOvercoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePointAntonioMaio2
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Richard Harbridge
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Spca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackieSpca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackieNCCOMMS
 
Enforcing SharePoint Governance_Tony Coppa_Detroit Roadshow
Enforcing SharePoint Governance_Tony Coppa_Detroit RoadshowEnforcing SharePoint Governance_Tony Coppa_Detroit Roadshow
Enforcing SharePoint Governance_Tony Coppa_Detroit RoadshowMary Leigh Mackie
 

Similar a Webinar: Take Control of SharePoint Security (20)

Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
 
Seattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySeattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and Privacy
 
SPSDenver-Enforcing.SP.Governance
SPSDenver-Enforcing.SP.GovernanceSPSDenver-Enforcing.SP.Governance
SPSDenver-Enforcing.SP.Governance
 
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
 
SharePoint Security Playbook [eBook]
SharePoint Security Playbook [eBook]SharePoint Security Playbook [eBook]
SharePoint Security Playbook [eBook]
 
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Security
 
Mary leigh mackie-enforcing-sp_gov-spsbe04
Mary leigh mackie-enforcing-sp_gov-spsbe04Mary leigh mackie-enforcing-sp_gov-spsbe04
Mary leigh mackie-enforcing-sp_gov-spsbe04
 
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
SPSBE_2012_Mackie_Enforcing SharePoint Governnace (SPSBE04)
 
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
 
Security and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: HealthcareSecurity and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: Healthcare
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Cryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideCryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions Guide
 
Why Information Architecture is Vital for Effective Information Management
Why Information Architecture is Vital for Effective Information ManagementWhy Information Architecture is Vital for Effective Information Management
Why Information Architecture is Vital for Effective Information Management
 
Overcoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePointOvercoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePoint
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Spca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackieSpca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackie
 
Enforcing SharePoint Governance_Tony Coppa_Detroit Roadshow
Enforcing SharePoint Governance_Tony Coppa_Detroit RoadshowEnforcing SharePoint Governance_Tony Coppa_Detroit Roadshow
Enforcing SharePoint Governance_Tony Coppa_Detroit Roadshow
 

Más de AntonioMaio2

Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365AntonioMaio2
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maioAntonioMaio2
 
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat teamAntonioMaio2
 
Information security in office 365 a shared responsibility - antonio maio
Information security in office 365   a shared responsibility - antonio maioInformation security in office 365   a shared responsibility - antonio maio
Information security in office 365 a shared responsibility - antonio maioAntonioMaio2
 
SharePoint Saturday Ottawa - How secure is my data in office 365?
SharePoint Saturday Ottawa - How secure is my data in office 365?SharePoint Saturday Ottawa - How secure is my data in office 365?
SharePoint Saturday Ottawa - How secure is my data in office 365?AntonioMaio2
 
Office 365 security new innovations from microsoft ignite - antonio maio
Office 365 security   new innovations from microsoft ignite - antonio maioOffice 365 security   new innovations from microsoft ignite - antonio maio
Office 365 security new innovations from microsoft ignite - antonio maioAntonioMaio2
 
Real world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - publishedReal world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - publishedAntonioMaio2
 
What’s new in SharePoint 2016!
What’s new in SharePoint 2016!What’s new in SharePoint 2016!
What’s new in SharePoint 2016!AntonioMaio2
 
Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365AntonioMaio2
 
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Hybrid Identity Management with SharePoint and Office 365 - Antonio MaioHybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Hybrid Identity Management with SharePoint and Office 365 - Antonio MaioAntonioMaio2
 
Developing custom claim providers to enable authorization in share point an...
Developing custom claim providers to enable authorization in share point   an...Developing custom claim providers to enable authorization in share point   an...
Developing custom claim providers to enable authorization in share point an...AntonioMaio2
 
Identity management challenges when moving share point to the cloud antonio...
Identity management challenges when moving share point to the cloud   antonio...Identity management challenges when moving share point to the cloud   antonio...
Identity management challenges when moving share point to the cloud antonio...AntonioMaio2
 
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013   publishedBest practices for security and governance in share point 2013   published
Best practices for security and governance in share point 2013 publishedAntonioMaio2
 
Keeping SharePoint Always On
Keeping SharePoint Always OnKeeping SharePoint Always On
Keeping SharePoint Always OnAntonioMaio2
 
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointHow Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointAntonioMaio2
 
Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013AntonioMaio2
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...AntonioMaio2
 
Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013AntonioMaio2
 
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013AntonioMaio2
 

Más de AntonioMaio2 (20)

Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maio
 
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat team
 
Information security in office 365 a shared responsibility - antonio maio
Information security in office 365   a shared responsibility - antonio maioInformation security in office 365   a shared responsibility - antonio maio
Information security in office 365 a shared responsibility - antonio maio
 
SharePoint Saturday Ottawa - How secure is my data in office 365?
SharePoint Saturday Ottawa - How secure is my data in office 365?SharePoint Saturday Ottawa - How secure is my data in office 365?
SharePoint Saturday Ottawa - How secure is my data in office 365?
 
Office 365 security new innovations from microsoft ignite - antonio maio
Office 365 security   new innovations from microsoft ignite - antonio maioOffice 365 security   new innovations from microsoft ignite - antonio maio
Office 365 security new innovations from microsoft ignite - antonio maio
 
Real world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - publishedReal world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - published
 
What’s new in SharePoint 2016!
What’s new in SharePoint 2016!What’s new in SharePoint 2016!
What’s new in SharePoint 2016!
 
Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365
 
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Hybrid Identity Management with SharePoint and Office 365 - Antonio MaioHybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
 
Developing custom claim providers to enable authorization in share point an...
Developing custom claim providers to enable authorization in share point   an...Developing custom claim providers to enable authorization in share point   an...
Developing custom claim providers to enable authorization in share point an...
 
Identity management challenges when moving share point to the cloud antonio...
Identity management challenges when moving share point to the cloud   antonio...Identity management challenges when moving share point to the cloud   antonio...
Identity management challenges when moving share point to the cloud antonio...
 
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013   publishedBest practices for security and governance in share point 2013   published
Best practices for security and governance in share point 2013 published
 
Keeping SharePoint Always On
Keeping SharePoint Always OnKeeping SharePoint Always On
Keeping SharePoint Always On
 
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointHow Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
 
Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
 
Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013
 
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
Intro to Develop and Deploy Apps for Microsoft SharePoint and Office 2013
 

Último

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Último (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

Webinar: Take Control of SharePoint Security

  • 1. Join the Conversation #SharePointSecurity #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 2. joel.oleson@gmail.com Joel Oleson sharepointjoel.com SharePoint Evangelist SharePoint Joel @joeloleson LDS Solutions Manager Antonio Maio Antonio.Maio@titus.com Microsoft SharePoint MVP Senior Product Manager TITUS @AntonioMaio2 #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 3. Data in SharePoint… Now What??? Visit Joel Oleson @ www,sharepointjoel.com WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 4. Is Your Information Architecture Plan A House of Cards? Visit Joel Oleson @ www,sharepointjoel.com WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 5. Governance vs. Security  Governance provides structure, oversight, and management to organize a successful deployment with proper roles and responsibilities with agreed on processes on a technology  Security - Preventing unauthorized access. Precautions to guard against potential leaks or crimes. WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 6. Governance & Security Governance Security Visit Joel Oleson @ www,sharepointjoel.com WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 7. Why is CISO and the Security Team Afraid of SharePoint?  They see that’s where the data is or is moving  Yikes! Search works  Security by Obscurity doesn’t work anymore  Delegation is a scary proposition  Uncle Ben was right about responsibility- With power comes great responsibility WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 8. Visit Joel Oleson @ www,sharepointjoel.com WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 9. Polling Question #1  Which of the following sensitive information do you need to protect in SharePoint? Check all that apply:  Financial Information  Human Resource Information  Health Information  Personally Identifiable Information  Intellectual Property #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 10. Trends in SharePoint Content  Sensitive content sitting beside non-sensitive content  Content organized by nature of information, not by security level  Trend in all industries, Internal Confidential including military and Public intelligence #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 11. New Security Challenges  How do you know what data is sensitive?  How do you know who Public Internal Confidential should have access?  How do you control Alice Bob access to widely Finance Research dispersed information? John Partner #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 12. SharePoint Native Security  Authentication  Web Application Policies  Privileged Users  Permissions (ACL’s) #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 13. Authentication Options Authentication Options - Classic Mode (Kerberos or NTLM) - Claims-based Authentication - Forms-based Authentication Other Non-AD Sourcese WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 14. Web Application Policies Set policies for web Web application as a whole Application  User policies and permissions Site Site Collection Collection  Permission policies  Authentication/sign-in Site Site  Anonymous access  Blocked file types Library List  Web Parts #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 15. Privileged Users Farm Administrator Site Collection  What if you have Administrator “Top Secret” information in SharePoint and admins aren’t cleared to see it? - Access everything - Access everything  Integration with - Enable/disable in site collection Microsoft RMS can any configuration - Enable/disable any configuration help in this - Uninstall server- side applications in site collection situation and solutions #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 16. Permissions (ACLs)  Permissions can apply Site to any information Collection object or container in SharePoint Site Site  Hierarchical permission model: permissions inherited from level Library List above  Breaking inheritance is Document Folder Item a manual process #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 17. Fine-Grained Permissions & Metadata The solution for sensitive content sitting with non-sensitive content  Metadata to identify which data to protect  User attributes (claims) to determine who should have access  Automation to manage fine-grained permissions Internal Confidential Public #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 18. Polling Question #2  What is your biggest challenge in SharePoint? Check all that apply:  Controlling access to official corporate records  Permissions Management and site ownerships  Secure External Access (e.g. Partners, Contractors)  Identity Management and Authentication  Auditing for compliance #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 19. TITUS SharePoint Security Suite  Protect sensitive information in SharePoint by enforcing access control policies that use Trusted Claims and Document Metadata  Promote data governance by enforcing awareness, compliance and accountability #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 20. Scenario Users Store/Access Business Content in SharePoint Alice Finance Bob Research SharePoint Project Library (ex. Merger) John External Contractor #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 21. Scenario Users Store/Access Business Content in SharePoint Alice Finance Internal Confidential Internal Bob Research Public Public Confidential SharePoint Project Library (ex. Merger) John External Contractor #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 22. Scenario Alice only accesses content she is permitted to access Alice Finance Internal Confidential Internal #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 23. Scenario Bob only accesses content he is permitted to access Bob Research Public Public Internal #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 24. Scenario John only accesses content available to contractors Public Public John External Contractor #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 25. TITUS and Claims-Based Authorization User Environment Data SharePoint Permissions #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 26. Administration Built into SharePoint  Simplifies SharePoint security and data governance Alice: Finance Team Access Finance docs Bob: Research Team Access Research docs John: External Contractor Access Public Research docs only #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 27. Raise User Awareness Automatically apply standardized security labels to MS Office and PDFs #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 28. Promote End User Accountability Mark documents with identifying information about a user when documents come out of SharePoint Date and Timestamp Current Username Date and Timestamp #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 29. Protect and Securely Share Sensitive Information  Implement Consistent & Effective Data Governance  Enable Dynamic Fine Grained Security  Automate Security using Identity and Metadata 2013 #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 30. Next Steps  Discover TITUS SharePoint Security Solutions at www.titus.com  Sign up for a Free Trial at www.titus.com  Visit TITUS at Microsoft SharePoint Conference 2012 – Booth # 865 #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 31. Q&A Joel Oleson Antonio Maio SharePoint Expert Microsoft SharePoint MVP SharePoint Joel Senior Product Manager @joeloleson TITUS @AntonioMaio2 #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 32. #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
  • 33. Prize Giveaway #SharePointSecurity WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |

Notas del editor

  1. Change to permissions