SlideShare una empresa de Scribd logo
1 de 39
Descargar para leer sin conexión
Microsoft 365 Compliance
Intelligent compliance and risk management solutions
David J. Rosenthal
Vice President, Digital Business
Microsoft Technology Center, New York City
October 24, 2019
Data is
exploding
It’s created, stored, and
shared everywhere
Platforms
SaaS
Remote
Corporate
Structured
Private cloud
SMS
Vendors
Unstructured
Public
Emails
Documents
Records
The landscape is fragmented
and confusing
Breach
notification
Supervision
GDPR
Information
governance
Data loss
prevention
Archiving
Fraud
prevention
Information
protection
eDiscovery
Anomaly
detection
Privacy
Compliance
management
Records
management
Access
management
EncryptionData classification
Auditing
Hundreds of compliance requirements
Hundreds of vendors
Data regulations
are increasing
around the world
Protection of Personal
Information Act 2013
(POPI)
Australia Privacy Principles
2014
General Data Privacy Law
Data Protection in Act
(pending)
Federal Data Protection
Law 2000
California Consumer
Privacy Act (CCPA) 2018
Personal Information
Protection and Electronic
Documents Act (PIPEDA)
Act on Protection of
Personal Information
(APPI) 2017
Personal Information
Protection Act (PIPA) 2011
Personal Information
Security Specification 2018
Personal Data Protection
Act (PDPA 2012)
Personal Data Protection
Bill 2018
The Privacy Protection
Act (PPA) 2017
General Data Protection
Regulation (GDPR 2016)
BUSINESSES AND USERS
ARE GOING TO
EMBRACE TECHNOLOGY
ONLY IF THEY CAN
TRUST IT.
Satya Nadella
Actions of a trusted partner
Actions of a trusted partner
Customers own any
patents and industrial
design rights that result
from our shared
innovation work
We proactively
collaborate with
customers and regulators
We do not provide any
government with the
ability to break encryption,
nor do we provide
any government
with encryption keys
We do not share
business customer
data with our advertiser
-supported services, nor
do we mine it for
marketing or
advertising
We do not engineer back
doors for governments
into our products
We extended GDPR data
subject rights to all
consumers worldwide
Intelligent compliance and risk management solutions
Information Protection
& Governance
Internal
Risk Management
Discover
& Respond
Protect and govern data
anywhere it lives
Identify and remediate
critical insider risks
Quickly investigate and respond
with relevant data
Compliance Management Simplify and automate risk assessments
Simplify and automate risk
assessments
COMPLIANCE MANAGEMENT
The regulatory landscape is complex and shifting
215+
updates per day from
900 regulatory bodies¹
40%
of firms spent 4+ hrs/
week creating and
amending reports¹
65%
of firms ranked “design
and implementation of
internal processes”
the biggest GDPR
hurdle2
1. Thomson Reuters Regulatory Intelligence - Cost of Compliance 2018
2. http://resources.compuware.com/research-improved-gdpr-readiness-businesses-still-at-risk-of-non-compliance
Shared responsibility model
Customer management of risk
Data classification and data accountability
Shared management of risk
Identity & access management | End point devices
Provider management of risk
Physical | Networking
Cloud customer Cloud provider
Responsibility On-Prem IaaS PaaS SaaS
Data classification
and accountability
Application
level controls
Network controls
Host infrastructure
Physical security
Client & end-point
protection
Identity & access
management
Examples of shared responsibilities: NIST
Personnel control
Strict screening for employees, vendors,
and contractors, and conduct trainings
through onboarding process
Personnel control
Allocate and staff sufficient resources
to operate an organization-wide
privacy program, including awareness-
raising and training
Access to production environment
Set up access controls that strictly limit
standing access to customer’s data or
production environment
Access to production environment
Set up access control policy and SOP,
leveraging Customer Lockbox / identity
management solutions
Protect data
Encrypt data based on org’s
compliance obligations. E.g.
encrypt PII in transit between users,
using its own encryption key, etc.
Protect data
Encrypt data at rest and in transit
based on industrial standards (BitLocker,
TLS, etc.)
Organization
responsibility
responsibility
800-53
Compliance Manager
Manage your compliance from one place
Compliance Manager is a dashboard that provides the Compliance Score and a
summary of your data protection and compliance stature as well as recommendations
to improve data protection and compliance. This is a recommendation, it is up to you
to evaluate and validate the effectiveness of customer controls as per your regulatory
environment. Recommendations from Compliance Manager and Compliance Score
should not be interpreted as a guarantee of compliance.
Ongoing risk assessment
An intelligent score reflects your compliance posture
against regulations or standards
Actionable insights
Recommended actions to improve your data
protection capabilities
Simplified compliance
Streamlined workflow across teams and richly detailed
reports for auditing preparation
Compliance Manager demo
Protect and govern data
anywhere it lives
INFORMATION PROTECTION & GOVERNANCE
Discovering and managing data is challenging
88%
of organizations no
longer have confidence
to detect and prevent
loss of sensitive data¹
>80%
of corporate data is
“dark” – it’s not classified,
protected or governed²
#1
Protecting and
governing sensitive
data is biggest
concern in complying
with regulations
1. Forrester. Security Concerns, Approaches and Technology Adoption. December 2018
2. IBM. Future of Cognitive Computing. November 2015
3. Microsoft GDPR research, 2017
Do you have a strategy for protecting and managing
sensitive and business critical data?
Do you know where your business critical and
sensitive data resides and what is being done
with it?
Do you have control of this data as it travels
inside and outside of your organization?
Are you using multiple solutions to classify,
label, and protect this data?
Information
Protection &
Governance
Protect and govern data
– anywhere it lives 88%
Understand your data landscape and identify
important data across your hybrid environment
Automatically retain,
delete, and store
data and records in
compliant manner
Apply flexible
protection actions
including encryption,
access restrictions
and visual markings
Powered by an intelligent platform
KNOW
YOUR DATA
88%
GOVERN
YOUR DATA
PROTECT
YOUR DATA
Unified approach to automatic data classification, policy
management, analytics and APIs
Know Your Data
Identify oversharing, mismanagement or misuse of
important documents
Understand volume, scope and location of sensitive
information
Visibility into sensitive information types detected
across documents and emails
Identify exposure & risks; guide policy configuration
Act on recommendations to enable policies to better
protect and govern data
Helps inform taxonomy and policies for sensitivity
labeling and retention labeling
Protect Your Data: Information Protection
Customize protection policies based on data sensitivity
Broad coverage
Protect sensitive information across devices, apps, on-
premises file repositories and cloud services
Streamlined administration
Configure sensitivity labels and protection policies in
single place and apply across endpoints and services
Built-in experiences
Integrated natively into Office apps, Office 365 services
and 3rd-party services
Flexible labeling options
Choose between automatic labeling, manual end-user
driven labeling or recommended labeling
Govern Your Data: Information Governance
Automatically govern data across your environment
Records Management
Ensure core business records are properly declared and
stored immutability with full audit visibility to meet
regulatory obligations
Streamlined administration
Configure retention labels and policies in single place
and apply automatically across services
Built-in experiences
Investigate and validate how and when labels are being
applied. Defensibly dispose of content after disposition
review
Identify and remediate
critical insider risks
INTERNAL RISK MANAGEMENT
90%
of enterprises feel
vulnerable to insider risk
57%
indicate they are most
vulnerable to loss of
confidential data
51%
Concerned with
negligent insider
behaviors
Identifying and mitigating risks is challenging
https://www.veriato.com/docs/default-source/whitepapers/insider-threat-report-2018.pdf
Organizations face a broad range of risks from insiders
Data spillage
Confidentiality
violations
IP theft
Workplace
violence
Regulatory
compliance
violations
Fraud
Policy
violations
Insider trading
Conflicts of
interest
Leaks of sensitive
data
Data handling
violations
Workplace
harassment
Defensible insights
Productivity reporting, full audit of review activities
and policy tracking
Communications Supervision
Intelligent policies
Refine digital communications with intelligent conditions,
sensitive info types, inclusions & exclusions and percent sample
Efficient reviews
Review experience built into Compliance center, tag and
comment on content and bulk resolution
Built in Encryption and Key Mgmt
OME/AIP
TLS
Service
Encryption
BitLocker
Capabilities for added protection and control
Additional customer controls for
added protection and control
Meets rigorous industry standards
Data is encrypted by default at-rest
and in-transit
Option to manage and control your
own encryption keys to help meet
compliance needs
Privileged Access Management
Controlling privileged access by Microsoft service
engineers and by your administrators
Privileged workflow
The principle of zero standing access
Just in time and just enough access
Logging and auditing
Quickly investigate and
respond with relevant data
DISCOVER & RESPOND
Cost of compliance can be significant
51%
of companies of >$1B
revenue, indicate at least
one regulatory
proceeding pending²
44%
of organizations report
they have had more than
one internal
investigation requiring
outside counsel²
50%
of organizations have
spent more time over
last 3 years address
regulatory requests²
1. Strategy Analytics. “Global Mobile Workforce Forecast Update 2016-2022.” Oct 2016.
2. Entrepreneur.com. “Password Statistics: The Bad, The Worse, and The Ugly.” June 3, 2015.
3. DARKReading. “Data Breach Record Exposure Up 205% from 2016.” Nov 8, 2017.
Are you able to intelligently reduce the
volume of data to find what’s relevant?
Are you able to track activity to fulfill
compliance obligations?
Do you have a process in place to
review the data before its shared?
Collection into document working sets
Manage static sets of documents within a case, that can be
independently searched, analyzed, shared, and acted upon.
Advanced eDiscovery
Quickly find and respond with only the relevant information
Custodian Management and Communications
Preserve content by custodian, send hold notifications
and track acknowledgements
Deep crawling and indexing
Deep processing (e.g. much higher size limits, non-Microsoft
file types, …) to extract and index text & metadata
Cull your data intelligently with ML
Use predictive coding, near duplicate detection, email threading,
Themes and ML models to identify potential high value content
Review and take action on documents
View content via a native and text viewer, organize documents
with tags and redact sensitive information prior to export
Data Investigations
Quickly locate, triage, and remediate sensitive data incidents in your organization
Validate with built-in review
Review content in-place to validate sensitive
or malicious content
Advanced search to quickly collect relevant data
Quickly search across Office 365 with conditions,
keywords and more to refine targeted search
Identify and investigate persons of interest
Identify and manage persons of interest within an investigation
to ensure related content and people are in scope
Take action & remediate sensitive data incidents
Identify sensitive content in-place and take immediate action to
soft delete, hard delete or tag for further processing
Complete audit log and escalation
All actions logged and ability to provide legal hold escalation
via the review and action process
Audit log and alerts
Comprehensive long-term audit supports continuous compliance
Establish alerts based on
organization specific criteria
Comprehensive coverage across
Office 365 services
Unified Audit log search and alert
experience
Microsoft 365
compliance
partners
Controle
EY
PWC
Light House
BDO
KPMG
Avaleris Inc
N1 SOFTWARE e SERVICOS
DE INFORMATICA LTDA-ME
Soarsoft International
Global Computing and Telecoms
Performanta
Meeco
Experteq IT Services Pty Ltd
Crayon
EY
KPMG
PWC
Software one
EY
EY
KPMG
Makronet
Atos Global
Comparex
DXC Technology
PWC
Accenture
Bechtle Global
InfoWAN
PHAT Consulting GmbH
Crayon
CGI Group UK
New Signature
Ai3
Capgemini
Nelite
VNext
4WARD
Aquest
BDO Ziv Haft
See more partners here:
https://blogs.partner.microsoft.com/mpn/gdpr-leaders-needed-help-customers-navigate-gdpr-journey/
Consider a different approach
Reduce number of solution vendors and
leverage shared responsibility
Know, protect and govern your sensitive
data throughout its lifecycle
Implement more intelligent, built-in
compliance solutions
Contact Information
© 2019 Razor Technology www.razor-tech.com
David Rosenthal
VP & General Manager
Digital Business
@DavidJRosenthal
SlideShare
Blog: www.razor-tech.com
5 Tower Bridge
300 Barr Harbor Dr., Suite 705
West Conshohocken, PA 19428
www.razor-tech.com
David.Rosenthal@razor-tech.com
Cell: 215.801.4430
Office: 866.RZR.DATA
LETS KEEP IN TOUCH
37
Intelligent compliance and risk
management solutions
Microsoft 365
Compliance
Discussion

Más contenido relacionado

La actualidad más candente

Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...☁️ Gustavo Magella
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedAlbert Hoitingh
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdfChunLei(peter) Che
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)Radhakrishnan Govindan
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsVignesh Ganesan I Microsoft MVP
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?Albert Hoitingh
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
 
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...ArethaSimons
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AADAndrew Bettany
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 

La actualidad más candente (20)

Office 365 Security Best Practices
Office 365 Security Best PracticesOffice 365 Security Best Practices
Office 365 Security Best Practices
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystified
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
Data Loss Prevention in Office 365
Data Loss Prevention in Office 365Data Loss Prevention in Office 365
Data Loss Prevention in Office 365
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 

Similar a Microsoft 365 Compliance

Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
CIO WaterCooler Focus: GDPR Jasmit Sagoo
CIO WaterCooler Focus: GDPR   Jasmit SagooCIO WaterCooler Focus: GDPR   Jasmit Sagoo
CIO WaterCooler Focus: GDPR Jasmit SagooAndrew Pryor
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCapgemini
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR prioritiesAlberto Canadè
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
One name unify them all
One name unify them allOne name unify them all
One name unify them allBizTalk360
 
Top 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxTop 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxAlistair Pugin
 
M365 Records Management Community Webinar
M365 Records Management Community WebinarM365 Records Management Community Webinar
M365 Records Management Community WebinarDrew Madelung
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...Patrick Guimonet
 

Similar a Microsoft 365 Compliance (20)

Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
CIO WaterCooler Focus: GDPR Jasmit Sagoo
CIO WaterCooler Focus: GDPR   Jasmit SagooCIO WaterCooler Focus: GDPR   Jasmit Sagoo
CIO WaterCooler Focus: GDPR Jasmit Sagoo
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Data Security.pdf
Data Security.pdfData Security.pdf
Data Security.pdf
 
Top 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxTop 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptx
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
M365 Records Management Community Webinar
M365 Records Management Community WebinarM365 Records Management Community Webinar
M365 Records Management Community Webinar
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
 

Más de David J Rosenthal

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made SimpleDavid J Rosenthal
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021David J Rosenthal
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021David J Rosenthal
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from MicrosoftDavid J Rosenthal
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftDavid J Rosenthal
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldDavid J Rosenthal
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the EnterpriseDavid J Rosenthal
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantDavid J Rosenthal
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureDavid J Rosenthal
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelDavid J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active DirectoryDavid J Rosenthal
 

Más de David J Rosenthal (20)

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made Simple
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from Microsoft
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Microsoft 365 Compliance

  • 1. Microsoft 365 Compliance Intelligent compliance and risk management solutions David J. Rosenthal Vice President, Digital Business Microsoft Technology Center, New York City October 24, 2019
  • 2. Data is exploding It’s created, stored, and shared everywhere Platforms SaaS Remote Corporate Structured Private cloud SMS Vendors Unstructured Public Emails Documents Records
  • 3. The landscape is fragmented and confusing
  • 5. Hundreds of compliance requirements Hundreds of vendors
  • 6. Data regulations are increasing around the world Protection of Personal Information Act 2013 (POPI) Australia Privacy Principles 2014 General Data Privacy Law Data Protection in Act (pending) Federal Data Protection Law 2000 California Consumer Privacy Act (CCPA) 2018 Personal Information Protection and Electronic Documents Act (PIPEDA) Act on Protection of Personal Information (APPI) 2017 Personal Information Protection Act (PIPA) 2011 Personal Information Security Specification 2018 Personal Data Protection Act (PDPA 2012) Personal Data Protection Bill 2018 The Privacy Protection Act (PPA) 2017 General Data Protection Regulation (GDPR 2016)
  • 7. BUSINESSES AND USERS ARE GOING TO EMBRACE TECHNOLOGY ONLY IF THEY CAN TRUST IT. Satya Nadella Actions of a trusted partner
  • 8. Actions of a trusted partner Customers own any patents and industrial design rights that result from our shared innovation work We proactively collaborate with customers and regulators We do not provide any government with the ability to break encryption, nor do we provide any government with encryption keys We do not share business customer data with our advertiser -supported services, nor do we mine it for marketing or advertising We do not engineer back doors for governments into our products We extended GDPR data subject rights to all consumers worldwide
  • 9. Intelligent compliance and risk management solutions Information Protection & Governance Internal Risk Management Discover & Respond Protect and govern data anywhere it lives Identify and remediate critical insider risks Quickly investigate and respond with relevant data Compliance Management Simplify and automate risk assessments
  • 10. Simplify and automate risk assessments COMPLIANCE MANAGEMENT
  • 11. The regulatory landscape is complex and shifting 215+ updates per day from 900 regulatory bodies¹ 40% of firms spent 4+ hrs/ week creating and amending reports¹ 65% of firms ranked “design and implementation of internal processes” the biggest GDPR hurdle2 1. Thomson Reuters Regulatory Intelligence - Cost of Compliance 2018 2. http://resources.compuware.com/research-improved-gdpr-readiness-businesses-still-at-risk-of-non-compliance
  • 12. Shared responsibility model Customer management of risk Data classification and data accountability Shared management of risk Identity & access management | End point devices Provider management of risk Physical | Networking Cloud customer Cloud provider Responsibility On-Prem IaaS PaaS SaaS Data classification and accountability Application level controls Network controls Host infrastructure Physical security Client & end-point protection Identity & access management
  • 13. Examples of shared responsibilities: NIST Personnel control Strict screening for employees, vendors, and contractors, and conduct trainings through onboarding process Personnel control Allocate and staff sufficient resources to operate an organization-wide privacy program, including awareness- raising and training Access to production environment Set up access controls that strictly limit standing access to customer’s data or production environment Access to production environment Set up access control policy and SOP, leveraging Customer Lockbox / identity management solutions Protect data Encrypt data based on org’s compliance obligations. E.g. encrypt PII in transit between users, using its own encryption key, etc. Protect data Encrypt data at rest and in transit based on industrial standards (BitLocker, TLS, etc.) Organization responsibility responsibility 800-53
  • 14. Compliance Manager Manage your compliance from one place Compliance Manager is a dashboard that provides the Compliance Score and a summary of your data protection and compliance stature as well as recommendations to improve data protection and compliance. This is a recommendation, it is up to you to evaluate and validate the effectiveness of customer controls as per your regulatory environment. Recommendations from Compliance Manager and Compliance Score should not be interpreted as a guarantee of compliance. Ongoing risk assessment An intelligent score reflects your compliance posture against regulations or standards Actionable insights Recommended actions to improve your data protection capabilities Simplified compliance Streamlined workflow across teams and richly detailed reports for auditing preparation
  • 16. Protect and govern data anywhere it lives INFORMATION PROTECTION & GOVERNANCE
  • 17. Discovering and managing data is challenging 88% of organizations no longer have confidence to detect and prevent loss of sensitive data¹ >80% of corporate data is “dark” – it’s not classified, protected or governed² #1 Protecting and governing sensitive data is biggest concern in complying with regulations 1. Forrester. Security Concerns, Approaches and Technology Adoption. December 2018 2. IBM. Future of Cognitive Computing. November 2015 3. Microsoft GDPR research, 2017
  • 18. Do you have a strategy for protecting and managing sensitive and business critical data? Do you know where your business critical and sensitive data resides and what is being done with it? Do you have control of this data as it travels inside and outside of your organization? Are you using multiple solutions to classify, label, and protect this data?
  • 19. Information Protection & Governance Protect and govern data – anywhere it lives 88% Understand your data landscape and identify important data across your hybrid environment Automatically retain, delete, and store data and records in compliant manner Apply flexible protection actions including encryption, access restrictions and visual markings Powered by an intelligent platform KNOW YOUR DATA 88% GOVERN YOUR DATA PROTECT YOUR DATA Unified approach to automatic data classification, policy management, analytics and APIs
  • 20. Know Your Data Identify oversharing, mismanagement or misuse of important documents Understand volume, scope and location of sensitive information Visibility into sensitive information types detected across documents and emails Identify exposure & risks; guide policy configuration Act on recommendations to enable policies to better protect and govern data Helps inform taxonomy and policies for sensitivity labeling and retention labeling
  • 21. Protect Your Data: Information Protection Customize protection policies based on data sensitivity Broad coverage Protect sensitive information across devices, apps, on- premises file repositories and cloud services Streamlined administration Configure sensitivity labels and protection policies in single place and apply across endpoints and services Built-in experiences Integrated natively into Office apps, Office 365 services and 3rd-party services Flexible labeling options Choose between automatic labeling, manual end-user driven labeling or recommended labeling
  • 22. Govern Your Data: Information Governance Automatically govern data across your environment Records Management Ensure core business records are properly declared and stored immutability with full audit visibility to meet regulatory obligations Streamlined administration Configure retention labels and policies in single place and apply automatically across services Built-in experiences Investigate and validate how and when labels are being applied. Defensibly dispose of content after disposition review
  • 23. Identify and remediate critical insider risks INTERNAL RISK MANAGEMENT
  • 24. 90% of enterprises feel vulnerable to insider risk 57% indicate they are most vulnerable to loss of confidential data 51% Concerned with negligent insider behaviors Identifying and mitigating risks is challenging https://www.veriato.com/docs/default-source/whitepapers/insider-threat-report-2018.pdf
  • 25. Organizations face a broad range of risks from insiders Data spillage Confidentiality violations IP theft Workplace violence Regulatory compliance violations Fraud Policy violations Insider trading Conflicts of interest Leaks of sensitive data Data handling violations Workplace harassment
  • 26. Defensible insights Productivity reporting, full audit of review activities and policy tracking Communications Supervision Intelligent policies Refine digital communications with intelligent conditions, sensitive info types, inclusions & exclusions and percent sample Efficient reviews Review experience built into Compliance center, tag and comment on content and bulk resolution
  • 27. Built in Encryption and Key Mgmt OME/AIP TLS Service Encryption BitLocker Capabilities for added protection and control Additional customer controls for added protection and control Meets rigorous industry standards Data is encrypted by default at-rest and in-transit Option to manage and control your own encryption keys to help meet compliance needs
  • 28. Privileged Access Management Controlling privileged access by Microsoft service engineers and by your administrators Privileged workflow The principle of zero standing access Just in time and just enough access Logging and auditing
  • 29. Quickly investigate and respond with relevant data DISCOVER & RESPOND
  • 30. Cost of compliance can be significant 51% of companies of >$1B revenue, indicate at least one regulatory proceeding pending² 44% of organizations report they have had more than one internal investigation requiring outside counsel² 50% of organizations have spent more time over last 3 years address regulatory requests² 1. Strategy Analytics. “Global Mobile Workforce Forecast Update 2016-2022.” Oct 2016. 2. Entrepreneur.com. “Password Statistics: The Bad, The Worse, and The Ugly.” June 3, 2015. 3. DARKReading. “Data Breach Record Exposure Up 205% from 2016.” Nov 8, 2017.
  • 31. Are you able to intelligently reduce the volume of data to find what’s relevant? Are you able to track activity to fulfill compliance obligations? Do you have a process in place to review the data before its shared?
  • 32. Collection into document working sets Manage static sets of documents within a case, that can be independently searched, analyzed, shared, and acted upon. Advanced eDiscovery Quickly find and respond with only the relevant information Custodian Management and Communications Preserve content by custodian, send hold notifications and track acknowledgements Deep crawling and indexing Deep processing (e.g. much higher size limits, non-Microsoft file types, …) to extract and index text & metadata Cull your data intelligently with ML Use predictive coding, near duplicate detection, email threading, Themes and ML models to identify potential high value content Review and take action on documents View content via a native and text viewer, organize documents with tags and redact sensitive information prior to export
  • 33. Data Investigations Quickly locate, triage, and remediate sensitive data incidents in your organization Validate with built-in review Review content in-place to validate sensitive or malicious content Advanced search to quickly collect relevant data Quickly search across Office 365 with conditions, keywords and more to refine targeted search Identify and investigate persons of interest Identify and manage persons of interest within an investigation to ensure related content and people are in scope Take action & remediate sensitive data incidents Identify sensitive content in-place and take immediate action to soft delete, hard delete or tag for further processing Complete audit log and escalation All actions logged and ability to provide legal hold escalation via the review and action process
  • 34. Audit log and alerts Comprehensive long-term audit supports continuous compliance Establish alerts based on organization specific criteria Comprehensive coverage across Office 365 services Unified Audit log search and alert experience
  • 35. Microsoft 365 compliance partners Controle EY PWC Light House BDO KPMG Avaleris Inc N1 SOFTWARE e SERVICOS DE INFORMATICA LTDA-ME Soarsoft International Global Computing and Telecoms Performanta Meeco Experteq IT Services Pty Ltd Crayon EY KPMG PWC Software one EY EY KPMG Makronet Atos Global Comparex DXC Technology PWC Accenture Bechtle Global InfoWAN PHAT Consulting GmbH Crayon CGI Group UK New Signature Ai3 Capgemini Nelite VNext 4WARD Aquest BDO Ziv Haft See more partners here: https://blogs.partner.microsoft.com/mpn/gdpr-leaders-needed-help-customers-navigate-gdpr-journey/
  • 36. Consider a different approach Reduce number of solution vendors and leverage shared responsibility Know, protect and govern your sensitive data throughout its lifecycle Implement more intelligent, built-in compliance solutions
  • 37. Contact Information © 2019 Razor Technology www.razor-tech.com David Rosenthal VP & General Manager Digital Business @DavidJRosenthal SlideShare Blog: www.razor-tech.com 5 Tower Bridge 300 Barr Harbor Dr., Suite 705 West Conshohocken, PA 19428 www.razor-tech.com David.Rosenthal@razor-tech.com Cell: 215.801.4430 Office: 866.RZR.DATA LETS KEEP IN TOUCH 37
  • 38. Intelligent compliance and risk management solutions Microsoft 365 Compliance