Office 365 Security and Compliance Overview

Slides:



Advertisements
Similar presentations
Success through People with LinkedIn and O365
Advertisements

The time to address enterprise mobility is now
Deployment Planning Services
9/12/2018 6:21 PM BRK2203 Protect and control your sensitive s with new Office 365 Message Encryption capabilities Praveen Vijayaraghavan Principal.
Leverage the O365 Task Ecosystem with Microsoft To-Do and Planner
Secure Hyperconnectivity with TeamViewer and Windows technologies
Build transformative industry solutions on the Office 365 platform
Understanding EU GDPR from an Office 365 perspective
Cloud Security IS Application-Centric Security
THR2099 What to do BEFORE all hell breaks loose: Building a modern cybersecurity strategy.
Microsoft /4/2018 8:21 AM BRK3082 Build solutions and apps with Microsoft OneDrive API and Microsoft Graph API Ryan Gregg Principal Program Manger,
Azure Information Protection Strategy and Roadmap
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Deployment Planning Services
6/17/ :27 AM BRK3341 Unlock extensibility by connecting your service to PowerApps and Microsoft Flow Theresa (Tessa) Palmer–Sr. Program Manager Sunay.
6/19/2018 2:57 AM THR3092 Monitor and investigate actions on your user and data with alerts, insights and reports Binyan Chen Program Manager II, Office.
Office 365 Groups Governance and Compliance
6/26/2018 5:24 AM THR1083 Enabling Advanced Security Capabilities: Drive consistent authorization across multiple applications Bryan Bolling Solution Architect,
Do more with Microsoft Word and Office 365
Microsoft /1/2018 5:38 PM Send secure to anyone with the power of Office 365 and  Azure Information Protection Gagan Gulati Ian Hameroff.
Decoding audit events in Microsoft Office 365
Optimizing Microsoft OneDrive for the enterprise
Build data-driven solutions using Microsoft Visio
Understanding your collaboration options in Office 365
Understanding Multi-Geo Capabilities in Office 365
Protect sensitive information with Office 365 DLP
Location – the next frontier in analytics
7/23/2018 6:01 PM BRK2282 Protecting complete data lifecycle using Microsoft’s information protection capabilities Gagan Gulati Alex Li Principal.
7/29/2018 4:45 PM Manage SharePoint and OneDrive in Office 365: A field guide for administrators Chris Bortlik Modern Workplace Technical Architect Microsoft.
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Microsoft Ignite /31/ :08 AM
Microsoft Planner: How to manage your team’s work in Office 365
Threat Management Gateway
Understanding Windows Analytics Update Compliance
Excel and Power BI Better Together Democratization of data
8/7/ :28 AM BRK3198 Monitor and investigate actions on your user and data with alerts, insights and reports Binyan Chen Program Manager II, Office.
Office 365 and the GDPR Roy King, Product Marketing Manager
Workflow Orchestration with Adobe I/O
Customize Office 365 Search and create result sources
The utility belt for managing security and compliance in Office 365
Find, try and get line-of-business apps on Microsoft AppSource
Automated Response with Windows Defender ATP
9/12/2018 7:18 AM THR1081 Don’t be the first victim of new malware Turn Windows Defender AV Cloud Protection on! Amitai Senior Program.
Rights Management Services (RMS)
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Using AAD B2C for WordPress & Secure Deployment Scenario
Understanding best practices in classifying sensitive data
Building a unified experience across Office 365
Prevent Costly Data Leaks from Microsoft Office 365
What’s new in Office 365 administration
Customize and Tune Microsoft Office 365 Data Loss Prevention
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
Automating security for better, continuous compliance in the cloud
Five mistakes to avoid when deploying Enterprise Mobility + Security
Learn how to make SharePoint Accessible and Inclusive
Microsoft To-Do Preview
Accelerate customer experience with ChatOps
Overview: Dynamics 365 for Project Service Automation
2/24/2019 7:49 PM BRK2198 Four new Azure management experiences to run your business critical applications Dushyant Gill | Jan Kalis.
Keep up with Office 365 evolution in the real world
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Breaking Down the Value of A Yammer Post: 20 Things to Do
Getting the most out of Azure resources with Azure Advisor
4/21/2019 7:09 AM THR2098 Unlock New Opportunities with Nintex Hawkeye Process Intelligence and Workflow Analytics Sr. Product.
Consolidate, manage, backup, and secure your cloud content
Optimizing your content for search and discovery
Microsoft Data Insights Summit
<offer name> with Microsoft 365 Business Secure Deployment
Microsoft Data Insights Summit
Presentation transcript:

Office 365 Security and Compliance Overview 6/16/2018 10:30 PM BRK3136 Office 365 Security and Compliance Overview Rudra Mitra Director, Office 365 Program Management Alym Rayani Director, Office 365 Marketing © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Which one is the hacker? 6/16/2018 10:30 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Our unique approach Platform Intelligence Partners Microsoft Inspire 6/16/2018 10:30 PM Our unique approach Platform Intelligence Partners © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Areas of Focus Intelligence powered insights Identity & access management Areas of Focus Threat protection Intelligence powered insights Reduce total cost of ownership Protection beyond Office 365 Platform Information protection Security management Compliance solutions

Office 365 Security & Compliance Offerings Threat protection Information protection Security management Compliance solutions Protect against advanced threats and recover quickly when attacked Ensure documents and emails are seen only by authorized people Meet your compliance obligations while managing your risk and reducing cost Gain visibility and control over security tools Security & Compliance Center Office 365 Cloud App Security Secure Score Data Loss Prevention Office Message Encryption Exchange Online Protection Office 365 Advanced Threat Protection Office 365 Threat Intelligence Advanced Data Governance Advanced eDiscovery Customer Lockbox Service Assurance Compliance Manager * = new and updated capabilities

Office 365 Threat Protection ENABLING OUR CUSTOMERS TO PROTECT DETECT RESPOND THE MICROSOFT SECURITY GRAPH POWERED BY THE EXCHANGE ONLINE PROTECTION Preventing signature-based spam, malware, etc ADVANCED THREAT PROTECTION Preventing compromise from “unknown” threats THREAT INTELLIGENCE Developing proactive cybersecurity strategy IN-DEPTH, INTEGRATED, INTELLIGENT

Advanced Threat Protection that works across Office 365 Office 365 Advanced Threat Protection (ATP) is the most powerful solution available that secures your ENTIRE Office 365 ecosystem from today’s most advanced and sophisticated threats Office 365 Advanced Threat Protection (ATP) is the most used advanced malware and phish protection service with Office 365; more than all other products in the same category combined

Threat Protection Demo 6/16/2018 10:30 PM Threat Protection Demo Phil Newman © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Exchange Online Protection Cloud-based email protection for online and on- premise users Native capability of Microsoft Exchange Online Protect your messaging environment against malware Improve productivity by blocking spam NEW Security Dashboard for centralized management NEW Insights for configuration improvements NEW Reports with action call outs and common remediation's

Advanced Threat Protection Time-of-click protection against malicious URLs Zero-day protection against malicious attachments Critical insights into external threats Integrated across apps & services Intelligence sharing across Windows devices NEW Enhanced Anti-phish capabilities NEW Expanding to SharePoint, OneDrive for Business, Teams workloads NEW Safe Links for Internal Emails

Microsoft Worldwide Partner Conference 2016 6/16/2018 10:30 PM Threat Intelligence Broad visibility into attack trends Billions of data points from Office, Windows, and Azure Integrated data from external cyber threat hunters Proactive security policy management Intuitive dashboards with drill-down capabilities NEW Threat Tracker NEW Threat Trend Insights NEW New real-time activity (user/content) intelligence Threat Explorer © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Microsoft’s approach to Information Protection 6/16/2018 10:30 PM Microsoft’s approach to Information Protection Comprehensive protection of sensitive data throughout the lifecycle – inside and outside the organization Detect Classify Protect Monitor Scan & detect sensitive data based on policy Classify data and apply labels based on sensitivity Apply protection actions, including encryption, access restrictions Reporting, alerts, remediation Devices cloud On premises © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Sensitive data detections in Office 365 Microsoft Worldwide Partner Conference 2016 6/16/2018 10:30 PM Sensitive data detections in Office 365 Microsoft’s information protection solutions help you protect sensitive data throughout the lifecycle – inside and outside the organization 6x Increase 7.5x Increase © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Information Protection Demo 6/16/2018 10:30 PM Information Protection Demo Alex Li © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Information Protection Labeling 6/16/2018 10:30 PM Information Protection Labeling GOAL: Consistent & persistent labeling across information protection solutions A label is a simplified way for end-users to classify & protect their content Today, may require configuration in multiple places & add-in for Office client apps COMING SOON Consistent label configuration and application COMING SOON Built-in native labeling support for Office apps – Mac and web to start; Windows, iOS & Android thereafter © Microsoft Corporation. All rights reserved.

Data Loss Prevention Detect sensitive information across Office 365 6/16/2018 10:30 PM Data Loss Prevention Detect sensitive information across Office 365 Choose from 80+ sensitive information types – or create your own Customize policies, exclusions and actions Block accidental sharing and educate users View and monitor reports, alerts, events NEW Custom sensitive information types NEW HIPAA sensitive information types NEW Large dictionary support © Microsoft Corporation. All rights reserved.

Office 365 Message Encryption capabilities 6/16/2018 10:30 PM Office 365 Message Encryption capabilities Protect and mitigate the risk of data loss and unintended disclosure of emails through encryption and rights protection Control sensitive data through flexible policies or ad hoc customer controls that’s built into Office 365 Meet Compliance obligations that require data encryption or encryption key control NEW End-user encryption controls NEW Enables B2B and B2C collaboration NEW BYOK in Azure Information Protection © Microsoft Corporation. All rights reserved.

INTELLIGENT SECURITY & COMPLIANCE MANAGEMENT Advanced Security Management Secure Score Compliance Manager Security & Compliance Center INTELLIGENT SECURITY & COMPLIANCE MANAGEMENT Powered by the Intelligent Security Graph VISIBILITY CONTROL GUIDANCE Understand the security state and risks across resources Define consistent security policies and enable controls Enhance security through built-in intelligence and recommendations

Office 365 Secure Score Secure Score help you balance security and productivity by helping you understand controls are available and which ones you have enabled Tenants that use Secure Score on average have a score that is more than double of a tenant that has not used Secure Score

Security and Compliance Management Demo 6/16/2018 10:30 PM Security and Compliance Management Demo Sumit Malhotra © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Office 365 Security and Compliance Center 6/16/2018 10:30 PM Office 365 Security and Compliance Center Powerful for experts, and simple for generalists to use Scenario oriented workflows with cross-cutting policies spanning features Powerful content discovery across Office 365 workloads Proactive suggestions leveraging Microsoft Security Intelligence Graph NEW Reports with issue call out and recommended remediation's NEW Configuration improvement suggestions NEW More alerts and digest reports © Microsoft Corporation. All rights reserved.

Advanced Security Management 6/16/2018 10:30 PM Advanced Security Management Identify high-risk and abnormal usage, security incidents, and threats. Shape your Office 365 environment with granular security controls and policies. Gain enhanced visibility and context into your Office 365 usage and shadow IT. NEW New name – Office 365 Cloud Security NEW Support for DLP, Teams, Power BI, Yammer NEW Integration with AAD groups; user activity and IP address drill down experiences NEW EU data center availability © Microsoft Corporation. All rights reserved.

Preview Fall 2017 6/16/2018 10:30 PM Compliance Manager An intelligent score assessing your compliance posture against evolving regulations Recommended actions to improve your data protection capabilities Streamlined workflow and audit-ready reports Compliance Manager Preview is a dashboard that provides a summary of your data protection and compliance stature and recommendations to improve data protection and compliance. This is a recommendation, it is up to you to evaluate its effectiveness in your regulatory environment prior to implementation. Recommendations from Compliance Manager Preview should not be interpreted as a guarantee of compliance. © Microsoft Corporation. All rights reserved.

Data Governance momentum 6/16/2018 10:30 PM Data Governance momentum © Microsoft Corporation. All rights reserved.

Advanced Compliance capabilities in Office 365 Helping you meet your compliance obligations while managing your risk and reducing cost Added controls Help you meet internal and external compliance requirements Intelligent solutions Enable you to bring your data under control Visibility into actions Monitor and investigate actions taken on your data by the Advanced Compliance solutions Advanced Data Governance · Advanced eDiscovery · Customer Lockbox · Customer Key

Data Governance Demo Nishan DeSilva 6/16/2018 10:30 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

GDPR Dashboard

Advanced Data Governance 6/16/2018 10:30 PM Advanced Data Governance Automate data retention by leveraging recommendations driven by machine learning Automatically classify the data most relevant for your organization or industry Policy recommendations (delete, move, encrypt, or share) based on data insights and intelligence NEW Consistently manage records that have retention periods associated with specific event triggers NEW Manual disposition review to defensibly delete what’s redundant, trivial or obsolete NEW Supervise employee communications to comply with security and regulatory guidelines © Microsoft Corporation. All rights reserved.

6/16/2018 10:30 PM Advanced eDiscovery Train the system to automatically distinguish between relevant and non-relevant documents Group similar documents together with near- duplicate detection to make review more efficient Identify unique messages in an email thread and reduce the volume of data for review using Threading NEW Import case-specific copy of non-Office 365 data and analyze using Advanced eDiscovery NEW Quickly analyze and export data with one click using Express Analysis © Microsoft Corporation. All rights reserved.

6/16/2018 10:30 PM Customer Key Available Now Provide and manage your own keys used to encrypt Office 365 data Built into the Office 365 with no disruption to end user and with recovery key which adds protections against unintended key loss Actions are auditable and controls will be verified in next upcoming SOC audit © Microsoft Corporation. All rights reserved.

Office 365 Information Protection momentum 95 Million Office 365 users protected with our built-in security and compliance capabilities

Other Sessions and Resources Keep what you need but don’t horde everything with intelligent data governance in Office 365 - 9/26 9:00 Manage and control your data to help meet compliance needs with Customer Key - 9/26 12:30 GDPR and Office 365 - 9/27 10:45 Stay Ahead of the Cyberattacks with Office 365 Threat Intelligence - 9/28 14:15 Anti-phishing with Office 365 Advanced Threat Protection - 9/28 16:00 Insights into your Office 365 Mail Flow - 9/29 12:30 Resources Office 365 Trust Center - https://products.office.com/en- us/business/office-365-trust-center-welcome Compliance Manager Preview Program - https://aka.ms/compliance-manager-preview Security, Privacy & Compliance Tech Community - https://techcommunity.microsoft.com/t5/Sec urity-Privacy-Compliance/ct- p/SecurityPrivacyCompliance Ignite News Blog - https://aka.ms/ignite2017o365security Microsoft Mechanics - https://www.youtube.com/user/OfficeGarage Series

Please evaluate this session Tech Ready 15 6/16/2018 Please evaluate this session From your Please expand notes window at bottom of slide and read. Then Delete this text box. PC or tablet: visit MyIgnite https://myignite.microsoft.com/evaluations Phone: download and use the Microsoft Ignite mobile app https://aka.ms/ignite.mobileapp Your input is important! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6/16/2018 10:30 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.