Office 365 Security Assessment Workshop

Slides:



Advertisements
Similar presentations
MIGRATION MIGR-09. How to Run Your Next Implementation... Don't Let It Run You! Patricia Johnson Senior Systems Consultant Strategic Systems Group, Inc.
Advertisements

Page 2 Agenda Page 3 History –Blue Print, 2000 –GIS Process 1.2, 2001 (training only) –GIS Process 2.0, (ITIL based - not implemented) –Supply/Demand.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Dr. Julian Lo Consulting Director ITIL v3 Expert
Project Management: A Critical Skill for Organizations Presented by Hetty Baiz Project Office Princeton University.
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
Security Controls – What Works
1 Copyright © 2014 PPM 2000 Inc. SINGAPRORE, AUGUST 2014 Denis O’Sullivan, CPP INCIDENT MANAGEMENT TECHNOLOGY CHALLENGES.
Community Planning Training 1-1. Community Plan Implementation Training 1- Community Planning Training 1-3.
Incident Handling and Response Breakout Overview.
QAD's Customer Engagement Dan Blake Consultancy Development Director, QAD QAD Explore 2012.
The Evergreen, Background, Methodology and IT Service Management Model
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Tracking national portfolios and assessing results Sub-regional Workshop for GEF Focal Points Western and Central Africa Dakar, May 2007.
Instructional & Information Technology Services Fall, Activities and Updates Teresa Macklin Information Security Officer Information Security.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Microsoft Office Project 2003: Selling EPM in your Organization Matt Wilson Business Solutions Specialist LMR Solutions.
Assessment Findings Validation Title of the Project (date)
Module 10: Implementing Administrative Templates and Audit Policy.
Introduction to SPA Trade Services PDA Work Flow Management Systems The Era of Change.
Blackboard Learn 9.1 Communicating with Students © 2010 Blackboard Inc. All rights reserved.
PACFaH M&E TOOLS AND REPORTNG TIMELINES Jayne Arinze-Egemonye.
Compliance Management System. Intelex System Overview Focus Modules: –Permits Management –Monitoring & Measurement –Training Management –Document Control.
Planning Engagement Kickoff
Office 365 Security Assessment Workshop
Microsoft 365 Security and Compliance: Training and Resources
Interset Support Overview March 2017
Sample Fit-Gap Kick-off
Deployment Planning Services
IBM® Application Security Product Professional Services
Office 365 Security Assessment Workshop
Deployment Planning Services
EMS Everywhere Workshop Overview February 2017
CallTower Implementation Process Overview
Transforming business
Office 365 FastTrack Planning Engagement Kickoff
Office 365 Security Assessment Workshop
Data Architecture World Class Operations - Impact Workshop.
Deployment Planning Services
Accelerate GDPR compliance with Microsoft 365
Deployment Planning Services
Securing the Network Perimeter with ISA 2004
Training for New District Test Coordinators
Microsoft Corporation
Information Security: Risk Management or Business Enablement?
PRIVILEGED ACCOUNT ABUSE
SMB practice development: Security play
Machine Learning Session
IS&T Project Reviews September 9, 2004.
Managing Content: You Need To Think About More Than Office 365
System Review – The Forgotten Implementation Step
12 STEPS TO A GDPR AWARE NETWORK
SMB practice development: Security play
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Employee engagement Close out presentation
The new way of IT – Maturity levels
Employee engagement Delivery guide
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Employee Cybersecurity Program
Microsoft Data Insights Summit
<offer name> with Microsoft 365 Business Secure Deployment
In the attack index…what number is your Company?
Strengthening the GDPR business opportunity with Microsoft 365
Make it real: Help your customers comply with the GDPR
Microsoft Data Insights Summit
Global One Communications
RISK MANAGEMENT CENTER
IT Next – Transformation Program
Presentation transcript:

Office 365 Security Assessment Workshop Close-out Presentation <Presenter Name>

1 2 3 4 Agenda Introduction Engagement Overview Engagement Tools Next steps and Actions 2 3 4

Close-out Presentation Example Close-out Presentation The purpose of this meeting is to: Review vision, objectives and assessment approach Review and agree on recommendations and roadmap Discuss and agree on next steps and actions

Engagement Overview

Office 365 Security Assessment Workshop Phase 1 Kick Off Phase 2 Assessment Phase 3 Education Phase 4 Roadmap Project scope Pre-assessment questionnaire Requirements Stakeholders Review questionnaire Secure Score Identify gaps Possible Advanced Security Management proxy log import Provide up to 3 hrs. of education on security topics Utilizes sessions from Office University training events Demonstrate SaaS application use through Advanced Security Management Provide detailed roadmap as prescribed by Secure Score Identify customers security roadmap and next steps Partner opportunity to help close identified gaps

Approach Secure Score Prioritize Build Roadmap Design/Deploy Use Office 365 Secure Score to understand current security baseline Track score improvements over time Track configuration drift, using scheduled reviews Security Awareness Consulting and solution recommendation Implementation and configuration Prioritize Prioritize the security actions from Secure Score based on user impact and implementation cost Secure Score Prioritize: -User impact -Implementation cost Build Roadmap Design/Deploy Build Roadmap Build a roadmap for the implementation of the prioritized security actions Design/Deploy Design and deploy the recommended security actions in the roadmap Not in scope as part of this engagement

Recommendations and Roadmap

Security Action Score Summary Example Current State Office 365 Secure Score Security Action Prioritization Summary Office 365 Secure Score Security Action Score Summary User Impact Implementation Cost Office 365 Secure Score Security Action Category Summary

Key Recommendations Example Quick Wins 0-3 Months Low user impact Low implementation cost 3-6 Months Moderate implementation cost 6 Months and beyond Moderate user impact Low and moderate implementation cost Enable MFA for all global admins Set strong outbound spam policy Review signs-ins after multiple failures report weekly Enable audit data recording Review signs-ins from multiple geographies report weekly Enable Information Rights Management (IRM) services Enable Advanced Security Management Console Enable MFA for all users Enable Advanced Threat Protection safe attachments policy Enable Advanced Threat Protection safe links policy Do not allow anonymous calendar sharing Require passwords to be reset at least every 60 days Enable mobile device management services Enable Data Loss Prevention policies SPO Sites have classification policies IRM protections applied to documents IRM protections applied to email

How we can help Example User impact: Implementation cost: 0-3 Months 6 Months and beyond Protect Enable audit data recording Enable Advanced Threat Protection safe attachments policy Enable MFA for all users Enable mobile device management services IRM protections applied to documents IRM protections applied to email Enable MFA for all global admins Set strong outbound spam policy Enable Advanced Threat Protection safe links policy Enable Data Loss Prevention policies Establish education program for IT staff and end-users On-going service: Security Assessment Detect Managed security service: Monitoring, account and credential abuse Managed security service : Reporting Managed security service : Threat detection Enable Advanced Security Management Console Respond Managed security service : Incident response User impact: Low Moderate Implementation cost:

Next Steps and Actions

Next Steps and Actions Example Party Responsible Completion Date Next Step, Action Notes