Secure Document Sharing

Slides:



Advertisements
Similar presentations
Excel Lesson 16 Protecting, Tracking, and Sharing Workbooks Microsoft Office 2010 Advanced Cable / Morrison 1.
Advertisements

Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
This presentation will take a look at to prevent your information from being discovered by and investigator.
In the top right hand corner you will type in your package code in the box that says “Place Order.” Then you will click “Go.”
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 11 Exploring Secure Topologies  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Apr 30, 2002Mårten Trolin1 Previous lecture – passwords Passwords for authentication –Storing hashed passwords –Use of salt Passwords for key generation.
Exercise Exercise3.1 8 Exercise3.1 9 Exercise
Exercise Exercise Exercise Exercise
Exercise Exercise Exercise Exercise
Exercise Exercise6.1 7 Exercise6.1 8 Exercise6.1 9.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
AN OVERVIEW OF MAC PDF TOOLS 1. PDF Tools for Mac PDF files can be used either in Windows, Unix or Apple’s Mac OS operating system commonly. It still.
Managing Local and Network Printer Chapter 11 powered by dj.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Theme: classification & distribution of government control of FEA.
iSpeak Break Timer 60 min 45 min 30 min 20 min 15 min 10 min 5 min or less.
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
Module 9 Configuring Messaging Policy and Compliance.
Government classification
Configuring Data Protection Chapter 12 powered by dj.
Module 7 Planning and Deploying Messaging Compliance.
Chapter 2 Securing Network Server and User Workstations.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Increasing security by disabling DML statements to a dba user in Oracle database Hakik PACI Polytechnic University of Tirana.
Proposed UW Minimum Computer Security Standards From C&C 28 Jan 2005 Draft.
AirLock Secure storage for all your sensitive account data Cross platform (Windows, Linux, Mac) (Optional) Sync between multiple pc’s (Optional) Access.
Encryption of Global Properties Richard McKnight Principal Consultant at Alfresco.
JohnPaulAguiar.com BLOGGING | SOCIAL MEDIA | MARKETING | INSPIRATION.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
Technology to Protect Crown Jewels. Purpose This pack draws out extreme examples for protecting the Crown Jewels. The purpose of examining these extremes.
Information Security and Privacy By: Mike Battestilli.
Secure your complete data lifecycle using Azure Information Protection
Personal Data Protection and Security Measures
Purpose Review and discuss the IT Policy and Procedure for Incident Handling and Response. Topics Incident Management Policy Incident Response Procedure.
Accelerate GDPR compliance with Microsoft 365
Security Design.
Deployment Planning Services
Microsoft /1/2018 5:38 PM Send secure to anyone with the power of Office 365 and  Azure Information Protection Gagan Gulati Ian Hameroff.
Domain 2 – Asset Security
Information Protection
Secure your complete data lifecycle using Azure Information Protection
To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the screen changes and you.
Understanding best practices in classifying sensitive data
Azure Information Protection
Azure Information Protection
Azure Information Protection
Azure Information Protection
Azure Information Protection
تحليل الحساسية Sensitive Analysis.
Azure Information Protection
Azure Information Protection
Azure Information Protection
Security in SharePoint and Teams with DLP, IRM, and AIP
Encryption in Office 365 Shobhit Sahay Technical Product Manager
MSIT 543 Cryptography Concepts and Techniques Symmetric Key Encryption
Personnel Clearance Debriefing
Case Study 1: Security Considerations
Label Name Label Name Label Name Label Name Label Name Label Name
It’s Time for a Break!!!.
Job Aid.
Azure Information Protection
BADGING PROCEDURES/CAC ACCESS
Virtual Machine Migration for Secure Out-of-band Remote Management in Clouds T.Unoki, S.Futagami, K.Kourai (Kyushu Institute of Technology) OUT-OF-BAND.
Classifying content on your (Z:) HomeDrive
Security in SharePoint and Teams with DLP, IRM, and AIP
Presentation transcript:

Secure Document Sharing Protecting documents from unauthorized disclosure and detecting sensitive data in cloud apps.

Data Classification

Data Classification

Data Classification

Data Classification

Data Classification Note: Enabling protection means that the document will be encrypted. Without enabling protection the document will be labeled but not encrypted. Remove protection option allows to decrypt previously encrypted documents. (For example – in cases where after a period of time data becomes unclassified.)

Data Classification

Data Classification

Data Classification Back in the label configuration screen

Data Classification

Detecting classified data in cloud apps It will take about 15 minutes for the P20 label to show up in Cloud App Security since you’ve just created it. You can take a coffee break and come back or proceed and use one of the other labels that have been created earlier.

Data Classification Go to portal.cloudappsecurity.com

Data Classification Note: P20 Special Label is the classification label you created earlier in this exercise. If you do not see it there – you either need to wait a bit more for it to show up (takes around 15 min), or you did something wrong earlier!