Presented by Jarrod Roark Director – Advanced Infrastructure Bennett Adelson.

Slides:



Advertisements
Similar presentations
Exchange Online: Pricing & Licensing Overview. | Copyright© 2010 Microsoft Corporation Agenda Overview of Office 365 suite offers Exchange Online standalone.
Advertisements

Mobile Device Management Intune-Configmanager CHANDAN BHARTI PREMIER FIELD ENGINEER-MICROSOFT.
Common Question Who can benefit from Cloud? Every enterprise today can benefit from Cloud.
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
© 2014 Fair Isaac Corporation. Confidential. This presentation is provided for the recipient only and cannot be reproduced or shared without Fair Isaac.
Navigating and Negotiating Contracts Presented by Krista L. Newkirk, Associate General Counsel.
TOOL TO DESIGN FOR CONSTRUCTION WORKER SAFETY An Article Written by Gambatese, Hinze and Haas 1997.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Shoppers Drug Mart: Our Approach to Government Relations Presentation to the Canadian Assistive Devices Association 19 September 2012.
IT:Network:Microsoft Server 2 Chapter 27 WINDOWS SERVER UPDATE SERVICES.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Engagement as Strategy: Leading by Convening in the SSIP Part 2 8 th Annual Capacity Building Institute May, 2014 Joanne Cashman, IDEA Partnership Mariola.
Demos Sharing a document B2B Protected with Policy Tips Departmental Templates Mac Outlook Protected PDF OneDrive / SharePoint Document Tracking.
Based on AIIM Industry Watch MatchPoint Benefits.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Frequently Asked Questions NCSC Product Certification Payroll Anytime, Anywhere!
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
By Jared.  Under the terms of the alliance, epals this fall will add Microsoft’s
© Intapp, Inc. 1 Cloud Strategies for Law Firms: Enabling Lawyer Productivity, Maintaining Firm Control.
Understand, simplify, deliver. CLOUD MOMENTUM Nigel Gibbons.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
FFIEC Cyber Security Assessment Tool
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Dino Tsibouris (614) Updates on Cloud, Contracting, Privacy, Security, and International Privacy Issues Mehmet Munur (614)
Take Control of Your Contracts with Dolphin 365, a Companion Product to Microsoft Office 365 That Leverages Your Investment and Reduces Risk OFFICE 365.
Cloud Archive By: Kimberly Nolan. What it is?  The goal of a cloud archiving service is to provide a data storage (ex. Google drive and SkyDrive) as.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
One Foot in the Cloud, Another On-Premises Ross Adams 2016 Redmond Summit | Identity Without Boundaries May 25 th 2016 Azure AD
Office 365 What Is The Right Fit For You? Andrew Riley, MCTS, MCTIP, ITIL v3.
OFFICE 365 APP BUILDER PROFILE: Druva
FastTrack Benefit Onboarding, Migration, & Adoption Planning Details
Law Firm Data Security: What In-house Counsel Need to Know
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
The time to address enterprise mobility is now
Deployment Planning Services
Deployment Planning Services
Enterprise Mobility Suite Technical and Business Briefing
People-Centric Management
Transforming business
Brandon Botes #SPSJHB Records Management – Friend or Foe ???
Brandon Botes #SPSDBN Records Management – Friend or Foe ???
Deployment Planning Services
Avanade balances data security and employee privacy with Microsoft Intune Avanade is the leading provider of innovative digital and cloud services, business.
Protect sensitive information with Office 365 DLP
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Power BI Security Best Practices
Attention! In order to print this two-page flyer, please follow these steps: 1) Personalize the text and logo area with your custom copy and logo. 2) Delete.
Cyber Risk Management Through Vendor Contracts
Frequently Asked Questions NCSC Product Certification
Microsoft Azure Makes It Simple to Integrate Data between Dynamics CRM and Web Portal MINI-CASE STUDY “We needed to deliver our customer a robust and.
O365 Data Compliance Control of sensitive data is key to cloud adoption Addressing Legal and Regulatory Data Compliance requirements is now a critical.
Microsoft Virtual Academy
Managing Exchange Online using PowerShell
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
Five mistakes to avoid when deploying Enterprise Mobility + Security
Office 365 Identity Management
Brandon Botes #SPSJHB Records Management – Friend or Foe ???
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
Neil Kirton and Zoë Newman
Microsoft Data Insights Summit
Strengthening the GDPR business opportunity with Microsoft 365
2019 Thales Global Cloud Security Study
Presentation transcript:

Presented by Jarrod Roark Director – Advanced Infrastructure Bennett Adelson

Security and Legal Concerns The missing manual for SharePoint Online

Agenda Premise Most commonly asked questions and concerns Summary Q and A

Disclaimer I am not a lawyer!

Premise Problem: In my experience the number one roadblock to successfully delivering an on time and on budget online services migration/implementation are legal and security concerns inside of our clients Organization. Solution: – Education – Policy – Controls

Most common concerns relating to Online Services Is my information safe in the cloud? What if Microsoft gets hacked? How do we deal with sensitive data?

Is my information safe in the cloud? You are responsible for determining whether Microsoft security meets your organization's requirements. It is up to you to evaluate if you have particularly sensitive data, or data that must be held to a certain level of security under regulations applicable to your industry. ISA Safe Harbor SSAE16 SOC1 Type II FISMA

What if Microsoft gets hacked? Limitation on liability. To the extent permitted by applicable law, the liability of each party, its Affiliates, and its contractors arising under this agreement is limited to direct damages up to (1) for Products other than Online Services, the amount you were required to pay for the Product giving rise to that liability and (2) for Online Services, the amount you were required to pay for the Online Service giving rise to that liability during the prior 12 months 1. Look at your existing cyber insurance policies. Does it have a cloud services rider? If not cost of adding. 1.

How do we deal with sensitive data? Levelset!

How do we deal with sensitive data? Define mobility strategy. Who Users Roles What Data Categorization Applications Where Devices Location When Business Hours Anytime Policy Controls = How Policy + Controls = Strategy

How do we deal with sensitive data? Consider the paradigm shift to user centric management. Work with your chosen platform, not against it. Leverage the included and available tools before third party solutions. – RMS – Data leakage protection – DAC – Policy driven access control – Azure AD premium – user self service and role based access – Intune – mobile device management

Summary Education – Involve Security, Legal and key stakeholders BEFORE making a decision to understand concerns and address. Lock in scope based on BUSINESS requirements, not what you can do. – Be informed on the platform What it can and can not do. – Watch for project creep early and maintain a tight scope. Policy – Define a mobility strategy. – Document requirements and policy early on and stick to it. – Don’t try to implement every thought or suggestion before go live. – Iterative approach based on current corporate culture, and continuously reviewed/improved. Controls – Policy should drive controls not the other way around. – Work with the platform not against it.

Q & A Thank you! Contact Info – Jarrod Roark – –