Securing Microsoft Teams: 4 Tactics For Regulated Organizations
How to improve your management of workspaces, document permissions, data retention, and external sharing to comply with HIPPA, GDPR, state record regulations, and more
Tuesday, October 6 @ 12:00 PM EST
Duration: 1 Hour
Stephanie DonahuePresident, PAITgroup
With almost 20 years of experience in the IT Sector, Stephanie is a leader, an innovator, and skilled problem solver. She has a passion for technology and innovation that led her to co-found the PAIT Group. Stephanie believes that technology can minimize risk and maximize business growth and potential.
John "Jay" Leask, PMP
Principal Solution Engineer, AvePoint Public Sector
John "Jay" Leask, PMPPrincipal Solution Engineer, AvePoint Public Sector
Jay Leask is a Principal Solution Engineer for AvePoint Public Sector. A seasoned consultant with a focus on digital collaboration and stakeholder engagement, Jay uses 20 years of IT experience to engage customers in designing solutions to increase the value and decrease risk of their Microsoft investments.
What Regulated Industry Organizations Need to Be Aware of
With the uptick in Microsoft Teams usage, organizations need to protect the data being generated and shared without slowing down collaboration.
While the regulated data types differ, nearly all industry data regulations state sensitive data:
- Needs to be retained for a specific period of time
- Should only be accessed by the minimum number of people who need access
This webinar will cover 4 different tactics, using native and third-party tools, for how to ensure sensitive data is retained and accessed appropriately—and how organizations can audit and prove their compliance!
What We Will Cover:
Tactic 1: Create Team templates for Teams hosting sensitive information and monitor for configuration/membership drift.
Microsoft Teams allows administrators to create templates for common use cases that can be leveraged for Teams that will host sensitive information. We’ll show you the best practices for leveraging this native feature and the challenges of monitoring configuration drift throughout a Team’s lifecycle (and what you can do about it).
Tactic 2: Review, monitor and audit permissions to sensitive data and documents
Now that you have your Teams and workspaces secured, you need to be able to review who has access to what sensitive information. We’ll show you how to find sensitive content using native tools, the challenges of combing through permission reports, and best practices for mitigating oversharing of sensitive information.
Tactic 3: Ensure adequate data protection and retention
Microsoft 365 retention policies can help protect your sensitive data. We will show you the best practices for leveraging this tool while demonstrating the gaps that exist and provide real-world examples of how regulated companies have covered them.
Tactic 4: Review guest access and external sharing settings
Guest access and external sharing are complicated! It can be impacted by settings across half a dozen admin centers. Additionally, guest access is now enabled by default in new Microsoft Teams deployments. We will show you how to right-size your guest access and external sharing settings across your organization (as well as how to create different settings for each department or business unit) along with best practices for guest governance.