Securing Microsoft Teams: 4 Tactics For Regulated Organizations
How to improve your management of workspaces, document permissions, data retention, and external sharing to comply with HIPPA, GDPR, state record regulations, and more
WATCH ON-DEMAND BY REGISTERING BELOW.
Duration: 1 Hour
Technical Community Lead - Office of the CTO, Avanade
Stephanie DonahueTechnical Community Lead - Office of the CTO, Avanade
With over 20 years of experience in technology, Stephanie is a leader, an innovator, and skilled problem solver. She believes that technology can minimize risk and maximize business growth and potential. Stephanie is a Microsoft Regional Director and MVP and a recognized member of the Modern Workplace community where she speaks, writes, and organizes events. Stephanie's community engagement helps her stay on the pulse of technology to get ahead of the curve when it comes to emerging technologies. She leverages her knowledge and relationships with vendors, peers, and thought leaders into innovative business solutions for customers. As Technical Community Lead, Stephanie supports Avanade’s global technical leadership communities.
Director, Strategic Accounts and Solutions, AvePoint Public Sector
Jay LeaskDirector, Strategic Accounts and Solutions, AvePoint Public Sector
Jay Leask is a Director of Strategic Accounts and Solutions for AvePoint Public Sector. A seasoned consultant with a focus on digital collaboration and stakeholder engagement, Jay uses 20 years of IT experience to engage customers in designing solutions to increase the value and decrease risk of their Microsoft investments.
What Regulated Industry Organizations Need to Be Aware of
With the uptick in Microsoft Teams usage, organizations need to protect the data being generated and shared without slowing down collaboration.
While the regulated data types differ, nearly all industry data regulations state sensitive data:
- Needs to be retained for a specific period of time
- Should only be accessed by the minimum number of people who need access
This webinar will cover 4 different tactics, using native and third-party tools, for how to ensure sensitive data is retained and accessed appropriately—and how organizations can audit and prove their compliance!
What We Will Cover:
Tactic 1: Create Team templates for Teams hosting sensitive information and monitor for configuration/membership drift.
Microsoft Teams allows administrators to create templates for common use cases that can be leveraged for Teams that will host sensitive information. We’ll show you the best practices for leveraging this native feature and the challenges of monitoring configuration drift throughout a Team’s lifecycle (and what you can do about it).
Tactic 2: Review, monitor and audit permissions to sensitive data and documents
Now that you have your Teams and workspaces secured, you need to be able to review who has access to what sensitive information. We’ll show you how to find sensitive content using native tools, the challenges of combing through permission reports, and best practices for mitigating oversharing of sensitive information.
Tactic 3: Ensure adequate data protection and retention
Microsoft 365 retention policies can help protect your sensitive data. We will show you the best practices for leveraging this tool while demonstrating the gaps that exist and provide real-world examples of how regulated companies have covered them.
Tactic 4: Review guest access and external sharing settings
Guest access and external sharing are complicated! It can be impacted by settings across half a dozen admin centers. Additionally, guest access is now enabled by default in new Microsoft Teams deployments. We will show you how to right-size your guest access and external sharing settings across your organization (as well as how to create different settings for each department or business unit) along with best practices for guest governance.
Ensure your organization is covered
Register for our webinar and learn the latest strategies regulated organizations deploy to protect their data without limiting collaboration.