Office 365 Security Concerns: Stop Data Leaks and Insider Attacks
Protecting sensitive data doesn’t need to slow down your organisation's ability to share and collaborate
WATCH ON-DEMAND BY REGISTERING BELOW.
Duration: 1 Hour
John Hodges
SVP Product Strategy, AvePointJohn is Vice President of Product Strategy at AvePoint, focusing on developing compliance solutions that address modern data privacy, classification, and data protection needs for organizations worldwide. John has been actively engaged in the SharePoint community for several years, working with many Fortune 500 companies to drive sustainable adoption of Microsoft technology and optimise SharePoint’s larger purpose-built implementations. John’s insights and opinions on modern Information Technology can be found in various industry publications, as well as throughout this numerous speaking sessions in webinars and at events worldwide.
Hunter Willis
AvePoint, VP Richmond SharePoint User Group, MSCA O365Hunter Willis has been in web development, SEO and Social Media marketing for over a decade, and entered the SharePoint space in 2016. Throughout his career he has developed internal collaboration sites, provided technical and strategic advice, and managed solutions for small to large organizations.
In addition, Hunter has served as a strategy consultant for many companies and non-profits in the Richmond area. Hunter continues to work directly with non-profits in his spare time, and works full time as a Solutions Engineer at AvePoint.
Plug Data Leaks and Reveal Shadow Users!
Office 365 makes it easy to collaborate, but creating granular settings to police access to Teams and sensitive data within them can be challenging.
Instead of relying on perfect owners, join our webinar where our experts will show you how to effectively enforce your Teams membership and configurations without impacting non-sensitive collaboration.
We will even take it a step further because locking down your workspaces is just the start. Your Teams are filled with “shadow users,” external guests, nested Groups, and anonymous links that provide access to sensitive files beyond the listed members.
We will show you how to determine if you could have a problem with shadow users. Determine who (including external guests) has accessed what sensitive content with what frequency—even if you don’t already have your content tagged!
Additionally, learn how to measure and prioritize exposure to sensitive content caused by collaboration and lower it over time without having to go through thousands of lines of permission reports.
This is one of our most valuable webinars for any organisation that has data they need to protect in Office 365. Register today!
Make sure all your information is protected in Office 365 today!
