Bottom Up and Top Down: A Layered Approach to Protecting Sensitive Data in Microsoft 365 GCC

Watch On-Demand
Protect data microsoft 365 gcc

Event Information

  • 1 Hour

Speakers

author
John Peluso

Chief Technology Officer, AvePoint

Protecting sensitive data doesn’t need to slow down your agency’s ability to share and collaborate. 

Plug Data Leaks and Reveal Shadow Users!

Office 365 makes it easier than ever for your users to collaborate and meet your mission, but creating granular settings to police access to Teams and the sensitive data stored within them can be challenging for IT teams.

This is especially true for government agencies with centralized Office 365 deployments where IT must effectively enforce Teams membership and configurations without impacting non-sensitive collaboration.

Locking down your workspaces is just the start.

Your Teams are filled with “shadow users,” external guests, nested Groups, and anonymous links that provide access to sensitive files beyond the listed members.

You’ll learn how to:

  • Determine if you could have a problem with shadow users.
  • Determine who (including external guests) has accessed what sensitive content with what frequency—even if you don’t already have your content tagged!
  • Measure and prioritize exposure to sensitive content caused by collaboration and lower it over time without having to go through thousands of lines of permission reports.

Don’t miss this webinar if your agency is leveraging Office 365 to collaborate and store sensitive data!

Register to Watch
On-Demand

Fields with * are required.