Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Jun 25, 2018
Microsoft security experts answer questions about how we protect information at Microsoft. We developed and implemented a data classification schema that consists of five labels to help protect data and documents. They describe how we use the labels, our efforts to educate people about classifying data and preventing data loss, and tools for automating information protection.
1:13 - The new Microsoft information data classification and labeling system and how we came up with the schema. 8:33 - The different technologies and products that Microsoft uses to protect information. 17:31 - Does Microsoft have a detection tool, utility, or service that determines sensitive data or data types? 21:08 - How does Microsoft handle search results and SharePoint Online for Azure Information Protection (AIP) protected content? 24:36 - How does Microsoft deal with potential labeling conflicts with the acquisition of another company? 27:08 - How does Microsoft approach cleanup and remediation of their data. What is the education and awareness campaign that Microsoft has in place? 34:17 - How long did the process of deploying the new classification system take? 36:47 - How is Windows Information Protection being used at Microsoft? 39:44 - Are there any tools available that convert labeling on files that are migrated from another tenant? 42:14 - How does Microsoft deal with false positives? 46:22 - What is the remediation process for the flagged items? 48:38 - Could you describe a typical timeline expected to reach maturity from L1 to L5 in a large-scale Fortune 500 company? 53:28 - What are some of the key takeaways that you would like to leave our audience with today?
Customers are always asking how Microsoft uses its own technology. What were the initial catalysts for change? The challenges? The benefits? IT Showcase provides what no one else can—the inside story of how Microsoft does IT.