Securing Microsoft 365: it’s more than your data at risk
In this webinar, we will look at the growing threat to Microsoft 365 environments, including from configuration tampering and drift. And we will discuss how organisations can restore both data and tenant configurations after an incident, and apply proper controls and configurations across their Microsoft 365 estates.
Microsoft 365 is a productivity suite, a collaboration platform, and a security and identity management toolset. But, as with all cloud and software as a service applications, it comes with its own management and security challenges.
Organisations are increasingly aware that SaaS applications do not back up or protect their data. What is less well known is that Microsoft does not back up M365 tenant configurations, yet 49% of organisations believe that it does.
At the same time, CISOs and IT directors risk underestimating the complexity of their M365 estates, and what this means for recovery after an outage or cyber attack. Microsoft 365 has 18 different administrative interfaces, and 225 configuration types. Yet 90% of organisations give excessive administrative privileges to M365, significantly increasing their attack surface.
In this webcast, our expert panel will examine:
- The growing threat from configuration tampering and drift, and the lack of visibility within M365 environments
- The need to ensure organisations can restore not just data, but tenant configurations after an incident, and be sure that their restored environment is secure
- How to ensure proper controls and configuration across Microsoft 365 and Entra across a growing estate, across multiple tenants, without over-burdening security and IT administration teams.
Join us to learn how security leaders are securing Microsoft 365 environments, in the face of a rapidly changing threat landscape.
-
Agenda10.00BST
Securing Microsoft 365: It's more than your data at risk
Microsoft 365 is a productivity suite, a collaboration platform, and a security and identity management toolset. But, as with all cloud and software as a service applications, it comes with its own management and security challenges.
Organisations are increasingly aware that SaaS applications do not back up or protect their data. What is less well known is that Microsoft does not back up M365 tenant configurations, yet 49% of organisations believe that it does.
At the same time, CISOs and IT directors risk underestimating the complexity of their M365 estates, and what this means for recovery after an outage or cyber attack. Microsoft 365 has 18 different administrative interfaces, and 225 configuration types. Yet 90% of organisations give excessive administrative privileges to M365, significantly increasing their attack surface.
In this webcast, our expert panel will examine:
- The growing threat from configuration tampering and drift, and the lack of visibility within M365 environments
- The need to ensure organisations can restore not just data, but tenant configurations after an incident, and be sure that their restored environment is secure
- How to ensure proper controls and configuration across Microsoft 365 and Entra across a growing estate, across multiple tenants, without over-burdening security and IT administration teams.
Join us to learn how security leaders are securing Microsoft 365 environments, in the face of a rapidly changing threat landscape.
-
SpeakersVasil Michev Microsoft 365 Subject Matter Expert CoreView
John Stevenson Senior Product Marketing Manager CoreView
Paul Roach Principal Consultant Grok ConsultingPRPaul Stringfellow CTO Gardner Systems
Confirm cancellation
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence