Drive security enforcement across Microsoft Teams, SharePoint and Office 365 by Luzaan Lottering
33K views
Nov 16, 2023
This session will walk you through how you can use our smart risk assessment engine to effectively manage securing Office 365 in your organization. Conference Website: https://www.2020twenty.net/lightup #lightup #2020twenty
View Video Transcript
0:00
So let me begin. Hi everyone
0:03
Thanks so much for joining our session today. During this amazing light up virtual conference, my name is Luzon Lotring as Nishanta said
0:14
I am the marketing manager at Cardiolog ytics and I will go ahead and kick things off
0:21
Today our session is on driving security enforcement across Microsoft Teams, SharePoint and Office 365
0:33
I'm very excited to talk to you about this today and to show you our solution, Cardiolog Enforce, because here at Cardiolog ytics we are revolutionizing enforcement across Office 365, Microsoft Teams, SharePoint and Microsoft
0:51
OneDrive by enforcing security, security policies and improving data safeguarding. And of course
0:59
if you have any questions, please send them through to the questions
1:04
box or to info at in clock.com. And you can also connect with us on
1:11
Twitter with the Twitter handle that you can see right there on your
1:16
screen at Cardiolog. So thank you to everyone for being part of this event in support of UNICEF and let's light
1:31
it up and continue to donate $1 or any amount you wish to to help support children in need globally
1:43
Thank you to all of the sponsors for this amazing event where we not only get to learn about
1:50
Microsoft technologies, but also get together to raise funds for UNICEF who continue to provide
1:58
humanitarian and developmental aid to children worldwide. And then for any feedback, please use these QR codes that will take you to the speaker feedback
2:14
and event feedback forms. To get back to our topic today, so in regard to the agenda for
2:25
cardiolog ytics session today, we'll start out with a very short introduction
2:31
I will talk a bit about cardiolog ytics and who we are, and then I will be going over different
2:38
enforcement types of violations. Then I will go over our enforcement tool and walk you through
2:47
how you can use our smart risk assessment engine to effectively manage securing Office 365
2:55
in your organization. And then after that, I will discuss security challenges in Office 365
3:03
in detail and also how to enforce effectively or how Cardiolog Enforce effectively secures
3:12
Office 365. And then again at the end there will be time for Q&A so continue to send your
3:19
questions through throughout this presentation. So let's begin with a brief introduction
3:27
Cardiolog ytics has been around for about 15 years now. Since 2005, in fact, we are based out of Boston and over the past 15 years, we've been focused on ytics and engagement designed for SharePoint, for Teams and Office 365
3:50
Our flagship solution is Cardiolog ytics and it's built specifically for internal platforms
3:58
including all versions of SharePoint from 2010 up to 2019, as well as SharePoint Online, Microsoft Teams, OneDrive and Exchange
4:12
We serve customers globally in about every industry from finance to pharmaceutical, government, education and many others
4:25
Our solution is available or all our solutions are available both as an on-prem as well as a SaaS version based on Power BI
4:38
A little bit about our goals. Our goal here at Cardiolog ytics is to help our customers to constantly improve Office 365
4:49
based on how it's being used. So there are four pillars that we talk to our customers about
4:59
The first is Monitor, which is tracking the usage within SharePoint, Teams, OneDrive, and Exchange
5:07
change. Second is engaging users, asking them what their needs are, asking them what their
5:16
pain points are and asking them what is not working for them. And then the next pillar
5:23
is to enhance. So we want to make sure we are constantly improving SharePoint and Teams
5:32
and so on based on those two pillars. The idea is to have actionable metrics
5:39
which will allow us to... Apologies, I was just interrupted by another session
5:47
Let me just quickly go back to where I was. Apologies for that
5:52
So the next pillar, as I said, is to enhance. So we want to make sure that we are constantly improving
6:00
SharePoint and Teams and so on based on those two pillars. So the idea is to have actionable metrics
6:08
which will allow us to constantly make Office 365 platforms better for our users
6:15
And then finally the last pillar is securing Office 365 by enforcing permissions and access
6:24
identifying breaches of information and securing confidential data. And this last filler, this is the one that we will be discussing in more detail today
6:37
Out by looking at different types of violations that exist in Office 365
6:44
and also how Cardiolog Enforce can help to secure and enforce. The first thing is confidential data
6:54
So we text yze data. So when links or content that's confidential or data that is sensitive is shared, it will notify those parties that need to be notified about it
7:07
How do we do that? We use AI and algorithms that yze
7:13
the risk of documents being shared and risk assessment determines if anyone needs to be notified
7:22
such as in a case where documents usually get shared amongst managerial staff and now suddenly this document is shared to someone lower on the hierarchy so this will be identified as a risk and cardiolog in force will act accordingly
7:42
next is private data so when private data is being shared or when a contract is leaked
7:49
you will get reports informing you about everything that was compromised and really
7:56
importantly those could be things compromised even prior to the leak. Next is corporate policy
8:05
violations such as inappropriate messages and that will be labeled inappropriate according to
8:14
the corporate policy of a particular organization. Next is access permissions, such as access to portals
8:26
for example, documents that certain users are maybe not permitted to access
8:32
For example, pages or sites or subsides that being shared with everyone
8:40
Or if someone is able to or permitted to access, but they are not really supposed to access
8:48
In that case, CardiologIn4 can and will block them and also notify whomever needs to be notified
8:59
And then the last one here, data extraction. So, for example, if someone is about to leave the company and then suddenly there's a lot of activity from them, things such as opening a lot of documents or any other what we will consider abnormal user behavior, according to the AI, this will then get flagged and it will notify whomever needs to be notified
9:27
Also, I would just like to add that we do monitor APIs as well
9:35
Now, I will show you around our demo environment to show you all how you can use CardiLog in force to keep company regulations intact
9:48
Let me. There we go. So I will give you first of all an overview of the solution and then demo our enforced GUI
10:13
So the first step will be deciding on and setting the enforcement goal
10:20
So that will be what is your enforcement goal? What do you want to do
10:27
What does your enforcement goal have to do with? Does it have to do with access permissions, with data extraction, with confidential and private data or corporate policies
10:37
Let me get into those a little bit more. If you look at access permissions, your goal might be to remove unauthorized users or an unauthorized user from a team
10:49
So that could be anyone maybe adding someone to a team or perhaps someone with the same name as someone else who is in fact supposed to be in the team
11:01
So let's look at some of these other canned access permission enforcement goals right here to remove unauthorized users from OneDrive documents, remove unauthorized users from SharePoint sites, flag security manager on unauthorized sharing user
11:19
Block unapproved user from unauthorized content and detect access permission. Human errors. Very important
11:29
Next, we have data extraction. This could be remove the user permissions upon suspicious usage anomalies
11:38
That could even be flagging a security manager on suspicious user behavior
11:43
Identifying and monitoring potential high-risk users. blocking end point output for users that violated companies policies and then also reporting on
11:57
compromised data very important if we look at confidential and private data i'm not going to go
12:03
through all of them but some of some examples of goals here could be to block private data on a team
12:11
chat, remove confidential data from a team with unauthorized members, report on unauthorized data
12:20
And then the fourth possible umbrella for goals in terms of your enforcement could be corporate
12:29
policies. So that would entail things such as to send some messages on public chat that violate
12:36
corporate policies to block a user that violates corporate policies on a team's chat
12:45
flag private chat in violation with corporate policies, and so on. Step two, first of all
12:55
you will then decide what your enforcement goal is. And if it's not one of these
13:00
you can go ahead and create one from scratch. So step two will be deciding which receiver role will be flagged, will be notified
13:12
Will it be my security manager, the person that's responsible for security in the company
13:18
and who will take the actions? Is it the team owner? Is it the actor or the actor is just a word for the user who performed the violation
13:33
So the guilty party. Is it a team member? Is it the manager of the actor
13:41
So the manager of the person who performed the violation? Or you can even go ahead and create your own segment
13:52
The next step, step three, how will these people be notified? How will they get a message
13:59
How will they be flagged as to what happened in the Office 365 environment once you've
14:04
selected who you want to get this notification, who you want to get flagged
14:09
So these are your different channels. Maybe they will get a text message, especially now that everyone is working remotely, a quick
14:19
text message to notify them of the violation that occurred. Maybe a pop up right with on the SharePoint page
14:29
notifying them of what has occurred. Email is also a great channel
14:35
Or you can even send them a message. Well, this message could even be sent to them directly
14:41
within social platforms such as right within Teams that will show up as a message in Teams
14:49
or in Slack, or in Skype, or even Messenger. So it really depends which channel will be best
14:58
for that particular job title or role that you have selected as the person who has to be notified Your next step will be violation type but I will go into that in a little bit more detail
15:11
when I demo the GUI. And then finally, step five, choose an Office 365 application that you want to
15:21
enforce. You want to enforce Yammer, OneDrive, Teams, SharePoint, or even Stream. So let me now
15:31
go back and show you a demo of a few scenarios to better grasp exactly how our solution works
15:40
and how an organization will truly benefit from using it. As mentioned, we already have the
15:47
information about your portal or your company or your customers portal and the usage of the portal
15:57
So in other words, how people behave in the environment as well as the information being
16:02
shared so we can actually yze and know what's going on in the portal before anyone gets the
16:10
information. So keeping that in mind, we have created two scenarios that I wanted to show
16:16
show you today and explain more about. If we click on this first one, this first goal I would like
16:24
to show in more detail is the goal of someone sharing information that is sensitive to the
16:31
company. So we can actually identify when someone uploads information or adds that to the portal
16:41
data that is not supposed to be exposed. We can actually monitor that information and using smart AI tools to define which data
16:52
is actually confidential and basically block that before it can be accessed by anyone
17:00
So we define a violation of confidential data when someone shares confidential data or violates
17:10
the confidential data rules. We can first of all block it or in other words prevent the violation
17:18
from even happening and then secondly notify those people who need to be notified of this
17:25
particular type of violation. So in this case I'm showing what will be shown inside SharePoint. This
17:34
is a SharePoint pop-up. So a pop-up on the manager's page that will notify him and also explain
17:44
that some user made a violation within that team or which confidential data was shared
17:56
So in this case, the content was removed first of all and the user was notified and as you can see
18:02
their security manager was also notified or flagged. If we go back to the channel
18:10
an organization can define, like I said, any channel they prefer to get notified in
18:15
Whether it's a phone call or text message or a message in Teams or any other integrated platform or an email
18:23
as I've mentioned, and even a really, really neat channel is, like I've said, an in-app message right within SharePoint
18:31
such as this one. And then if we hop over to this
18:35
eventually it will block the content and it won't be accessible by anyone
18:44
If I go back to the second scenario, which I would like to demonstrate
18:49
and that is unexpected access. So for example, in SharePoint or any other platform for sharing data
18:58
people have the liberty to share information that is already in the
19:02
and they can share that with other people that might not or should not have access to this
19:10
information. So the goal here is to basically block the user that received the invitation
19:17
or the permission access to access the data so we can take away his permissions without this person
19:26
ever accessing that data or that information. And all of a sudden, a new user has access to it, which he is not supposed to. So we can actually
19:43
identify that and notify the people that this user now has the permissions. So we don't just notify
19:51
we actually block the user. So in this case, like I said
19:56
a user that is external to the salespeople and he received something such as the cost management
20:04
of the product, which is confidential. So it's very important not just to block
20:11
not just to notify, but actually to block the user. So when he tries to access the page
20:16
he will get redirected to a designated landing page, which will actually show him that he was redirected to this landing page due to the fact that he did not have permission to access the page he initially tried to access
20:32
So if he wants, he can, however, ask for access. And then it is up to that particular security manager to allow that person or not to allow that person
20:44
So in this case, we send a text message and we can actually block the continuation of that violation
20:53
So as I mentioned, the product has a lot of predetermined goals and everything is dynamic
21:03
So using these scan enforcement goals you see here on this page, you can actually choose the goals you would like to enforce in your organization's portal
21:13
in order to make sure that your data is safe. So let me get back to the presentation
21:37
So why is all of this so important though? I will tell you why
21:41
Cloud implementations have brought incredible leveraging of on demand services to modern enterprise, but they've also introduced a host of new security issues, as you've seen when I was walking you through Cardiolog in force
21:58
So threat mitigation and disclosure are two of the key priorities in today's data incident response plans that work
22:06
and actually a new report by cloud consulting firm Delta Risk interviewed respondents with skin in the game
22:15
in terms of cloud services and they got a list of major worries
22:19
that are often included in risk mitigation plans. So some of those main concerns for Office 365 managers include
22:26
human access so that would be various type of unauthorized access cloud misconfiguration So wrong credentials and sharing Data leakages and that could be both private and confidential data that can be leaked
22:45
And then also APIs, the abuse of open keys and credentials. Cardiologin 4 secures Office 365 in the following ways for the following segments
23:00
So chat and media. Cardiolog Enforce can secure chats and images and links and attachments
23:09
and content via advanced enforcement algorithms. Hubs for users. So enforcing permissions and access
23:19
meaning all users and guests can be exposed to specific data and channels
23:24
corporate policies, validating corporate policies, including texts, files, content sharing and private information
23:35
And then security trust to identify the breach of private and confidential information across multiple platforms. platforms
23:45
Enforce really does revolutionize Office 365 enforcement in terms of media
23:55
If we look at media that is including messages, so any written and shared information, attachments
24:04
that could be content, files added to Office 365 from any other platform, even links and hyperlinks
24:13
links sent or shared with users or guests. In terms of permission and access, Enforce helps
24:21
to ensure access permissions for users and guests within a team or a channel. So enforcing and
24:29
flagging unauthorized access and permission violations and reporting on the severity of
24:36
the violation and possible cause of action. And then also in terms of language, enforce detects
24:45
messages that are against corporate policies and reduce corporate liability, enforces and flags
24:55
inappropriate text or language and reports on the severity of the violation and possible cause of
25:04
action. Let's have a look at the different types of violations that could take place
25:12
So different media types would include file uploads, OneDrive sharing, images, chats and
25:23
messages and as I've mentioned links as well as hyperlinks. And then the different environments
25:31
that we can enforce with Cardiolog Enforce is Teams, SharePoint, OneDrive, Yammer and also Stream
25:47
I would now like to go over some frequently asked questions regarding our solution Cardiolog Enforce
25:55
and then also at the end I will have some time luckily because I see that I went through
26:04
everything pretty quickly I will have some time to also thoroughly go through all of the questions
26:10
that you have sent me in the questions box. So some of our frequently asked questions are the
26:18
following. Does Cardiolog Engage actually stop the violation from happening or only report on it
26:27
That is a question that comes up a lot. So my answer to that is, so our answer to that
26:34
if the system recognises a violation in SharePoint, we redirect the end user to a designated
26:42
landing page which notifies him or her that he or she is not permitted to view
26:49
the page and then also contact the owner if he thinks he should but that's in
26:56
terms of SharePoint what about teams in teams we remove the user or the content
27:02
instantly and then another question that we get ever so often how do you identify
27:10
identify content that is sensitive. So we do that. Because we do text ysis AI algorithms
27:22
Also, we allow the customers to add keywords. So in addition, we yze the risk by permission
27:31
deduction and learning algorithms. So those are two of the questions that we get really
27:39
really often. Let me have a quick look here to see if anyone sent through any questions
27:46
in my questions box
28:05
I have no questions. Maybe now that I have finished with my presentation and also the demo
28:15
maybe the questions will come through now, so I will give it a minute
28:20
if anyone has anything that they would like to ask. if nothing is coming through then i will wrap up cardiolog ytics session today
28:38
and just as a reminder we invite you to visit us at intlock.com to book to book your free demo of cardiolog ytics
28:52
also Cardiolog Engage and Gamify. Those are three other solutions and you can also tweet us at
29:00
at Cardiolog and for more information and any other helpful tips please do check out our amazing blog
29:09
at blog.intloc.com and for more information please feel free to contact us at info at
29:18
That's intlock.com. Let me have a quick look at the questions. Nothing yet, so then I will go ahead and say a huge
29:26
thanks to everyone who joined or attended our session today. Enjoy the rest of all the sessions and remember to
29:34
donate to UNICEF. So yeah, goodbye to everyone. Thanks, listen, that was an amazing session
29:43
So it looks like we don't have any other questions, so that was so good
#Business Services
#Consumer Resources
#Identity Theft Protection
#Monitoring Software
#Service Providers
#Software