![ITSPmagazine Podcast artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts113/v4/5d/61/89/5d618998-327c-cc0d-b5dc-676ee5ec55f6/mza_2794539829735101717.jpg/100x100bb.jpg)
Making The Most Of Your O365 Implementation: Securely | With Lisa Lee, Hannah Tun, Smith Thomas
ITSPmagazine Podcast
English - April 06, 2020 03:12 - 47 minutes - 43.4 MB - ★★★★★ - 15 ratingsTechnology education internet business computers digital transformation future technology innovation science hacking Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Are you ready to "geek out" again? This time on Office 365 (O365)? Good! I have some fantastic guests joining me for this conversation where I planned to cover the following:
What are some of the most used components in O365 that we should be looking at from an access control and configuration perspective?What are some of the elements—and related settings—that are enabled by default that many companies may not need and, therefore, should consider disabling or configuring differently?What are some of the elements/settings that are disabled by default that many companies should look to enable—what do they need to consider, if anything, before they do that?What do we know about the human element here—are there programs or other things companies should explore to help ensure their users are aware and informed about the risks they face?Fortunately, we covered all of this and more:
What can IT and security teams rely upon when it comes to the tech, automation, and the end-users?Where do InfoSec teams need to step in to ensure that things are functioning as they expected?How can IT and InfoSec work together to identify anomalies and exceptions in operations so they can respond in a way that not only keeps business running but does so securely?What tools are available to IT and security admins, and how can they be leveraged?Tips to ensure effective secure communication and collaboration.Tips to ensure adequate access control and authentication mechanisms.Tips for dealing with business email compromise (BEC) and ransomwarePhew! That's a ton of stuff. Trust me… you'll want to listen to this one with your admin console open and ready to go.
And, more importantly, take my advice at the end of this if you find you need some help.
Ready? Good! GO!
Guest(s)
Lisa Lee, Microsoft
Hannah Tun, Indiana University
Smith Thomas, Big Networks
Resources
The complete series of SMB CyberSecurity webcasts, podcasts, articles, and supporting material can be found on ITSPmagazine at: https://itspmagazine.com/cybersecurity-for-small-medium-business
This Episode’s Sponsors:
Nintex: https://itspm.ag/itspntweb
To see and hear more Redefining Security content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-security
Are you interested in sponsoring an ITSPmagazine Channel?
https://www.itspmagazine.com/podcast-series-sponsorships