Event banner

Data security: Zero Trust in a world of AI and emerging technology

Event Ended
Tuesday, Mar 26, 2024, 08:00 AM PDT
Online

Event details

How are you currently protecting and securing your data? Are you still relying on 20th century practices, such as access control permissions and trusting users to always do the right thing by applying proper controls and security to sensitive information? If so, let's talk about the basics of modern data security and how you can secure and protect information, regardless of where it resides or how it travels. Join Danny and Steve as they welcome Emily Blundo and Sarahzin Shane to discuss how Zero Trust principles apply to data security and how technologies such as data classification, sensitivity labels, and data loss prevention technologies help protect your data. We will also discuss how emerging AI-powered solutions, such as Security Copilot, can help you in this space as well. Join us with your thoughts and questions!

Post your questions in the Comments below early and throughout the broadcast.

 

Bookmark https://aka.ms/UnpackingEndpointManagement for links to previous episodes on demand and details on upcoming episodes.

 

Char_Cheesman
Updated Dec 27, 2024

12 Comments

  • Char_Cheesman's avatar
    Char_Cheesman
    Bronze Contributor

    That concludes our Unpacking Endpoint Management for today. We’ll be back next month at MVPs on manageability: reflections from the MVP Summit!

    In addition to the questions posted on this page, we also answer questions posted in reply to the event on LinkedIn and X (Twitter). Here are the questions we answered today:

    Question -- How can AI help with my unstructured data? We have stuff all over the place – even on individual computers - answered at 3:10

    From X -- As a security pro, AI is my worst nightmare. Make me feel better about it? What are the 3 things I should get in line before my LT says "Go make AI happen!"? - answered at 6:50

    Question -- We use WIP (Windows Information Protection) for Windows BYOD information protection. What should we be using now that it has been deprecated? - answered at 13:20

    Question -- Are there differences between MIP unified labeling client and labels built into Office apps? - answered at 14:50

    From LinkedIn -- Can I stop data exfiltration before it actually happens? - answered at 16:15

    Question -- Are encrypted files encrypted both “at-rest” and “in-transit?” - answered at 22:40

    From X -- You mentioned AI Hub. Where can I find more information about that? How do I get access? - answered at 29:10

    From LinkedIn -- I think I heard about a new Purview compliance feature that could help me analyze messages across Copilot, Teams, email, etc. more easily and assess risk from the inside. Can you talk more about that? (Wish I could remember the name of it...) - answered at 33:20

    Question -- What about PDF files. Especially password-protected files?. Can we protect sensitive information in those file types? - answered at 40:10

    Question -- What's the best way to establish uniform protection policies across multiple data sources? - answered at 48:55

  • Chris2330's avatar
    Chris2330
    Occasional Reader

    We would like to control copy/paste of sensitivity labeled documents on mobile devices without limiting all copy/paste between managed and unmanaged apps. We tried to create a DLP policy to do this, but it only allows data classification types to be assigned. How would I go about doing this?

    • Char_Cheesman's avatar
      Char_Cheesman
      Bronze Contributor

      Thanks for participating in today's episode of Unpacking Endpoint Management! For reference, the panel covered this topic at around 52:15.

  • Char_Cheesman's avatar
    Char_Cheesman
    Bronze Contributor

    Don't be shy! This is a great forum to ask your questions about the latest features, but also to share information about use cases and scenarios you need to support. Post your questions now in the Comments.

    • Char_Cheesman's avatar
      Char_Cheesman
      Bronze Contributor

      Thanks for participating in today's episode of Unpacking Endpoint Management! For reference, the panel covered this topic at around 30:15.

    • Char_Cheesman's avatar
      Char_Cheesman
      Bronze Contributor

      Thanks for participating in today's episode of Unpacking Endpoint Management! For reference, the panel covered this topic at around 11:35.

  • Char_Cheesman's avatar
    Char_Cheesman
    Bronze Contributor

    Welcome to today’s episode of Unpacking Endpoint Management. Let's get started! Post your questions in the Comments. We will be answering questions in the live stream.

  • Unpacking Endpoint Management gets underway in just over an hour. Feel free to post a question here in the Comments before and during the show!

Date and Time
Mar 26, 20248:00 AM - 9:00 AM PDT