Discover risks from dark data and learn how to address them

Workshop highlights

Understand the hidden compliance risks of dark data

Assess your organization’s dark data risks with Data Risk Check

Assess your environment against the Data Protection Baseline

Receive an analysis and report on findings and associated risks

Learn about tools and services that can mitigate risks

Explore recommendations and next steps

80%

of corporate data is “dark” – it’s not classified, protected or governed

Not long ago, managing data just meant dealing with documents and emails. Pervasive digital technology and the rapid shift to remote work have greatly expanded the information universe. Much of that data becomes stale or unused immediately after creation and contains information that could impose a compliance risk.

Address compliance risks head on

Protecting information—wherever it goes—is critical to ensuring trust and meeting compliance requirements. But first, you need to know what data you have, where it is, how it’s being used, and compliance risks that may exist.

Discover Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.

   As your business-critical data expands and your workforce shifts to remote work, having an integrated approach to mitigating and controlling privacy and regulatory risks is more important than ever.

By attending this workshop, our experts will work with you to:

Document your compliance objectives and strategy including compliant Teams deployment and use

Show how to understand, mitigate, and protect against potential privacy and regulatory risks from dark data

Demonstrate ways to accelerate your compliance journey with the latest Microsoft technologies

Provide actionable next steps based on your needs and objectives

Discover Sensitive Data Workshop

Pre-Engagement Meeting

Data Risk Check

Data Protection
Baseline
Assessment

Microsoft
Compliance
Overview

Recommendations
and Next Steps

Data Risk Check uncovers data that can cause a compliance risk

The Data Risk Check is the core activity of the Discover Sensitive Data workshop. The activity is spread out over several weeks to allow time to run on top of your cloud infrastructure and surface privacy and regulatory risks in organizational data. Data Risk Check leverages automated Microsoft 365 tools and services to discover data stored in the Microsoft Cloud and identify potential problem areas.

 

The automated discovery process will analyze your existing data for:

  • Sensitive information and intellectual property
  • Unused or “stale” data
  • Riskful or suspicious activities

The Data Risk Check in its core will identify privacy and regulatory risks in Exchange Online, SharePoint Online, OneDrive for Business and Teams and can be extended with optional modules to scan on-premises data repositories and Windows 10 Endpoints.

Pre-Engagement Meeting

Data Risk Check

Data Protection
Baseline
Assessment

Microsoft
Compliance
Overview

Recommendations
and Next Steps

Mandatory
Module

Exchange
Online

Mandatory
Module

SharePoint
Online

Mandatory
Module

Teams

Optional
Module

On-premises
data stores

Optional
Module

Windows 10
Endpoints

What to expect:

By the end of this workshop, experts in Microsoft compliance will provide you with a:

Data Risk Check report that includes findings and insights from the automated discovery process

Data Protection Baseline assessment report with suggestions and top key improvement actions

A list of recommendations and actionable next steps that will help mitigate the identified privacy and regulatory risks

Set of long-term recommendations on your compliance strategy, with key initiatives and tactical next steps

Clear look into Microsoft’s approach to mitigating and controlling privacy and regulatory risks

Who should attend

The workshop is intended for security decision-makers such as:

  • C-SUITE
  • Chief Information Security Officer (CISO)
  • Chief Information Officer (CIO)
  • Chief Security Officer (CSO)
  • Identity and or Application owners/decision makers
  • IT Security
  • IT Operations
  • Security Architect
  • Security Engineers
  • Application business owners
Teams Apps and Solutions

Contact Us today to get started!