Teams Tuesday Meetup August 2023 Podcast4 min read
Microsoft Information Protection's various unified label and encryption technologies are spreading and integrating with several Microsoft solutions both within the Microsoft 365 and Azure services. Different encryption solutions can be used to meet the customer's needs. But how does the encryption actually work? What happens when an encrypted file is moved between on-premises storage and Microsoft cloud solutions? What is the consequence of using Double Key Encryption (DKE) where the customer owns his own webhosted key? Answers to these questions and much more will be presented in depth in this session!
Below are the questions and answers from the August 2023 Meetup Session.
Q. Tell us a bit about yourself?
A. My name is Anders Olsson, and I'm 41 years old. I live in a small town in Sweden called Karlstad, which is located right between the capitals of Sweden, Stockholm, and Norway, Oslo. When I'm not working, I spend my time with my two children, two cats, and my girlfriend. I exercise regularly and also work as a kickboxing instructor at a gym.
Q. Tell us a bit about your work background?
A. I have been working within cybersecurity for over 20 years. I started with Microsoft security solutions like the firewall ISA, which became part of the Forefront security suite for all kinds of on-premises workloads. When the cloud journey started and Microsoft announced that every product had an end of life. I thought about how I should change my career and came up with the idea that Information Protection is going to be huge in the future with all cloud solution and new way of working. I started to work with Microsoft encryption techniques like RMS/EFS 15 years ago, which is somewhat similar to what is used today within the current Microsoft Purview Information Protection solutions. This will be the focus of today's session.
Q. What does a typical workday look like for you?
A. I primarily support large companies within both the private and public sectors to identify and protect sensitive data. Within my company, I am a tech lead for a team focusing on secure compliance and collaboration. We focus on both the Microsoft Purview Compliance area and the collaboration solutions from Microsoft within M365, such as Teams, SharePoint/OneDrive Online, as well as the local SharePoint/OneDrive OnPrem, to comply with rules and regulations for information storage. It's about creating a secure way for collaboration both internally and externally to enhance productivity for our customers while maintaining control over the data. Once this is done, our Managed Detect and Response team monitors the Purview implementation 24/7, combining it with Defender solutions to detect risks, prevent attacks, and mitigate information leakage.
Q. What is this session about? Please explain
A. A session that explains how to protect sensitive information using Microsoft Teams, demonstrating the end-user experience, followed by a walkthrough of the configuration process. It also includes an in-depth explanation of how encryption functions.
The session is best experienced with both audio and visuals.
Q. Where can people find you?
A. You can reach me either via email or Teams using the address firstname.lastname@example.org.
Alternatively, you can connect with me on LinkedIn using the address MrAnders: https://www.linkedin.com/in/mranders/
Hopefully, they can include links along with the recording so that you get the spelling right :)