Mitigating Collaboration Risk Workbook

Identify common security concerns and how to avoid it

As with anything of value, information is not risk free. The collection, storage, access, usage, and disposal of information is a breeding ground of risk. And as we have seen in recent events, an ounce of prevention is worth a pound of treatment.

Organizations need to leverage a prescriptive, repeatable, and mathematical approach to risk management. Using such an approach to quantify and mitigate risk demonstrates intentional corporate action to deal responsibly with risk, which can soften the hard edge of legal and regulatory action.


What you will learn from this content: 

  1. In-depth analysis of what organizations need to be mindful of when it comes to their collaboration
  2. How to Measure and Prioritize Risk
  3. How to build a mitigation plan to ensure your information is secure

Sponsored by  {}

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: