- Consulting services
Security Identity: 3-Day Workshop
A 3 day workshop to help you identify risk, gain insights and improve your security posture using Microsoft Azure
The foundation of cybersecurity is ensuring confidentiality, integrity and availability of data and critical business assets.
Identity attacks are on the rise, this workshop will show how to minimise tomorrow’s data breaches by securing identities today, help find identity risks happening now in your environment, gain insights on your app landscape, and improve your identity security posture. • Optimise Identity • Assess Security Posture • Optimise Cost • Increase Visibility
Our goal is to provide you with tools to protect your authorised users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate with others. • Understand your identity goals and objectives • Define your existing and desired identity security posture • Provide insights into applications used within your environment (sanctioned and unsanctioned by IT) • Showcase core IT and user security scenarios through demos • Develop a joint action plan based key results, recommendations and next steps
Throughout this process, we will discuss services such as:
• Azure AD
• Conditional Access (CA)
• Self Service Password Reset (SSPR)
• Azure AD Connect
• Log Analytics and Storage Accounts
• Cloud Applications Security (CAS)
This 3 day investment will be consist of the following agenda:
Preparation: • Pre-engagement call • Prepare and send Identity Workshop Questionnaire
Day 1: Engagement Setup and Reporting
• Kick-off meeting • Security Score overview • Run Microsoft Secure Score for Identity Security Posture assessment • App Discovery Presentation • App Discovery Setup • App Discovery Reporting and discussion
Day 2: Design and Planning
• Identity fundamentals • Self-Service Password Reset (SSPR) • Multifactor Authentication (MFA) • Conditional Access (CA) • Azure AD App Management
Day 3: Workshop Day
• Customer value conversation • Discovery session • Demo • Key results, recommendations and next steps