8/24/2023 0 Comments Office 365 e3 security![]() So, that's identity and endpoints, it's threat protection, and it's compliance and governance as well. In terms of agenda, we've broken it down into four key pillars. And, you know, we've been working with local government over the, over many years now, and we've seen that many organisations, you know, take up some of the Microsoft technology portfolio, a lot of the stuff in the portfolio, to help them with their transformation, and to basically better serve citizens, right? But we acknowledge that, actually, a lot of that capability within that licencing stack can sometimes be overlooked, so we realise that and, and, you know, working with the LGA today, we'd like to basically break that down for you today around security and compliance, and really just paint a picture for you, right? Just to, to figure out what's most important from that, related to security and compliance. So, as, Cliff mentioned, by way of introduction, I'm Arron Kerai. I am a Cybersecurity Specialist at Microsoft, and I'm joining with Chris today as Technical Security Specialist at Microsoft as well. M: Perfect, so as, Chris just does that, yes, hi everyone, thank you for your time this morning. Chris, do you wanna share the slides please, when you're ready?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |