https://store-images.s-microsoft.com/image/apps.51141.0c745abd-fb60-4a7f-961b-c0b9b8065604.f83cb8f1-d557-4fe6-98b6-5762ef775364.26404138-76bf-4450-8ee1-b1ad293a6d2f

Microsoft Compliance Wkshp for Manufacturing -4wks

Lighthouse Global

Microsoft 365 Compliance Workshop helps manufacturing organizations implement a compliance strategy that accelerates and streamlines data security and governance while reducing risk.

After this workshop, manufacturing organizations will know how to use Microsoft 365 tools to manage compliance risk, including: * Use eDiscovery searches to identify stale, outdated, and sensitive information. * Actionable recommendations for improved data mitigation and governance. * Detailed assessment of your IT and compliance priorities. * Hands-on overview of Microsoft 365 tools and how they can help you develop an integrated compliance strategy. * Long-term compliance strategy recommendations with detailed next steps.

Sample Workshop Agenda Week1 OFFICE 365 SECURITY & COMPLIANCE CENTER OVERVIEW
* Features & Benefits (incl. PowerShell) * Workflow Process

Week 2 HANDS-ON DEMO WITH THE SECURITY & COMPLIANCE CENTER * Assigning Permissions * eDiscovery Dashboard * eDiscovery Case Creation * Custodian Management & Notification * Legal Holds – Preserve in Place * Searches and Search Techniques * Reporting (GUI & PowerShell Reports) * Exporting from Office 365 (E3) * Advanced eDiscovery (E5) * Importing On-Premise (non-365) Data * Processing, OCR, Error Files Remediation * Deduplication * Advanced Searching, Tagging, & Redactions * Advanced Exporting (Concordance-Like) * Audit Logging

Week 3 DATA PRIVACY & GDPR
* Data Subject Rights: - Data Subject Access rights - Right to correction of data - Right to be forgotten - Right to restriction of processing * Tracking & Logging of Processing Activities * Cross border transfer processing - Purpose of processing - Notices * Personal Data Identification * Sensitive Information (PII, IP, Confidentiality) * Data Classification - Consent - Security, encryption & access management features. - Disposal - Retention – Auto deletion in accordance with retention policy * Audit - Audit tracking logs – who accessed, what is being processed (e.g. data elements) and for how many data subjects

Week 4

DATA SECURITY AND INFORMATION GOVERNANCE OVERVIEW * Features & Benefits

HANDS ON DEMO

At a glance
https://store-images.s-microsoft.com/image/apps.48329.0c745abd-fb60-4a7f-961b-c0b9b8065604.f83cb8f1-d557-4fe6-98b6-5762ef775364.92b0e029-1371-4338-9872-113fd8605b2e