1 day with
Microsoft 365 Security
Free workshop just for your company

Protect your organization from cyber threats and meet compliance requirements.

Register for a free, 1-day Microsoft 365 Security workshop, dedicated to companies with more than 200 employees. We will hold this meeting at your convenience and focus on your needs. The entire event will have a 1:1 format, where only representatives of your company and Cloudica experts will participate. 

Sign up for the workshop

Cloudica needs the information you provide to contact you about our services. Read more

Tailored to your needs

Microsoft 365 Security workshop

Dedicated to IT professionals responsible for managing security in their organization and those interested in learning about the best practices and security features offered by Microsoft 365. 

During the workshop, you will gain practical security knowledge and skills, learn about Microsoft 365 best practices and functionalities that will help you protect your organization from cyber threats and meet compliance requirements.  

This workshop is primarily dedicated to companies with more than 200 employees. If your company is smaller, but the topics are of interest to you – contact us, and we will propose the most optimal solution. 

Why is it worth it? 

The workshop consists of practical labs and activities designed to facilitate what you have learned and gain hands-on experience with Microsoft 365 security features. Our skilled trainers will offer valuable insights and best practices to assist you in effectively managing security within your environment.

During the workshop, you will learn how to: 

  • Manage identity and access in your organization’s environment using Microsoft 365 Identity and Access Management functionality 
  • Detect and respond to threats using Microsoft 365 Threat Protection functionality 
  • Protecting sensitive data using Azure Information Protection, Office 365 Data Loss Prevention and Azure Rights Management Services 
  • Manage compliance and meet regulatory requirements using Microsoft 365 Compliance Management functionality 
  • Assess and improve the security health of the organization using Microsoft Secure Score, Threat Analytics and Cloud App Security. 
  • Configuring device security, application security, and meeting the requirements of devices with the ability to access data. 

Feedback from our customers:

Thank you for organizing the workshop.
It was conducted very professionally by Bartłomiej and what is most important for us in a very clear way.

Piotr Błędowski IT Department Manager Etisoft

I would like to thank you again very much for the Workshop.
We are satisfied with basically all aspects, the topic was very interesting, the presenter very professionally presented the issues, basically answered all the questions that arose during the workshop.

The meeting helped us somewhat to arrange some topics and shed some light on the issues we should think about in the near future. I’m thinking here of future implementations of M365 and Azure services.

Miroslaw Odor IT Project Manager INTERAK

Agenda

Morning session
  • Introduction to Microsoft 365 Security 
  • Microsoft 365 Identity and Access Management
  • Microsoft 365 Threat Protection 
Lunch
Afternoon Session
  • Microsoft 365 Information Protection
  • Microsoft 365 Endpoint Security Management
  • Microsoft 365 Security Management
Sesja poranna
  • Wprowadzenie do Microsoft 365 Security

  • Microsoft 365 Identity i Access Management

  • Microsoft 365 Threat Protection
Lunch
Sesja popołudniowa
  • Microsoft 365 Information Protection

  • Microsoft 365 Compliance Management

  • Microsoft 365 Security Management

Registration for the workshop is free, however, our calendar fills up fast. We recommend registering as soon as possible, so we can adjust the date and place of the meeting to suit your needs. We can conduct the meeting online or at an agreed location.

Host

Bartłomiej Róg

Cloud Consultant at Cloudica

Manages and implements Microsoft cloud solutions. Has experience with Windows Server and hybrid environments. Through many years of working with clients, Bartłomiej has greatly developed his skills in communication and matching IT infrastructure to their needs. He is also constantly expanding his knowledge in various IT fields and is eager to share it. 

Host

Krzysztof Stefański

Chief Technology Officer at Cloudica

Has many years of experience in consulting and project implementation in Microsoft technologies. He advises and develops implementation plans for Microsoft 365 cloud, Azure and hybrid environments. He has been working with clients for many years, thanks to which he has developed skills in communication and matching IT infrastructure to their business needs.  

Sign up for the workshop

Protect your organization against cyber threats and meet compliance requirements.

Cloudica needs the information you provide to contact you about our services. Read more

Thank you for registration!

We will contact you to adjust the date and meeting point to suit your needs

Dziękujemy!

Kliknij poniżej aby rozpocząć pobieranie ebooka.

Once the above questions have been answered, a disaster recovery and backup readiness index can be calculated based on the following scale: 

  • Level 1: Inadequate – The organization has significant gaps in its disaster recovery and backup posture.  
  • Level 2: Developing – The organization has some disaster recovery and backup processes in place, but significant improvements are needed.  
  • Level 3: Mature – The organization has a mature disaster recovery and backup posture, but there is room for improvement.  
  • Level 4: Robust – The organization has a strong disaster recovery and backup posture and is well-prepared to address potential disruptions.  
  • Level 5: Exceptional – The organization has a comprehensive and mature approach to disaster recovery and backup. 

The disaster recovery and backup readiness index can be calculated by assigning a score of 1-5 to each question based on the level of readiness demonstrated. The scores are then averaged across all questions in each category to determine the readiness level for that category. The overall disaster recovery and backup readiness index is calculated by averaging the readiness levels across all categories. 

Level 1: Basic
You have minimal cybersecurity processes in place and face a high risk of cyberattacks. Immediate attention and significant improvements are necessary to enhance your security posture.

Level 2: Developing
You have some cybersecurity processes in place but require substantial improvements to reach a mature state. You should focus on strengthening your policies, procedures, and security controls.

Level 3: Mature
You have a solid cybersecurity posture, but there is still room for improvement. You should continue enhancing your processes, monitoring capabilities, and incident response practices.

Level 4: Advanced
You have a strong cybersecurity posture and are well-prepared to address potential threats. However, you should remain proactive and stay abreast of emerging threats and technologies to maintain your advanced level of security.

Level 5: Leading
You have a comprehensive and mature approach to cybersecurity. You are a leader in cybersecurity best practices and continually innovate to stay ahead of evolving threats.

Dziękujemy za rejestrację!

Link do webinaru otrzymają Państwo mailowo dzień przed spotkaniem.

23 Marca 2023

10:00 via MS Teams

Tomasz Woźniak

Thank you!

To download our e-book „The best way to Outsource IT Staff” click button below