CISO Workshop Module 5: Information Protection
Learn how to protect sensitive information wherever it goes with automatic classification and persistent encryption across devices. Includes information on continuous monitoring of data across mobile devices, cloud services, and other corporate assets.
- Download PDF summary: Module 5: Information Protection
- Download PowerPoint summary: Module 5: Information Protection
Introduction: Information Protection (3:04)
Part 1: Information Protection History and Context (8:43)
Part 2: Information Protection Strategy (9:11)
Part 3: Story of a File and Protecting Information Anywhere (10:23)
Feedback
https://aka.ms/ContentUserFeedback.
Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see:Submit and view feedback for