Meeting the Cyber Assessment Framework’s (CAF) principles is a challenging prospect for many organisations. Fortunately, Microsoft offers a host of security products and system administration tools that can help you meet the CAF’s four top-level objectives: A, B, C, and D.
In this webinar, we’ll outline the main requirements for each of these objectives, which Microsoft technologies you can use to address them, and how they should be configured to build a ‘defence-in-depth’ approach. This includes several examples of how you can use Microsoft products to meet an outcome of ‘Achieved’ under several of the CAF’s Indicators of Good Practice (IGPs).
This webinar will also include step-by-step demonstrations of how to configure specific tools – such as Purview, the Microsoft Defender Suite, Entra, Sharepoint, and more. For organisations that operate non-Microsoft products and services, this session will still provide themes and principles that can be applied to products from any vendor in meeting CAF objectives.
Webinar Highlights
Using SharePoint, Power Automate and Azure to Understand Threats and Risks
Using Purview Compliance Manager for Service Assurance
Using Active Directory and Entra for Identity Access and Management (IdAM)
Protecting Data with Purview
Vulnerability Management with Defender for Cloud, Defender for Endpoint, and Defender for IoT
Using Microsoft Defender Suite for security monitoring and proactive event discovery.
Speakers
Scott Hudson
Principal Consultant
Bridewell
Emran Ali
Principal Lead Consultant
Bridewell