Pt2. The Battle for Teams – User vs Security: The Technology Perspective by Zoe Wilson & Luke Evans

Over the last 12 months, Microsoft Teams has seen an unprecedented amount of growth as the whole world switched to remote working, with Teams playing a key part. In many cases, Teams was thrown out to facilitate this shift to remote working, with governance and security being very much an after-though. End-users have adopted Teams and love the freedom to work and collaborate in the open with colleagues, customers and partners alike.

Microsoft Teams is a fantastic tool for supporting cross-functional and even cross-organisational collaboration, but its openness introduces concerns about unfettered file and data sharing between an unlimited number of users.

Information security teams are now having to retrospectively think about the Teams implementation and how to ensure that people, content and information is secured and protected. Historically, often, effective security came at the expense of usability. And usability came at the expense of security. Many continue to go by the notion that there is no way to achieve both effective security and usability simultaneously – we’re here to battle this out! Who will win – the end users or security?

Part 2: This is very much a session of two parts, where we take you through this battle between security and usability. In this session, we will consider this from the technology perspective, taking you through the usability requirements at a high-level, before diving in to the technical configuration required to implement the security configuration. After attending this session, you will understand:

  • Where does Microsoft security responsibilities end and yours begin
  • What are the fundamental technical components that Microsoft Teams builds upon
  • What Teams features or functionality should you secure, how should you do it and what balance you should strike
  • How to configure the associated technology to better secure your Microsoft Teams instance without affecting end user productivity Technologies in this session include: Microsoft Teams SharePoint Online Azure AD Microsoft 365 E5 Security and Compliance
Skip to content