Secure Identities and Access Workshop Delivery Guide 4 July 2022



Download 1.16 Mb.
Page32/37
Date08.08.2023
Size1.16 Mb.
#61825
1   ...   29   30   31   32   33   34   35   36   37
Secure Identities and Access
Endpoint Compliance Presentation – 60 minutes

  • Deliver the activity by presenting the 14 - Secure Identities and Access – Endpoint Compliance.pptx presentation.

    • When presenting, be concise and stick to the facts.

    • Allow the customer to draw their own conclusions.

    • Make sure you reserve some time for Q&A.

  • Work on deployment plan for Endpoint Compliance – 60 minutes

    • Update the Endpoint Compliance high-level deployment plan slide within the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.

    • Make sure that you discuss, define, and agree with the customer on next steps in terms of follow-up activities and/or engagements. If possible, identify owners from both the customer and delivery organization, expected timelines, and resources needed. Document the next steps as part of the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Background reading

To prepare for the delivery of the Secure Identities and Access Workshop engagement, refer to Appendix A - Readiness and Technical Content for links to relevant online learning content.
Duration and effort

  • Preparation 1 Hrs.

  • Delivery 2 Hrs.



  1. Workshop Day

    1. Customer Value Conversation




Use this module of the Secure Identities and Access Workshop to provide a presentation of Microsoft Identity platform capabilities, providing the customer with a better understanding of the end-to-end value of the Microsoft Identity platform.


Objectives

  • Deliver the Secure Identities and Access Workshop Customer Value Conversation presentation.

  • Define and agree with the customer on next steps in terms of follow-up activities and/or engagements.
Format

Can be delivered as an onsite or online workshop.
Customer resources

  • Executive Sponsor

  • Security Team
Delivery resources
Supporting materials

  • Secure Identities and Access Workshop - Customer Value Conversation Presentation.pptx

  • 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx
Preparation

The delivery resource will need to familiarize themself with:

  • 12 - Secure Identities and Access - Identity and Access Management.pptx

  • 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx
Pre-requisites

The activities outlined in 11 Design and Planning should be completed prior to starting this activity.
Deliverables

The deliverables are defined as:

  • Next steps defined and agreed upon with the customer (including follow-up engagements).
Guidance

  • Deliver the module using the 12 - Secure Identities and Access - Identity and Access Management.pptx presentation.

  • When presenting, be concise and stick to the facts.

  • Allow the customer to draw their own conclusions.

  • Make sure that you discuss, define, and agree with the customer on next steps in terms of follow-up activities and/or engagements. If possible, identify owners from both the customer and delivery organization, expected timelines, and resources needed. Document the next steps as part of the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.

  • Make sure you reserve some time for Q&A.
Background reading

To prepare for the delivery of the Secure Identities and Access Workshop engagement, refer to Appendix A - Readiness and Technical Content for links to relevant online learning content.
Duration and effort

  • Preparation 1 Hrs.

  • Delivery 1 Hrs.



    1. Download 1.16 Mb.

      Share with your friends:
1   ...   29   30   31   32   33   34   35   36   37




The database is protected by copyright ©ininet.org 2024
send message

    Main page