Endpoint Compliance Presentation – 60 minutes
Deliver the activity by presenting the 14 - Secure Identities and Access – Endpoint Compliance.pptx presentation.
When presenting, be concise and stick to the facts.
Allow the customer to draw their own conclusions.
Make sure you reserve some time for Q&A.
Work on deployment plan for Endpoint Compliance – 60 minutes
Update the Endpoint Compliance high-level deployment plan slide within the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Make sure that you discuss, define, and agree with the customer on next steps in terms of follow-up activities and/or engagements. If possible, identify owners from both the customer and delivery organization, expected timelines, and resources needed. Document the next steps as part of the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Background reading
To prepare for the delivery of the Secure Identities and Access Workshop engagement, refer to Appendix A - Readiness and Technical Content for links to relevant online learning content.
Duration and effort
Preparation 1 Hrs.
Delivery 2 Hrs.
Workshop Day Customer Value Conversation
|
Use this module of the Secure Identities and Access Workshop to provide a presentation of Microsoft Identity platform capabilities, providing the customer with a better understanding of the end-to-end value of the Microsoft Identity platform.
|
Objectives
Deliver the Secure Identities and Access Workshop Customer Value Conversation presentation.
Define and agree with the customer on next steps in terms of follow-up activities and/or engagements.
Format
Can be delivered as an onsite or online workshop.
Customer resources
Executive Sponsor
Security Team
Delivery resources Supporting materials
Secure Identities and Access Workshop - Customer Value Conversation Presentation.pptx
10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx
Preparation
The delivery resource will need to familiarize themself with:
12 - Secure Identities and Access - Identity and Access Management.pptx
10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx
Pre-requisites
The activities outlined in 11 Design and Planning should be completed prior to starting this activity.
Deliverables
The deliverables are defined as:
Next steps defined and agreed upon with the customer (including follow-up engagements).
Guidance
Deliver the module using the 12 - Secure Identities and Access - Identity and Access Management.pptx presentation.
When presenting, be concise and stick to the facts.
Allow the customer to draw their own conclusions.
Make sure that you discuss, define, and agree with the customer on next steps in terms of follow-up activities and/or engagements. If possible, identify owners from both the customer and delivery organization, expected timelines, and resources needed. Document the next steps as part of the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Make sure you reserve some time for Q&A.
Background reading
To prepare for the delivery of the Secure Identities and Access Workshop engagement, refer to Appendix A - Readiness and Technical Content for links to relevant online learning content.
Duration and effort
Preparation 1 Hrs.
Delivery 1 Hrs.
Share with your friends: |