Session

Power Platform Security & DLP: From Wild West to Governed at Scale

Security wants control; makers want speed. You can have both. This practical session shows how to design a security posture for Power Platform that prevents data exfiltration without strangling innovation.

We’ll build an environment strategy from data‑risk down, then implement tenant‑scoped and environment‑scoped DLP policies with connector classification, endpoint filtering, and rules for HTTP/custom connectors. You’ll see how Managed Environments, least‑privilege Application Users, and service principals reduce blast radius; how to handle connection ownership and joiner/mover/leaver at scale; and how to set up review/exception processes security actually approves.

We’ll also cover Conditional Access patterns, admin/audit connectors, and the dashboards that show executives where risk is falling and value is rising.

You’ll learn:
✅ How to segment environments by risk profile and data residency requirements
✅ DLP policy design (business vs. non‑business, endpoint filtering, HTTP/custom connector guardrails)
✅ When to use Managed Environments, and how to govern solution catalogs
✅ Least‑privilege patterns for connections, Application Users, and service principals
✅ A scalable exception/review process (requests, evidence, approvals, expirations)
✅ Auditing and monitoring: admin connectors, logs, and “what to watch” dashboards


Additional Details:
- Audience: Platform admins, security/identity teams, CoE leads, compliance officers
- Level / Duration: Intermediate–Advanced; 60 minutes
- Takeaways: DLP policy matrix (starter), environment risk map template, exception workflow (request→evidence→approval), JML connection‑ownership checklist
- Prereqs: Familiarity with connectors, Solutions, and basic tenant admin concepts

Elijah Young

Enterprise Automation & AI/LLM Architect & Power Platform CoE Builder | Over $60M+ value delivered

Atlanta, Georgia, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top