Ep 113: Should we be in Microsoft 365 GCC, GCC High, or Commercial?
Listen now
Description
Microsoft 365 was launched in 2011 in hopes of revolutionizing cloud-powered productivity platforms. Since then, Microsoft 365 has grown to the point where it is now one of the largest cloud-powered productivity platforms on the market, competing with the likes of Google and more. To give organizations a clear picture of their Microsoft 365 options, your host John Verry sits down with Conrad Agramont, CEO of Agile IT, a top Microsoft Cloud Service Provider focusing on Microsoft 365, to discuss Microsoft Government Community Cloud (GCC), GCC High, and more. In this episode, Join us as we discuss the following: • How the three Microsoft 365 clouds differ in terms of key security capabilities • The importance of communicating with your government program office about the cybersecurity requirements in your contract • What migration from commercial Microsoft 365 to a "gov cloud" can look like in terms of time, cost, and effort • The two most challenging aspects of any Microsoft 365 migration • Pros and cons of a "hybrid approach" involving multiple Microsoft 365 environments To hear this episode and many more like it, we encourage you to subscribe to the Virtual CISO Podcast. Just search for The Virtual CISO Podcast in your favorite podcast player or watch the Podcast on YouTube here. To stay updated with the newest podcast releases, follow us on LinkedIn here.
More Episodes
In this episode of The Virtual CISO Podcast, your host John Verry is joined by Mike Craig to break down the differences between FedRAMP, TxRAMP, AZRAMP, and StateRAMP. Together, they discuss:How the Naoris Protocol establishes decentralized trust for compute endpoints.  Key distinctions between...
Published 10/17/24
Published 10/17/24
In this episode of The Virtual CISO Podcast, your host, John Verry, sits down with David Carvalho, a cryptography and cybersecurity expert with over 25 years of experience, to explore the next frontier in cybersecurity: decentralized security models and post-quantum cryptography. How the Naoris...
Published 09/23/24