
Microsoft Security Workshops
As a Microsoft partner, we now offer fully funded security workshops for eligible organisations that use Microsoft cloud technologies including Azure, Microsoft Dynamics, and Microsoft 365.

Cloud Accelerator for Microsoft 365 programme
The Microsoft Cloud Accelerator for Microsoft 365 programme is designed to show you the possibilities available to secure your Microsoft 365 estate using native and purpose-built cyber security solutions. One of our Trustmarque Microsoft cyber security experts will host the workshops and cover a range of areas across your IT estate to meet your cyber security requirements.
On completion of the workshops you will:
Improve your cyber security posture
Secure your users devices and apps
Identify any data compliance risks
Future proof your security set up

Microsoft Security Workshops
Secure Remote Work Workshop
In response to COVID-19, Microsoft has released their Secure Remote Work Workshop. This workshop will help you ensure your users stay connected, while you protect them and maintain control. This workshop will help guide your present and future business continuity plans using Microsoft 365.
The Secure Remote Work Workshop is a one-day engagement that includes:
- Understanding your organisation’s objectives and workloads and ensure they’re fully enabled and optimised for remote work.
- Assess your options and implications to better enable current and future remote work scenarios.
- Develop a joint plan and recommended next steps.
Security, Compliance, & Identity Workshops
The Security, Compliance, and Identity Workshops are designed to assist you in conducting effective discussions with your customers about their baseline and advanced security and compliance strategy, priorities, initiatives, and key influences.
Security Workshop
The Microsoft Security Workshop will help improve your security posture as you continue to manage an ever-increasing volume and complexity of identities, data, applications, devices, and infrastructure. Through the security workshop, Trustmarque can help you learn how to immediately start to secure your organisation and mitigate and protect against potential future threats.
Through this workshop, we will you to strengthen your organisation’s approach to cybersecurity and help you to prioritise and mitigate any potential attacks. The workshop will provide:
- An in depth analysis using Threat Check to identify any threats that may be targeting your organisation
- Actionable recommendations to immediately mitigate any identified threats
- A detailed assessment of your IT and security priorities and initiatives
- An inside look at Microsoft’s holistic approach to security, and how it can support your organisation
- Integrated security demonstrations including the latest tools and methods
- Long-term recommendations on your security strategy, with key initiatives and tactical next steps
Azure Sentinel
The Azure Sentinel module is an add-on to the Security Workshop. It uses Azure Sentinel, a cloud native SIEM, and selected Microsoft 365 security products to provide you with an overview of Azure Sentinel as well as information on any active threats in both your cloud and on-premise workloads. The Azure Sentinel add-on module will give you:
- An overview the features, capabilities and benefits of Azure Sentinel
- Visibilty of any potential threats found during the engagement and help you prioritise and mitigate them
- A demonstration of how Azure Sentinel can be delivered as part of a managed security service
- A defined and actionable set next steps based on your needs and objectives.
Compliance Workshop: Data Risk Management
Protecting your organisation information wherever it resides is critical to fulfilling regulation obligations and meeting compliance requirements. However, you need to know exactly what data you have, its volume, where it is, how it’s being used, who uses it, and what compliance risks that may exist.
The Compliance Workshop: Data Risk Management will give you the insights you need to better discover, protect, and govern your corporate data, and will provide you with a:
- Data Risk Check report that includes findings and insights
- A list of recommendations and actionable next steps that will help mitigate any identified compliance risks
- Detailed assessment of your strategic objectives, influences, and priorities for compliance
- Hands-on opportunity to experience what integrated compliance looks like, including the latest tools and methods
- Set of long-term recommendations for your compliance strategy
Data Risk Check uncovers data that can cause a compliance risk
Data Risk Check is the core activity of the Compliance Workshop Data Risk Management. To ensure comprehensive results, the activity is spread out over several weeks to allow time to run on top of your cloud infrastructure and surface compliance risks in organisational data.
The Data Risk Check uses automated Microsoft 365 tools and services to discover where data stored in the Microsoft Cloud and identify any potential problem areas, such as:
- Sensitive information and intellectual property
- Unused or long-term dormant data
- Risky or suspicious activities
Identity Workshop
With increased remote working, the use of personal devices and cloud apps, such as those contained in Microsoft 365, your organisation’s data is no longer centralised. This can leave you vulnerable to identity attacks and data breaches. The foundation of cybersecurity is to identify your legitimate users and give them proper access to the information and tools they need to do their job, while keeping out malicious persons or criminals.
Identity attacks can manifest themselves as suspicious user and sign-in behavior in your environment or constant suspicious requests. This Identity Workshop will help you find and identity risks happening in your environment, give you insights on your application landscape, and improve your identity security posture.
The workshop will help you:
- Understand your identity goals and objectives
- Define your existing and desired identity security posture
- Provide insights into applications used within your environment (sanctioned and unsanctioned by IT)
- Showcase core IT and user security scenarios
- Develop a joint action plan based key results, recommendations, and next steps
How it works
The Microsoft Cloud Accelerator programme workshops are designed by Microsoft and delivered by Trustmarque to cover different aspects of cyber security for your Microsoft 365 estate and are tailored to your needs. The workshops have different focuses but follow a similar methodology, these are:


Understand
We will work with you to understand in detail about your priorities, initiatives, strategic objectives, and the key influences on your security strategy.

Discover
Knowing the current and potential threats to your IT environment across email, identity, and data is essential. We work with you to uncover any vulnerabilities.
Recommendations and Next steps
Using the outcomes from the workshop we will recommend solutions you could use to meet your organisation’s identified risks and compliance needs. The findings from the workshop will help guide a future roadmap and define actionable next steps and a practical timeline.
Funding & eligibility
The basic eligibility criteria are set out in the table below, if you are unsure then please contact your Trustmarque Account Manager. Please note that all funding is at Microsoft’s discretion and may change at any time.


If you do not meet the eligibility criteria, the workshops are still available to you but at a cost. Contact us to discuss your circumstances and options.
Why Trustmarque?
As a Microsoft Gold Partner we have a wealth of expertise and experience across the breadth of Microsoft’s cloud solutions, whether that is advising, implementing or deploying innovative solutions. Our portfolio of services and partners give you access to the most relevant and advanced solutions to address the myriad of cyber security challenges you face. In addition, we have invested highly in staff training and are proud of our relationships and certifications with the industry’s leading vendors.
Our cyber security practice was originally founded in 2004 and acquired by Capita in 2013, we are a multiple award-winning practice that has been in operation for 17 years. We are uniquely placed to leverage both the strength of our strategic ecosystem partners and Microsoft.
Find out about funding anf how to access your Microsoft security workshop
Contact your Trustmarque Account Manager or complete the form below stating the workshop you are interested in, and someone will be in touch.