SlideShare a Scribd company logo
1 of 10
Microsoft Strategic Initiative
Charls Yang, Yining Xie, Andres Hoberman, Kyle Pauling
Good afternoon everyone. My name is Charles, this is Lizzie,
Andres, and Kyle. Today, we are going to present a strategic
initiative plan for microsoft for the 2018 fiscal year and beyond.
Cybersecurity
The topic we want to focus on and bring to the business’s
attention today is cybersecurity. For those who are unfamiliar,
Cybersecurity refers to a set of techniques used to protect the
integrity of networks, programs, and data from attack and
unauthorized access.
Cybercrime Portfolio
Cyber attacks
Security vulnerabilities
Disclosure of personal data
Network outages and data loss
Disruption of online services
All threaten long-term customer loyalty, security, firm revenue,
and firm reliability
Activities that cybersecurity tries to prevent include but are not
limited to cyber attacks, etc etc. which all threaten customer
relations, security of our firm, our revenue, as well as firm
reliability.
Increasing Prevalence
The reason why cybersecurity has come on our radar now is
because of the steady increases of attacks in the last few years.
The two biggest reasons for this are the boom of the internet of
things as well as the underground market. When we implement
software in all areas of our life, there will be more opportunities
for cybercriminals to target.
Cybercrime Costs
Cybersecurity spending to exceed $1 trillion from 2017-2021
Cybersecurity Costs
Average cost of ~$12 – $17M per incident
Data Breaches
Overall costs to hit $6 trillion annually by 2021
Cybercrime Costs
$325M in damages caused by global ransomware
Damaged caused by global ransomware to surpass $5B in 2017.
A 15x from 2015
Global Ransomware
Cybersecurity- Our Business Segments
Personal Computing
Windows OS
82.96% market share
Dependence on the OS by customers like the U.S. Department
of Defense or the biggest banks in the world like JP Morgan
Chase
A bug that restricts computer usage or alters functions could
cause damage to millions of devices and users’ information
Apple macOS password glitch this week; hurts their sales
Intelligent Cloud
Azure, Dynamics 365
Links multiple networks and is the backbone of the firm’s
infrastructure
Stores business and personal data
Leaks or hacks can expose personal banking or other sensitive
information
Late 2010, Microsoft cloud breach allowed anybody to see
employee information
Productivity & Business Processes
Office, Exchange, Skype, Outlook, LinkedIn, ERP, CRM
Office (Commercial and 365)
Over 1 billion users
Excel contains financial information that can benefit hackers
Powerpoint can contain interfirm information that is not public
yet
Office 365 breach June 2016
57% of users affected
Ransom note that also included an audio warning
Next Steps
The
Solution
Acquire new resources to boost cyber security through:
Organic
Internal departmental growth
Acquisitions
Complete control of external resources
Alliances
Partial control of external resources
Organic
New hirings and large investments in top intellectual capital
from universities, cyber security firms
Develop software with top security measures in every step of
the production chain, including post-purchase
Less expensive, but takes longer to acquire new resources than
Acquisitions or Alliances
Past Acquisitions
Hexadite
Go from alert of breaches to remediation in minutes
$100 million
Secure Islands
Advanced data security solutions
Adallom
Cloud security
Emphasis on Office 365
All have kept MSFT at a high standard of security
But must keep strengthening to sustain more attacks
Future Acquisitions
Move capital into long term investment for the future of the
firm
Acquire small cybersecurity firms and integrate more, which
will have additional costs (like they have in the past)
Acquire established cybersecurity firms for large amounts of
capital and let them keep their independence, while focusing
exclusively on Microsoft
Symantec, LifeLock, Fortinet
Alliances
Partner with top cyber security firms in response to the
developing needs
IBM Security
Customized enterprise security portfolio to disrupt new threats,
deploy security innovations and reduce the cost and complexity
of IT security
Parent company, IBM, is one of MSFT’s major competitors
MSFT has partnered with competitors in the past (Apple)
Alliance governance can be through equity (like they did with
Apple), a contract, or some combination
Alliances
Cisco
Host of products and services for threat detection and
prevention
Cloud security, Virtual Private Networks, Email and server
security
Sophos
Sophos Mobile 7 - latest of its Enterprise Mobility Management
solutions
BAE Systems
Operates in 5 areas: electronic systems, cyber and intelligence
systems, intelligence and security systems, applied intelligence,
and platforms and services
Offers flexible solutions for Microsoft’s different needs
PARTS M&M Framework
People - Organic approach = MSFT only; Acquisition or
Alliance = MSFT + others
Activities - At all levels of operations from code development
to server maintenance to IT infrastructure and networking
Resources - Human and intellectual capital, corporate capital,
network and technological expertise
Timing - Now and always ongoing, cyber threats are constantly
evolving
Symbols - Trust in competitors if an alliance is formed while
acquisitions demonstrate market power and MSFT’s resources
Measurements - # of attacks defended, time online services are
down, data lost
Milestones - After an attack to review damages
Our Strategic Initiative Plan
Partner with IBM Security
Through a contractual agreement and equity purchase
Demonstrate commitment and trust in the partnership
Combined resources can offer the most secure services and
products
Make more acquisitions and alliances as needed in the future
since the threat is growing
Appendix
Source: Symantec
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx

More Related Content

Similar to Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx

Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Ioannis Aligizakis, M.Sc.
 
Fastest Growing Cybersecurity Companies.pptx
Fastest Growing Cybersecurity Companies.pptxFastest Growing Cybersecurity Companies.pptx
Fastest Growing Cybersecurity Companies.pptxSonaliG6
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdSusan Darby
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 DefenderMighty Guides, Inc.
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxSonaliG6
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfseoteameits
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Enterprise Management Associates
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managmentDean Iacovelli
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeSysfore Technologies
 

Similar to Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx (20)

Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
 
Fastest Growing Cybersecurity Companies.pptx
Fastest Growing Cybersecurity Companies.pptxFastest Growing Cybersecurity Companies.pptx
Fastest Growing Cybersecurity Companies.pptx
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | Sysfore
 

More from ARIV4

Please go through the document completely before providing the answe.docx
Please go through the document completely before providing the answe.docxPlease go through the document completely before providing the answe.docx
Please go through the document completely before providing the answe.docxARIV4
 
Please follow the instruction carefully. APA stile. Mínimum three re.docx
Please follow the instruction carefully. APA stile. Mínimum three re.docxPlease follow the instruction carefully. APA stile. Mínimum three re.docx
Please follow the instruction carefully. APA stile. Mínimum three re.docxARIV4
 
Please follow the instructions attached in MS Word. Font Arial,  .docx
Please follow the instructions attached in MS Word. Font Arial,  .docxPlease follow the instructions attached in MS Word. Font Arial,  .docx
Please follow the instructions attached in MS Word. Font Arial,  .docxARIV4
 
Please help me write a report focusing on photocatalysis of TiO2 .docx
Please help me write a report focusing on photocatalysis of TiO2 .docxPlease help me write a report focusing on photocatalysis of TiO2 .docx
Please help me write a report focusing on photocatalysis of TiO2 .docxARIV4
 
Please follow the directions in the assignment content Environme.docx
Please follow the directions in the assignment content Environme.docxPlease follow the directions in the assignment content Environme.docx
Please follow the directions in the assignment content Environme.docxARIV4
 
Please follow the directions below to complete the project1.).docx
Please follow the directions below to complete the project1.).docxPlease follow the directions below to complete the project1.).docx
Please follow the directions below to complete the project1.).docxARIV4
 
Please follow all directions please. the attachment titled assignme.docx
Please follow all directions please. the attachment titled assignme.docxPlease follow all directions please. the attachment titled assignme.docx
Please follow all directions please. the attachment titled assignme.docxARIV4
 
Please draft a personal message that you would like to appear on you.docx
Please draft a personal message that you would like to appear on you.docxPlease draft a personal message that you would like to appear on you.docx
Please draft a personal message that you would like to appear on you.docxARIV4
 
Please explain how you have met various BSN Essentials for each co.docx
Please explain how you have met various BSN Essentials for each co.docxPlease explain how you have met various BSN Essentials for each co.docx
Please explain how you have met various BSN Essentials for each co.docxARIV4
 
Please Follow directions or I will dispute please answer origina.docx
Please Follow directions or I will dispute please answer origina.docxPlease Follow directions or I will dispute please answer origina.docx
Please Follow directions or I will dispute please answer origina.docxARIV4
 
Please find the attached.Task 1 -  In 150 words comment on att.docx
Please find the attached.Task 1  -  In 150 words comment on att.docxPlease find the attached.Task 1  -  In 150 words comment on att.docx
Please find the attached.Task 1 -  In 150 words comment on att.docxARIV4
 
Please draw primarily from this weeks readings (and use additio.docx
Please draw primarily from this weeks readings (and use additio.docxPlease draw primarily from this weeks readings (and use additio.docx
Please draw primarily from this weeks readings (and use additio.docxARIV4
 
Please explain the reoccurring theme (sub-textual idea) of blin.docx
Please explain the reoccurring theme (sub-textual idea) of blin.docxPlease explain the reoccurring theme (sub-textual idea) of blin.docx
Please explain the reoccurring theme (sub-textual idea) of blin.docxARIV4
 
Please fill the attached Self-Assessment Surveys (TWO) and calcula.docx
Please fill the attached Self-Assessment Surveys (TWO) and calcula.docxPlease fill the attached Self-Assessment Surveys (TWO) and calcula.docx
Please fill the attached Self-Assessment Surveys (TWO) and calcula.docxARIV4
 
Please explain the rules of the calling program (Caller Rules).docx
Please explain the rules of the calling program (Caller Rules).docxPlease explain the rules of the calling program (Caller Rules).docx
Please explain the rules of the calling program (Caller Rules).docxARIV4
 
Please follow directions to receive all possible points!!The int.docx
Please follow directions to receive all possible points!!The int.docxPlease follow directions to receive all possible points!!The int.docx
Please follow directions to receive all possible points!!The int.docxARIV4
 
Please follow instructions A blanch interpersonal record attached..docx
Please follow instructions A blanch interpersonal record attached..docxPlease follow instructions A blanch interpersonal record attached..docx
Please follow instructions A blanch interpersonal record attached..docxARIV4
 
Please explain how you have met various BSN Essentials for each cour.docx
Please explain how you have met various BSN Essentials for each cour.docxPlease explain how you have met various BSN Essentials for each cour.docx
Please explain how you have met various BSN Essentials for each cour.docxARIV4
 
Please explain how you have met various Bachelor of Science in Nur.docx
Please explain how you have met various Bachelor of Science in Nur.docxPlease explain how you have met various Bachelor of Science in Nur.docx
Please explain how you have met various Bachelor of Science in Nur.docxARIV4
 
Please DiscussWhat are host-based, client-based, client-serv.docx
Please DiscussWhat are host-based, client-based, client-serv.docxPlease DiscussWhat are host-based, client-based, client-serv.docx
Please DiscussWhat are host-based, client-based, client-serv.docxARIV4
 

More from ARIV4 (20)

Please go through the document completely before providing the answe.docx
Please go through the document completely before providing the answe.docxPlease go through the document completely before providing the answe.docx
Please go through the document completely before providing the answe.docx
 
Please follow the instruction carefully. APA stile. Mínimum three re.docx
Please follow the instruction carefully. APA stile. Mínimum three re.docxPlease follow the instruction carefully. APA stile. Mínimum three re.docx
Please follow the instruction carefully. APA stile. Mínimum three re.docx
 
Please follow the instructions attached in MS Word. Font Arial,  .docx
Please follow the instructions attached in MS Word. Font Arial,  .docxPlease follow the instructions attached in MS Word. Font Arial,  .docx
Please follow the instructions attached in MS Word. Font Arial,  .docx
 
Please help me write a report focusing on photocatalysis of TiO2 .docx
Please help me write a report focusing on photocatalysis of TiO2 .docxPlease help me write a report focusing on photocatalysis of TiO2 .docx
Please help me write a report focusing on photocatalysis of TiO2 .docx
 
Please follow the directions in the assignment content Environme.docx
Please follow the directions in the assignment content Environme.docxPlease follow the directions in the assignment content Environme.docx
Please follow the directions in the assignment content Environme.docx
 
Please follow the directions below to complete the project1.).docx
Please follow the directions below to complete the project1.).docxPlease follow the directions below to complete the project1.).docx
Please follow the directions below to complete the project1.).docx
 
Please follow all directions please. the attachment titled assignme.docx
Please follow all directions please. the attachment titled assignme.docxPlease follow all directions please. the attachment titled assignme.docx
Please follow all directions please. the attachment titled assignme.docx
 
Please draft a personal message that you would like to appear on you.docx
Please draft a personal message that you would like to appear on you.docxPlease draft a personal message that you would like to appear on you.docx
Please draft a personal message that you would like to appear on you.docx
 
Please explain how you have met various BSN Essentials for each co.docx
Please explain how you have met various BSN Essentials for each co.docxPlease explain how you have met various BSN Essentials for each co.docx
Please explain how you have met various BSN Essentials for each co.docx
 
Please Follow directions or I will dispute please answer origina.docx
Please Follow directions or I will dispute please answer origina.docxPlease Follow directions or I will dispute please answer origina.docx
Please Follow directions or I will dispute please answer origina.docx
 
Please find the attached.Task 1 -  In 150 words comment on att.docx
Please find the attached.Task 1  -  In 150 words comment on att.docxPlease find the attached.Task 1  -  In 150 words comment on att.docx
Please find the attached.Task 1 -  In 150 words comment on att.docx
 
Please draw primarily from this weeks readings (and use additio.docx
Please draw primarily from this weeks readings (and use additio.docxPlease draw primarily from this weeks readings (and use additio.docx
Please draw primarily from this weeks readings (and use additio.docx
 
Please explain the reoccurring theme (sub-textual idea) of blin.docx
Please explain the reoccurring theme (sub-textual idea) of blin.docxPlease explain the reoccurring theme (sub-textual idea) of blin.docx
Please explain the reoccurring theme (sub-textual idea) of blin.docx
 
Please fill the attached Self-Assessment Surveys (TWO) and calcula.docx
Please fill the attached Self-Assessment Surveys (TWO) and calcula.docxPlease fill the attached Self-Assessment Surveys (TWO) and calcula.docx
Please fill the attached Self-Assessment Surveys (TWO) and calcula.docx
 
Please explain the rules of the calling program (Caller Rules).docx
Please explain the rules of the calling program (Caller Rules).docxPlease explain the rules of the calling program (Caller Rules).docx
Please explain the rules of the calling program (Caller Rules).docx
 
Please follow directions to receive all possible points!!The int.docx
Please follow directions to receive all possible points!!The int.docxPlease follow directions to receive all possible points!!The int.docx
Please follow directions to receive all possible points!!The int.docx
 
Please follow instructions A blanch interpersonal record attached..docx
Please follow instructions A blanch interpersonal record attached..docxPlease follow instructions A blanch interpersonal record attached..docx
Please follow instructions A blanch interpersonal record attached..docx
 
Please explain how you have met various BSN Essentials for each cour.docx
Please explain how you have met various BSN Essentials for each cour.docxPlease explain how you have met various BSN Essentials for each cour.docx
Please explain how you have met various BSN Essentials for each cour.docx
 
Please explain how you have met various Bachelor of Science in Nur.docx
Please explain how you have met various Bachelor of Science in Nur.docxPlease explain how you have met various Bachelor of Science in Nur.docx
Please explain how you have met various Bachelor of Science in Nur.docx
 
Please DiscussWhat are host-based, client-based, client-serv.docx
Please DiscussWhat are host-based, client-based, client-serv.docxPlease DiscussWhat are host-based, client-based, client-serv.docx
Please DiscussWhat are host-based, client-based, client-serv.docx
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 

Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx

  • 1. Microsoft Strategic Initiative Charls Yang, Yining Xie, Andres Hoberman, Kyle Pauling Good afternoon everyone. My name is Charles, this is Lizzie, Andres, and Kyle. Today, we are going to present a strategic initiative plan for microsoft for the 2018 fiscal year and beyond. Cybersecurity The topic we want to focus on and bring to the business’s attention today is cybersecurity. For those who are unfamiliar, Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs, and data from attack and unauthorized access. Cybercrime Portfolio Cyber attacks Security vulnerabilities Disclosure of personal data Network outages and data loss Disruption of online services All threaten long-term customer loyalty, security, firm revenue, and firm reliability Activities that cybersecurity tries to prevent include but are not limited to cyber attacks, etc etc. which all threaten customer
  • 2. relations, security of our firm, our revenue, as well as firm reliability. Increasing Prevalence The reason why cybersecurity has come on our radar now is because of the steady increases of attacks in the last few years. The two biggest reasons for this are the boom of the internet of things as well as the underground market. When we implement software in all areas of our life, there will be more opportunities for cybercriminals to target. Cybercrime Costs Cybersecurity spending to exceed $1 trillion from 2017-2021 Cybersecurity Costs Average cost of ~$12 – $17M per incident Data Breaches Overall costs to hit $6 trillion annually by 2021 Cybercrime Costs $325M in damages caused by global ransomware Damaged caused by global ransomware to surpass $5B in 2017. A 15x from 2015 Global Ransomware Cybersecurity- Our Business Segments
  • 3. Personal Computing Windows OS 82.96% market share Dependence on the OS by customers like the U.S. Department of Defense or the biggest banks in the world like JP Morgan Chase A bug that restricts computer usage or alters functions could cause damage to millions of devices and users’ information Apple macOS password glitch this week; hurts their sales Intelligent Cloud Azure, Dynamics 365 Links multiple networks and is the backbone of the firm’s infrastructure Stores business and personal data Leaks or hacks can expose personal banking or other sensitive information Late 2010, Microsoft cloud breach allowed anybody to see employee information Productivity & Business Processes Office, Exchange, Skype, Outlook, LinkedIn, ERP, CRM Office (Commercial and 365) Over 1 billion users Excel contains financial information that can benefit hackers Powerpoint can contain interfirm information that is not public yet Office 365 breach June 2016 57% of users affected Ransom note that also included an audio warning
  • 4. Next Steps The Solution Acquire new resources to boost cyber security through: Organic Internal departmental growth Acquisitions Complete control of external resources Alliances Partial control of external resources Organic New hirings and large investments in top intellectual capital from universities, cyber security firms
  • 5. Develop software with top security measures in every step of the production chain, including post-purchase Less expensive, but takes longer to acquire new resources than Acquisitions or Alliances Past Acquisitions Hexadite Go from alert of breaches to remediation in minutes $100 million Secure Islands Advanced data security solutions Adallom Cloud security Emphasis on Office 365 All have kept MSFT at a high standard of security But must keep strengthening to sustain more attacks
  • 6. Future Acquisitions Move capital into long term investment for the future of the firm Acquire small cybersecurity firms and integrate more, which will have additional costs (like they have in the past) Acquire established cybersecurity firms for large amounts of capital and let them keep their independence, while focusing exclusively on Microsoft Symantec, LifeLock, Fortinet Alliances Partner with top cyber security firms in response to the developing needs
  • 7. IBM Security Customized enterprise security portfolio to disrupt new threats, deploy security innovations and reduce the cost and complexity of IT security Parent company, IBM, is one of MSFT’s major competitors MSFT has partnered with competitors in the past (Apple) Alliance governance can be through equity (like they did with Apple), a contract, or some combination Alliances Cisco Host of products and services for threat detection and prevention Cloud security, Virtual Private Networks, Email and server security Sophos Sophos Mobile 7 - latest of its Enterprise Mobility Management solutions BAE Systems Operates in 5 areas: electronic systems, cyber and intelligence
  • 8. systems, intelligence and security systems, applied intelligence, and platforms and services Offers flexible solutions for Microsoft’s different needs PARTS M&M Framework People - Organic approach = MSFT only; Acquisition or Alliance = MSFT + others Activities - At all levels of operations from code development to server maintenance to IT infrastructure and networking Resources - Human and intellectual capital, corporate capital, network and technological expertise Timing - Now and always ongoing, cyber threats are constantly evolving Symbols - Trust in competitors if an alliance is formed while acquisitions demonstrate market power and MSFT’s resources Measurements - # of attacks defended, time online services are down, data lost Milestones - After an attack to review damages
  • 9. Our Strategic Initiative Plan Partner with IBM Security Through a contractual agreement and equity purchase Demonstrate commitment and trust in the partnership Combined resources can offer the most secure services and products Make more acquisitions and alliances as needed in the future since the threat is growing Appendix Source: Symantec