Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons it’s Written On - Alex Simons


Published on

This session will review digital identity’s transition from vulnerable authentication methods and what Microsoft and others are doing to address the hard problems associated with managing and protecting digital identities.

Published in: Technology
  • Be the first to comment

CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons it’s Written On - Alex Simons

  1. 1. Without great security, Digital Identity is not worth the electrons it’s written on Alex Simons DirectorofProgramManagement MicrosoftCorporation
  2. 2. 90% organizations using Microsoft Active Directory WW 500M 10Bdaily Microsoft Account logons active Microsoft Account users 5.5M organizations using Microsoft Azure Active Directory >1,000 Microsoft engineers working on Identity and Security
  3. 3. The frequency and sophistication of cybersecurity attacks are escalating $500B total potential cost of cybercrime to the global economy $3.5M average cost of a data breach to a company 200+ median # days attackers reside within a victim’s network before detection network intrusions due to compromised user credentials 75%+
  4. 4. rule-based detection static analysis machine learning anomaly detection real-time risk scoring device profiling adaptive authentication conditional access smart cards security tokens OTPs & OATH codes authenticator apps biometrics dedicated teams threat intelligence dark web shared intelligence bounties Credential Hardening Dynamic Mitigation Attack Intelligence Advanced Detection
  5. 5. On premises In the cloud Machine Learning User and Entity Behavior Analytics
  6. 6. Brute force cameroncameron1cameron2cameron3cameron4cameron5cameron6cameron7cameron8cameron9cameron10cameron11cameron12cameron13cameron14cameron15cameron16cameron17cameron18cameron19cameron25cameron26cameron27cameron28cameron29cameron30cameron31cameron32cameron33cameron34cameron35cameron36cameron37cameron38cameron39cameron40cameron41cameron42cameron43cameron44cameron45cameron46cameron47cameron48cameron49cameron50 ÛÛÛÛÛÛÛÛÛÛÛÛ
  7. 7. Monitoring abuse across tenants Bad username IP address: Probable Penetration IP address: Bad username Bad password Bad password Bad username Bad password Bad username Bad username Logon Successful
  8. 8. Anonymizers IP address: IP address:
  9. 9. N Botnets
  10. 10. Security issues and risks Broken trust Weak protocols Known protocol vulnerabilities
  11. 11. Malicious attacks Pass-the-Ticket (PtT) Pass-the-Hash (PtH) Overpass-the-Hash Forged PAC (MS14-068) Golden Ticket Skeleton key malware Reconnaissance BruteForce
  12. 12. Abnormal behavior Anomalous logins Remote execution Suspicious activity Unknown threats Password sharing Lateral movement
  13. 13.
  14. 14.