SlideShare a Scribd company logo
1 of 13
“WHAT HAPPENED AT THE CITY OF
XXX ?”
IMPACT
Own domain Delete backups Exfiltrate data Redirect funds Ransom Botnet
ESCALATION
Pass the hash Pass the ticket
RECON
Target recon Network traversal Mailbox persistence Device persistence
ENTRY
PHISHING
Spear, whaling, trusted user
PASSWORD
Brute force, spray
KNOWN VULNERABILITIES
OS, database, apps
Video
CYBERSECURITY BY THE NUMBERS
AUTOMATION
of investigation and
response
INTEGRATION of all
components for coordinated
insights and response
FOUNDATIONS OF A MODERN SECURITY
PLATFORM
MACHINE LEARNING and AI
to separate signal and noise
CLOUD
SCALE
real-time
threat intel
“By 2020, 30% of security
spending will be on vendors that
provide an integrated platform
approach to security”
– 2017 IDC FutureScape report
AN ARGUMENT FOR UTILITY
COMPUTING
IN THE CYBER FIGHT
Hyperscale cloud vendors will far outspend even the Fortune
5 on security because their business model is TRUST.
Radically different economics - customers get access to 1B
in cyber spend, only pay for a “slice”.
Move to cloud is part of a sound risk management strategy –
i.e. transferring risk
Cloud helps you stay continually patched and compliant
Certs AND a track record
Action How We Can Partner
Self-service
Fast
Track
Premier MCS Partner
10. Deploy Azure Backup and Recovery services     
9. Move doc stores to OneDrive for Business     
8. Automate info protection and classification     
7. Deploy Win 10 and Cred Guard to all clients.    
6. Deploy Endpoint Protection with automated
investigation/remediation.
   
5. Monitor and reduce time-to-patch    
4. Deploy next gen Security Information and Event
Management tools
   
3. Deploy behavior-analysis content scanning    
2. Leverage Microsoft Secure Score best practices across
Identity, Office 365, Windows clients and servers.
   
1. Deploy phishproof identities for all users, including
Just-In-Time and Just-Enough admin accounts.
   
BRAKES ARE WHAT ALLOW THE CAR
TO GO FASTER.
FINALLY, PLEASE REMEMBER…
Q & A
Our most unique global asset in the
fight, informed by trillions of feeds.
Machine learning helps sort the
signal from the noise. This signal is
leveraged across all of Microsoft’s
security services.
450B
monthly
authentications
18+B
Bing web pages
scanned750M+
Azure user
accounts
Enterprise
security for
90%
of Fortune 500
Malware data
from Windows
Defender
Shared threat
data from partners,
researchers and law
Enforcement
worldwide
Botnet data from
Microsoft Digital
Crimes Unit
1.2B
devices scanned
each month
400B
emails analyzed
200+
global cloud
consumer and
Commercial services
INTELLIGENT SECURITY GRAPH
Back

More Related Content

What's hot

The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber Threats
Sai Huda
 

What's hot (20)

Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
 
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
 
The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber Threats
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
 
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
 
Cloud & Cybersecurity
Cloud & CybersecurityCloud & Cybersecurity
Cloud & Cybersecurity
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than Ever
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
 
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB) Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB)
 
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsBlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
 

Similar to CE Cybersecurity Trends and Strategies for Hosting in the Cloud

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
TechWell
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
Ulf Mattsson
 

Similar to CE Cybersecurity Trends and Strategies for Hosting in the Cloud (20)

IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver Innovation
 
Azure - a secure platform for source-to-pay
Azure - a secure platform for source-to-payAzure - a secure platform for source-to-pay
Azure - a secure platform for source-to-pay
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
GDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestGDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & Cyberquest
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo Logic
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
SplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use CaseSplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use Case
 
EENA2019: Track3 session1 improving response times & decision making_Eric Basha
EENA2019: Track3 session1 improving response times & decision making_Eric BashaEENA2019: Track3 session1 improving response times & decision making_Eric Basha
EENA2019: Track3 session1 improving response times & decision making_Eric Basha
 
Why WSO2 for Digital Transformation
Why WSO2 for Digital TransformationWhy WSO2 for Digital Transformation
Why WSO2 for Digital Transformation
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
What happens in the Innovation of Things?
What happens in the Innovation of Things?What happens in the Innovation of Things?
What happens in the Innovation of Things?
 

More from Case IQ

Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Case IQ
 
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk   7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
Case IQ
 

More from Case IQ (20)

How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce RiskHow Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
 
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
 
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
 
Protecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate InvestigatorsProtecting the Mental Wellbeing of Corporate Investigators
Protecting the Mental Wellbeing of Corporate Investigators
 
Meric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptxMeric Bloc_Webinar Nov22.pptx
Meric Bloc_Webinar Nov22.pptx
 
5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture
 
How to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of ComplianceHow to Assess, Level Up, and Leverage Your Culture of Compliance
How to Assess, Level Up, and Leverage Your Culture of Compliance
 
Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)Everything You Need to Get E&C Investigations Right (According to the DOJ)
Everything You Need to Get E&C Investigations Right (According to the DOJ)
 
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
 
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
 
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
 
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
 
What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?
 
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
 
Building Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and TrainingBuilding Effective Sexual Harassment Prevention Policies and Training
Building Effective Sexual Harassment Prevention Policies and Training
 
How to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplaceHow to recognize and minimize unconscious bias in the workplace
How to recognize and minimize unconscious bias in the workplace
 
Search Engine Skills for Workplace Investigators
Search Engine Skills for Workplace InvestigatorsSearch Engine Skills for Workplace Investigators
Search Engine Skills for Workplace Investigators
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
 
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionInsider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
 
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk   7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

CE Cybersecurity Trends and Strategies for Hosting in the Cloud

  • 1.
  • 2.
  • 3. “WHAT HAPPENED AT THE CITY OF XXX ?” IMPACT Own domain Delete backups Exfiltrate data Redirect funds Ransom Botnet ESCALATION Pass the hash Pass the ticket RECON Target recon Network traversal Mailbox persistence Device persistence ENTRY PHISHING Spear, whaling, trusted user PASSWORD Brute force, spray KNOWN VULNERABILITIES OS, database, apps Video
  • 5.
  • 6. AUTOMATION of investigation and response INTEGRATION of all components for coordinated insights and response FOUNDATIONS OF A MODERN SECURITY PLATFORM MACHINE LEARNING and AI to separate signal and noise CLOUD SCALE real-time threat intel “By 2020, 30% of security spending will be on vendors that provide an integrated platform approach to security” – 2017 IDC FutureScape report
  • 7. AN ARGUMENT FOR UTILITY COMPUTING IN THE CYBER FIGHT Hyperscale cloud vendors will far outspend even the Fortune 5 on security because their business model is TRUST. Radically different economics - customers get access to 1B in cyber spend, only pay for a “slice”. Move to cloud is part of a sound risk management strategy – i.e. transferring risk Cloud helps you stay continually patched and compliant Certs AND a track record
  • 8. Action How We Can Partner Self-service Fast Track Premier MCS Partner 10. Deploy Azure Backup and Recovery services      9. Move doc stores to OneDrive for Business      8. Automate info protection and classification      7. Deploy Win 10 and Cred Guard to all clients.     6. Deploy Endpoint Protection with automated investigation/remediation.     5. Monitor and reduce time-to-patch     4. Deploy next gen Security Information and Event Management tools     3. Deploy behavior-analysis content scanning     2. Leverage Microsoft Secure Score best practices across Identity, Office 365, Windows clients and servers.     1. Deploy phishproof identities for all users, including Just-In-Time and Just-Enough admin accounts.    
  • 9. BRAKES ARE WHAT ALLOW THE CAR TO GO FASTER. FINALLY, PLEASE REMEMBER…
  • 10. Q & A
  • 11.
  • 12.
  • 13. Our most unique global asset in the fight, informed by trillions of feeds. Machine learning helps sort the signal from the noise. This signal is leveraged across all of Microsoft’s security services. 450B monthly authentications 18+B Bing web pages scanned750M+ Azure user accounts Enterprise security for 90% of Fortune 500 Malware data from Windows Defender Shared threat data from partners, researchers and law Enforcement worldwide Botnet data from Microsoft Digital Crimes Unit 1.2B devices scanned each month 400B emails analyzed 200+ global cloud consumer and Commercial services INTELLIGENT SECURITY GRAPH Back

Editor's Notes

  1. 1 Bitsight report cited in NPR article 2 Verizon 2017 Data Breach Report 3 Verizon 2017 Data Breach Report 4 Microsoft Incident Response team 5 2017 Global Information Security Workforce Study 6 Forbes 7 Slate https://slate.com/technology/2015/07/opm-head-katherine-archuleta-resigns-over-data-breach.html
  2. To defend against attacks that are ruthlessly fast and extraordinarily complex, the need for sophisticated software utilizing machine learning and operating on as much data as possible has never been greater. This is where we offer something very unique and powerful to every consumer and every organization. We have been quietly building something incredible: The Microsoft Intelligent Security Graph. Every second we are adding hundreds of GBs worth of the telemetry to the Graph. This anonymized data is coming from the 100’s of global cloud services we operate, consumer and commercial, data about the threats faced by the +1B PCs we update via Windows Update every month, aggregated with external data points we collect through extensive research, partnership with industry and law enforcement through our Digital Crime Units, and our Cybersecurity Defense Operations Center. To give you a sense on what that means, we add to the Security Graph with data from the 300B monthly authentications across our consumer and enterprise services, as well as the 200B e-mails that are analyzed each month for malware and malicious web sites. We receive trillions of pieces of data from billions of devices. http://www.gettyimages.com/license/545863031