Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Information Protection ; Are We Doing Enough?


Published on

Presentation given to 100 professionals representing the general counsel and senior leadership of enterprise customers for Microsoft.

We are no longer living in 2013… The landscape is changing THAT fast. The headlines are filled, almost daily, with yet another data breach, cyberattack, or international regulation to enforce more privacy and data security. How can we protect the information assets, the lifeblood of any enterprise large or small, from data leakage or outright theft (and guess what? The criminals are not necessarily after YOUR data!)?

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Information Protection ; Are We Doing Enough?

  1. 1. Information Protection Are We Doing Enough?
  2. 2. Yesterday Today Bad “Actors”  Isolated Criminals  “Script Kiddies” Bad “Actors”  Organized Crime  Foreign States  Hactivists Targets  Identity Theft  Self Promotion  Theft of Services Targets  Intellectual Property  Financial Information  Strategic Access “Target of Opportunity” “Target of Choice”
  3. 3. © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.