Microsoft 365
Training Series:
Security and Compliance
How the cloud helps us all be more
secure
Nick Lines, Product Manager Security
nlines@microsoft.com
Cyberspace is the
new battlefield
Security skills are in
short supply
Virtually anything
can be attacked
Data center
security
Data loss
prevention
Compliance
tools
Anomaly
detection
Security
management
Information
rights
management
Email
security
Threat
detection
Hybrid cloud
security
Security operations that work for you
Partnerships for a heterogeneous worldEnterprise-class technology
Security operations that work for you
Partnerships for a heterogeneous worldEnterprise-class intelligent security
Each physical datacenter
protected with world-class,
multi-layered protection
Secured with cutting-
edge operational security
• Restricted access
• 24x7 monitoring
• Global security experts
Global cloud infrastructure
with custom hardware and
network protection
Over 100
datacenters
across the
planet
Security operations that work for you
Security operations that work for you
Partnerships for a heterogeneous worldEnterprise-class intelligent security
Help stop damaging attacks
with integrated and
automated security
Locate and classify
information anywhere it lives
Strengthen your security
posture with insights and
guidance
Secure identities to
reach zero trust
Threat
protection
Information
protection
Identity & access
management
Security
management
Identity & access
management
How do I get Zero Trust?
Secure Authentication
Conditional Access
Identity Protection
Passwords = weakest link
Identities are constantly
at risk
Getting to a world without passwords
Microsoft Authenticator FIDO2 Security KeysWindows Hello
Azure AD
Conditional Access
User and location Device
Application Real time risk
Conditional
access
Identity protection
An integral component of Microsoft Threat Protection
Azure AD
Identity
Protection
Azure
ATP
Microsoft
Cloud App
Security
Turn on MFA
Begin your password-less journey
Protect your apps with Azure AD conditional
access
Identity & access
management
Information
protection
Unified taxonomy
Rich dashboards
Intuitive experiences
Fragmented policy
Scattered knowledge
Poor user enforcement
Discover & classify
sensitive information
Apply protection
based on policy
Monitor &
remediate
Apps On-premisesCloud servicesDevices
Across
Accelerate
Compliance
Information
protection
Start classifying content
Deploy Microsoft Cloud App Security
Integrated experiences
Correlated insights
Automated workflows
Disconnected tools
Alert fatigue
Task overload
Microsoft Threat Protection
Identities Endpoints User Data Cloud Apps Infrastructure
Intelligent Security Graph | 6.5 TRILLION signals per day
Threat protection
Check out Microsoft Threat Protection at
security.microsoft.com
Turn on Azure Security Center
Deploy Office 365 ATP,
Windows Defender ATP, & Azure ATP
Understood posture
Prioritized plan
Quantified impact
Uncertain configuration
Option overload
Unknown status
Security
management
Visit securescore.microsoft.com to
see your score
Make a plan to improve your score!
Microsoft Threat Protection
Azure Security Center
Microsoft
Information Protection
Microsoft Secure Score
Azure Security Center
Azure AD
Conditional Access
Threat
protection
Information
protection
Identity & access
management
Security
management
Security operations that work for you
Partnerships for a heterogeneous worldEnterprise-class intelligent security
Partner
with peers
Work with
industry alliances
Work with
government
Teaming up with our security partners to build an ecosystem of intelligent
security solutions that better defend against a world of increased threats
1  Modern Security - Keynote
1  Modern Security - Keynote

1 Modern Security - Keynote

Editor's Notes

  • #4 New battlefield – just look what has happened recently. State sponsored actors are disrupting, cyber will be the new battlefield … and it’s not just Russia, recent reports say China is where it’s at Cybersecurity Ventures has predicted that there will be 3.5 million unfilled cyber security job openings by 2021. Everyone in this room has seen dubious tropes used in movies – thankfully we’ve moved on from Jeff Goldblum in independence day. The raspberry pi heating hack in Mr Robot seems farfetched, but a casino was compromised via it’s fishtank.
  • #5 It used to be that your network was something you controlled. Devices were something you controlled. Not ours? Not coming in. That as an idea is dead. I think almost every organization I’ve spoken to now agrees, but there are still some holdouts.
  • #6 You’ve got the cloud, and the edge. What’s common in all of these things is that they’re connected, and typically they’re connected to an open network. Yes, I know there’s exceptions!
  • #7 And what gets more interesting is when you ask about security, and what people think security is, you get 500 different answers. Typically, the security stack in an organization has been augmented as threats have evolved, meaning there’s a large amount of disconnected systems. Typical enterprises have over 60 security vendors in the mix. We’re not saying get rid of all of those, but consolidation is definitely a benefit: what happens to your devices can inform what you do with identities, for example.
  • #8 When we come to look at how Microsoft look at security, these are the places we think we’re different. We’ll quickly walk through these.
  • #10 We are massive. We also, for some reason, are one of the most attacked organisations on the planet – can’t imagine why! Our datacenters are works of art. I used to work for a company that provided services to police forces, admittedly a decade ago, and back there we thought see through floors were pretty cool for security. The things that we have in our datacenters are proper science fiction. We have a zero standing admin approach, and we can extend that out to the customer too.
  • #11 Our global CDOC – cyber defence operations center – is a rather boring looking office in Redmond. The visitor centre is more interesting, but the way it works is more interesting: a full on control centre inspired by military, with a few ex service people involved. There’s over 3,500 people dedicated to cyber security.
  • #12 We can’t be considered a security vendor without having the slide that shows how wonderful we are, and how much signal we have. Where it gets clever is that this all goes into a single place, the intelligent security graph. Others can feed into, and get triggers from, this.
  • #14 You’re going to get a LOT more about this today, but we organize our tech into 4 pillars.
  • #15 You’ll see demos of this today
  • #17 We’ve seen a 300% increase in security attacks, and passwords are still the most common form of attack. How many have had the sextortion email? Everyone use have I been pwned? How many have downloaded the password dumps? Scary, isn’t it?
  • #18 There’s no such thing as a magic bullet, but conditional access is a very, very good thing to use. MFA, conditional access and ATP are the priorities I always say – I daresay Gurdeep and Mingchao will have their own favourites…
  • #19 And the way this is all surfaced up is now a huge amount simpler: you can track your identity incidents through your organization, digging in across boundaries – you’ll see this. It’s stunningly good.
  • #37 We work with partners to share data, and work closely with industry – including people who you’d assume we’d rather not, such as Google – but also with governments across the world.
  • #38 We work with all these to share data. Yes, there’s competitors in there, such as Ping, Sailpoint, but we work together to better secure us all.