SlideShare a Scribd company logo
1 of 35
Download to read offline
Year 2025
world Internet users
of consumer electronics sold
in emerging economies
mobile Internet
subscriptions globally
data will move through
or be stored in the cloud
Security and privacy are a top leadership concern
3
Managing risk in an increasingly connected world
“This Nexus of Forces is impacting
security in terms of new vulnerabilities.
–Ruggero Contu, Christian Canales and Lawrence Pingree. Forecast Overview: Information Security, Worldwide, 2014 Update. Gartner, Inc. June 25, 2014.
Impact of cyber attacks could be
as much as $3 trillion in lost
productivity and growth
Implications
Job security Customer loyalty
Intellectual property
Legal liabilityBrand reputation
$ 3.5M
Average cost of
a data breach to
a company
15 % increase YoY
median # of days attackers are
present on a victim network
before detection243
level issue
is a
CxO
Security
Verizon, “2014 Data Breach Investigations Report”
74.8%
Percentage of total security
incidents in 2013 directed toward
public sector
Make no mistake…we are Under Attack
Public Sector, Retail, Financial Services &
SOE’s are the primary targets
Some More Details - Evolution to Targeted
Threats
Indiscriminate Targeted
Consumer Enterprise Target
Single Vector Multi-vector
Manual Automated
Desktop Device and Cloud
Visible Concealed
Lone Agent Organised Ecosystem
Spam Information Theft
Information Theft Information Destruction
“The world is changing very fast. Big will not beat small anymore. It will be the fast
beating the slow.” Rupert Murdoch
Origin of Data Breaches
Who is behind data breaches? How do breaches occur?
98% stemmed from external agents (+6%)
4% implicated internal employees (-13%)
<1% committed by business partners (<>)
58% of all data theft tied to activist groups
81% utilized some form of hacking (+31%)
69% incorporated malware (+20%)
10% involved physical attacks (-19%)
7% employed social tactics (-4%)
5% resulted from privilege misuse (-12%)
Source: Verizon 2012 Data Breach investigations Report
We are not combating hackers
We are combating an ecosystem
Simplified diagram of the abuse supply chain
Coordination
Collaboration
Disruption
set policies and principles
identify, block, sinkhole
Seize, prosecute, takedown
security by design
identify, block, partner
starve
Anti-malware and
security ecosystem
Large-scale Public Services
Cloud Providers, Telco’s
Government
Ad Networks
Banks, Finance, Commerce
OEMs
Vendors
CERTs, ISPs &
Law Enforcement
How do we win?
It will take a partnership
Microsoft Experience and Credentials
Dependable, available
Predictable, consistent,
responsive service
Maintainable
Resilient, easily restored
Proven, ready
Trustworthy Computing
Working Toward a Safer, More Trusted Internet
Security Privacy Business PracticesReliability
Secures against attacks
Protects confidentiality,
integrity, and availability
of data and systems
Helps manage risk
Protects from unwanted
communication
User choice and control
Products, online services
adhere to fair information
principles
Commitment to
customer-centric
interoperability
Recognized industry
leader, world-class
partner
Open, transparent
Elements to a Resilient Infrastructure
Protect Detect
Threat Information
Management
Response
14
Resilience against modern
Cyberthreats
-
The Hockey Analogy
Placeholder for hockey player picture 😏
15
Coaching
Management
Build the Foundation for Success and Adapt to
Changes
16
Goalie
Protect
Patch, Deploy Newer Products, Apply the SDL
17
Awareness
Detect
Active Attacks
18
Defense
Response
Customer, CSS and Cybersecurity Team
Intelligence
Threat Information
20
Protect
Patch, Deploy Newer
Products, Apply the SDL
Detect
Active Attacks
Response
Customer, CSS and
Cybersecurity Incident
Response
Threat Information
Management
OverallResilienceofanOrganizationsIT
Infrastructure
Achieving Overall Resilience
Cloud Resilience
On-Premises Systems Resilience
We aggressively fight
cybercrime and advocate
extensively for enhancing
cybersecurity
We invest deeply in
building a trustworthy
computing platform
and security expertise
Microsoft is committed to protecting our customers
and being a global cybersecurity advocate
We have strong
principles and policies
that empower you to be
in control of your
information
Security
Privacy
Compliance
Transparency
Advocacy
Risk management Governance
• Deeper source inspection
Achieving Overall Resilience
Cloud Security and Compliance
Trustworthy Cloud
Public Data Internal Data Confidential Data
Commitment to industry standards and organizational compliance
On personal
devices
24 x 7
collaborationOn the road In the officeAt home
Through
social media
OverallResilienceofanOrganizationsIT
Infrastructure
Wrapping Up: Overall Resilience
Use trustworthy cloud services to take advantage of the industry leading security processes,
technology and skills deployed in Microsoft’s Cloud Services
Cloud
Resilience
Stay Current (Upgrade) + Patch
Management
Align Active Directory to Threat
Environment
Assess Threats and
Countermeasures
Implement Secure Development
Practices
Use secured devices and enterprise mobility
management to gain more control over
information and apps in a BYOD as well as
enterprise steered device strategy
Work with Microsoft’s Consulting Services to
implement the security pillars Protect, Detect
and Respond to achieve resilience in your on-
premises infrastructure.
On-PremisesSystems
Resilience
36
© 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it
should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Reto Haeni
Chief Security Officer & Advisor
Microsoft Western Europe HQ
reto.haeni@microsoft.com
blog: www.retohaeni.net

More Related Content

What's hot

The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityMarkLogic
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureLee Dalton
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax TechnologyHaystax Technology
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data SecurityImperva
 
Tripwire_UK_Executive_Cybersecurity_Literacy_Survey
Tripwire_UK_Executive_Cybersecurity_Literacy_SurveyTripwire_UK_Executive_Cybersecurity_Literacy_Survey
Tripwire_UK_Executive_Cybersecurity_Literacy_SurveyMelloney Jewell
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiebuc
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
Improving cyber-security through acquisition
Improving cyber-security through acquisitionImproving cyber-security through acquisition
Improving cyber-security through acquisitionChristopher Dorobek
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsBrian Rushton-Phillips
 
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...Rea & Associates
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ... 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...Proofpoint
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School	FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School FDMagazine
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 

What's hot (20)

The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data Security
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochure
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 
Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax Technology
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
Tripwire_UK_Executive_Cybersecurity_Literacy_Survey
Tripwire_UK_Executive_Cybersecurity_Literacy_SurveyTripwire_UK_Executive_Cybersecurity_Literacy_Survey
Tripwire_UK_Executive_Cybersecurity_Literacy_Survey
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Improving cyber-security through acquisition
Improving cyber-security through acquisitionImproving cyber-security through acquisition
Improving cyber-security through acquisition
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ... 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School	FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 

Viewers also liked

Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber ...
Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber ...Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber ...
Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber ...Microsoft
 
CFO konference - Financial management i Microsoft og et kulturelt pionerproje...
CFO konference - Financial management i Microsoft og et kulturelt pionerproje...CFO konference - Financial management i Microsoft og et kulturelt pionerproje...
CFO konference - Financial management i Microsoft og et kulturelt pionerproje...Microsoft
 
Cyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threatCyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threatMicrosoft
 
Медиапроект Pubtime. Презентация для инвестора
Медиапроект Pubtime. Презентация для инвестораМедиапроект Pubtime. Презентация для инвестора
Медиапроект Pubtime. Презентация для инвестораВиктор Крысов (Viktor Krysov)
 
Modern workplace
Modern workplaceModern workplace
Modern workplaceMicrosoft
 
Prescriptive SellingTM en game changer ift at sikre en effektiv salgsstyrke
Prescriptive SellingTM en game changer ift at sikre en effektiv salgsstyrkePrescriptive SellingTM en game changer ift at sikre en effektiv salgsstyrke
Prescriptive SellingTM en game changer ift at sikre en effektiv salgsstyrkeMicrosoft
 
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...Microsoft
 
Alm. brand integrerer forretningsprocesser i en microsoft bi platform
Alm. brand integrerer forretningsprocesser i en microsoft bi platformAlm. brand integrerer forretningsprocesser i en microsoft bi platform
Alm. brand integrerer forretningsprocesser i en microsoft bi platformMicrosoft
 
Ledelseskompas målrettet MT Højgaards ledelse
Ledelseskompas målrettet MT Højgaards ledelseLedelseskompas målrettet MT Højgaards ledelse
Ledelseskompas målrettet MT Højgaards ledelseMicrosoft
 
Kundeservice for vindere
Kundeservice for vindereKundeservice for vindere
Kundeservice for vindereMicrosoft
 
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft
 
Velfærd for færre resourcer
Velfærd for færre resourcerVelfærd for færre resourcer
Velfærd for færre resourcerMicrosoft
 
FREMTIDENS CFO
FREMTIDENS CFOFREMTIDENS CFO
FREMTIDENS CFOMicrosoft
 
Lad data styre din forretning
Lad data styre din forretningLad data styre din forretning
Lad data styre din forretningMicrosoft
 
Find værdi i alle data
Find værdi i alle dataFind værdi i alle data
Find værdi i alle dataMicrosoft
 
Den Moderne Arbejdsplads - New Ways of Working i ISS, af Jeff Gravenhorst, Gr...
Den Moderne Arbejdsplads - New Ways of Working i ISS, af Jeff Gravenhorst, Gr...Den Moderne Arbejdsplads - New Ways of Working i ISS, af Jeff Gravenhorst, Gr...
Den Moderne Arbejdsplads - New Ways of Working i ISS, af Jeff Gravenhorst, Gr...Microsoft
 
One Step Ahead 2014 Social Business
One Step Ahead 2014 Social BusinessOne Step Ahead 2014 Social Business
One Step Ahead 2014 Social BusinessMicrosoft
 
Samspillet mellem mennesker, processer og teknologi
Samspillet mellem mennesker, processer og teknologiSamspillet mellem mennesker, processer og teknologi
Samspillet mellem mennesker, processer og teknologiMicrosoft
 

Viewers also liked (20)

Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber ...
Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber ...Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber ...
Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber ...
 
CFO konference - Financial management i Microsoft og et kulturelt pionerproje...
CFO konference - Financial management i Microsoft og et kulturelt pionerproje...CFO konference - Financial management i Microsoft og et kulturelt pionerproje...
CFO konference - Financial management i Microsoft og et kulturelt pionerproje...
 
Cyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threatCyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threat
 
Медиапроект Pubtime. Презентация для инвестора
Медиапроект Pubtime. Презентация для инвестораМедиапроект Pubtime. Презентация для инвестора
Медиапроект Pubtime. Презентация для инвестора
 
Modern workplace
Modern workplaceModern workplace
Modern workplace
 
Prescriptive SellingTM en game changer ift at sikre en effektiv salgsstyrke
Prescriptive SellingTM en game changer ift at sikre en effektiv salgsstyrkePrescriptive SellingTM en game changer ift at sikre en effektiv salgsstyrke
Prescriptive SellingTM en game changer ift at sikre en effektiv salgsstyrke
 
MDOP
MDOPMDOP
MDOP
 
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
 
Alm. brand integrerer forretningsprocesser i en microsoft bi platform
Alm. brand integrerer forretningsprocesser i en microsoft bi platformAlm. brand integrerer forretningsprocesser i en microsoft bi platform
Alm. brand integrerer forretningsprocesser i en microsoft bi platform
 
Ledelseskompas målrettet MT Højgaards ledelse
Ledelseskompas målrettet MT Højgaards ledelseLedelseskompas målrettet MT Højgaards ledelse
Ledelseskompas målrettet MT Højgaards ledelse
 
Kundeservice for vindere
Kundeservice for vindereKundeservice for vindere
Kundeservice for vindere
 
Трейвиш А.И. Страноведение Лекция 1
Трейвиш А.И. Страноведение Лекция 1Трейвиш А.И. Страноведение Лекция 1
Трейвиш А.И. Страноведение Лекция 1
 
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
 
Velfærd for færre resourcer
Velfærd for færre resourcerVelfærd for færre resourcer
Velfærd for færre resourcer
 
FREMTIDENS CFO
FREMTIDENS CFOFREMTIDENS CFO
FREMTIDENS CFO
 
Lad data styre din forretning
Lad data styre din forretningLad data styre din forretning
Lad data styre din forretning
 
Find værdi i alle data
Find værdi i alle dataFind værdi i alle data
Find værdi i alle data
 
Den Moderne Arbejdsplads - New Ways of Working i ISS, af Jeff Gravenhorst, Gr...
Den Moderne Arbejdsplads - New Ways of Working i ISS, af Jeff Gravenhorst, Gr...Den Moderne Arbejdsplads - New Ways of Working i ISS, af Jeff Gravenhorst, Gr...
Den Moderne Arbejdsplads - New Ways of Working i ISS, af Jeff Gravenhorst, Gr...
 
One Step Ahead 2014 Social Business
One Step Ahead 2014 Social BusinessOne Step Ahead 2014 Social Business
One Step Ahead 2014 Social Business
 
Samspillet mellem mennesker, processer og teknologi
Samspillet mellem mennesker, processer og teknologiSamspillet mellem mennesker, processer og teknologi
Samspillet mellem mennesker, processer og teknologi
 

Similar to Cyber Security Conference - A deeper look at Microsoft Security Strategy, Technology Trends and the Economy of Cybercrime, By Chief Security Advisor Reto Haeni, Microsoft Western Europe

2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityMatthew Rosenquist
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data securityKeith Braswell
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONChristopherTHyatt
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew RosenquistMatthew Rosenquist
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutionsharman041
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...Thierry Labro
 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15James Fisher
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber securityWGroup
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptxDolchandra
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience InsuranceAccenture Insurance
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistMatthew Rosenquist
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 

Similar to Cyber Security Conference - A deeper look at Microsoft Security Strategy, Technology Trends and the Economy of Cybercrime, By Chief Security Advisor Reto Haeni, Microsoft Western Europe (20)

2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptx
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Cyber Security Conference - A deeper look at Microsoft Security Strategy, Technology Trends and the Economy of Cybercrime, By Chief Security Advisor Reto Haeni, Microsoft Western Europe

  • 1.
  • 2. Year 2025 world Internet users of consumer electronics sold in emerging economies mobile Internet subscriptions globally data will move through or be stored in the cloud
  • 3. Security and privacy are a top leadership concern 3 Managing risk in an increasingly connected world “This Nexus of Forces is impacting security in terms of new vulnerabilities. –Ruggero Contu, Christian Canales and Lawrence Pingree. Forecast Overview: Information Security, Worldwide, 2014 Update. Gartner, Inc. June 25, 2014. Impact of cyber attacks could be as much as $3 trillion in lost productivity and growth Implications Job security Customer loyalty Intellectual property Legal liabilityBrand reputation $ 3.5M Average cost of a data breach to a company 15 % increase YoY median # of days attackers are present on a victim network before detection243 level issue is a CxO Security
  • 4. Verizon, “2014 Data Breach Investigations Report” 74.8% Percentage of total security incidents in 2013 directed toward public sector Make no mistake…we are Under Attack Public Sector, Retail, Financial Services & SOE’s are the primary targets
  • 5. Some More Details - Evolution to Targeted Threats Indiscriminate Targeted Consumer Enterprise Target Single Vector Multi-vector Manual Automated Desktop Device and Cloud Visible Concealed Lone Agent Organised Ecosystem Spam Information Theft Information Theft Information Destruction “The world is changing very fast. Big will not beat small anymore. It will be the fast beating the slow.” Rupert Murdoch
  • 6. Origin of Data Breaches Who is behind data breaches? How do breaches occur? 98% stemmed from external agents (+6%) 4% implicated internal employees (-13%) <1% committed by business partners (<>) 58% of all data theft tied to activist groups 81% utilized some form of hacking (+31%) 69% incorporated malware (+20%) 10% involved physical attacks (-19%) 7% employed social tactics (-4%) 5% resulted from privilege misuse (-12%) Source: Verizon 2012 Data Breach investigations Report
  • 7. We are not combating hackers We are combating an ecosystem Simplified diagram of the abuse supply chain
  • 9. set policies and principles identify, block, sinkhole Seize, prosecute, takedown security by design identify, block, partner starve Anti-malware and security ecosystem Large-scale Public Services Cloud Providers, Telco’s Government Ad Networks Banks, Finance, Commerce OEMs Vendors CERTs, ISPs & Law Enforcement How do we win? It will take a partnership
  • 11. Dependable, available Predictable, consistent, responsive service Maintainable Resilient, easily restored Proven, ready Trustworthy Computing Working Toward a Safer, More Trusted Internet Security Privacy Business PracticesReliability Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects from unwanted communication User choice and control Products, online services adhere to fair information principles Commitment to customer-centric interoperability Recognized industry leader, world-class partner Open, transparent
  • 12.
  • 13. Elements to a Resilient Infrastructure Protect Detect Threat Information Management Response
  • 14. 14 Resilience against modern Cyberthreats - The Hockey Analogy Placeholder for hockey player picture 😏
  • 15. 15 Coaching Management Build the Foundation for Success and Adapt to Changes
  • 16. 16 Goalie Protect Patch, Deploy Newer Products, Apply the SDL
  • 20. 20 Protect Patch, Deploy Newer Products, Apply the SDL Detect Active Attacks Response Customer, CSS and Cybersecurity Incident Response Threat Information Management
  • 22.
  • 23. We aggressively fight cybercrime and advocate extensively for enhancing cybersecurity We invest deeply in building a trustworthy computing platform and security expertise Microsoft is committed to protecting our customers and being a global cybersecurity advocate We have strong principles and policies that empower you to be in control of your information Security Privacy Compliance Transparency Advocacy Risk management Governance
  • 24.
  • 25. • Deeper source inspection
  • 26. Achieving Overall Resilience Cloud Security and Compliance Trustworthy Cloud
  • 27. Public Data Internal Data Confidential Data
  • 28.
  • 29.
  • 30.
  • 31. Commitment to industry standards and organizational compliance
  • 32.
  • 33. On personal devices 24 x 7 collaborationOn the road In the officeAt home Through social media
  • 34. OverallResilienceofanOrganizationsIT Infrastructure Wrapping Up: Overall Resilience Use trustworthy cloud services to take advantage of the industry leading security processes, technology and skills deployed in Microsoft’s Cloud Services Cloud Resilience Stay Current (Upgrade) + Patch Management Align Active Directory to Threat Environment Assess Threats and Countermeasures Implement Secure Development Practices Use secured devices and enterprise mobility management to gain more control over information and apps in a BYOD as well as enterprise steered device strategy Work with Microsoft’s Consulting Services to implement the security pillars Protect, Detect and Respond to achieve resilience in your on- premises infrastructure. On-PremisesSystems Resilience
  • 35. 36 © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. Reto Haeni Chief Security Officer & Advisor Microsoft Western Europe HQ reto.haeni@microsoft.com blog: www.retohaeni.net