SlideShare a Scribd company logo
1 of 7
CYBER SECURITY
DEMYSTIFIED
Speaker Name
Jobrole
Date
ASSUME BREACH:
ATTACKS ON YOUR BUSINESS ARE INEVITABLE
34
21
Attack detected!
Most breaches aren’t
detected by the organisation
itself, but by third parties such
as banks, regulators and law
enforcement agencies.
Execution of objectives
Having achieved broader
network access, attackers
can now steal information
at will, or compromise
key systems.
Attack begins
Most attackers establish
a ‘beachhead’ on the
organisation’s network
by stealing domain
administrator credentials.
Planning the attack
Cyber attackers research
the target organisation’s
technology, processes
and people to identify
vulnerabilities.
-200 DAYS
75% of large organisations suffered
a staff-related breach in 2015 243 days on average from breach to detection
In 60% of cases, attackers were able to
compromise an organisation in minutes
90% of large organisations suffered
a security breach in 2015
0 DAYS
Fact
We champion customer data
privacy more so than any other
company
Fact
We provide the utmost legal
certainty available for EU-US
data transfers
Fact
Up to 87% of public sector data
can now be stored safely in the
Microsoft cloud
Fact
The Microsoft cloud is still safer
and more reliable than most
on-premises environments
CYBER SECURITY
IS EVERYONE’S BUSINESS
EVOLVING LEADERSHIP RESPONSIBILITIES:
Chief Marketing Officer
Must manage post-breach
messages to customers,
shareholders and the media, plus
preparing board members for
press interviews
Chief Sales Officer
Sales staff must know how to protect
against threats from working in public
places. The CSO must pre-plan a clear
response strategy and ensure staff
members are familiar with it.
Chief Financial Officer
Must support a strict approach
to information classification and
handling across the organisation
and ensure that clear mitigation
and repair plans are in place.
INDUSTRY FEARS:
Public sector
Policy myths and data
classification confusion slow
cloud adoption
Retail
Customers worry if their data
is safe from hackers, Nation
States and government agencies
Financial services
Clarity around compliance,
Safe Harbour and data
ownership is needed
Manufacturing
Reports of outages and
breaches sap the confidence
of key stakeholders
A CLOUD
YOU CAN TRUST
These principles play a key role in the protection
and control of your data and make up the four pillars
of a truly comprehensive cloud solution:
SECURITY
We will
implement strong
security measures
to safeguard your
data.
PRIVACY
We will provide
you with control
over your data
to help keep
it private.
COMPLIANCE
We will help
you meet
your specific
compliance
needs.
TRANSPARENCY
We will explain
what we do
with your data
in clear, plain
language.
Satya Nadella, Microsoft CEO
Businesses and users are
going to embrace technology
only if they can trust it.
“
”
INTRODUCING THE
MICROSOFT SECURITY PROGRAM
Windows Hello
Microsoft Passport
Customer LockBox
Microsoft Exchange
Online Protection
Microsoft Azure Active
Directory
Credential Guard
Device Guard
Windows Defender
Windows Update for Business
Advanced Threat Protection Microsoft Intune
Enterprise Data Protection Data Loss Prevention
Azure Rights Management
Advanced Threat Analytics
DEVICES
& APPS
DATA
USERS
Satya Nadella, Microsoft CEO
As one of the largest
cloud operators in the
world, Microsoft has
invested more than
$15 billion in building
a resilient cloud
infrastructure and
cloud services that
deliver high availability
and security while
lowering overall costs.
“
”
OUR SECURITY POSTURE
PROTECT - DETECT - RESPOND
OUR
SECURITY POSTURE
RESPOND
Establish a holistic, multidimensional approach to response
PROTECT
Today’s cloud-first, mobile-first
world demands the highest level of
identity and data security in order
to keep your business protected
DETECT
Don’t wait 200 days to discover
you’ve been breached. Invest in
the tools and services that enable
you to detect attacks faster
CYBER SECURITY
DEMYSTIFIED
Download your free
digital copy of the Cyber
Security Demystified
eBook and share it
with your business
stakeholders today:
http://aka.ms/csdebook
AND IN THE MEANTIME…
simple but important actions
to improve your security today:6
Educate yourself
and your staff on
the latest risks,
common cyber
crime methods
and best practice
Don’t run
software as an
Administrator
to mitigate risks
Use firewall
and antivirus
software to
spot threats
Develop your
software securely.
Visit:
microsoft.com/sdl
to find out more
Make sure to
regularly check
and install the latest
security updates
Use the most
up to date
versions of all
software and
use automatic
updates where
possible

More Related Content

What's hot

Cybersecurity technology adoption survey
Cybersecurity technology adoption surveyCybersecurity technology adoption survey
Cybersecurity technology adoption surveyPaperjam_redaction
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber securityTevfik Üret
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and HackingParth Makadiya
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Introduction to Cyber Security | Malware | Phishing attacks
Introduction to Cyber Security | Malware | Phishing attacksIntroduction to Cyber Security | Malware | Phishing attacks
Introduction to Cyber Security | Malware | Phishing attacksKumayl Rajani
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsJohn Gilligan
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)AashishTanania
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 

What's hot (20)

Cybersecurity technology adoption survey
Cybersecurity technology adoption surveyCybersecurity technology adoption survey
Cybersecurity technology adoption survey
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Introduction to Cyber Security | Malware | Phishing attacks
Introduction to Cyber Security | Malware | Phishing attacksIntroduction to Cyber Security | Malware | Phishing attacks
Introduction to Cyber Security | Malware | Phishing attacks
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (15)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Botnet
Botnet Botnet
Botnet
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Botnets
BotnetsBotnets
Botnets
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Cyber Security Demistyified

Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Ioannis Aligizakis, M.Sc.
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloudFREVVO
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...Cloudflare
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Marco Casassa Mont
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeSysfore Technologies
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfYounesChafi1
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskCloudMask inc.
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfForgeahead Solutions
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for GovernmentsCloudMask inc.
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your CloudthinkASG
 
Three Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdfThree Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdfEnterprise Insider
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldCiente
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - IdealwareIdealware
 

Similar to Cyber Security Demistyified (20)

Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloud
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | Sysfore
 
Cloud & Sécurité
Cloud & SécuritéCloud & Sécurité
Cloud & Sécurité
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 
Three Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdfThree Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdf
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 

More from Microsoft UK

Digital transformation in Manufacturing
Digital transformation in ManufacturingDigital transformation in Manufacturing
Digital transformation in ManufacturingMicrosoft UK
 
Driving Workforce Enablement Through IT Innovation - Windows & Devices
Driving Workforce Enablement Through IT Innovation - Windows & DevicesDriving Workforce Enablement Through IT Innovation - Windows & Devices
Driving Workforce Enablement Through IT Innovation - Windows & DevicesMicrosoft UK
 
Driving Workforce Enablement Through IT Innovation - Digital at Rolls-Royce
Driving Workforce Enablement Through IT Innovation - Digital at Rolls-RoyceDriving Workforce Enablement Through IT Innovation - Digital at Rolls-Royce
Driving Workforce Enablement Through IT Innovation - Digital at Rolls-RoyceMicrosoft UK
 
Driving Workforce Enablement Through IT Innovation - A Panel Discussion
Driving Workforce Enablement Through IT Innovation - A Panel DiscussionDriving Workforce Enablement Through IT Innovation - A Panel Discussion
Driving Workforce Enablement Through IT Innovation - A Panel DiscussionMicrosoft UK
 
Driving Workforce Enablement Through IT Innovation - Microsoft HoloLens
Driving Workforce Enablement Through IT Innovation - Microsoft HoloLensDriving Workforce Enablement Through IT Innovation - Microsoft HoloLens
Driving Workforce Enablement Through IT Innovation - Microsoft HoloLensMicrosoft UK
 
Driving Workforce Enablement Through IT Innovation - Driving Collaboration Wi...
Driving Workforce Enablement Through IT Innovation - Driving Collaboration Wi...Driving Workforce Enablement Through IT Innovation - Driving Collaboration Wi...
Driving Workforce Enablement Through IT Innovation - Driving Collaboration Wi...Microsoft UK
 
Driving Workforce Enablement Through IT Innovation - Digital Transformation i...
Driving Workforce Enablement Through IT Innovation - Digital Transformation i...Driving Workforce Enablement Through IT Innovation - Digital Transformation i...
Driving Workforce Enablement Through IT Innovation - Digital Transformation i...Microsoft UK
 
Driving workforce enablement through it innovation - Windows & Devices
Driving workforce enablement through it innovation - Windows & DevicesDriving workforce enablement through it innovation - Windows & Devices
Driving workforce enablement through it innovation - Windows & DevicesMicrosoft UK
 
Driving workforce enablement through it innovation - RAC Utilising Data Insig...
Driving workforce enablement through it innovation - RAC Utilising Data Insig...Driving workforce enablement through it innovation - RAC Utilising Data Insig...
Driving workforce enablement through it innovation - RAC Utilising Data Insig...Microsoft UK
 
Driving workforce enablement through it innovation - Microsoft Leading Digita...
Driving workforce enablement through it innovation - Microsoft Leading Digita...Driving workforce enablement through it innovation - Microsoft Leading Digita...
Driving workforce enablement through it innovation - Microsoft Leading Digita...Microsoft UK
 
Driving workforce enablement through it innovation - Microsoft HoloLens
Driving workforce enablement through it innovation - Microsoft HoloLensDriving workforce enablement through it innovation - Microsoft HoloLens
Driving workforce enablement through it innovation - Microsoft HoloLensMicrosoft UK
 
Driving workforce enablement through it innovation - Digital at Rolls-Royce
Driving workforce enablement through it innovation - Digital at Rolls-RoyceDriving workforce enablement through it innovation - Digital at Rolls-Royce
Driving workforce enablement through it innovation - Digital at Rolls-RoyceMicrosoft UK
 
Digital transformation in Manufacturing
Digital transformation in ManufacturingDigital transformation in Manufacturing
Digital transformation in ManufacturingMicrosoft UK
 
Driving workforce enablement through it innovation - Driving Collaboration wi...
Driving workforce enablement through it innovation - Driving Collaboration wi...Driving workforce enablement through it innovation - Driving Collaboration wi...
Driving workforce enablement through it innovation - Driving Collaboration wi...Microsoft UK
 

More from Microsoft UK (15)

Black Friday 2016
Black Friday 2016Black Friday 2016
Black Friday 2016
 
Digital transformation in Manufacturing
Digital transformation in ManufacturingDigital transformation in Manufacturing
Digital transformation in Manufacturing
 
Driving Workforce Enablement Through IT Innovation - Windows & Devices
Driving Workforce Enablement Through IT Innovation - Windows & DevicesDriving Workforce Enablement Through IT Innovation - Windows & Devices
Driving Workforce Enablement Through IT Innovation - Windows & Devices
 
Driving Workforce Enablement Through IT Innovation - Digital at Rolls-Royce
Driving Workforce Enablement Through IT Innovation - Digital at Rolls-RoyceDriving Workforce Enablement Through IT Innovation - Digital at Rolls-Royce
Driving Workforce Enablement Through IT Innovation - Digital at Rolls-Royce
 
Driving Workforce Enablement Through IT Innovation - A Panel Discussion
Driving Workforce Enablement Through IT Innovation - A Panel DiscussionDriving Workforce Enablement Through IT Innovation - A Panel Discussion
Driving Workforce Enablement Through IT Innovation - A Panel Discussion
 
Driving Workforce Enablement Through IT Innovation - Microsoft HoloLens
Driving Workforce Enablement Through IT Innovation - Microsoft HoloLensDriving Workforce Enablement Through IT Innovation - Microsoft HoloLens
Driving Workforce Enablement Through IT Innovation - Microsoft HoloLens
 
Driving Workforce Enablement Through IT Innovation - Driving Collaboration Wi...
Driving Workforce Enablement Through IT Innovation - Driving Collaboration Wi...Driving Workforce Enablement Through IT Innovation - Driving Collaboration Wi...
Driving Workforce Enablement Through IT Innovation - Driving Collaboration Wi...
 
Driving Workforce Enablement Through IT Innovation - Digital Transformation i...
Driving Workforce Enablement Through IT Innovation - Digital Transformation i...Driving Workforce Enablement Through IT Innovation - Digital Transformation i...
Driving Workforce Enablement Through IT Innovation - Digital Transformation i...
 
Driving workforce enablement through it innovation - Windows & Devices
Driving workforce enablement through it innovation - Windows & DevicesDriving workforce enablement through it innovation - Windows & Devices
Driving workforce enablement through it innovation - Windows & Devices
 
Driving workforce enablement through it innovation - RAC Utilising Data Insig...
Driving workforce enablement through it innovation - RAC Utilising Data Insig...Driving workforce enablement through it innovation - RAC Utilising Data Insig...
Driving workforce enablement through it innovation - RAC Utilising Data Insig...
 
Driving workforce enablement through it innovation - Microsoft Leading Digita...
Driving workforce enablement through it innovation - Microsoft Leading Digita...Driving workforce enablement through it innovation - Microsoft Leading Digita...
Driving workforce enablement through it innovation - Microsoft Leading Digita...
 
Driving workforce enablement through it innovation - Microsoft HoloLens
Driving workforce enablement through it innovation - Microsoft HoloLensDriving workforce enablement through it innovation - Microsoft HoloLens
Driving workforce enablement through it innovation - Microsoft HoloLens
 
Driving workforce enablement through it innovation - Digital at Rolls-Royce
Driving workforce enablement through it innovation - Digital at Rolls-RoyceDriving workforce enablement through it innovation - Digital at Rolls-Royce
Driving workforce enablement through it innovation - Digital at Rolls-Royce
 
Digital transformation in Manufacturing
Digital transformation in ManufacturingDigital transformation in Manufacturing
Digital transformation in Manufacturing
 
Driving workforce enablement through it innovation - Driving Collaboration wi...
Driving workforce enablement through it innovation - Driving Collaboration wi...Driving workforce enablement through it innovation - Driving Collaboration wi...
Driving workforce enablement through it innovation - Driving Collaboration wi...
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Cyber Security Demistyified

  • 2. ASSUME BREACH: ATTACKS ON YOUR BUSINESS ARE INEVITABLE 34 21 Attack detected! Most breaches aren’t detected by the organisation itself, but by third parties such as banks, regulators and law enforcement agencies. Execution of objectives Having achieved broader network access, attackers can now steal information at will, or compromise key systems. Attack begins Most attackers establish a ‘beachhead’ on the organisation’s network by stealing domain administrator credentials. Planning the attack Cyber attackers research the target organisation’s technology, processes and people to identify vulnerabilities. -200 DAYS 75% of large organisations suffered a staff-related breach in 2015 243 days on average from breach to detection In 60% of cases, attackers were able to compromise an organisation in minutes 90% of large organisations suffered a security breach in 2015 0 DAYS
  • 3. Fact We champion customer data privacy more so than any other company Fact We provide the utmost legal certainty available for EU-US data transfers Fact Up to 87% of public sector data can now be stored safely in the Microsoft cloud Fact The Microsoft cloud is still safer and more reliable than most on-premises environments CYBER SECURITY IS EVERYONE’S BUSINESS EVOLVING LEADERSHIP RESPONSIBILITIES: Chief Marketing Officer Must manage post-breach messages to customers, shareholders and the media, plus preparing board members for press interviews Chief Sales Officer Sales staff must know how to protect against threats from working in public places. The CSO must pre-plan a clear response strategy and ensure staff members are familiar with it. Chief Financial Officer Must support a strict approach to information classification and handling across the organisation and ensure that clear mitigation and repair plans are in place. INDUSTRY FEARS: Public sector Policy myths and data classification confusion slow cloud adoption Retail Customers worry if their data is safe from hackers, Nation States and government agencies Financial services Clarity around compliance, Safe Harbour and data ownership is needed Manufacturing Reports of outages and breaches sap the confidence of key stakeholders
  • 4. A CLOUD YOU CAN TRUST These principles play a key role in the protection and control of your data and make up the four pillars of a truly comprehensive cloud solution: SECURITY We will implement strong security measures to safeguard your data. PRIVACY We will provide you with control over your data to help keep it private. COMPLIANCE We will help you meet your specific compliance needs. TRANSPARENCY We will explain what we do with your data in clear, plain language. Satya Nadella, Microsoft CEO Businesses and users are going to embrace technology only if they can trust it. “ ”
  • 5. INTRODUCING THE MICROSOFT SECURITY PROGRAM Windows Hello Microsoft Passport Customer LockBox Microsoft Exchange Online Protection Microsoft Azure Active Directory Credential Guard Device Guard Windows Defender Windows Update for Business Advanced Threat Protection Microsoft Intune Enterprise Data Protection Data Loss Prevention Azure Rights Management Advanced Threat Analytics DEVICES & APPS DATA USERS Satya Nadella, Microsoft CEO As one of the largest cloud operators in the world, Microsoft has invested more than $15 billion in building a resilient cloud infrastructure and cloud services that deliver high availability and security while lowering overall costs. “ ”
  • 6. OUR SECURITY POSTURE PROTECT - DETECT - RESPOND OUR SECURITY POSTURE RESPOND Establish a holistic, multidimensional approach to response PROTECT Today’s cloud-first, mobile-first world demands the highest level of identity and data security in order to keep your business protected DETECT Don’t wait 200 days to discover you’ve been breached. Invest in the tools and services that enable you to detect attacks faster
  • 7. CYBER SECURITY DEMYSTIFIED Download your free digital copy of the Cyber Security Demystified eBook and share it with your business stakeholders today: http://aka.ms/csdebook AND IN THE MEANTIME… simple but important actions to improve your security today:6 Educate yourself and your staff on the latest risks, common cyber crime methods and best practice Don’t run software as an Administrator to mitigate risks Use firewall and antivirus software to spot threats Develop your software securely. Visit: microsoft.com/sdl to find out more Make sure to regularly check and install the latest security updates Use the most up to date versions of all software and use automatic updates where possible

Editor's Notes

  1. Cyber Crime: It could happen to you The Threat Security professionals are no longer simply advising about countering cyber threats. New evidence indicates that most organisations will suffer a breach at some point, and damage minimisation depends on fast deployment of a robust strategy. In other words, it’s no longer about whether or not you get breached, but how you respond when it happens. The Damage The average annualised cost of cyber crime for UK organisations is £4.1 million Key points: It takes over 200 days on average to discover a cyber breach. This leaves the organisation vulnerable to repeated theft and damage during this period. The first 48 hours after discovery are critical. They demand a fast analysis of the attack, a clear assessment of the organisation’s exposure and a carefully prepared communications strategy. Not only is timing critical, but also pulling in the right business stakeholders at the right time to form an action plan. Think: How will you communicate with your staff when all your systems are down because of the breach? Additional Quotes “If you don’t get it right, the average annualised cost of cyber crime for UK organisations is £4.1 million” Ponemon Institute 2015 ‘Cost of Cyber Crime Study “Security concerns are a primary reason for not wanting to move specific applications to the Cloud for two thirds of organisations” Cloud Industry Forum - Cloud and the Digital Imperative, 2016
  2. PERCEPTION VERSUS REALITY CEOs recognise the huge transformational potential of the cloud, where enhanced efficiency at reduced costs can greatly increase the value of an organisation in the eyes of shareholders. Any pause for thought is usually around the issue of cyber security, as evidenced in the Cloud Industry Forum “Cloud and the Digital Imperative” 2016 report, which found that 61% of the entire sample stated that security was a significant concern about cloud adoption, with 54% concerned about data privacy. However, the Cloud Industry Forum also exposes a strong disconnect between perception and reality, with 98% of respondents reporting that they have never experienced a security breach when using a cloud service. Prompted by this and other evidence, CEOs are working with board members to rationalise fears about the cloud, not only in the context of business profitability, but also the reality of how internal and external cyber threats contribute to cyber breaches. CFO CFOs must understand the value of their organisation’s information. Simply put, data is an essential company asset; the value of which only continues to increase over time. Similarly, CFOs must understand exactly what would happen if that information was exposed, particularly intellectual property assets. The CFO must support a strict approach to information classification and handling across the organisation, including driving awareness and education that ensures employees are fully aware of their information responsibilities. Working closely with the chief security officer, CFOs must also ensure that clear mitigation and repair plans are in place should the worst occur. Specifically relating to their function, this will include measures such as timely notification of shareholders. CMO As the communications interface of the organisation, CMOs will be responsible for managing the post-breach messages that go out to customers, shareholders and the media, including preparing board members for press interviews. There is often little time for people to get up to speed during a breach, so the marketing function must be ready to react immediately. Deployment of the response strategy must be swift and con dent, which demands advance understanding of the kinds of breaches the organisation may suffer, the security strategies in place to prevent them, and the likely outcomes that need to be addressed. It’s also worth bearing in mind that marketing functions are more likely to be involved in experimental media technologies that enable them to reach early adopters. These systems must be assessed carefully for their reliability and interoperability, with key weaknesses highlighted early on. CSO Sales forces handle a great deal of customer information that must be protected by law. Unfortunately, the mobility of sales professionals means they are often less able to soak up the culture of cyber security that can exist among office-based staff. Awareness training is essential, particularly in key risk areas relating to device and wireless working practices. Sales staff must also know how to protect themselves from threats that working in public places brings, such as people overhearing sales conversations or seeing confidential information on their laptop screen. If this fails, sales leadership must have systems in place to limit the exposure of company information from potentially careless or negligent employees. In collaboration with the marketing function, the chief sales officer must pre-plan a clear response strategy and ensure staff members are familiar with it. Role play can be useful.
  3. Security is what we’re talking about here, however there are related areas that you should be aware of when choosing a cloud provider, namely: Privacy, Compliance and Transparency. These principles play a key role in the protection and control of your data and make up the four pillars of a truly comprehensive cloud solution. Security A cloud services provider should appreciate the wider risks to your data that security alone can’t defend against. On top of the highest level of encryption and security, protecting customer content at rest and in transit, it should take a proactive approach to mitigating all forms of risk across the many different cyber threats, from malware and social engineering to state sponsored attacks and online fraud. Our datacenters are equipped with state-of-the-art physical security measures. We operate a 24x7 incident response team to mitigate threats and attacks. We encrypt data transferred between our data centers. We protect your stored data with built-in tools and provide access to further encryption capabilities. Privacy Your data should only be used to provide the cloud services you have purchased. Your provider should never scan your data for advertising purposes or any other reason and should ensure you control and maintain access to your data. A good provider should allow you flexibility over your operating environment, offering public cloud, hybrid and private hosted cloud options and enable you to take your data with you should you decide to leave. You will have flexibility, choice and transparency on where your data is stored. We will not use your data for advertising or commercial purposes. We will not disclose your information outside of Microsoft except with your consent or when required by law. We provide a variety of tools to extract your data. We delete your data no more than 180 days after your service is terminated or expires. Compliance In order to ensure your business is as compliant as can be, you must ensure your provider not only works with regulators, but proactively engages with the leading authorities and is audited to the highest international standards by trusted third parties. We lead the industry in pursuing compliance with the latest standards for data privacy and security, such as ISO 27018. We regularly undergo independent audits to certify our compliance. We work with customers and regulators to help them meet their compliance requirements. Transparency A good cloud provider should offer you complete transparency as to its actions, its commitment to compliance, work with regulators and stance on legislation. It should also ensure that this information is readily available to you. Protecting your data means challenging the establishment and status quo when it comes to important issues. Your chosen provider should be vocal in the industry and work with regulators and government agencies in order to meet the highest standards of data protection legislation. We provide understandable and strict policy of what we will—and will NOT—use your data for. When responding to law enforcement requests, we strive to defend your rights and privacy, and ensure due process is followed. For each of our services, we provide you with information on where your data may be stored and processed. For more information on Microsoft’s approach to data privacy, visit this link: https://www.microsoft.com/ en-us/trustcenter/default.aspx
  4. You can find security solutions that mitigate threats to your data and devices at the heart of Microsoft’s products, starting with those we all take for granted – the tools we use every day. Windows 10 From removing the risk of hacked passwords to ensuring data stored on devices remains secure and available only to those authorised to see it, Windows 10’s built in security features mitigate a wide range of security threats. Users With biometrics from Windows Hello and multi-factor authentication from Microsoft Passport, Windows 10 can make passwords, traditionally one of the easiest access points for hackers, a thing of the past. Additionally, SmartScreen Filter helps users make informed decisions regarding malicious websites and downloads. Devices and apps A range of tools within Windows 10 help to protect devices and the data stored on them, with Credential Guard keeping devices secure from unauthorised access and Device Guard and Windows Defender detecting malware and protecting devices from it with the world’s largest anti-malware, anti-virus service. Windows Update for Business also ensure that the latest security software is always installed. Data Windows 10 includes Enterprise Data Protection, which enables automatic encryption and persistent protection for sensitive information, preventing it from being shared to and accessed by unauthorised parties. OFFICE 365 Designed to protect organisations from spam, viruses, malware and specific advanced threats as well as data leakage and accidental loss, Office 365 offers a robust set of security features right out of the box. Users Customer LockBox prevents anyone, even Microsoft employees, from accessing your data without explicit permission, while Microsoft Exchange Online Protection restricts spam emails or those carrying malware from making it inside your organisation. Devices and apps As malware and phishing attacks adapt and develop in order to take advantage of security software that doesn’t respond to the real time threat landscape, Advanced Threat Protection (ATP) provides your organisation with unprecedented zero day protection in real time. Data If employees aren’t up to speed with data handling policy, accidental data loss and leakage is likely. While compliance can be hard to implement at speed, Data Loss Prevention in Office 365 can automatically intervene when sensitive data is at risk, helping to keep information safe and educate users on policy. On top of this, Azure Rights Management helps to control and protect important information by enabling you to apply your own policy restrictions. ENTERPRISE MOBILITY SUITE (EMS) Ensuring control and security of sensitive data is essential as more employees use multiple devices and applications. Enterprise mobility tools help to secure access across devices and applications, protect the data within them and quickly identify network threats. Microsoft process 300 billion authentications a month in our networks. Users With Microsoft Azure Active Directory, identities can be managed both on premise and in the cloud, enabling employees to use secure single sign-on and app self service across devices. Devices With so many applications and devices available to employees, the risk of exploitation also increases. Microsoft Intune provides mobile app and device management to protect corporate applications on almost any device. Data If your business is using legacy systems to handle sensitive corporate data, the chances are anyone can access and share it. Microsoft Azure Rights Management provides encryption, identity and authorisation to keep sensitive information safe across all devices, while Advanced Threat Analytics spots suspicious activity on your network using behaviour based analytics .
  5. PROTECT User Secure your identity and access management. Understand which users should be able to access specific data and provide the correct level of access. Device Secure your hardware, operating system and applications. Know how many devices are in use throughout your business, who uses them and for what use in order to determine access levels. Data Secure your data anywhere and at any time. Take control of the data across your network and on remote devices. PROTECTION IN THE MICROSOFT CLOUD Dedicated Security Tools - Azure Rights Management - Windows System Centre - Windows Device Guard in Windows 10 - Windows SmartScreen Security Development Lifecycle Services (SDL) A free assessment of your software assurance program, delivering a roadmap to strengthen and mature your software development practices, helping you to avoid bugs other concerns in future applications. Microsoft Security Risk Assessment (MSRA) Helping organisations understand their risk of exposure in critical applications and measure security controls and processes against industry practices. Enhanced Security Administration Environment (ESAE) Security technologies and recommended practices to provide enhanced security protection. Privileged Administrator Workstation (PAW) Protecting administrator credentials by adding layer of protection to administrative workstations. ——— DETECT User Protect users from cyber threats by providing a safe working environment complete with the latest security tools Device Detect any deviations from baseline, policies, or behaviour Data Detect any attempts for unauthorised data access A modern security solution should be firmly grounded in detection in order to swiftly spot and respond to cyber attacks. When a user is logged in, there should still be methods in place to determine whether their behaviour is appropriate. DETECTION IN THE MICROSOFT CLOUD Windows System Centre Use Event Log to track security-related events across your network. Microsoft Threat Detection Service (MTDS) Detect errors and to check for malicious activity while deriving to regulate and manage errors efficiently. Persistent Adversary Detection Service (PADS) A service that examines high value assets or a sample of systems to proactively determine whether a system is under threat. Microsoft Advanced Threat Analytics (MATA) Behavioural analytics and detection for known attacks and issues to help identify attacks before they cause damage. The Microsoft Digital Crimes Unit (DCU) Every organisation has the right to expect the technology they use to be secure and delivered by a company they can trust. The Microsoft Digital Crimes Unit (DCU) helps meet this promise by fighting global malware, reducing digital risk and protecting vulnerable populations, with an international team of lawyers, investigators, data scientists, engineers, analysts and business professionals across 30 countries. Microsoft works with law enforcement and industry, leveraging novel legal strategies to disrupt cyber criminals and, since 2010, has rescued tens of millions of infected devices connecting to more than 50 million Internet protocol addresses. This intelligence is shared with law enforcement and those responsible for critical infrastructure in a country. — Respond User Respond by elevating access requirements based on risk. All users should start with the minimum requirements that they need to perform their job e ectively. However, if they need special rights in speci c circumstances, these should only be granted for a limited time via Azure Privileged Identity Management. Device Respond dynamically to any suspicious device or application. Data Assess the impact of any illegitimate access to data, then respond to the data leak by either monitoring or removing access. RESPONSE IN THE MICROSOFT CLOUD Incident Response Microsoft offers the Incident Response and Recovery service to determine whether a system is under targeted exploitation via a discreet incident response engagement that examines high value assets or exploited systems for signs of advanced implants not typically found by commodity anti-virus or intrusion detection system technologies.