SlideShare a Scribd company logo
UNLEASH YOUR DIGITAL ENTERPRISE
Keeping pace and staying safe in the digital
world
How can we
keep pace with
multitudes of new
platforms and cloud
services?
keep pace with
the
expectations of
our own staff?
keep pace with
customer demands
and market
expectations?
keep our data and IP
safe whilst keeping
pace?
keep pace with new
entrants to market?
Today’s challenges
• Customer is first
• Customers expect more
• Customers want it now
• If you don’t disrupt someone else will
Disruption is coming
If it hasn’t already occurred, someone is going to disrupt
your industry.
… and it’s not just high tech things or new services
• Mundane products in saturated markets are prime
targets
What is being disrupted?
Sometimes it’s not even about the product
Disruption can focus upon the
• Customer experience and the benefits
• How the brand engages with the customer
• How the product is purchased
Regardless of how, the customer is at the front of the conversation
Let’s talk mattresses
Blocks of foam and springs
$45,000,000,000 industry
Disrupter profile: Casper
• 3 years old
• $750 million valuation
• $200 million in 2016 sales
• Disrupting the purchasing process
Mattresses of disruption
So what are Casper doing?
• Focussing on the customer experience, not the product
• Selling the experience, creating a set of values and brand alliance
‘Great sleep is the key to living a great life’
• Focussing on the benefit not the feature.
• Building empathy.
• Providing a better shopping experience. No wandering through retailers.
• Targeting consumers wanting an online experience
Technology enables pace
• Frequently technology is the
tool that enables you to
keep pace, or maybe even
get ahead.
• Regardless of where & how
it’s hosted, an IT system has
three components.
People
Process
Technology
Your next employees
Mobility is expected
Internet and cloud native
Data anywhere is the norm
Personal IT just works
KEEPING PACE IS TOUGH
Visualisation of data breaches
You’re probably further into the cloud than you realise
No more boundaries. Many things in many places
With so many services in
so many locations, can
you ‘draw a line’ around
your network?
If you can’t draw a line
around it, how do you
protect it?
Approved
on-premises
app services
Approved
cloud services
Cloud services
you don’t know
about
Corporate data
stored on
unsecured devices
Who you are, rather than where you are has become more important
Identity is the new control plane
Your data is stored:
• On-premises
• In permitted cloud services
• In unknown cloud services
• On corporate devices
• On un-managed devices
Your data has moved beyond the network.
We need a new security perimeter
So, how do we stay safe?
01
Cyber program
Understand the enemy
Identify risks & exposure
Build a defensive
strategy
Execute it
02
Perimeter
Review and refresh the
capabilities of your
network perimeter
03
Identity
Your firewall is no longer
the boundary
Identity is the new
control plane
DEVELOP A
CYBER
PROGRAM
01
Cyber program
Understand the enemy
Identify risks & exposure
Build a defensive
strategy
Execute it
The hacker may be more dedicated
Time is a key construct of vulnerability to malicious activity.
• The demands of business compete for our time.
• The IT teams’ available time is split between new initiatives, business demands, legacy
infrastructure challenges and ongoing support
For the hacker time is their most valuable asset.
• A persistent threat hacker is spending more time trying to break in than you are trying
to prevent it.
What should business do?
Understand the enemy
• Persistent, advanced and human-based. Actively probing for weakness.
Identify your risks and exposure
• Where are your information assets and how protected are they?
• Where are your weaknesses?
Build a defensive strategy and execute upon it
• Plan to protect what matters the most.
Continuously validate its effectiveness
• Optimise your defences by probing for weakness.
Cyber program
Components of the program
• Identify your business objectives and organisational priorities
• Determine the scope of systems that support these objectives and priorities
• Identify related systems and assets, regulatory requirements and overall risk approach
• Identify the Threat Groups most likely to target the organisation and understand why.
Prioritise, Scope
& Orient
• Identify a framework of reference for cyber control definitions (NIST, ISO 27001, CIS-CSC)
• Develop a current profile by indicating what cyber controls currently exist in the business
• Determine the maturity of controls in place
Create Current
State Profile
Guided by your overall risk management process or previous risk assessment activities.
• Analyse the operational environment to understand the likelihood of a cybersecurity event
and the impact it could have.
• Identify the most likely and most dangerous threat scenarios which could occur.
Conduct Risk
Assessment
• Create a target profile that focuses on the assessment of the identified Controls describing
the organisation’s desired cybersecurity outcomes
• Consider influences and requirements of external stakeholders such as regulatory bodies,
customers and business partners when creating a target profile
Create Target
State Profile
• Compare the Current Profile and the Target Profile to determine the gaps
• Create a prioritised action plan to address those gaps that draws upon organisational
priorities, a cost/benefit analysis, and understanding of risk to achieve the outcomes in the
Target Profile
• Determine the resources, technology or roles necessary to address the gaps
Determine &
Prioritise Gaps
• Determine the order and priority of activities to achieve the target state
• Monitor the cybersecurity practices against the Target Profile
Implement
Action Plan
Cyber program
Components of the program
REVIEW YOUR
PERIMETER
02
Perimeter
Review and refresh the
capabilities of your
network perimeter
big wall
outside
Cyber program
Is it possible to stay safe?
Employees
Business
partners
Customers
Apps
Devices
Data
Users
Data leaks
Lost device
Compromised identity
Stolen
credentials
YOUR
IT ENVIRONMENT
YOUR
IT ENVIRONMENT
Your security posture
!
DETECT
using targeted signals,
behavioral monitoring,
and machine learning
RESPOND
closing the gap between discovery
and action
PROTECT
across all endpoints,
from sensors to the
datacenter
The perimeter has changed
IDENTITY
AS THE
CONTROL
PLANE
ONE COMMON
IDENTITY
IMPROVED
SECURITY
SIMPLIFIED
MANAGEMENT
SSO
On-premises: Existing
applications, Windows
Server Active Directory,
and other directories
Cloud: Azure, PaaS,
SaaS and Office 365
Closing the gap between
discovery and action
Review your perimeter
Whilst the corporate firewall is no longer the sole boundary, it still has its place
• The traditional firewall, web and email protection are no longer a complete solution.
• Protection is needed for your users in cloud applications (PaaS or SaaS)
• The only thing you can control is you users’ identity, it’s the new control plane
• Know your exposure to SaaS and PaaS
• Know your new perimeter and how you want to deal with it
DEVELOP
YOUR
IDENTITY
03
Identity
Your firewall is no longer
the boundary
Identity is the new
control plane
Identity-driven security
The security landscape has changed
Shadow
IT
Data breach
Employees
Partners
Customers
Cloud apps
Identity Devices Apps & Data
Transition to
cloud & mobility
New attack
landscape
Current defenses
not sufficient
Identity breach On-premises apps
SaaS
Azure
Identity-driven security
Three steps to identity-driven security
1. Protect the front door
Safeguard your resources at the front door with innovative
and advanced risk-based conditional accesses
2. Provide layered protection. User, app, device and
data
Gain deep visibility into user, device, and data activity on-
premises and in the cloud.
3. Detect attacks before they cause damage
Uncover suspicious activity and pinpoint threats with deep
visibility and ongoing behavioral analytics
Identity-driven security
Protect the front door
Conditions
Allow access
Or
Block access
Actions
Enforce MFA
per user/per
app
Location
Device state
User/Application
MFA
Risk
User
Azure AD Privileged
Identity Management
Azure AD Identity
Protection
Identity-driven security
Provide layered protection. User, app, device and data
How do I control data
on-premises and in the
cloud?
Azure Information Protection
Classify & Label
Protect
Monitor and Respond
How do I prevent data
leakage from my mobile
apps?
Microsoft Intune
LOB app protection
DLP for Office 365 mobile apps
Optional device management
How do I gain visibility
and control of my cloud
apps?
Cloud App Security
Risk scoring
Shadow IT Discovery
Policies for data control
Identity-driven security
Detect attacks before they cause damage
Microsoft Advanced Threat Analytics (ATA)
Behavioral Analytics
Detection of known malicious attacks
Detection of known security issues
On-premises detection Detection in the cloud
Cloud App Security + Azure Active Directory Premium
Behavioral analytics
Anomaly detection
Security reporting and monitoring
Cloud-powered protection
Azure Active Directory Identity Protection
SIEM
Power
BI
Monitoring
tools
Security, monitoring and reporting
Solutions
Notifications
Data Extracts/Downloads
Reporting APIs
Apply Microsoft learnings to
your existing security tools
Machine-learning engine
Leaked
credentialsInfected
devices
Configuration
vulnerabilities
Brute force attacks
Suspicious sign-in
activities
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World

More Related Content

What's hot

Digital Transformation - How to Deliver Meaningful Results
Digital Transformation - How to Deliver Meaningful ResultsDigital Transformation - How to Deliver Meaningful Results
Digital Transformation - How to Deliver Meaningful Results
Bizagi
 
Digital Transformation: How to Model Human Behavior in Digitization
Digital Transformation: How to Model Human Behavior in DigitizationDigital Transformation: How to Model Human Behavior in Digitization
Digital Transformation: How to Model Human Behavior in Digitization
Bizagi
 
Dynamics Day 2016 keynote: Microsoft product strategy
Dynamics Day 2016 keynote: Microsoft product strategyDynamics Day 2016 keynote: Microsoft product strategy
Dynamics Day 2016 keynote: Microsoft product strategy
Intergen
 
Digital Transformation: How to Model Human Behavior in Digitization
Digital Transformation: How to Model Human Behavior in DigitizationDigital Transformation: How to Model Human Behavior in Digitization
Digital Transformation: How to Model Human Behavior in Digitization
Bizagi
 
Agile Practices for Transitioning to SAP S/4HANA®
Agile Practices for Transitioning to SAP S/4HANA® Agile Practices for Transitioning to SAP S/4HANA®
Agile Practices for Transitioning to SAP S/4HANA®
panayaofficial
 
Fostering a Culture of Innovation with Cloud
Fostering a Culture of Innovation with CloudFostering a Culture of Innovation with Cloud
Fostering a Culture of Innovation with Cloud
Amazon Web Services
 
Helping business with Digital Transformation
Helping business with Digital TransformationHelping business with Digital Transformation
Helping business with Digital Transformation
Digital Works Consulting
 
Using the Right Content Strategy to Create a Personalized Digital Experience
Using the Right Content Strategy to Create a Personalized Digital ExperienceUsing the Right Content Strategy to Create a Personalized Digital Experience
Using the Right Content Strategy to Create a Personalized Digital Experience
Perficient, Inc.
 
Datastax - The Architect's guide to customer experience (CX)
Datastax - The Architect's guide to customer experience (CX)Datastax - The Architect's guide to customer experience (CX)
Datastax - The Architect's guide to customer experience (CX)
DataStax
 
Building a change approach to live beyond one project
Building a change approach to live beyond one projectBuilding a change approach to live beyond one project
Building a change approach to live beyond one project
Rebecca Jackson
 
Oracle Cloud Transformation_ABE Slides_FINAL
Oracle Cloud Transformation_ABE Slides_FINALOracle Cloud Transformation_ABE Slides_FINAL
Oracle Cloud Transformation_ABE Slides_FINALAhmed Sayed
 
6 Steps to Become a Data-Driven Company
6 Steps to Become a Data-Driven Company6 Steps to Become a Data-Driven Company
6 Steps to Become a Data-Driven Company
BrainSell Technologies
 
Measuring User Adoption
Measuring User AdoptionMeasuring User Adoption
Measuring User Adoption
Michael Sampson
 
Talentry Combined Overview
Talentry Combined OverviewTalentry Combined Overview
Talentry Combined OverviewEvan Donaldson
 
LIVE DEMO: Fraud Analytics
LIVE DEMO: Fraud AnalyticsLIVE DEMO: Fraud Analytics
LIVE DEMO: Fraud Analytics
VMware Tanzu
 
Scalar corporate overview nov 2012
Scalar corporate overview nov 2012Scalar corporate overview nov 2012
Scalar corporate overview nov 2012
patmisasi
 
SLA to XLA Workshop, Edinburgh 2019
SLA to XLA Workshop, Edinburgh 2019SLA to XLA Workshop, Edinburgh 2019
SLA to XLA Workshop, Edinburgh 2019
nexthink
 
Intuit Transforms HR - HR Technology Conference 2011
Intuit Transforms HR - HR Technology Conference 2011Intuit Transforms HR - HR Technology Conference 2011
Intuit Transforms HR - HR Technology Conference 2011
Workday
 
Yammer External Networks: Engaging Customers and Partners
Yammer External Networks: Engaging Customers and Partners Yammer External Networks: Engaging Customers and Partners
Yammer External Networks: Engaging Customers and Partners
Perficient, Inc.
 

What's hot (20)

Digital Transformation - How to Deliver Meaningful Results
Digital Transformation - How to Deliver Meaningful ResultsDigital Transformation - How to Deliver Meaningful Results
Digital Transformation - How to Deliver Meaningful Results
 
Digital Transformation: How to Model Human Behavior in Digitization
Digital Transformation: How to Model Human Behavior in DigitizationDigital Transformation: How to Model Human Behavior in Digitization
Digital Transformation: How to Model Human Behavior in Digitization
 
Dynamics Day 2016 keynote: Microsoft product strategy
Dynamics Day 2016 keynote: Microsoft product strategyDynamics Day 2016 keynote: Microsoft product strategy
Dynamics Day 2016 keynote: Microsoft product strategy
 
Digital Transformation: How to Model Human Behavior in Digitization
Digital Transformation: How to Model Human Behavior in DigitizationDigital Transformation: How to Model Human Behavior in Digitization
Digital Transformation: How to Model Human Behavior in Digitization
 
Agile Practices for Transitioning to SAP S/4HANA®
Agile Practices for Transitioning to SAP S/4HANA® Agile Practices for Transitioning to SAP S/4HANA®
Agile Practices for Transitioning to SAP S/4HANA®
 
Fostering a Culture of Innovation with Cloud
Fostering a Culture of Innovation with CloudFostering a Culture of Innovation with Cloud
Fostering a Culture of Innovation with Cloud
 
Helping business with Digital Transformation
Helping business with Digital TransformationHelping business with Digital Transformation
Helping business with Digital Transformation
 
Using the Right Content Strategy to Create a Personalized Digital Experience
Using the Right Content Strategy to Create a Personalized Digital ExperienceUsing the Right Content Strategy to Create a Personalized Digital Experience
Using the Right Content Strategy to Create a Personalized Digital Experience
 
Datastax - The Architect's guide to customer experience (CX)
Datastax - The Architect's guide to customer experience (CX)Datastax - The Architect's guide to customer experience (CX)
Datastax - The Architect's guide to customer experience (CX)
 
Building a change approach to live beyond one project
Building a change approach to live beyond one projectBuilding a change approach to live beyond one project
Building a change approach to live beyond one project
 
Oracle Cloud Transformation_ABE Slides_FINAL
Oracle Cloud Transformation_ABE Slides_FINALOracle Cloud Transformation_ABE Slides_FINAL
Oracle Cloud Transformation_ABE Slides_FINAL
 
6 Steps to Become a Data-Driven Company
6 Steps to Become a Data-Driven Company6 Steps to Become a Data-Driven Company
6 Steps to Become a Data-Driven Company
 
Measuring User Adoption
Measuring User AdoptionMeasuring User Adoption
Measuring User Adoption
 
Talentry Combined Overview
Talentry Combined OverviewTalentry Combined Overview
Talentry Combined Overview
 
LIVE DEMO: Fraud Analytics
LIVE DEMO: Fraud AnalyticsLIVE DEMO: Fraud Analytics
LIVE DEMO: Fraud Analytics
 
CapellaServices
CapellaServicesCapellaServices
CapellaServices
 
Scalar corporate overview nov 2012
Scalar corporate overview nov 2012Scalar corporate overview nov 2012
Scalar corporate overview nov 2012
 
SLA to XLA Workshop, Edinburgh 2019
SLA to XLA Workshop, Edinburgh 2019SLA to XLA Workshop, Edinburgh 2019
SLA to XLA Workshop, Edinburgh 2019
 
Intuit Transforms HR - HR Technology Conference 2011
Intuit Transforms HR - HR Technology Conference 2011Intuit Transforms HR - HR Technology Conference 2011
Intuit Transforms HR - HR Technology Conference 2011
 
Yammer External Networks: Engaging Customers and Partners
Yammer External Networks: Engaging Customers and Partners Yammer External Networks: Engaging Customers and Partners
Yammer External Networks: Engaging Customers and Partners
 

Similar to Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World

BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Tudor Damian
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Kurt Hagerman
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Kjetil Lund-Paulsen
 
Securing the Remote Working Environment
Securing the Remote Working EnvironmentSecuring the Remote Working Environment
Securing the Remote Working Environment
Dizzion, Inc.
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
mishogelashvili28
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
LokNathRegmi1
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
PowerSaturdayParis
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern Workplace
Joanne Klein
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdf
ErikHof4
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
jaredcarst
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
David J Rosenthal
 

Similar to Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World (20)

BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
CCSK.pptx
CCSK.pptxCCSK.pptx
CCSK.pptx
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
 
Securing the Remote Working Environment
Securing the Remote Working EnvironmentSecuring the Remote Working Environment
Securing the Remote Working Environment
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern Workplace
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdf
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 

More from Empired

Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...
Empired
 
Taming the feral Teams
Taming the feral TeamsTaming the feral Teams
Taming the feral Teams
Empired
 
Customer Insights: It's time to get personal
Customer Insights: It's time to get personalCustomer Insights: It's time to get personal
Customer Insights: It's time to get personal
Empired
 
Working Remotely with Microsoft Technologies
Working Remotely with Microsoft TechnologiesWorking Remotely with Microsoft Technologies
Working Remotely with Microsoft Technologies
Empired
 
Empired Convergence 2017 - Business Transformation Across the Enterprise
Empired Convergence 2017 - Business Transformation Across the EnterpriseEmpired Convergence 2017 - Business Transformation Across the Enterprise
Empired Convergence 2017 - Business Transformation Across the Enterprise
Empired
 
Empired Convergence 2017 - Why Convergence
Empired Convergence 2017 - Why ConvergenceEmpired Convergence 2017 - Why Convergence
Empired Convergence 2017 - Why Convergence
Empired
 
Empired Convergence 2017 - The Modern Digital Workplace
Empired Convergence 2017 - The Modern Digital WorkplaceEmpired Convergence 2017 - The Modern Digital Workplace
Empired Convergence 2017 - The Modern Digital Workplace
Empired
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
Empired
 
Dynamics Day 2017 Adelaide - Customer Experience Design
Dynamics Day 2017 Adelaide - Customer Experience Design Dynamics Day 2017 Adelaide - Customer Experience Design
Dynamics Day 2017 Adelaide - Customer Experience Design
Empired
 
Dynamics Day 2017 Adelaide - Dynamics 365 making it real
Dynamics Day 2017 Adelaide  - Dynamics 365 making it realDynamics Day 2017 Adelaide  - Dynamics 365 making it real
Dynamics Day 2017 Adelaide - Dynamics 365 making it real
Empired
 
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise OperationsDynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
Empired
 
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
Empired
 
Disaster Recovery: the Main Roads story
Disaster Recovery: the Main Roads storyDisaster Recovery: the Main Roads story
Disaster Recovery: the Main Roads story
Empired
 
Dynamics Day 2017 Melbourne - transform you decision making
Dynamics Day 2017 Melbourne - transform you decision makingDynamics Day 2017 Melbourne - transform you decision making
Dynamics Day 2017 Melbourne - transform you decision making
Empired
 
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital TransformationDynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
Empired
 
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operationsDynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
Empired
 
Dynamics Day 2017 Melbourne: Becoming customer centric
Dynamics Day 2017 Melbourne: Becoming customer centricDynamics Day 2017 Melbourne: Becoming customer centric
Dynamics Day 2017 Melbourne: Becoming customer centric
Empired
 
Dynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynote
Dynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynoteDynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynote
Dynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynote
Empired
 
Dynamics Day 2017 Brisbane: Data Insights
Dynamics Day 2017 Brisbane: Data InsightsDynamics Day 2017 Brisbane: Data Insights
Dynamics Day 2017 Brisbane: Data Insights
Empired
 
Dynamics Day 2017 Brisbane: Dynamics 365 Field and Project Services
Dynamics Day 2017 Brisbane: Dynamics 365 Field and Project ServicesDynamics Day 2017 Brisbane: Dynamics 365 Field and Project Services
Dynamics Day 2017 Brisbane: Dynamics 365 Field and Project Services
Empired
 

More from Empired (20)

Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...
 
Taming the feral Teams
Taming the feral TeamsTaming the feral Teams
Taming the feral Teams
 
Customer Insights: It's time to get personal
Customer Insights: It's time to get personalCustomer Insights: It's time to get personal
Customer Insights: It's time to get personal
 
Working Remotely with Microsoft Technologies
Working Remotely with Microsoft TechnologiesWorking Remotely with Microsoft Technologies
Working Remotely with Microsoft Technologies
 
Empired Convergence 2017 - Business Transformation Across the Enterprise
Empired Convergence 2017 - Business Transformation Across the EnterpriseEmpired Convergence 2017 - Business Transformation Across the Enterprise
Empired Convergence 2017 - Business Transformation Across the Enterprise
 
Empired Convergence 2017 - Why Convergence
Empired Convergence 2017 - Why ConvergenceEmpired Convergence 2017 - Why Convergence
Empired Convergence 2017 - Why Convergence
 
Empired Convergence 2017 - The Modern Digital Workplace
Empired Convergence 2017 - The Modern Digital WorkplaceEmpired Convergence 2017 - The Modern Digital Workplace
Empired Convergence 2017 - The Modern Digital Workplace
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Dynamics Day 2017 Adelaide - Customer Experience Design
Dynamics Day 2017 Adelaide - Customer Experience Design Dynamics Day 2017 Adelaide - Customer Experience Design
Dynamics Day 2017 Adelaide - Customer Experience Design
 
Dynamics Day 2017 Adelaide - Dynamics 365 making it real
Dynamics Day 2017 Adelaide  - Dynamics 365 making it realDynamics Day 2017 Adelaide  - Dynamics 365 making it real
Dynamics Day 2017 Adelaide - Dynamics 365 making it real
 
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise OperationsDynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
 
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
 
Disaster Recovery: the Main Roads story
Disaster Recovery: the Main Roads storyDisaster Recovery: the Main Roads story
Disaster Recovery: the Main Roads story
 
Dynamics Day 2017 Melbourne - transform you decision making
Dynamics Day 2017 Melbourne - transform you decision makingDynamics Day 2017 Melbourne - transform you decision making
Dynamics Day 2017 Melbourne - transform you decision making
 
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital TransformationDynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
 
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operationsDynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
 
Dynamics Day 2017 Melbourne: Becoming customer centric
Dynamics Day 2017 Melbourne: Becoming customer centricDynamics Day 2017 Melbourne: Becoming customer centric
Dynamics Day 2017 Melbourne: Becoming customer centric
 
Dynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynote
Dynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynoteDynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynote
Dynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynote
 
Dynamics Day 2017 Brisbane: Data Insights
Dynamics Day 2017 Brisbane: Data InsightsDynamics Day 2017 Brisbane: Data Insights
Dynamics Day 2017 Brisbane: Data Insights
 
Dynamics Day 2017 Brisbane: Dynamics 365 Field and Project Services
Dynamics Day 2017 Brisbane: Dynamics 365 Field and Project ServicesDynamics Day 2017 Brisbane: Dynamics 365 Field and Project Services
Dynamics Day 2017 Brisbane: Dynamics 365 Field and Project Services
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World

  • 1. UNLEASH YOUR DIGITAL ENTERPRISE Keeping pace and staying safe in the digital world
  • 2. How can we keep pace with multitudes of new platforms and cloud services? keep pace with the expectations of our own staff? keep pace with customer demands and market expectations? keep our data and IP safe whilst keeping pace? keep pace with new entrants to market?
  • 3. Today’s challenges • Customer is first • Customers expect more • Customers want it now • If you don’t disrupt someone else will
  • 4. Disruption is coming If it hasn’t already occurred, someone is going to disrupt your industry. … and it’s not just high tech things or new services • Mundane products in saturated markets are prime targets
  • 5. What is being disrupted? Sometimes it’s not even about the product Disruption can focus upon the • Customer experience and the benefits • How the brand engages with the customer • How the product is purchased Regardless of how, the customer is at the front of the conversation
  • 6.
  • 7. Let’s talk mattresses Blocks of foam and springs $45,000,000,000 industry Disrupter profile: Casper • 3 years old • $750 million valuation • $200 million in 2016 sales • Disrupting the purchasing process
  • 8. Mattresses of disruption So what are Casper doing? • Focussing on the customer experience, not the product • Selling the experience, creating a set of values and brand alliance ‘Great sleep is the key to living a great life’ • Focussing on the benefit not the feature. • Building empathy. • Providing a better shopping experience. No wandering through retailers. • Targeting consumers wanting an online experience
  • 9. Technology enables pace • Frequently technology is the tool that enables you to keep pace, or maybe even get ahead. • Regardless of where & how it’s hosted, an IT system has three components. People Process Technology
  • 10.
  • 11. Your next employees Mobility is expected Internet and cloud native Data anywhere is the norm Personal IT just works
  • 14. You’re probably further into the cloud than you realise No more boundaries. Many things in many places With so many services in so many locations, can you ‘draw a line’ around your network? If you can’t draw a line around it, how do you protect it? Approved on-premises app services Approved cloud services Cloud services you don’t know about Corporate data stored on unsecured devices
  • 15. Who you are, rather than where you are has become more important Identity is the new control plane Your data is stored: • On-premises • In permitted cloud services • In unknown cloud services • On corporate devices • On un-managed devices Your data has moved beyond the network. We need a new security perimeter
  • 16. So, how do we stay safe? 01 Cyber program Understand the enemy Identify risks & exposure Build a defensive strategy Execute it 02 Perimeter Review and refresh the capabilities of your network perimeter 03 Identity Your firewall is no longer the boundary Identity is the new control plane
  • 17. DEVELOP A CYBER PROGRAM 01 Cyber program Understand the enemy Identify risks & exposure Build a defensive strategy Execute it
  • 18. The hacker may be more dedicated Time is a key construct of vulnerability to malicious activity. • The demands of business compete for our time. • The IT teams’ available time is split between new initiatives, business demands, legacy infrastructure challenges and ongoing support For the hacker time is their most valuable asset. • A persistent threat hacker is spending more time trying to break in than you are trying to prevent it.
  • 19. What should business do? Understand the enemy • Persistent, advanced and human-based. Actively probing for weakness. Identify your risks and exposure • Where are your information assets and how protected are they? • Where are your weaknesses? Build a defensive strategy and execute upon it • Plan to protect what matters the most. Continuously validate its effectiveness • Optimise your defences by probing for weakness.
  • 20. Cyber program Components of the program • Identify your business objectives and organisational priorities • Determine the scope of systems that support these objectives and priorities • Identify related systems and assets, regulatory requirements and overall risk approach • Identify the Threat Groups most likely to target the organisation and understand why. Prioritise, Scope & Orient • Identify a framework of reference for cyber control definitions (NIST, ISO 27001, CIS-CSC) • Develop a current profile by indicating what cyber controls currently exist in the business • Determine the maturity of controls in place Create Current State Profile Guided by your overall risk management process or previous risk assessment activities. • Analyse the operational environment to understand the likelihood of a cybersecurity event and the impact it could have. • Identify the most likely and most dangerous threat scenarios which could occur. Conduct Risk Assessment
  • 21. • Create a target profile that focuses on the assessment of the identified Controls describing the organisation’s desired cybersecurity outcomes • Consider influences and requirements of external stakeholders such as regulatory bodies, customers and business partners when creating a target profile Create Target State Profile • Compare the Current Profile and the Target Profile to determine the gaps • Create a prioritised action plan to address those gaps that draws upon organisational priorities, a cost/benefit analysis, and understanding of risk to achieve the outcomes in the Target Profile • Determine the resources, technology or roles necessary to address the gaps Determine & Prioritise Gaps • Determine the order and priority of activities to achieve the target state • Monitor the cybersecurity practices against the Target Profile Implement Action Plan Cyber program Components of the program
  • 22. REVIEW YOUR PERIMETER 02 Perimeter Review and refresh the capabilities of your network perimeter
  • 25. Cyber program Is it possible to stay safe? Employees Business partners Customers Apps Devices Data Users Data leaks Lost device Compromised identity Stolen credentials
  • 28. Your security posture ! DETECT using targeted signals, behavioral monitoring, and machine learning RESPOND closing the gap between discovery and action PROTECT across all endpoints, from sensors to the datacenter
  • 29. The perimeter has changed IDENTITY AS THE CONTROL PLANE ONE COMMON IDENTITY IMPROVED SECURITY SIMPLIFIED MANAGEMENT SSO On-premises: Existing applications, Windows Server Active Directory, and other directories Cloud: Azure, PaaS, SaaS and Office 365 Closing the gap between discovery and action
  • 30. Review your perimeter Whilst the corporate firewall is no longer the sole boundary, it still has its place • The traditional firewall, web and email protection are no longer a complete solution. • Protection is needed for your users in cloud applications (PaaS or SaaS) • The only thing you can control is you users’ identity, it’s the new control plane • Know your exposure to SaaS and PaaS • Know your new perimeter and how you want to deal with it
  • 31. DEVELOP YOUR IDENTITY 03 Identity Your firewall is no longer the boundary Identity is the new control plane
  • 32.
  • 33. Identity-driven security The security landscape has changed Shadow IT Data breach Employees Partners Customers Cloud apps Identity Devices Apps & Data Transition to cloud & mobility New attack landscape Current defenses not sufficient Identity breach On-premises apps SaaS Azure
  • 34. Identity-driven security Three steps to identity-driven security 1. Protect the front door Safeguard your resources at the front door with innovative and advanced risk-based conditional accesses 2. Provide layered protection. User, app, device and data Gain deep visibility into user, device, and data activity on- premises and in the cloud. 3. Detect attacks before they cause damage Uncover suspicious activity and pinpoint threats with deep visibility and ongoing behavioral analytics
  • 35. Identity-driven security Protect the front door Conditions Allow access Or Block access Actions Enforce MFA per user/per app Location Device state User/Application MFA Risk User Azure AD Privileged Identity Management Azure AD Identity Protection
  • 36. Identity-driven security Provide layered protection. User, app, device and data How do I control data on-premises and in the cloud? Azure Information Protection Classify & Label Protect Monitor and Respond How do I prevent data leakage from my mobile apps? Microsoft Intune LOB app protection DLP for Office 365 mobile apps Optional device management How do I gain visibility and control of my cloud apps? Cloud App Security Risk scoring Shadow IT Discovery Policies for data control
  • 37. Identity-driven security Detect attacks before they cause damage Microsoft Advanced Threat Analytics (ATA) Behavioral Analytics Detection of known malicious attacks Detection of known security issues On-premises detection Detection in the cloud Cloud App Security + Azure Active Directory Premium Behavioral analytics Anomaly detection Security reporting and monitoring
  • 38. Cloud-powered protection Azure Active Directory Identity Protection SIEM Power BI Monitoring tools Security, monitoring and reporting Solutions Notifications Data Extracts/Downloads Reporting APIs Apply Microsoft learnings to your existing security tools Machine-learning engine Leaked credentialsInfected devices Configuration vulnerabilities Brute force attacks Suspicious sign-in activities