SlideShare a Scribd company logo
Information Protection
and Governance
Jim Bryson + Tom Moen
Technology Solutions Professionals – Microsoft
State and Local Government Secure Enterprise
Evolving Cyber Security Strategies
“THE STATE OF THE STATE” IN CYBERSECURITY
Asymetrical threat
creates resource
drain
You are fighting a
profit-motivated, well
resourced HUMAN
adversary
Public sector orgs are
being explicitly
targeted
Result ? Half of
reported security
incidents are in the
public sector
The cost can be
enormous – $4M per
breach on average
(can be a lot more –
see OPM)
And even if you had
the money, there
aren’t enough trained
cyber techs to tackle
the problem
CONCLUSION: Trying to solve the security problem at an individual org level with current approaches is not
working and may bankrupt your organization. So what can we do differently ?
Two arguments/ideas for your consideration.
BEGIN MOVING TO BEST OF BREED SECURITY PLATFORM
Pubsec organizations
typically have upwards of
30-40 “best of breed”
security vendors to manage
If they choose to integrate
these, significant cost and
complexity
If they choose not to
integrate, humans become the
integration and limit response
time and decision quality –
i.e. attacks at Internet speed,
response at human speed
Need to begin moving to a
security platform that is pre-
integrated, identity-driven
(90+% of attacks), policy-
based to respond on Internet
time
COST/APPROACH CONTINUUM
Solution2
Solution1
Solution3
Solution4
Solution5
TIME
COST
Solution2
Solution1
Solution3
Solution4
Solution5
TIME
COST
“BEST OF BREED” PRODUCTS “BEST OF BREED” PLATFORM
IMPLEMENTING POINT SOLUTIONS IS EXPENSIVE
Integration cost
Software cost
Integration becomes
more complex, expensive
with each solution…
Increased leverage and
optimization of existing tools,
built in integration, consistent
policy, infra (AD), IT skills,
user training
…and eventually, I become
afraid of breaking my
custom integration if I
upgrade this
MOVE MORE
WORKLOADS TO
HYPERSCALE
CLOUD
1B annual spend on cyber security – economics of running your
workloads in our cloud are TRANSFORMATIONAL – pay for a “slice”
rather than owning the whole thing
Reduced window of attack due to rolling updates
Platform approach – “built in, not bolt on”, integrated, automated,
policy-based
Designed for mobile first, cloud first
Intelligent security graph - our most unique global asset in the fight,
informed by trillions of feeds. Machine learning helps sort the signal
from the noise. This signal is leveraged across all our security services
Certs AND a track record - we defend 200+ of the largest cloud
services in the world, some since 1998 (Windows Update). Oh yeah
and Microsoft itself.
Our most unique global asset in the
fight, informed by trillions of feeds.
Machine learning helps sort the
signal from the noise. This signal is
leveraged across all of Microsoft’s
security services
450B
monthly
authentications
18+B
Bing web pages
scanned750M+
Azure user
accounts
Enterprise
security for
90%
of Fortune 500
Malware data
from Windows
Defender
Shared threat
data from partners,
researchers and law
Enforcement
worldwide
Botnet data from
Microsoft Digital
Crimes Unit
1.2B
devices scanned
each month
400B
emails analyzed
200+
global cloud
consumer and
Commercial services
INTELLIGENT SECURITY GRAPH
Conditions
Allow access
Or
Block access
Actions
Enforce MFA
per user/per
app
Location
Device state
User/Application
MFA
Risk
User
CLOUD POWERED PROTECTION
CLOUD POWERED PROTECTION
Azure Information Protection
Classify & Label
Protect
How do I control data
on-premises and in
the cloud
Monitor and Respond
Microsoft Intune
How do I prevent data
leakage from my
mobile apps?
LOB app protection
DLP for Office 365 mobile apps
Optional device management
Cloud App Security
Risk scoring
Shadow IT Discovery
Policies for data control
How do I gain visibility
and control of my
cloud apps?
Click to edit Master title
style
CLOUD POWERED PROTECTION
Managed
apps
Personal
apps
Personal apps
Managed apps
Corporate
data
Personal
data
Multi-identity policy
Personal apps
Managed
apps
Copy Paste Save
Save to
personal storage
Paste to
personal
app
Email
attachment
Empower
users to
make right
decisions
Enable safe
sharing
internally and
externally
Maintain
visibility and
control
CLOUD POWERED PROTECTION
Protection that
lives and
moves with the
data
DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
respond
LABELINGCLASSIFICATION
Classification
& labeling
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
CLOUD POWERED PROTECTION
Azure Information
Protection DOCUMENT
TRACKING
DOCUMENT
REVOCATION
Monitor &
respond
LABELINGCLASSIFICATION
Classification
& labeling
ENCRYPTION
Protect
ACCESS
CONTROL
POLICY
ENFORCEMENT
Full Data
Lifecycle
CLOUD POWERED PROTECTION
Cloud App Security Intune
PROTECT
TRACK
****
App configuration
Encrypt data at the file
level and establish
access controls
Configure server names,
user names, and data
protection policies
Monitor and protect company
data in SaaS apps
Discover what SaaS apps your
users are using
OS-enabled
data protection
(Requires device enrollment)
Device security
Encryption
Device integrity
Password or
PIN policy
Enable users to track
their shared files
Manually or automatically
classify and label files
according to policies
Azure Information Protection
CLASSIFY + LABEL
Data separation
iOS Open-in controls
Windows Information
Protection
Android Enterprise
EMS-enabled
data protection
(Does not require device enrollment)
Personal
Identity
Corporate
Identity
Require PIN or biometrics
to access apps
Separate company and
personal data within apps
Enforce save as and
copy/paste controls
Wipe company data
Conditional Access
Intelligently manage access
to company data based on
device compliance, location,
app sensitivity, and risk
Company data can end up virtually anywhere.
Protect it on devices and in the cloud.
Stay in control of your data
Microsoft IntuneMicrosoft Enterprise Mobility + Security Learn more at microsoft.com/emsMicrosoft Intune Learn more at microsoft.com/intuneMicrosoft Enterprise Mobility + Security
Identity & Access
Data
Protection
Mobile Device &
Mobile
Application
Management
Threat
Protection
Filtering &
Hygiene
Compliance and
Risk Management
Compliance and
Risk Management
Compliance
and Risk
Microsoft Confidential - Internal Only
New permissions model
Compliance boundaries
Data completeness
RMS decryption, optical character recognition, improved indexing limits
Defensibility
Error reporting, Search & Export analytics,
auditing log enhancements
Unified case management
Consistency across eDiscovery & Advanced
eDiscovery with one consistent UX
Expansion of markets
GCC, ITAR
Advanced eDiscovery & Data Governance
Office 365 Compliance Data Lifecycle
Ingestion of Data Outside Office 365 In-Place Data Creation, Retention and Archiving In-Place eDiscovery
Auditing
Export
We Are Here
Custodian
Management
Search O365
to collect data
Hold
Management
Collect data from
non O365 data
sources
Review Production
Hold
Notifications
Enhanced
processing (OCR,
PST, AV, …)
Early Case
Assessment
Ad-hoc search
& tagging
Error reporting
& handling
Case
Management
Auditing Reporting
Analytics
Security &
PermissionsAdministration
Hold / Custodian
Management
Collection, Content
Processing
Search & Analytics
Review
O365
Partner
Partial Office 365
Where We Will Be Q1 2018
Custodian
Management
Search O365
to collect data
Hold
Management
Collect data from
non O365 data
sources
Review Production
Hold
Notifications
Enhanced
processing (OCR,
PST, AV, …)
Early Case
Assessment
Ad-hoc search
& tagging
Error reporting
& handling
Case
Management
Auditing Reporting
Analytics
Security &
PermissionsAdministration
Hold / Custodian
Management
Collection, Content
Processing
Search & Analytics
Review
O365
Partner
Partial Office 365
• Redaction – Adobe and Teradact http://teradact.com/index.html
• Review - Zylabs, Clearwell, Guidance (run in Azure)
• Existing Archives – Archive360 http://www.archive360.com/
• DOD5015 – Gimmal https://www.gimmal.com/governance-records-
management/
• Physical Records – Knowledge Lake
https://www.knowledgelake.com/records-management-sharepoint
• Matter Center Partners- Planet, Slalom, etc https://www.microsoft.com/en-
us/legal/productivity/partner.aspx
• Broad Deployment - ShareSquared, StoneShare, Knowledge Lake, etc.,
• Advanced eDiscovery - Lighthouse, DIT, BlueSource and many others
The Value Proposition of
Advanced eDiscovery (AeD)
Tenant = 100,000,000 items
Microsoft Confidential - Internal Only
Search Results =
1,000,000 items
$2,000,000 review cost
Microsoft Confidential - Internal Only
Relevance
Predictive Coding
Microsoft Confidential - Internal Only
600,000 items
$1,200,000 review cost
40% savings
Microsoft Confidential - Internal Only
Email Documents
Email Threading
Near Duplication
Microsoft Confidential - Internal Only
Email Documents
Email Threading
Near Duplication
Microsoft Confidential - Internal Only
Email Documents
240,000 items
$480,000 review cost
76% savings
Microsoft Confidential - Internal Only
Advanced eDiscovery
Intelligently explore and analyze unstructured data to quickly identify what’s relevant
Use predictive coding to train the system to find likely
relevant documents and reduce what’s sent to review
Minimize
Use near duplicate detection to organize the data
and email threading to reconstruct email
conversations from unstructured data
Organize
Use Themes to understand the topics represented in
the data set
Recognize
Advanced eDiscovery (AeD)
Intelligently explore and analyze unstructured data to quickly identify what’s relevant
Use predictive coding to train the system to find
likely relevant documents and reduce what’s
sent to review
Minimize
Use near duplicate detection to organize the
data and email threading to reconstruct email
conversations from unstructured data
Organize
Use Themes to understand the topics
represented in the data set
Recognize
Compliance Solutions deck
High-level Compliance Vision video
Best Practices in eDiscovery Solutions Case Creations, Holds and Searches
Advanced eDiscovery Relevance Solution: Predictive Coding Analytics
Advanced eDiscovery Analytics Solutions: How to Efficiently Organize and Reduce Data for Review
How Microsoft leverages Office 365 eDiscovery
eDiscovery detailed whitepaper
On-Ramp

More Related Content

What's hot

An Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityAn Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to Security
Gerard McNamee
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
IBM Security
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based securityArun Gopinath
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEM
Thomas Springer
 
18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You
Secure Islands - Data Security Policy
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
Thierry Matusiak
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
Chirag Joshi, CISA, CISM, CRISC
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
IBM Thailand Co Ltd
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
IBM Security
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
IBM Security
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
- Mark - Fullbright
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajan
Shwetank Jayaswal
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
DMI
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
Francisco González Jiménez
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
Andris Soroka
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
PECB
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 

What's hot (19)

An Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityAn Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to Security
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based security
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEM
 
18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajan
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 

Similar to Information protection and compliance

"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
Dean Iacovelli
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
Plain Concepts
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
David J Rosenthal
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
Richard Harbridge
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
David J Rosenthal
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Robert Crane
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
PowerSaturdayParis
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
Siddick Elaheebocus
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
Plain Concepts
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
SPS Paris
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
BizTalk360
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
Vincent Kwon
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
GWAVA
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
George Grammatikos
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
Ravikumar Sathyamurthy
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
Create IT
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
David J Rosenthal
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Kjetil Lund-Paulsen
 

Similar to Information protection and compliance (20)

"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Information protection and compliance

  • 1. Information Protection and Governance Jim Bryson + Tom Moen Technology Solutions Professionals – Microsoft State and Local Government Secure Enterprise Evolving Cyber Security Strategies
  • 2. “THE STATE OF THE STATE” IN CYBERSECURITY Asymetrical threat creates resource drain You are fighting a profit-motivated, well resourced HUMAN adversary Public sector orgs are being explicitly targeted Result ? Half of reported security incidents are in the public sector The cost can be enormous – $4M per breach on average (can be a lot more – see OPM) And even if you had the money, there aren’t enough trained cyber techs to tackle the problem CONCLUSION: Trying to solve the security problem at an individual org level with current approaches is not working and may bankrupt your organization. So what can we do differently ? Two arguments/ideas for your consideration.
  • 3. BEGIN MOVING TO BEST OF BREED SECURITY PLATFORM Pubsec organizations typically have upwards of 30-40 “best of breed” security vendors to manage If they choose to integrate these, significant cost and complexity If they choose not to integrate, humans become the integration and limit response time and decision quality – i.e. attacks at Internet speed, response at human speed Need to begin moving to a security platform that is pre- integrated, identity-driven (90+% of attacks), policy- based to respond on Internet time
  • 4. COST/APPROACH CONTINUUM Solution2 Solution1 Solution3 Solution4 Solution5 TIME COST Solution2 Solution1 Solution3 Solution4 Solution5 TIME COST “BEST OF BREED” PRODUCTS “BEST OF BREED” PLATFORM IMPLEMENTING POINT SOLUTIONS IS EXPENSIVE Integration cost Software cost Integration becomes more complex, expensive with each solution… Increased leverage and optimization of existing tools, built in integration, consistent policy, infra (AD), IT skills, user training …and eventually, I become afraid of breaking my custom integration if I upgrade this
  • 5. MOVE MORE WORKLOADS TO HYPERSCALE CLOUD 1B annual spend on cyber security – economics of running your workloads in our cloud are TRANSFORMATIONAL – pay for a “slice” rather than owning the whole thing Reduced window of attack due to rolling updates Platform approach – “built in, not bolt on”, integrated, automated, policy-based Designed for mobile first, cloud first Intelligent security graph - our most unique global asset in the fight, informed by trillions of feeds. Machine learning helps sort the signal from the noise. This signal is leveraged across all our security services Certs AND a track record - we defend 200+ of the largest cloud services in the world, some since 1998 (Windows Update). Oh yeah and Microsoft itself.
  • 6. Our most unique global asset in the fight, informed by trillions of feeds. Machine learning helps sort the signal from the noise. This signal is leveraged across all of Microsoft’s security services 450B monthly authentications 18+B Bing web pages scanned750M+ Azure user accounts Enterprise security for 90% of Fortune 500 Malware data from Windows Defender Shared threat data from partners, researchers and law Enforcement worldwide Botnet data from Microsoft Digital Crimes Unit 1.2B devices scanned each month 400B emails analyzed 200+ global cloud consumer and Commercial services INTELLIGENT SECURITY GRAPH
  • 7. Conditions Allow access Or Block access Actions Enforce MFA per user/per app Location Device state User/Application MFA Risk User CLOUD POWERED PROTECTION
  • 8. CLOUD POWERED PROTECTION Azure Information Protection Classify & Label Protect How do I control data on-premises and in the cloud Monitor and Respond Microsoft Intune How do I prevent data leakage from my mobile apps? LOB app protection DLP for Office 365 mobile apps Optional device management Cloud App Security Risk scoring Shadow IT Discovery Policies for data control How do I gain visibility and control of my cloud apps?
  • 9. Click to edit Master title style
  • 10. CLOUD POWERED PROTECTION Managed apps Personal apps Personal apps Managed apps Corporate data Personal data Multi-identity policy Personal apps Managed apps Copy Paste Save Save to personal storage Paste to personal app Email attachment
  • 11. Empower users to make right decisions Enable safe sharing internally and externally Maintain visibility and control CLOUD POWERED PROTECTION Protection that lives and moves with the data
  • 13. Azure Information Protection DOCUMENT TRACKING DOCUMENT REVOCATION Monitor & respond LABELINGCLASSIFICATION Classification & labeling ENCRYPTION Protect ACCESS CONTROL POLICY ENFORCEMENT Full Data Lifecycle CLOUD POWERED PROTECTION
  • 14. Cloud App Security Intune PROTECT TRACK **** App configuration Encrypt data at the file level and establish access controls Configure server names, user names, and data protection policies Monitor and protect company data in SaaS apps Discover what SaaS apps your users are using OS-enabled data protection (Requires device enrollment) Device security Encryption Device integrity Password or PIN policy Enable users to track their shared files Manually or automatically classify and label files according to policies Azure Information Protection CLASSIFY + LABEL Data separation iOS Open-in controls Windows Information Protection Android Enterprise EMS-enabled data protection (Does not require device enrollment) Personal Identity Corporate Identity Require PIN or biometrics to access apps Separate company and personal data within apps Enforce save as and copy/paste controls Wipe company data Conditional Access Intelligently manage access to company data based on device compliance, location, app sensitivity, and risk Company data can end up virtually anywhere. Protect it on devices and in the cloud. Stay in control of your data Microsoft IntuneMicrosoft Enterprise Mobility + Security Learn more at microsoft.com/emsMicrosoft Intune Learn more at microsoft.com/intuneMicrosoft Enterprise Mobility + Security
  • 15. Identity & Access Data Protection Mobile Device & Mobile Application Management Threat Protection Filtering & Hygiene Compliance and Risk Management Compliance and Risk Management
  • 17. New permissions model Compliance boundaries Data completeness RMS decryption, optical character recognition, improved indexing limits Defensibility Error reporting, Search & Export analytics, auditing log enhancements Unified case management Consistency across eDiscovery & Advanced eDiscovery with one consistent UX Expansion of markets GCC, ITAR Advanced eDiscovery & Data Governance
  • 18. Office 365 Compliance Data Lifecycle Ingestion of Data Outside Office 365 In-Place Data Creation, Retention and Archiving In-Place eDiscovery Auditing Export
  • 19. We Are Here Custodian Management Search O365 to collect data Hold Management Collect data from non O365 data sources Review Production Hold Notifications Enhanced processing (OCR, PST, AV, …) Early Case Assessment Ad-hoc search & tagging Error reporting & handling Case Management Auditing Reporting Analytics Security & PermissionsAdministration Hold / Custodian Management Collection, Content Processing Search & Analytics Review O365 Partner Partial Office 365
  • 20. Where We Will Be Q1 2018 Custodian Management Search O365 to collect data Hold Management Collect data from non O365 data sources Review Production Hold Notifications Enhanced processing (OCR, PST, AV, …) Early Case Assessment Ad-hoc search & tagging Error reporting & handling Case Management Auditing Reporting Analytics Security & PermissionsAdministration Hold / Custodian Management Collection, Content Processing Search & Analytics Review O365 Partner Partial Office 365
  • 21.
  • 22. • Redaction – Adobe and Teradact http://teradact.com/index.html • Review - Zylabs, Clearwell, Guidance (run in Azure) • Existing Archives – Archive360 http://www.archive360.com/ • DOD5015 – Gimmal https://www.gimmal.com/governance-records- management/ • Physical Records – Knowledge Lake https://www.knowledgelake.com/records-management-sharepoint • Matter Center Partners- Planet, Slalom, etc https://www.microsoft.com/en- us/legal/productivity/partner.aspx • Broad Deployment - ShareSquared, StoneShare, Knowledge Lake, etc., • Advanced eDiscovery - Lighthouse, DIT, BlueSource and many others
  • 23.
  • 24.
  • 25.
  • 26. The Value Proposition of Advanced eDiscovery (AeD)
  • 27.
  • 28. Tenant = 100,000,000 items Microsoft Confidential - Internal Only
  • 29. Search Results = 1,000,000 items $2,000,000 review cost Microsoft Confidential - Internal Only
  • 31. 600,000 items $1,200,000 review cost 40% savings Microsoft Confidential - Internal Only
  • 32. Email Documents Email Threading Near Duplication Microsoft Confidential - Internal Only
  • 33. Email Documents Email Threading Near Duplication Microsoft Confidential - Internal Only
  • 34. Email Documents 240,000 items $480,000 review cost 76% savings Microsoft Confidential - Internal Only
  • 35. Advanced eDiscovery Intelligently explore and analyze unstructured data to quickly identify what’s relevant Use predictive coding to train the system to find likely relevant documents and reduce what’s sent to review Minimize Use near duplicate detection to organize the data and email threading to reconstruct email conversations from unstructured data Organize Use Themes to understand the topics represented in the data set Recognize
  • 36. Advanced eDiscovery (AeD) Intelligently explore and analyze unstructured data to quickly identify what’s relevant Use predictive coding to train the system to find likely relevant documents and reduce what’s sent to review Minimize Use near duplicate detection to organize the data and email threading to reconstruct email conversations from unstructured data Organize Use Themes to understand the topics represented in the data set Recognize
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49. Compliance Solutions deck High-level Compliance Vision video Best Practices in eDiscovery Solutions Case Creations, Holds and Searches Advanced eDiscovery Relevance Solution: Predictive Coding Analytics Advanced eDiscovery Analytics Solutions: How to Efficiently Organize and Reduce Data for Review How Microsoft leverages Office 365 eDiscovery eDiscovery detailed whitepaper On-Ramp