SlideShare a Scribd company logo
1 of 21
03.04.2020
12.09.2020
#
2020
#
Securing IT Against Modern Threats
with Microsoft 365 Security Tools
Michael Noel, CCO
Join us on September 12
… and let’s celebrate 5th Anniversary!
SPS Warsaw Team
Tomek, Edyta, Marcin
03.04.2020
12.09.2020
#
Sponsors and Partners
03.04.2020
12.09.2020
#
Michael Noel
@MichaelTNoel
• Authored/Co-authored 20 books including the best-selling
SharePoint, Exchange, and Windows Unleashed series
• Presented at over 230 events in over 85 unique countries
around the world
• Partner at Convergent Computing in the San Francisco Bay
Area (cco.com)
03.04.2020
12.09.2020
#
IT Security: A Vastly Changed Landscape
• Targeted Attacks
• Spear Phishing (Exec/Finance targeting)
• State-sponsored Attacks (Sony hack, Sea Turtle, etc.)
• IP Theft/Loss (Mass downloads, disgruntled offboards,
‘oversharing.’)
• Data Integrity Challenges
• Ransomware/Cryptojacking
• “Permanent” deletion of cloud data
• Device Security
• Theft/Compromise
• Malware/Keyboard Loggers/Rootkits
• Information Overload
• Firewall/Syslog log overload
• Audit log overload
• Noise vs signal ratio in IT
• Trying to stay one step ahead of attackers
03.04.2020
12.09.2020
#
Passwords are Not as Secure as You Think
• Key to password security is not
necessarily length, complexity, or
even age; but global uniqueness
• Hackers have access to databases of
‘pwned’ passwords and can run
password hashes against these
databases in a matter of milliseconds
• ‘Passphrases’ that consist of unique
seed words are infinitely more
complex and much harder to crack
(i.e. “Yellow birdseed hat pumpkin”)
• Test your password at
https://haveibeenpwned.com
03.04.2020
12.09.2020
#
Lateral Attacks are Common and Easy to
Exploit
• Exploiting Cached credentials on workstations are a
common attack vector
• Any user with local admin rights to a workstation
(obtained legitimately or via phishing) can access the
cached credentials of any other user who logged in at
some point. If the passwords are not sufficiently
complex or match any darknet database entries, they
are EASILY cracked.
• “Golden Ticket” attacks using hacking tools such as
Mimikatz can then leverage elevated domain rights (i.e.
Domain Admin) to hack the krbst account and create
non-expiring ‘Golden Tickets’ that give unfettered rights
to all domain resources
03.04.2020
12.09.2020
#
03.04.2020
12.09.2020
#
What’s the Solution?
Examining Microsoft Security Tools
03.04.2020
12.09.2020
#
Microsoft Security in Relation to the NIST
Cyber Security Framework
Identify
• Azure Active
Directory
• Microsoft
Intune
• SCCM
• Windows
Defender
ATP
Protect • Azure MFA
• Azure AD Privileged
Identity
Management
• Microsoft Identity
Manager /
Privileged Access
Management
• Azure Information
Protection
• Azure AD Password
Protection
Detect
•Azure Sentinel
•Microsoft Cloud
App Security
•Azure Advanced
Threat
Protection
•Windows
Defender ATP
•Azure Security
Center
•Azure AD
Identity
Protection
Respond
• Azure
Sentinel
• Azure ATP
Recover
• Azure Security
Center
• Azure Backup
03.04.2020
12.09.2020
#
Microsoft Cloud App Security
03.04.2020
12.09.2020
#
Advanced Threat Analytics (ATA) &
Azure Advanced Threat Protection (ATP)
• ATA is an on-prem version of Azure ATP
• ATA/Azure ATP deploys sensors to
domain controllers to look for behaviors
associated with compromised internal
systems
• ATA/ATP Sensors perform their
calculations locally and then forward
their alerts to the cloud
• Microsoft Advanced Threat Protection
(ATP) is a cloud-based version of ATA
that extends the capabilities of ATA to
include the following:
• Azure Advanced Threat Protection (Azure
ATP)
• Microsoft Defender Advanced Threat
Protection (ATP)
• Office 365 Advanced Threat Protection
(Office 365 ATP)
03.04.2020
12.09.2020
#
Azure Sentinel
Azure Sentinel builds on the
proven Azure Monitor log
monitoring platform
Azure Sentinel provides for
centralized SIEM capabilities
for logs, alerting and providing
for reporting trends
Firewall, switch, Windows, and
Linux logs can all be forwarded
to Sentinel to allow for
retroactive forensics or real-
time alerts
03.04.2020
12.09.2020
#
Azure AD Password
Protection
Azure AD Password Protection runs as
agents on all internal domain
controllers that restrict how a password
is constructed.
Azure AD Password Protection allows
for complexity beyond the default
options in an AD environment,
disallowing passwords that are known
to be compromised and/or include key
words
03.04.2020
12.09.2020
#
Azure Multi-Factor
Authentication
Azure Multi-factor Authentication
(MFA) integrates with MFA apps
(Google Authenticator, Microsoft
Authentication) and SMS based MFA to
provide for an additional layer of auth
required for traffic.
Deployment of MFA alone can reduce
your exposure to modern threats by an
exponential amount
Runs on a dedicated server or the Azure
AD Connect server
03.04.2020
12.09.2020
#
Azure AD Privileged Identity Management
(PIM)
Azure AD Privileged Identity
Management (PIM) allows accounts to
be ‘privileged by request’ and not by
default.
Users can initiate requests to raise their
privileged roles, and these requests can
be moderated by admins and/or
monitored.
In the event of a compromise, admin
users will have no special rights until
they have been elevated, which greatly
reduces exposure.
03.04.2020
12.09.2020
#
Microsoft Identity Manager / PAM
The On-Prem version of PIM is
integrated into the Microsoft
Identity Manager (MIM) suite in the
form of Privileged Access
Management (PAM.)
PAM works similarly to PIM, with
the exception being that a Bastion
forest is used for accounts with
elevated privileges.
A Bastion forest exists across a one-
way trust and accounts are only
elevated as needed. This leaves
membership in privileged groups
such as ‘Domain Admins’ to very
few active accounts.
03.04.2020
12.09.2020
#
Azure Information Protection
• Azure Information Protection
provides for the ability to control
what happens to data AFTER it has
been accessed.
• Azure IP assigns Information
Protection tags to content either
manually or via automatic processes.
• The existing Azure Rights
Management Services (Azure RMS)
service is now integrated into Azure
RMS.
• Hold Your Own Key (HYOK) allows
organizations to secure and encrypt
content using their own private key,
removing Microsoft from data
custody.
03.04.2020
12.09.2020
#
Azure Security Center
The Azure Security Center monitors
and alerts against hybrid security
scenarios
Alerts are generated from virtual
machines both in the Azure cloud an
in supported on-prem workloads.
Microsoft prices based on a ‘Free’ tier
and a ‘Standard’ tier that includes
advanced automation. Pricing is
determined by the number and
complexity of systems managed by
the platform
03.04.2020
12.09.2020
#
Licensing SKU
USD /
user /
month
BasicApps
EntApps
RMS
FCI
HYOK/
AutoClass
AADC
MFA
Password
Protection
ATA
ATP
MCAS
PIM/MIM
/PAM
Security
Center
Sentinel
Azure AD – Free Free X
Azure AD – Office 365 Apps *O365 X X
Azure AD Premium P1 $6.00 X X X X
Azure AD Premium P2 $9.00 X X X X X X X
Azure Information Protection - Free Free X
Azure Information Protection – Office 365 Apps *O365 X X
Azure Information Protection Premium P1 $2.00 X X X X
Azure Information Protection Premium P2 $5.00 X X X X X
Enterprise Mobility + Security E3 $8.74 X X X X X X X X
Enterprise Mobility + Security E5 $14.80 X X X X X X X X X X X X
Microsoft 365 E3 $35.00 X X X X X X X X
Microsoft 365 E5 $63.00 X X X X X X X X X X X X
Pay as You Go (Storage and/or Usage) Varies X* X*
03.04.2020
12.09.2020
#
We are doing this for the first time 
We’d love to hear you feedback!
http://bit.ly/SPSWarsaw2020Online_Survey
03.04.2020
12.09.2020
#
Dziękuję! Pytania?
Don’t forget to meet us in-person on September 12th at Microsoft Poland’s Office!
Michael Noel
CCO.com
@MichaelTNoel
Facebook.com/MichaelNoel
Linkedin.com/in/MichaelTNoel
SharingTheGlobe.com
Slideshare.net/MichaelTNoel

More Related Content

What's hot

Secure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and AtidanSecure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and AtidanDavid J Rosenthal
 
What is Microsoft Azure Security?-Microsoft Azure security
 What is Microsoft Azure Security?-Microsoft Azure security What is Microsoft Azure Security?-Microsoft Azure security
What is Microsoft Azure Security?-Microsoft Azure securityZabeel Institute
 
Azure Sentinel Tips
Azure Sentinel Tips Azure Sentinel Tips
Azure Sentinel Tips Mario Worwell
 
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...Patrick Guimonet
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information ProtectionAndrew Bettany
 
1 Modern Security - Keynote
1  Modern Security - Keynote1  Modern Security - Keynote
1 Modern Security - KeynoteAndrew Bettany
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesUL Transaction Security
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementRiwut Libinuko
 
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...Amazon Web Services
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...Joris Faure
 
Thread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASBAmmar Hasayen
 
Identity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft AzureIdentity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft AzureSparkhound Inc.
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Sonja Madsen
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...PlatformSecurityManagement
 

What's hot (20)

Secure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and AtidanSecure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and Atidan
 
What is Microsoft Azure Security?-Microsoft Azure security
 What is Microsoft Azure Security?-Microsoft Azure security What is Microsoft Azure Security?-Microsoft Azure security
What is Microsoft Azure Security?-Microsoft Azure security
 
Azure Sentinel Tips
Azure Sentinel Tips Azure Sentinel Tips
Azure Sentinel Tips
 
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
 
1 Modern Security - Keynote
1  Modern Security - Keynote1  Modern Security - Keynote
1 Modern Security - Keynote
 
Cloud App Security
Cloud App SecurityCloud App Security
Cloud App Security
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management Services
 
Microsoft Digital Crimes Unit
Microsoft Digital Crimes UnitMicrosoft Digital Crimes Unit
Microsoft Digital Crimes Unit
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights Management
 
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...
 
Thread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 Security
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
 
Identity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft AzureIdentity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft Azure
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
 

Similar to [PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools

Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosJenniferMete1
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceVignesh Ganesan I Microsoft MVP
 
Microsoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptxMicrosoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptxMike Brannon
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxGenericName6
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreJoel Oleson
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security OverviewRobert Crane
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxDefenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxMatthew Levy
 
Securing the Skies: Navigating Cloud Security Challenges and Beyond
Securing the Skies: Navigating Cloud Security Challenges and BeyondSecuring the Skies: Navigating Cloud Security Challenges and Beyond
Securing the Skies: Navigating Cloud Security Challenges and BeyondPraveen Nair
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyMicrosoft Österreich
 
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...Morgan Simonsen
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024Michael Noel
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
IT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleIT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleMichael Noel
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint ManagerGeorge Grammatikos
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 

Similar to [PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools (20)

Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von Baggenstos
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
Microsoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptxMicrosoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptx
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure Score
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxDefenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
 
Securing the Skies: Navigating Cloud Security Challenges and Beyond
Securing the Skies: Navigating Cloud Security Challenges and BeyondSecuring the Skies: Navigating Cloud Security Challenges and Beyond
Securing the Skies: Navigating Cloud Security Challenges and Beyond
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
IT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleIT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital Brazzaville
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 

More from Tomasz Poszytek

Power Platform ALM fundamentals - MPPC23
Power Platform ALM fundamentals - MPPC23Power Platform ALM fundamentals - MPPC23
Power Platform ALM fundamentals - MPPC23Tomasz Poszytek
 
TomaszPoszytek_ALM-Fundamentals_SS2023.pdf
TomaszPoszytek_ALM-Fundamentals_SS2023.pdfTomaszPoszytek_ALM-Fundamentals_SS2023.pdf
TomaszPoszytek_ALM-Fundamentals_SS2023.pdfTomasz Poszytek
 
Automation Summit 2023 - TPoszytek - Debugging-error handling-cloud flows
Automation Summit 2023 - TPoszytek - Debugging-error handling-cloud flowsAutomation Summit 2023 - TPoszytek - Debugging-error handling-cloud flows
Automation Summit 2023 - TPoszytek - Debugging-error handling-cloud flowsTomasz Poszytek
 
Dataverse for Teams, Tomasz Poszytek, M365 California 2021
Dataverse for Teams, Tomasz Poszytek, M365 California 2021Dataverse for Teams, Tomasz Poszytek, M365 California 2021
Dataverse for Teams, Tomasz Poszytek, M365 California 2021Tomasz Poszytek
 
Boost user experience is your processes with Adaptive Cards - SPS Cologne
Boost user experience is your processes with Adaptive Cards - SPS CologneBoost user experience is your processes with Adaptive Cards - SPS Cologne
Boost user experience is your processes with Adaptive Cards - SPS CologneTomasz Poszytek
 
Automation Saturday - Boost UX in business processes with Adaptive Cards
Automation Saturday - Boost UX in business processes with Adaptive CardsAutomation Saturday - Boost UX in business processes with Adaptive Cards
Automation Saturday - Boost UX in business processes with Adaptive CardsTomasz Poszytek
 
Introduction to UI flows - Office 365 Nashville 2020
Introduction to UI flows - Office 365 Nashville 2020Introduction to UI flows - Office 365 Nashville 2020
Introduction to UI flows - Office 365 Nashville 2020Tomasz Poszytek
 
[DW&EU] Citizen Development: The missing pieces of the puzzle
[DW&EU] Citizen Development: The missing pieces of the puzzle[DW&EU] Citizen Development: The missing pieces of the puzzle
[DW&EU] Citizen Development: The missing pieces of the puzzleTomasz Poszytek
 
[PU&D] - The ultimate guide to UX design in PowerApps apps
[PU&D] - The ultimate guide to UX design in PowerApps apps[PU&D] - The ultimate guide to UX design in PowerApps apps
[PU&D] - The ultimate guide to UX design in PowerApps appsTomasz Poszytek
 
[DW&EU] - Bridging the Gap - Connecting IT and the Business to drive successf...
[DW&EU] - Bridging the Gap - Connecting IT and the Business to drive successf...[DW&EU] - Bridging the Gap - Connecting IT and the Business to drive successf...
[DW&EU] - Bridging the Gap - Connecting IT and the Business to drive successf...Tomasz Poszytek
 
[PU&D] - Become a flow/Power Automate hero in 2020 with
[PU&D] - Become a flow/Power Automate hero in 2020 with [PU&D] - Become a flow/Power Automate hero in 2020 with
[PU&D] - Become a flow/Power Automate hero in 2020 with Tomasz Poszytek
 
[DW&EU] - The Cloud in my handbag
[DW&EU] - The Cloud in my handbag[DW&EU] - The Cloud in my handbag
[DW&EU] - The Cloud in my handbagTomasz Poszytek
 
[DW&EU] - Private Channels in Microsoft Teams - Deep Dive
[DW&EU] - Private Channels in Microsoft Teams - Deep Dive[DW&EU] - Private Channels in Microsoft Teams - Deep Dive
[DW&EU] - Private Channels in Microsoft Teams - Deep DiveTomasz Poszytek
 
[DW&EU] - Microsoft Forms - The Hidden Gem of O365
[DW&EU] - Microsoft Forms - The Hidden Gem of O365[DW&EU] - Microsoft Forms - The Hidden Gem of O365
[DW&EU] - Microsoft Forms - The Hidden Gem of O365Tomasz Poszytek
 
[PU&D] - Create your personal Assistant with Microsoft Bot Framework Composer
[PU&D] - Create your personal Assistant with Microsoft Bot Framework Composer[PU&D] - Create your personal Assistant with Microsoft Bot Framework Composer
[PU&D] - Create your personal Assistant with Microsoft Bot Framework ComposerTomasz Poszytek
 
[DW&EU] - Case study: Office 365 user adoption roadmap step by step
[DW&EU] - Case study: Office 365 user adoption roadmap step by step[DW&EU] - Case study: Office 365 user adoption roadmap step by step
[DW&EU] - Case study: Office 365 user adoption roadmap step by stepTomasz Poszytek
 
[PU&D] - The road to Microsoft Teams from SharePoint
[PU&D] - The road to Microsoft Teams from SharePoint[PU&D] - The road to Microsoft Teams from SharePoint
[PU&D] - The road to Microsoft Teams from SharePointTomasz Poszytek
 
[PU&D] - Power Platform Unchained
[PU&D] - Power Platform Unchained[PU&D] - Power Platform Unchained
[PU&D] - Power Platform UnchainedTomasz Poszytek
 
[PU&D] - Power Platform only for Citizen Developers?
[PU&D] - Power Platform only for Citizen Developers?[PU&D] - Power Platform only for Citizen Developers?
[PU&D] - Power Platform only for Citizen Developers?Tomasz Poszytek
 
[DW&U] - To-Do, Doing, Done: How to manage work
[DW&U] - To-Do, Doing, Done: How to manage work[DW&U] - To-Do, Doing, Done: How to manage work
[DW&U] - To-Do, Doing, Done: How to manage workTomasz Poszytek
 

More from Tomasz Poszytek (20)

Power Platform ALM fundamentals - MPPC23
Power Platform ALM fundamentals - MPPC23Power Platform ALM fundamentals - MPPC23
Power Platform ALM fundamentals - MPPC23
 
TomaszPoszytek_ALM-Fundamentals_SS2023.pdf
TomaszPoszytek_ALM-Fundamentals_SS2023.pdfTomaszPoszytek_ALM-Fundamentals_SS2023.pdf
TomaszPoszytek_ALM-Fundamentals_SS2023.pdf
 
Automation Summit 2023 - TPoszytek - Debugging-error handling-cloud flows
Automation Summit 2023 - TPoszytek - Debugging-error handling-cloud flowsAutomation Summit 2023 - TPoszytek - Debugging-error handling-cloud flows
Automation Summit 2023 - TPoszytek - Debugging-error handling-cloud flows
 
Dataverse for Teams, Tomasz Poszytek, M365 California 2021
Dataverse for Teams, Tomasz Poszytek, M365 California 2021Dataverse for Teams, Tomasz Poszytek, M365 California 2021
Dataverse for Teams, Tomasz Poszytek, M365 California 2021
 
Boost user experience is your processes with Adaptive Cards - SPS Cologne
Boost user experience is your processes with Adaptive Cards - SPS CologneBoost user experience is your processes with Adaptive Cards - SPS Cologne
Boost user experience is your processes with Adaptive Cards - SPS Cologne
 
Automation Saturday - Boost UX in business processes with Adaptive Cards
Automation Saturday - Boost UX in business processes with Adaptive CardsAutomation Saturday - Boost UX in business processes with Adaptive Cards
Automation Saturday - Boost UX in business processes with Adaptive Cards
 
Introduction to UI flows - Office 365 Nashville 2020
Introduction to UI flows - Office 365 Nashville 2020Introduction to UI flows - Office 365 Nashville 2020
Introduction to UI flows - Office 365 Nashville 2020
 
[DW&EU] Citizen Development: The missing pieces of the puzzle
[DW&EU] Citizen Development: The missing pieces of the puzzle[DW&EU] Citizen Development: The missing pieces of the puzzle
[DW&EU] Citizen Development: The missing pieces of the puzzle
 
[PU&D] - The ultimate guide to UX design in PowerApps apps
[PU&D] - The ultimate guide to UX design in PowerApps apps[PU&D] - The ultimate guide to UX design in PowerApps apps
[PU&D] - The ultimate guide to UX design in PowerApps apps
 
[DW&EU] - Bridging the Gap - Connecting IT and the Business to drive successf...
[DW&EU] - Bridging the Gap - Connecting IT and the Business to drive successf...[DW&EU] - Bridging the Gap - Connecting IT and the Business to drive successf...
[DW&EU] - Bridging the Gap - Connecting IT and the Business to drive successf...
 
[PU&D] - Become a flow/Power Automate hero in 2020 with
[PU&D] - Become a flow/Power Automate hero in 2020 with [PU&D] - Become a flow/Power Automate hero in 2020 with
[PU&D] - Become a flow/Power Automate hero in 2020 with
 
[DW&EU] - The Cloud in my handbag
[DW&EU] - The Cloud in my handbag[DW&EU] - The Cloud in my handbag
[DW&EU] - The Cloud in my handbag
 
[DW&EU] - Private Channels in Microsoft Teams - Deep Dive
[DW&EU] - Private Channels in Microsoft Teams - Deep Dive[DW&EU] - Private Channels in Microsoft Teams - Deep Dive
[DW&EU] - Private Channels in Microsoft Teams - Deep Dive
 
[DW&EU] - Microsoft Forms - The Hidden Gem of O365
[DW&EU] - Microsoft Forms - The Hidden Gem of O365[DW&EU] - Microsoft Forms - The Hidden Gem of O365
[DW&EU] - Microsoft Forms - The Hidden Gem of O365
 
[PU&D] - Create your personal Assistant with Microsoft Bot Framework Composer
[PU&D] - Create your personal Assistant with Microsoft Bot Framework Composer[PU&D] - Create your personal Assistant with Microsoft Bot Framework Composer
[PU&D] - Create your personal Assistant with Microsoft Bot Framework Composer
 
[DW&EU] - Case study: Office 365 user adoption roadmap step by step
[DW&EU] - Case study: Office 365 user adoption roadmap step by step[DW&EU] - Case study: Office 365 user adoption roadmap step by step
[DW&EU] - Case study: Office 365 user adoption roadmap step by step
 
[PU&D] - The road to Microsoft Teams from SharePoint
[PU&D] - The road to Microsoft Teams from SharePoint[PU&D] - The road to Microsoft Teams from SharePoint
[PU&D] - The road to Microsoft Teams from SharePoint
 
[PU&D] - Power Platform Unchained
[PU&D] - Power Platform Unchained[PU&D] - Power Platform Unchained
[PU&D] - Power Platform Unchained
 
[PU&D] - Power Platform only for Citizen Developers?
[PU&D] - Power Platform only for Citizen Developers?[PU&D] - Power Platform only for Citizen Developers?
[PU&D] - Power Platform only for Citizen Developers?
 
[DW&U] - To-Do, Doing, Done: How to manage work
[DW&U] - To-Do, Doing, Done: How to manage work[DW&U] - To-Do, Doing, Done: How to manage work
[DW&U] - To-Do, Doing, Done: How to manage work
 

Recently uploaded

Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 

Recently uploaded (20)

Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 

[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools

  • 1. 03.04.2020 12.09.2020 # 2020 # Securing IT Against Modern Threats with Microsoft 365 Security Tools Michael Noel, CCO
  • 2. Join us on September 12 … and let’s celebrate 5th Anniversary! SPS Warsaw Team Tomek, Edyta, Marcin
  • 4. 03.04.2020 12.09.2020 # Michael Noel @MichaelTNoel • Authored/Co-authored 20 books including the best-selling SharePoint, Exchange, and Windows Unleashed series • Presented at over 230 events in over 85 unique countries around the world • Partner at Convergent Computing in the San Francisco Bay Area (cco.com)
  • 5. 03.04.2020 12.09.2020 # IT Security: A Vastly Changed Landscape • Targeted Attacks • Spear Phishing (Exec/Finance targeting) • State-sponsored Attacks (Sony hack, Sea Turtle, etc.) • IP Theft/Loss (Mass downloads, disgruntled offboards, ‘oversharing.’) • Data Integrity Challenges • Ransomware/Cryptojacking • “Permanent” deletion of cloud data • Device Security • Theft/Compromise • Malware/Keyboard Loggers/Rootkits • Information Overload • Firewall/Syslog log overload • Audit log overload • Noise vs signal ratio in IT • Trying to stay one step ahead of attackers
  • 6. 03.04.2020 12.09.2020 # Passwords are Not as Secure as You Think • Key to password security is not necessarily length, complexity, or even age; but global uniqueness • Hackers have access to databases of ‘pwned’ passwords and can run password hashes against these databases in a matter of milliseconds • ‘Passphrases’ that consist of unique seed words are infinitely more complex and much harder to crack (i.e. “Yellow birdseed hat pumpkin”) • Test your password at https://haveibeenpwned.com
  • 7. 03.04.2020 12.09.2020 # Lateral Attacks are Common and Easy to Exploit • Exploiting Cached credentials on workstations are a common attack vector • Any user with local admin rights to a workstation (obtained legitimately or via phishing) can access the cached credentials of any other user who logged in at some point. If the passwords are not sufficiently complex or match any darknet database entries, they are EASILY cracked. • “Golden Ticket” attacks using hacking tools such as Mimikatz can then leverage elevated domain rights (i.e. Domain Admin) to hack the krbst account and create non-expiring ‘Golden Tickets’ that give unfettered rights to all domain resources
  • 9. 03.04.2020 12.09.2020 # Microsoft Security in Relation to the NIST Cyber Security Framework Identify • Azure Active Directory • Microsoft Intune • SCCM • Windows Defender ATP Protect • Azure MFA • Azure AD Privileged Identity Management • Microsoft Identity Manager / Privileged Access Management • Azure Information Protection • Azure AD Password Protection Detect •Azure Sentinel •Microsoft Cloud App Security •Azure Advanced Threat Protection •Windows Defender ATP •Azure Security Center •Azure AD Identity Protection Respond • Azure Sentinel • Azure ATP Recover • Azure Security Center • Azure Backup
  • 11. 03.04.2020 12.09.2020 # Advanced Threat Analytics (ATA) & Azure Advanced Threat Protection (ATP) • ATA is an on-prem version of Azure ATP • ATA/Azure ATP deploys sensors to domain controllers to look for behaviors associated with compromised internal systems • ATA/ATP Sensors perform their calculations locally and then forward their alerts to the cloud • Microsoft Advanced Threat Protection (ATP) is a cloud-based version of ATA that extends the capabilities of ATA to include the following: • Azure Advanced Threat Protection (Azure ATP) • Microsoft Defender Advanced Threat Protection (ATP) • Office 365 Advanced Threat Protection (Office 365 ATP)
  • 12. 03.04.2020 12.09.2020 # Azure Sentinel Azure Sentinel builds on the proven Azure Monitor log monitoring platform Azure Sentinel provides for centralized SIEM capabilities for logs, alerting and providing for reporting trends Firewall, switch, Windows, and Linux logs can all be forwarded to Sentinel to allow for retroactive forensics or real- time alerts
  • 13. 03.04.2020 12.09.2020 # Azure AD Password Protection Azure AD Password Protection runs as agents on all internal domain controllers that restrict how a password is constructed. Azure AD Password Protection allows for complexity beyond the default options in an AD environment, disallowing passwords that are known to be compromised and/or include key words
  • 14. 03.04.2020 12.09.2020 # Azure Multi-Factor Authentication Azure Multi-factor Authentication (MFA) integrates with MFA apps (Google Authenticator, Microsoft Authentication) and SMS based MFA to provide for an additional layer of auth required for traffic. Deployment of MFA alone can reduce your exposure to modern threats by an exponential amount Runs on a dedicated server or the Azure AD Connect server
  • 15. 03.04.2020 12.09.2020 # Azure AD Privileged Identity Management (PIM) Azure AD Privileged Identity Management (PIM) allows accounts to be ‘privileged by request’ and not by default. Users can initiate requests to raise their privileged roles, and these requests can be moderated by admins and/or monitored. In the event of a compromise, admin users will have no special rights until they have been elevated, which greatly reduces exposure.
  • 16. 03.04.2020 12.09.2020 # Microsoft Identity Manager / PAM The On-Prem version of PIM is integrated into the Microsoft Identity Manager (MIM) suite in the form of Privileged Access Management (PAM.) PAM works similarly to PIM, with the exception being that a Bastion forest is used for accounts with elevated privileges. A Bastion forest exists across a one- way trust and accounts are only elevated as needed. This leaves membership in privileged groups such as ‘Domain Admins’ to very few active accounts.
  • 17. 03.04.2020 12.09.2020 # Azure Information Protection • Azure Information Protection provides for the ability to control what happens to data AFTER it has been accessed. • Azure IP assigns Information Protection tags to content either manually or via automatic processes. • The existing Azure Rights Management Services (Azure RMS) service is now integrated into Azure RMS. • Hold Your Own Key (HYOK) allows organizations to secure and encrypt content using their own private key, removing Microsoft from data custody.
  • 18. 03.04.2020 12.09.2020 # Azure Security Center The Azure Security Center monitors and alerts against hybrid security scenarios Alerts are generated from virtual machines both in the Azure cloud an in supported on-prem workloads. Microsoft prices based on a ‘Free’ tier and a ‘Standard’ tier that includes advanced automation. Pricing is determined by the number and complexity of systems managed by the platform
  • 19. 03.04.2020 12.09.2020 # Licensing SKU USD / user / month BasicApps EntApps RMS FCI HYOK/ AutoClass AADC MFA Password Protection ATA ATP MCAS PIM/MIM /PAM Security Center Sentinel Azure AD – Free Free X Azure AD – Office 365 Apps *O365 X X Azure AD Premium P1 $6.00 X X X X Azure AD Premium P2 $9.00 X X X X X X X Azure Information Protection - Free Free X Azure Information Protection – Office 365 Apps *O365 X X Azure Information Protection Premium P1 $2.00 X X X X Azure Information Protection Premium P2 $5.00 X X X X X Enterprise Mobility + Security E3 $8.74 X X X X X X X X Enterprise Mobility + Security E5 $14.80 X X X X X X X X X X X X Microsoft 365 E3 $35.00 X X X X X X X X Microsoft 365 E5 $63.00 X X X X X X X X X X X X Pay as You Go (Storage and/or Usage) Varies X* X*
  • 20. 03.04.2020 12.09.2020 # We are doing this for the first time  We’d love to hear you feedback! http://bit.ly/SPSWarsaw2020Online_Survey
  • 21. 03.04.2020 12.09.2020 # Dziękuję! Pytania? Don’t forget to meet us in-person on September 12th at Microsoft Poland’s Office! Michael Noel CCO.com @MichaelTNoel Facebook.com/MichaelNoel Linkedin.com/in/MichaelTNoel SharingTheGlobe.com Slideshare.net/MichaelTNoel