SlideShare a Scribd company logo
Paola Presutto
Sr Technical Evangelist - Microsoft
@PiperITaPRO
Windows 10 ā€“ There are
no limits
Source: McKinsey, Ponemon Institute, Verizon
CYBER THREATSARE A M A T E R I A L R I S K TO YOUR BUSINESS
Impact of lost productivity
and growth
Average cost of a data breach
(15% YoY increase)
$3.0 TR ILLION $3.5 MILLION
Corporate liability coverage.
$500 MILLION
ā€œCYBER SECURITY IS A CEO ISSUE.ā€
- M C K I N S E Y
ATTACKS HAPPEN FAST AND ARE HARD TO STOP
If an attacker sends an email
to 100 people in your
companyā€¦
ā€¦23 people will open itā€¦ ā€¦11 people will open the
attachmentā€¦
ā€¦and six will do it in the
first hour.
EVOLUTION OF ATTACKS
Mischief
Script
Kiddies
Unsophisticated
Fraud and Theft
Organized Crime
More sophisticated
Damage and Disruption
Nations, Terror Groups, Activists
Very sophisticated and well resourced
RANSOMWARE
ANATOMY OF AN ATTACK
Malicious Attachment Execution
Stolen Credential Use
Internet Service Compromise
Kernel-mode Malware
Kernel Exploits
Pass-the-Hash
Malicious Attachment Delivery
Browser or Doc Exploit Delivery
Phishing Attacks
ENTER
ESTABLISH
EXPAND
ENDGAME
NETWORK
DEVICE
USER
PASS-THE-HASH
Browser or Doc Exploit Execution
ANATOMY OF AN ATTACK
Theft of sensitive information, disruption of government.
PHISHING
NETWORK
DEVICE
USER
ENDGAME
http://natoint.com/900117-spain-forces-conclude-mission-in-central-african-republic/
PASS-THE-HASH
Browser or Doc Exploit Execution
ANATOMY OF AN ATTACK
Theft of sensitive information, disruption of government.
PHISHING
NETWORK
DEVICE
USER
ENDGAME
Land on exploit page
Exploit runs
Redirected to legitimate page
Total Elapsed Time: 00:00.1
THE WINDOWS 10 DEFENSE STACK
PROTECT, DETECT & RESPOND
PRE-BREACH POST-BREACH
Windows Defender
ATP
Breach detection
investigation &
response
Device
protection
Device Health
attestation
Device Guard
Device Control
Security policies
Information
protection
Device protection /
Drive encryption
Enterprise Data
Protection
Conditional access
Threat
resistance
SmartScreen
AppLocker
Device Guard
Windows Defender
Network/Firewall
Built-in 2FA
Account lockdown
Credential Guard
Microsoft Passport
Windows Hello :)
Identity
protection
Breach detection
investigation &
response
Device
protection
Information
protection
Threat
resistance
Conditional Access
Windows Defender
ATP
Device integrity
Device control
BitLocker and
BitLocker to Go
Windows
Information
Protection
SmartScreen
Windows Firewall
Microsoft Edge
Device Guard
Windows Defender
Windows Hello :)
Credential Guard
Identity
protection
POST-BREACHPRE-BREACH
Breach detection
investigation &
response
Device
protection
Identity
protection
Information
protection
Threat
resistance
Windows 7 Security features
POST-BREACHPRE-BREACH
Breach detection
investigation &
response
Device
protection
Identity
protection
Information
protection
Threat
resistance
Windows 10 Security on Legacy or Modern Devices
(Upgraded fromWindows 7 or 32-bit Windows 8)
POST-BREACHPRE-BREACH
Breach detection
investigation &
response
Device
protection
Identity
protection
Information
protection
Threat
resistance
Windows 10 Security on Modern Devices
(FreshInstall or upgraded from 64-bit Windows 8 )
Device Protection
Biometrics sensors
Virtualization
Cryptographic processing
Device integrity
TRADITIONAL PLATFORM STACK
Device Hardware
Kernel
Windows Platform Services
Apps
VIRTUALIZATION BASED SECURITY WINDOWS 10
Kernel
Windows Platform
Services
Apps
Kernel
SystemContainer
Trustlet#1
Trustlet#2
Trustlet#3
Hypervisor
Device Hardware
Windows Operating System
Hyper-VHyper-V
THE WINDOWS 10 DEFENSE STACK
PROTECT, DETECT & RESPOND
PRE-BREACH POST-BREACH
Conditional Access
Windows Defender
ATP
Breach detection
investigation &
response
Device
protection
Device integrity
Device control
Information
protection
BitLocker and
BitLocker to Go
Windows
Information
Protection
Threat
resistance
SmartScreen
Windows Firewall
Microsoft Edge
Device Guard
Windows Defender
Windows Hello :)
Credential Guard
Identity
protection
Device
protection
Device integrity
Device control
Threat
resistance
SmartScreen
Windows Firewall
Microsoft Edge
Device Guard
Windows Defender
MICROSOFT EDGE: DESIGNED FOR SECURE BROWSING
Eliminate vulnerabilities before attackers can find them
Contain the damage when vulnerabilities are discovered
Break exploitation techniques used by attackers
Prevent navigation to known exploit sites
Keep our customers
safe when browsing
the web
Objective
Make it difficult and
costly for attackers to
find and exploit
vulnerabilities in
Microsoft Edge
Strategy
Tactics
ļƒ  ļƒ 
Microsoft Edge is the most secure browser Microsoft has ever shipped
WINDOWS DEFENDER APPLICATION GUARD
Hypervisor
Device Hardware
Kernel
Apps
Windows Platform
Services
Kernel
Windows Platform
Services
Microsoft Edge
Kernel
System Container
Critical System Processes
Windows Defender
Application Guard Container
Windows Operating System
Hyper-V Hyper-V
HARDWARE ISOLATION
WINDOWS DEFENDER
ADVANCED THREAT PROTECTION
DETECT ADVANCED ATTACKS AND REMEDIATE BREACHES
Unique threat intelligence knowledge base
Unparalleled threat optics provide detailed actor profiles
1st and 3rd party threat intelligence data.
Rich timeline for investigation
Easily understand scope of breach. Data pivoting
across endpoints. Deep file and URL analysis.
Behavior-based, cloud-powered breach detection
Actionable, correlated alerts for known and unknown adversaries.
Real-time and historical data.
Built into Windows
No additional deployment & Infrastructure. Continuously
up-to-date, lower costs.
THE WINDOWS 10 DEFENSE STACK
PROTECT, DETECT & RESPOND
PRE-BREACH POST-BREACH
Conditional Access
Windows Defender
ATP
Breach detection
investigation &
response
Device
protection
Device integrity
Device control
Information
protection
BitLocker and
BitLocker to Go
Windows
Information
Protection
Threat
resistance
SmartScreen
Windows Firewall
Microsoft Edge
Device Guard
Windows Defender
Windows Hello :)
Credential Guard
Identity
protection
Windows Hello :)
Credential Guard
Identity
protection
Threat
resistance
SmartScreen
Windows Firewall
Microsoft Edge
Device Guard
Windows Defender
USER IDENTITY & AUTHENTICATION
Windows 10
shhh!
Easily mishandled or lost
(Hint: The user is the problem)
SHARED SECRETS
ļƒ  Improved security
ļƒ  Fingerprintand facialrecognition
ļƒ  Ease of use
ļƒ  Impossible to forget
ļƒ  VBS support
BIOMETRIC MODALITIES
THE WINDOWS 10 DEFENSE STACK
PROTECT, DETECT & RESPOND
PRE-BREACH POST-BREACH
Conditional Access
Windows Defender
ATP
Breach detection
investigation &
response
Device
protection
Device integrity
Device control
Information
protection
BitLocker and
BitLocker to Go
Windows
Information
Protection
Threat
resistance
SmartScreen
Windows Firewall
Microsoft Edge
Device Guard
Windows Defender
Windows Hello :)
Credential Guard
Identity
protection
Windows Hello :)
Credential Guard
Identity
protection
Information
protection
BitLocker and
BitLocker to Go
Windows
Information
Protection
Data Leakage
2HIPPA Secure Now, ā€œA look at the cost of healthcare data breaches,ā€ Art Gross, March 30, 2012
Have accidentallysent sensitive
informationto the wrong person1
58%
ā€¦of senior managersadmit to
regularly uploadingwork files to a
personal email or cloud account1
87%
Average per record cost of a data
breachacross all industries2
$240
PER
RECORD
1Stroz Friedberg, ā€œOn The Pulse: Information Security In American Business,ā€ 2013
DEVICE
PROTECTION
DATA
SEPARATION
LEAK
PROTECTION
SHARING
PROTECTION
DEVICE
PROTECTION
BitLocker
enhancements in
Windows 8.1
InstantGo
3rd party adoption
Protect system and
data when device is
lost or stolen
Containment
Data separation
DATA
SEPARATION
Prevent
unauthorized users
and apps from
accessing and
leaking data
LEAK
PROTECTION
Protect data when
shared with others,
or shared outside
of organizational
devices and control
SHARING
PROTECTION
YOUR INFORMATION PROTECTION NEEDS
SHARING PROTECTION
Protect all file types, everywhere they
go, cloud, email, BYOD, ā€¦
Support for all commonly used
devices and systems ā€“ Windows, OSX,
iOS, Android
Support for B2B and B2B via Azure AD
Support for on premise and cloud
based scenarios (e.g.: Office 365)
Seamless easy to provision and
support for FIPS 140-2 regulation
and compliance
Rights Management Services
Your security depends on a platform where:
APPS MUST EARN TRUST BEFORE USE
DEVICE GUARD
Ā© 2016 Microsoft Corporation. All rights reserved.

More Related Content

What's hot

WannaCry ransomware attack
WannaCry ransomware attackWannaCry ransomware attack
WannaCry ransomware attack
Abdelhakim Salama
Ā 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
Charles Steve
Ā 
Modern malware and threats
Modern malware and threatsModern malware and threats
Modern malware and threats
Martin HolovskĆ½
Ā 
Teknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expandedTeknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expanded
Alfons Tanujaya
Ā 
Mobile application security
Mobile application securityMobile application security
Mobile application security
EY Belgium
Ā 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
Raghunath G
Ā 
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Sysfore Technologies
Ā 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
Sperasoft
Ā 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
IBM Security
Ā 
WannaCry: Autopsy of Ransomwar
WannaCry: Autopsy of RansomwarWannaCry: Autopsy of Ransomwar
WannaCry: Autopsy of Ransomwar
David Smith
Ā 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS
Brent Muir
Ā 
Security threats in Android OS + App Permissions
Security threats in Android OS + App PermissionsSecurity threats in Android OS + App Permissions
Security threats in Android OS + App Permissions
Hariharan Ganesan
Ā 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
Stavia
Ā 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec Technology and Consulting
Ā 
News bytes Oct-2011
News bytes  Oct-2011News bytes  Oct-2011
News bytes Oct-2011
Ashwin Patil, GCIH, GCIA, GCFE
Ā 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
anupriti
Ā 
WannaCry / Wannacrypt Ransomware
WannaCry / Wannacrypt RansomwareWannaCry / Wannacrypt Ransomware
WannaCry / Wannacrypt Ransomware
Ayoub Rouzi
Ā 
ŠŠøŠŗ Š‘ŠµŠ»Š¾Š³Š¾Ń€ŃŠŗŠøŠ¹ - Š‘ŃƒŠ“Š½Šø ŠšŃ€ŠµŠ¼Š½ŠøŠµŠ²Š¾Š¹ Š”Š¾Š»ŠøŠ½Ń‹. Š˜ŃŃ‚Š¾Ń€Šøя ŠŗŠ°Ń€ŃŒŠµŃ€Ń‹ ŠŠøŠŗŠ°, Š±Š¾Ń€ŃŒŠ±Š° с хŠ°Šŗ...
ŠŠøŠŗ Š‘ŠµŠ»Š¾Š³Š¾Ń€ŃŠŗŠøŠ¹ - Š‘ŃƒŠ“Š½Šø ŠšŃ€ŠµŠ¼Š½ŠøŠµŠ²Š¾Š¹ Š”Š¾Š»ŠøŠ½Ń‹. Š˜ŃŃ‚Š¾Ń€Šøя ŠŗŠ°Ń€ŃŒŠµŃ€Ń‹ ŠŠøŠŗŠ°, Š±Š¾Ń€ŃŒŠ±Š° с хŠ°Šŗ...ŠŠøŠŗ Š‘ŠµŠ»Š¾Š³Š¾Ń€ŃŠŗŠøŠ¹ - Š‘ŃƒŠ“Š½Šø ŠšŃ€ŠµŠ¼Š½ŠøŠµŠ²Š¾Š¹ Š”Š¾Š»ŠøŠ½Ń‹. Š˜ŃŃ‚Š¾Ń€Šøя ŠŗŠ°Ń€ŃŒŠµŃ€Ń‹ ŠŠøŠŗŠ°, Š±Š¾Ń€ŃŒŠ±Š° с хŠ°Šŗ...
ŠŠøŠŗ Š‘ŠµŠ»Š¾Š³Š¾Ń€ŃŠŗŠøŠ¹ - Š‘ŃƒŠ“Š½Šø ŠšŃ€ŠµŠ¼Š½ŠøŠµŠ²Š¾Š¹ Š”Š¾Š»ŠøŠ½Ń‹. Š˜ŃŃ‚Š¾Ń€Šøя ŠŗŠ°Ń€ŃŒŠµŃ€Ń‹ ŠŠøŠŗŠ°, Š±Š¾Ń€ŃŒŠ±Š° с хŠ°Šŗ...
HackIT Ukraine
Ā 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoorsmridulahuja
Ā 

What's hot (20)

WannaCry ransomware attack
WannaCry ransomware attackWannaCry ransomware attack
WannaCry ransomware attack
Ā 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
Ā 
Modern malware and threats
Modern malware and threatsModern malware and threats
Modern malware and threats
Ā 
Teknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expandedTeknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expanded
Ā 
Mobile application security
Mobile application securityMobile application security
Mobile application security
Ā 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
Ā 
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Ā 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
Ā 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
Ā 
WannaCry: Autopsy of Ransomwar
WannaCry: Autopsy of RansomwarWannaCry: Autopsy of Ransomwar
WannaCry: Autopsy of Ransomwar
Ā 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS
Ā 
Security threats in Android OS + App Permissions
Security threats in Android OS + App PermissionsSecurity threats in Android OS + App Permissions
Security threats in Android OS + App Permissions
Ā 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
Ā 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Ā 
News bytes Oct-2011
News bytes  Oct-2011News bytes  Oct-2011
News bytes Oct-2011
Ā 
Network security
Network securityNetwork security
Network security
Ā 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
Ā 
WannaCry / Wannacrypt Ransomware
WannaCry / Wannacrypt RansomwareWannaCry / Wannacrypt Ransomware
WannaCry / Wannacrypt Ransomware
Ā 
ŠŠøŠŗ Š‘ŠµŠ»Š¾Š³Š¾Ń€ŃŠŗŠøŠ¹ - Š‘ŃƒŠ“Š½Šø ŠšŃ€ŠµŠ¼Š½ŠøŠµŠ²Š¾Š¹ Š”Š¾Š»ŠøŠ½Ń‹. Š˜ŃŃ‚Š¾Ń€Šøя ŠŗŠ°Ń€ŃŒŠµŃ€Ń‹ ŠŠøŠŗŠ°, Š±Š¾Ń€ŃŒŠ±Š° с хŠ°Šŗ...
ŠŠøŠŗ Š‘ŠµŠ»Š¾Š³Š¾Ń€ŃŠŗŠøŠ¹ - Š‘ŃƒŠ“Š½Šø ŠšŃ€ŠµŠ¼Š½ŠøŠµŠ²Š¾Š¹ Š”Š¾Š»ŠøŠ½Ń‹. Š˜ŃŃ‚Š¾Ń€Šøя ŠŗŠ°Ń€ŃŒŠµŃ€Ń‹ ŠŠøŠŗŠ°, Š±Š¾Ń€ŃŒŠ±Š° с хŠ°Šŗ...ŠŠøŠŗ Š‘ŠµŠ»Š¾Š³Š¾Ń€ŃŠŗŠøŠ¹ - Š‘ŃƒŠ“Š½Šø ŠšŃ€ŠµŠ¼Š½ŠøŠµŠ²Š¾Š¹ Š”Š¾Š»ŠøŠ½Ń‹. Š˜ŃŃ‚Š¾Ń€Šøя ŠŗŠ°Ń€ŃŒŠµŃ€Ń‹ ŠŠøŠŗŠ°, Š±Š¾Ń€ŃŒŠ±Š° с хŠ°Šŗ...
ŠŠøŠŗ Š‘ŠµŠ»Š¾Š³Š¾Ń€ŃŠŗŠøŠ¹ - Š‘ŃƒŠ“Š½Šø ŠšŃ€ŠµŠ¼Š½ŠøŠµŠ²Š¾Š¹ Š”Š¾Š»ŠøŠ½Ń‹. Š˜ŃŃ‚Š¾Ń€Šøя ŠŗŠ°Ń€ŃŒŠµŃ€Ń‹ ŠŠøŠŗŠ°, Š±Š¾Ń€ŃŒŠ±Š° с хŠ°Šŗ...
Ā 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
Ā 

Similar to Smau Milano 2016 - Paola Presutto, Microsoft

Beveilig je data met windows 10
Beveilig je data met windows 10 Beveilig je data met windows 10
Beveilig je data met windows 10
Avanade Nederland
Ā 
Securing Your Business #2 - Role Of The Vendor
Securing Your Business #2 - Role Of The VendorSecuring Your Business #2 - Role Of The Vendor
Securing Your Business #2 - Role Of The Vendor
Datapipe
Ā 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat Defense
Adi Saputra
Ā 
Volume And Vectors 090416
Volume And Vectors 090416Volume And Vectors 090416
Volume And Vectors 090416Anthony Arrott
Ā 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
Akiumi Hasegawa
Ā 
NetWitness
NetWitnessNetWitness
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hackerbestip
Ā 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
Jetking
Ā 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
Asif Raza
Ā 
Network security
Network securityNetwork security
Network security
LukeDaniel12
Ā 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Alexander Benoit
Ā 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Dean Iacovelli
Ā 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
Wayne Huang
Ā 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasAditya K Sood
Ā 
Network security
Network securityNetwork security
Network securityNikhil Vyas
Ā 
Web security-ā€“-everything-we-know-is-wrong-eoin-keary
Web security-ā€“-everything-we-know-is-wrong-eoin-kearyWeb security-ā€“-everything-we-know-is-wrong-eoin-keary
Web security-ā€“-everything-we-know-is-wrong-eoin-kearydrewz lin
Ā 
Understanding Application Threat Modelling & Architecture
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & Architecture
Priyanka Aash
Ā 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
Ā 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
TechBiz Forense Digital
Ā 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
TechBiz Forense Digital
Ā 

Similar to Smau Milano 2016 - Paola Presutto, Microsoft (20)

Beveilig je data met windows 10
Beveilig je data met windows 10 Beveilig je data met windows 10
Beveilig je data met windows 10
Ā 
Securing Your Business #2 - Role Of The Vendor
Securing Your Business #2 - Role Of The VendorSecuring Your Business #2 - Role Of The Vendor
Securing Your Business #2 - Role Of The Vendor
Ā 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat Defense
Ā 
Volume And Vectors 090416
Volume And Vectors 090416Volume And Vectors 090416
Volume And Vectors 090416
Ā 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
Ā 
NetWitness
NetWitnessNetWitness
NetWitness
Ā 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
Ā 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
Ā 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
Ā 
Network security
Network securityNetwork security
Network security
Ā 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Ā 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Ā 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
Ā 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
Ā 
Network security
Network securityNetwork security
Network security
Ā 
Web security-ā€“-everything-we-know-is-wrong-eoin-keary
Web security-ā€“-everything-we-know-is-wrong-eoin-kearyWeb security-ā€“-everything-we-know-is-wrong-eoin-keary
Web security-ā€“-everything-we-know-is-wrong-eoin-keary
Ā 
Understanding Application Threat Modelling & Architecture
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & Architecture
Ā 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
Ā 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
Ā 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
Ā 

More from SMAU

L'intelligenza artificiale per il marketing automation: come automatizzare le...
L'intelligenza artificiale per il marketing automation: come automatizzare le...L'intelligenza artificiale per il marketing automation: come automatizzare le...
L'intelligenza artificiale per il marketing automation: come automatizzare le...
SMAU
Ā 
Il supporto IA nella Lead Generation con Linkedin e Sales Navigator
Il supporto IA nella Lead Generation con Linkedin e Sales NavigatorIl supporto IA nella Lead Generation con Linkedin e Sales Navigator
Il supporto IA nella Lead Generation con Linkedin e Sales Navigator
SMAU
Ā 
SMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazione
SMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazioneSMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazione
SMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazione
SMAU
Ā 
SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...
SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...
SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...
SMAU
Ā 
SMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtech
SMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtechSMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtech
SMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtech
SMAU
Ā 
SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...
SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...
SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...
SMAU
Ā 
SMAU MILANO 2023 | šƒš¢š š¢š­ššš„ š“š«ššš¢š§š¢š§š  š‰šØš®š«š§šžš² La nuova frontiera della formazio...
SMAU MILANO 2023 | šƒš¢š š¢š­ššš„ š“š«ššš¢š§š¢š§š  š‰šØš®š«š§šžš² La nuova frontiera della formazio...SMAU MILANO 2023 | šƒš¢š š¢š­ššš„ š“š«ššš¢š§š¢š§š  š‰šØš®š«š§šžš² La nuova frontiera della formazio...
SMAU MILANO 2023 | šƒš¢š š¢š­ššš„ š“š«ššš¢š§š¢š§š  š‰šØš®š«š§šžš² La nuova frontiera della formazio...
SMAU
Ā 
SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...
SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...
SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...
SMAU
Ā 
SMAU MILANO 2023 | Google Business Profile tra SEO e Social Media
SMAU MILANO 2023 | Google Business Profile tra SEO e Social MediaSMAU MILANO 2023 | Google Business Profile tra SEO e Social Media
SMAU MILANO 2023 | Google Business Profile tra SEO e Social Media
SMAU
Ā 
SMAU MILANO 2023 | Il PM incontra la proprietĆ  intellettuale: pianificare la ...
SMAU MILANO 2023 | Il PM incontra la proprietĆ  intellettuale: pianificare la ...SMAU MILANO 2023 | Il PM incontra la proprietĆ  intellettuale: pianificare la ...
SMAU MILANO 2023 | Il PM incontra la proprietĆ  intellettuale: pianificare la ...
SMAU
Ā 
SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare lā€™attenzio...
SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare lā€™attenzio...SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare lā€™attenzio...
SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare lā€™attenzio...
SMAU
Ā 
SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...
SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...
SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...
SMAU
Ā 
SMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggi
SMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggiSMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggi
SMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggi
SMAU
Ā 
SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...
SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...
SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...
SMAU
Ā 
SMAU MILANO 2023 | Come scalare una produzione video: il caso ā€œVongola Lupino...
SMAU MILANO 2023 | Come scalare una produzione video: il caso ā€œVongola Lupino...SMAU MILANO 2023 | Come scalare una produzione video: il caso ā€œVongola Lupino...
SMAU MILANO 2023 | Come scalare una produzione video: il caso ā€œVongola Lupino...
SMAU
Ā 
SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...
SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...
SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...
SMAU
Ā 
SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...
SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...
SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...
SMAU
Ā 
SMAU MILANO 2023 | Personal Branding: come comunicare in maniera efficace la...
SMAU MILANO 2023 |  Personal Branding: come comunicare in maniera efficace la...SMAU MILANO 2023 |  Personal Branding: come comunicare in maniera efficace la...
SMAU MILANO 2023 | Personal Branding: come comunicare in maniera efficace la...
SMAU
Ā 
SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...
SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...
SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...
SMAU
Ā 
SMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbots
SMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbotsSMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbots
SMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbots
SMAU
Ā 

More from SMAU (20)

L'intelligenza artificiale per il marketing automation: come automatizzare le...
L'intelligenza artificiale per il marketing automation: come automatizzare le...L'intelligenza artificiale per il marketing automation: come automatizzare le...
L'intelligenza artificiale per il marketing automation: come automatizzare le...
Ā 
Il supporto IA nella Lead Generation con Linkedin e Sales Navigator
Il supporto IA nella Lead Generation con Linkedin e Sales NavigatorIl supporto IA nella Lead Generation con Linkedin e Sales Navigator
Il supporto IA nella Lead Generation con Linkedin e Sales Navigator
Ā 
SMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazione
SMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazioneSMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazione
SMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazione
Ā 
SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...
SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...
SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...
Ā 
SMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtech
SMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtechSMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtech
SMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtech
Ā 
SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...
SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...
SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...
Ā 
SMAU MILANO 2023 | šƒš¢š š¢š­ššš„ š“š«ššš¢š§š¢š§š  š‰šØš®š«š§šžš² La nuova frontiera della formazio...
SMAU MILANO 2023 | šƒš¢š š¢š­ššš„ š“š«ššš¢š§š¢š§š  š‰šØš®š«š§šžš² La nuova frontiera della formazio...SMAU MILANO 2023 | šƒš¢š š¢š­ššš„ š“š«ššš¢š§š¢š§š  š‰šØš®š«š§šžš² La nuova frontiera della formazio...
SMAU MILANO 2023 | šƒš¢š š¢š­ššš„ š“š«ššš¢š§š¢š§š  š‰šØš®š«š§šžš² La nuova frontiera della formazio...
Ā 
SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...
SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...
SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...
Ā 
SMAU MILANO 2023 | Google Business Profile tra SEO e Social Media
SMAU MILANO 2023 | Google Business Profile tra SEO e Social MediaSMAU MILANO 2023 | Google Business Profile tra SEO e Social Media
SMAU MILANO 2023 | Google Business Profile tra SEO e Social Media
Ā 
SMAU MILANO 2023 | Il PM incontra la proprietĆ  intellettuale: pianificare la ...
SMAU MILANO 2023 | Il PM incontra la proprietĆ  intellettuale: pianificare la ...SMAU MILANO 2023 | Il PM incontra la proprietĆ  intellettuale: pianificare la ...
SMAU MILANO 2023 | Il PM incontra la proprietĆ  intellettuale: pianificare la ...
Ā 
SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare lā€™attenzio...
SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare lā€™attenzio...SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare lā€™attenzio...
SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare lā€™attenzio...
Ā 
SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...
SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...
SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...
Ā 
SMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggi
SMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggiSMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggi
SMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggi
Ā 
SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...
SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...
SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...
Ā 
SMAU MILANO 2023 | Come scalare una produzione video: il caso ā€œVongola Lupino...
SMAU MILANO 2023 | Come scalare una produzione video: il caso ā€œVongola Lupino...SMAU MILANO 2023 | Come scalare una produzione video: il caso ā€œVongola Lupino...
SMAU MILANO 2023 | Come scalare una produzione video: il caso ā€œVongola Lupino...
Ā 
SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...
SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...
SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...
Ā 
SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...
SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...
SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...
Ā 
SMAU MILANO 2023 | Personal Branding: come comunicare in maniera efficace la...
SMAU MILANO 2023 |  Personal Branding: come comunicare in maniera efficace la...SMAU MILANO 2023 |  Personal Branding: come comunicare in maniera efficace la...
SMAU MILANO 2023 | Personal Branding: come comunicare in maniera efficace la...
Ā 
SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...
SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...
SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...
Ā 
SMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbots
SMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbotsSMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbots
SMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbots
Ā 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
Ā 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
Ā 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
Ā 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
Ā 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
Ā 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
Ā 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
Ā 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
Ā 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
Ā 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
Ā 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
Ā 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
Ā 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
Ā 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
Ā 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
Ā 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
Ā 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
Ā 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Ā 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ā 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Ā 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Ā 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Ā 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
Ā 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Ā 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Ā 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Ā 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ā 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Ā 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Ā 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Ā 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
Ā 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
Ā 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Ā 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
Ā 

Smau Milano 2016 - Paola Presutto, Microsoft

  • 1. Paola Presutto Sr Technical Evangelist - Microsoft @PiperITaPRO Windows 10 ā€“ There are no limits
  • 2. Source: McKinsey, Ponemon Institute, Verizon CYBER THREATSARE A M A T E R I A L R I S K TO YOUR BUSINESS Impact of lost productivity and growth Average cost of a data breach (15% YoY increase) $3.0 TR ILLION $3.5 MILLION Corporate liability coverage. $500 MILLION ā€œCYBER SECURITY IS A CEO ISSUE.ā€ - M C K I N S E Y
  • 3. ATTACKS HAPPEN FAST AND ARE HARD TO STOP If an attacker sends an email to 100 people in your companyā€¦ ā€¦23 people will open itā€¦ ā€¦11 people will open the attachmentā€¦ ā€¦and six will do it in the first hour.
  • 4. EVOLUTION OF ATTACKS Mischief Script Kiddies Unsophisticated Fraud and Theft Organized Crime More sophisticated Damage and Disruption Nations, Terror Groups, Activists Very sophisticated and well resourced
  • 6. ANATOMY OF AN ATTACK Malicious Attachment Execution Stolen Credential Use Internet Service Compromise Kernel-mode Malware Kernel Exploits Pass-the-Hash Malicious Attachment Delivery Browser or Doc Exploit Delivery Phishing Attacks ENTER ESTABLISH EXPAND ENDGAME NETWORK DEVICE USER
  • 7. PASS-THE-HASH Browser or Doc Exploit Execution ANATOMY OF AN ATTACK Theft of sensitive information, disruption of government. PHISHING NETWORK DEVICE USER ENDGAME http://natoint.com/900117-spain-forces-conclude-mission-in-central-african-republic/
  • 8. PASS-THE-HASH Browser or Doc Exploit Execution ANATOMY OF AN ATTACK Theft of sensitive information, disruption of government. PHISHING NETWORK DEVICE USER ENDGAME Land on exploit page Exploit runs Redirected to legitimate page Total Elapsed Time: 00:00.1
  • 9.
  • 10. THE WINDOWS 10 DEFENSE STACK PROTECT, DETECT & RESPOND PRE-BREACH POST-BREACH Windows Defender ATP Breach detection investigation & response Device protection Device Health attestation Device Guard Device Control Security policies Information protection Device protection / Drive encryption Enterprise Data Protection Conditional access Threat resistance SmartScreen AppLocker Device Guard Windows Defender Network/Firewall Built-in 2FA Account lockdown Credential Guard Microsoft Passport Windows Hello :) Identity protection Breach detection investigation & response Device protection Information protection Threat resistance Conditional Access Windows Defender ATP Device integrity Device control BitLocker and BitLocker to Go Windows Information Protection SmartScreen Windows Firewall Microsoft Edge Device Guard Windows Defender Windows Hello :) Credential Guard Identity protection
  • 15. TRADITIONAL PLATFORM STACK Device Hardware Kernel Windows Platform Services Apps
  • 16. VIRTUALIZATION BASED SECURITY WINDOWS 10 Kernel Windows Platform Services Apps Kernel SystemContainer Trustlet#1 Trustlet#2 Trustlet#3 Hypervisor Device Hardware Windows Operating System Hyper-VHyper-V
  • 17. THE WINDOWS 10 DEFENSE STACK PROTECT, DETECT & RESPOND PRE-BREACH POST-BREACH Conditional Access Windows Defender ATP Breach detection investigation & response Device protection Device integrity Device control Information protection BitLocker and BitLocker to Go Windows Information Protection Threat resistance SmartScreen Windows Firewall Microsoft Edge Device Guard Windows Defender Windows Hello :) Credential Guard Identity protection Device protection Device integrity Device control Threat resistance SmartScreen Windows Firewall Microsoft Edge Device Guard Windows Defender
  • 18. MICROSOFT EDGE: DESIGNED FOR SECURE BROWSING Eliminate vulnerabilities before attackers can find them Contain the damage when vulnerabilities are discovered Break exploitation techniques used by attackers Prevent navigation to known exploit sites Keep our customers safe when browsing the web Objective Make it difficult and costly for attackers to find and exploit vulnerabilities in Microsoft Edge Strategy Tactics ļƒ  ļƒ  Microsoft Edge is the most secure browser Microsoft has ever shipped
  • 19. WINDOWS DEFENDER APPLICATION GUARD Hypervisor Device Hardware Kernel Apps Windows Platform Services Kernel Windows Platform Services Microsoft Edge Kernel System Container Critical System Processes Windows Defender Application Guard Container Windows Operating System Hyper-V Hyper-V HARDWARE ISOLATION
  • 20. WINDOWS DEFENDER ADVANCED THREAT PROTECTION DETECT ADVANCED ATTACKS AND REMEDIATE BREACHES Unique threat intelligence knowledge base Unparalleled threat optics provide detailed actor profiles 1st and 3rd party threat intelligence data. Rich timeline for investigation Easily understand scope of breach. Data pivoting across endpoints. Deep file and URL analysis. Behavior-based, cloud-powered breach detection Actionable, correlated alerts for known and unknown adversaries. Real-time and historical data. Built into Windows No additional deployment & Infrastructure. Continuously up-to-date, lower costs.
  • 21. THE WINDOWS 10 DEFENSE STACK PROTECT, DETECT & RESPOND PRE-BREACH POST-BREACH Conditional Access Windows Defender ATP Breach detection investigation & response Device protection Device integrity Device control Information protection BitLocker and BitLocker to Go Windows Information Protection Threat resistance SmartScreen Windows Firewall Microsoft Edge Device Guard Windows Defender Windows Hello :) Credential Guard Identity protection Windows Hello :) Credential Guard Identity protection Threat resistance SmartScreen Windows Firewall Microsoft Edge Device Guard Windows Defender
  • 22. USER IDENTITY & AUTHENTICATION Windows 10
  • 23. shhh! Easily mishandled or lost (Hint: The user is the problem) SHARED SECRETS
  • 24. ļƒ  Improved security ļƒ  Fingerprintand facialrecognition ļƒ  Ease of use ļƒ  Impossible to forget ļƒ  VBS support BIOMETRIC MODALITIES
  • 25. THE WINDOWS 10 DEFENSE STACK PROTECT, DETECT & RESPOND PRE-BREACH POST-BREACH Conditional Access Windows Defender ATP Breach detection investigation & response Device protection Device integrity Device control Information protection BitLocker and BitLocker to Go Windows Information Protection Threat resistance SmartScreen Windows Firewall Microsoft Edge Device Guard Windows Defender Windows Hello :) Credential Guard Identity protection Windows Hello :) Credential Guard Identity protection Information protection BitLocker and BitLocker to Go Windows Information Protection
  • 26. Data Leakage 2HIPPA Secure Now, ā€œA look at the cost of healthcare data breaches,ā€ Art Gross, March 30, 2012 Have accidentallysent sensitive informationto the wrong person1 58% ā€¦of senior managersadmit to regularly uploadingwork files to a personal email or cloud account1 87% Average per record cost of a data breachacross all industries2 $240 PER RECORD 1Stroz Friedberg, ā€œOn The Pulse: Information Security In American Business,ā€ 2013
  • 27. DEVICE PROTECTION DATA SEPARATION LEAK PROTECTION SHARING PROTECTION DEVICE PROTECTION BitLocker enhancements in Windows 8.1 InstantGo 3rd party adoption Protect system and data when device is lost or stolen Containment Data separation DATA SEPARATION Prevent unauthorized users and apps from accessing and leaking data LEAK PROTECTION Protect data when shared with others, or shared outside of organizational devices and control SHARING PROTECTION YOUR INFORMATION PROTECTION NEEDS
  • 28. SHARING PROTECTION Protect all file types, everywhere they go, cloud, email, BYOD, ā€¦ Support for all commonly used devices and systems ā€“ Windows, OSX, iOS, Android Support for B2B and B2B via Azure AD Support for on premise and cloud based scenarios (e.g.: Office 365) Seamless easy to provision and support for FIPS 140-2 regulation and compliance Rights Management Services
  • 29. Your security depends on a platform where: APPS MUST EARN TRUST BEFORE USE DEVICE GUARD
  • 30. Ā© 2016 Microsoft Corporation. All rights reserved.