+ All Categories
Home > Technology > Cyber Security Demistyified

Cyber Security Demistyified

Date post: 12-Jan-2017
Category:
Upload: microsoft-uk
View: 228 times
Download: 0 times
Share this document with a friend
7
CYBER SECURITY DEMYSTIFIED Speaker Name Job role Date
Transcript
Page 1: Cyber Security Demistyified

CYBER SECURITY DEMYSTIFIED

Speaker NameJob role

Date

Page 2: Cyber Security Demistyified

ASSUME BREACH: ATTACKS ON YOUR BUSINESS ARE INEVITABLE

34

21

Attack detected!Most breaches aren’t detected by the organisation itself, but by third parties such as banks, regulators and law enforcement agencies.

Execution of objectivesHaving achieved broader network access, attackers can now steal information at will, or compromise key systems.

Attack beginsMost attackers establish a ‘beachhead’ on the organisation’s network by stealing domain administrator credentials.

Planning the attackCyber attackers research the target organisation’s technology, processes and people to identify vulnerabilities.

-200 DAYS

75% of large organisations suffered a staff-related breach in 2015 HM Government 2015 Information Security Breaches Survey

243 days on average from breach to detection

In 60% of cases, attackers were able to compromise an organisation in minutes Verizon 2015 Data Breach Investigations Report

90% of large organisations suffered a security breach in 2015HM Government 2015 Information Security Breaches Survey

0 DAYS

Page 3: Cyber Security Demistyified

FactWe champion customer data privacy more so than any other company

FactWe provide the utmost legal certainty available for EU-US data transfers

FactUp to 87% of public sector data can now be stored safely in the Microsoft cloud

FactThe Microsoft cloud is still safer and more reliable than most on-premises environments

CYBER SECURITY IS EVERYONE’S BUSINESS

EVOLVING LEADERSHIP RESPONSIBILITIES:Chief Marketing OfficerMust manage post-breach messages to customers, shareholders and the media, plus preparing board members for press interviews

Chief Sales OfficerSales staff must know how to protect against threats from working in public places. The CSO must pre-plan a clear response strategy and ensure staff members are familiar with it.

Chief Financial OfficerMust support a strict approach to information classification and handling across the organisation and ensure that clear mitigation and repair plans are in place.INDUSTRY FEARS:

Public sectorPolicy myths and data classification confusion slow cloud adoption

RetailCustomers worry if their data is safe from hackers, Nation States and government agencies

Financial servicesClarity around compliance, Safe Harbour and data ownership is needed

ManufacturingReports of outages and breaches sap the confidence of key stakeholders

Page 4: Cyber Security Demistyified

A CLOUD YOU CAN TRUST

These principles play a key role in the protection and control of your data and make up the four pillars of a truly comprehensive cloud solution:

SECURITYWe will implement strong security measures to safeguard your data.

PRIVACYWe will provide you with control over your data

to help keep it private.

COMPLIANCEWe will help you meet your specific compliance needs.

TRANSPARENCYWe will explain what we do with your data

in clear, plain language.

Satya Nadella, Microsoft CEO

Businesses and users are going to embrace technology only if they can trust it.

“”

Page 5: Cyber Security Demistyified

INTRODUCING THEMICROSOFT SECURITY PROGRAM

Windows HelloMicrosoft Passport

Customer LockBoxMicrosoft Exchange Online Protection

Microsoft Azure Active Directory

Credential Guard Device Guard Windows Defender Windows Update for Business

Advanced Threat Protection Microsoft Intune

Enterprise Data Protection Data Loss Prevention

Azure Rights ManagementAdvanced Threat Analytics

DEVICES& APPS

DATA

USERS

Enterprise Mobility Suite (EMS)

Satya Nadella, Microsoft CEO

As one of the largest cloud operators in the world, Microsoft has invested more than $15 billion in building a resilient cloud infrastructure and cloud services that deliver high availability and security while lowering overall costs.

Page 6: Cyber Security Demistyified

OUR SECURITY POSTUREPROTECT - DETECT - RESPOND

OURSECURITY POSTURE

RESPONDEstablish a holistic, multidimensional approach to response

PROTECTToday’s cloud-first, mobile-first

world demands the highest level of identity and data

security in order to keep your business protected

DETECTDon’t wait 200 days to discover you’ve been breached. Invest in the tools and services that enable you to detect attacks faster

Page 7: Cyber Security Demistyified

CYBER SECURITY DEMYSTIFIED

Download your free digital copy of the Cyber Security Demystified eBook and share it with your business stakeholders today:http://aka.ms/csdebook

AND IN THE MEANTIME…simple but important actions to improve your security today:6

6Educate yourself and your staff on the latest risks, common cyber crime methods and best practice 4

Don’t run software as an Administrator to mitigate risks

5Use firewall and antivirus software to spot threats

3Develop your software securely. Visit: microsoft.com/sdl to find out more 1

Make sure to regularly check and install the latest security updates 2

Use the most up to date versions of all software and use automatic updates where possible


Recommended