Date post: | 12-Jan-2017 |
Category: |
Technology |
Upload: | microsoft-uk |
View: | 228 times |
Download: | 0 times |
CYBER SECURITY DEMYSTIFIED
Speaker NameJob role
Date
ASSUME BREACH: ATTACKS ON YOUR BUSINESS ARE INEVITABLE
34
21
Attack detected!Most breaches aren’t detected by the organisation itself, but by third parties such as banks, regulators and law enforcement agencies.
Execution of objectivesHaving achieved broader network access, attackers can now steal information at will, or compromise key systems.
Attack beginsMost attackers establish a ‘beachhead’ on the organisation’s network by stealing domain administrator credentials.
Planning the attackCyber attackers research the target organisation’s technology, processes and people to identify vulnerabilities.
-200 DAYS
75% of large organisations suffered a staff-related breach in 2015 HM Government 2015 Information Security Breaches Survey
243 days on average from breach to detection
In 60% of cases, attackers were able to compromise an organisation in minutes Verizon 2015 Data Breach Investigations Report
90% of large organisations suffered a security breach in 2015HM Government 2015 Information Security Breaches Survey
0 DAYS
FactWe champion customer data privacy more so than any other company
FactWe provide the utmost legal certainty available for EU-US data transfers
FactUp to 87% of public sector data can now be stored safely in the Microsoft cloud
FactThe Microsoft cloud is still safer and more reliable than most on-premises environments
CYBER SECURITY IS EVERYONE’S BUSINESS
EVOLVING LEADERSHIP RESPONSIBILITIES:Chief Marketing OfficerMust manage post-breach messages to customers, shareholders and the media, plus preparing board members for press interviews
Chief Sales OfficerSales staff must know how to protect against threats from working in public places. The CSO must pre-plan a clear response strategy and ensure staff members are familiar with it.
Chief Financial OfficerMust support a strict approach to information classification and handling across the organisation and ensure that clear mitigation and repair plans are in place.INDUSTRY FEARS:
Public sectorPolicy myths and data classification confusion slow cloud adoption
RetailCustomers worry if their data is safe from hackers, Nation States and government agencies
Financial servicesClarity around compliance, Safe Harbour and data ownership is needed
ManufacturingReports of outages and breaches sap the confidence of key stakeholders
A CLOUD YOU CAN TRUST
These principles play a key role in the protection and control of your data and make up the four pillars of a truly comprehensive cloud solution:
SECURITYWe will implement strong security measures to safeguard your data.
PRIVACYWe will provide you with control over your data
to help keep it private.
COMPLIANCEWe will help you meet your specific compliance needs.
TRANSPARENCYWe will explain what we do with your data
in clear, plain language.
Satya Nadella, Microsoft CEO
Businesses and users are going to embrace technology only if they can trust it.
“”
INTRODUCING THEMICROSOFT SECURITY PROGRAM
Windows HelloMicrosoft Passport
Customer LockBoxMicrosoft Exchange Online Protection
Microsoft Azure Active Directory
Credential Guard Device Guard Windows Defender Windows Update for Business
Advanced Threat Protection Microsoft Intune
Enterprise Data Protection Data Loss Prevention
Azure Rights ManagementAdvanced Threat Analytics
DEVICES& APPS
DATA
USERS
Enterprise Mobility Suite (EMS)
Satya Nadella, Microsoft CEO
As one of the largest cloud operators in the world, Microsoft has invested more than $15 billion in building a resilient cloud infrastructure and cloud services that deliver high availability and security while lowering overall costs.
“
”
OUR SECURITY POSTUREPROTECT - DETECT - RESPOND
OURSECURITY POSTURE
RESPONDEstablish a holistic, multidimensional approach to response
PROTECTToday’s cloud-first, mobile-first
world demands the highest level of identity and data
security in order to keep your business protected
DETECTDon’t wait 200 days to discover you’ve been breached. Invest in the tools and services that enable you to detect attacks faster
CYBER SECURITY DEMYSTIFIED
Download your free digital copy of the Cyber Security Demystified eBook and share it with your business stakeholders today:http://aka.ms/csdebook
AND IN THE MEANTIME…simple but important actions to improve your security today:6
6Educate yourself and your staff on the latest risks, common cyber crime methods and best practice 4
Don’t run software as an Administrator to mitigate risks
5Use firewall and antivirus software to spot threats
3Develop your software securely. Visit: microsoft.com/sdl to find out more 1
Make sure to regularly check and install the latest security updates 2
Use the most up to date versions of all software and use automatic updates where possible