+ All Categories
Home > Documents > Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Date post: 08-Feb-2017
Category:
Upload: colin-brown
View: 37 times
Download: 2 times
Share this document with a friend
58
Colin Brown Solution Architect & Chief Security Advisor Microsoft Enterprise Services, UK [email protected]
Transcript
Page 1: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Colin Brown Solution Architect & Chief Security Advisor

Microsoft Enterprise Services, UK

[email protected]

Page 2: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

The Evolving Landscape

Q&A, contacts and close.

Why Security and Identity are so important

The Microsoft Commitment to Cybersecurity

Understanding Cyberattacks

What All Customers Need to Do

Take Action

Agenda

Page 3: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 4: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 5: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 6: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Cloud Mobility

Page 7: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

The reason most cloud

projects fail to start is

because of Security

The reason most in flight cloud projects fail is because of Identity

Page 8: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 9: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Estimated shortfall of 1.5million by 2019

1 million new cybersecurity job openings in 2016

Unavailable or expensive to recruit

Customers will not be able to build their own teams and will be driven to service providers

Page 10: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 11: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Average cost of recovery from a single incident is $3.5million

This can rise to > $100million

Incidents are now a near certainty for everyone

“Assume breach” is the new security posture

People lose their jobs

Target’s CEO in the US

This is a boardroom level conversation

If you are not having it, someone else is

Page 12: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 13: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Securing the MSIT EnvironmentAn innovative digital foundation for our company

Page 14: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Microsoft Experience & CredentialsSecond decade of perspective & progress

Page 15: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Satya Nadella KeynoteEnterprise security in a mobile-first, cloud-first world, November 2015

http://news.microsoft.com/security2015/

Page 16: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

OUR NEWSECURITY POSTURE

!

DETECTusing targeted signals, behavioral monitoring, and machine learning

RESPONDclosing the gap between discovery and action

PROTECTacross all endpoints, from sensors to the datacenter

Satya Nadella Keynote

Page 17: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

OUR UNIQUE PERSPECTIVE

300B user authentications each month

1B Windows devices updated

200B emails analyzed for spam and malware

Page 18: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 19: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Capabilities are embedded into our products and cloud services

OUR SECURITY PLATFORM

Page 20: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

CTIP Report: Company Y

Capabilities are embedded into offerings from Microsoft Enterprise Services.

• Microsoft Security Risk Assessment (MSRA)

• Microsoft Threat Detection Services (MTDS)

• Persistent Adversary Detection Services (PADS)

Page 21: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Satya Nadella Keynote

Page 22: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

• Protect Microsoft’s cloud infrastructure, customer-facing cloud services, products and devices, and internal resources 24 x 7 x 365

• Unite personnel, technology, and analytics in a central hub

• Provide world-class security protection, detection, and response

• More than 50 Security Experts and Data Scientists

• Connected to >3500 Security Professionals across Microsoft

• Tight partnerships with Microsoft Research and the Security Development Lifecycle (SDL) team

Satya Nadella KeynoteCyber Defence Operations Center (CDOC)

Page 23: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 24: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 25: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 26: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Digital Crimes Unit and Malware Lab

Page 27: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 28: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 29: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 30: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 31: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 32: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 33: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 34: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 35: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 36: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

DEFENCE

IN DEPTH

Page 37: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

ASSUME BREACH

Page 38: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 39: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Understanding Cyber AttacksTypical attack stages

Page 40: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

What is a Typical Attack Profile?

Page 41: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

What is a Typical Attack Profile?

Page 42: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

What is a Typical Attack Profile?

Page 43: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

What is a Typical Attack Profile?

Page 44: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

What is a Typical Attack Profile?

Page 45: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

What is a Typical Attack Profile?

Page 46: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

What is a Typical Attack Profile?

Page 47: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

What is a Typical Attack Profile?

Page 48: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

24-48hours

What is a Typical Attack Profile?When you assume breach, you need to detect & respond ASAP

First HostCompromised

CYBERTHREATS

Domain AdminCompromised

DATA LOSS (Attacker Undetected) 7-10 months

Breach Discovered

Page 49: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

What is a Typical Attack Profile?

Page 50: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 51: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

What All Customers Need to Do Roadmap to improve your cybersecurity position

?

Page 52: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Security Navigator – Know Your Position

Identity strategy

Technical appraisal of the security of Active Directory

Extent of environmental compromise and data exfiltration

Tactical recovery of compromise

Identity & Security assessment and strategy

Cybersecurity strategic recommendations

Page 53: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

What All Customers Need to Do Roadmap to improve your cybersecurity position

?

Page 54: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Protect, Detect & Respond Cybersecurity, Identity & Security Solutions and Services

Respond

Detect

Protect

Cloud App

Security.

Azure AD

Identity

Protection.

Incident

Response

Secure &

Resilient AD

Program ––

SLAM

Cyb

erse

curity

Arch

itect E

ng

ag

em

en

t

Microsoft

Threat

Detection

Services

Incident

Recovery:

Tactical &

Strategic

Enhanced

Security Admin

Environment

EMS

Onboarding

Assistance

Azure AD

Implementation

Services

EMET

Reporting

Service

Design Services,

ADFS, FIM/MIM,

BitLocker, PKI,

DirectAccess,

Azure

Advanced Threat

Analytics

Implementation

Services Security

Incident

Response

Workshop

Secu

rity A

ssessm

en

t

Iden

tity A

ssessm

en

t

Secu

re D

evelo

pm

en

t Lifecy

cle A

ssessm

en

t

Users | Devices | Applications | Data

Azure AD RMS

Implementation

Services

Persistent

Adversary

Detection

Service

Page 55: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 56: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

ASSUME BREACH

Page 57: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0
Page 58: Cybersecurity Briefing Deck - Customer Ready - Long - v1 0

Colin Brown

Solution Architect

Cybersecurity, Identity & Security

Microsoft Enterprise Services

+44-1189-095627

+44-7814-285280

[email protected]


Recommended