+ All Categories
Home > Documents > Cybersecurity Briefing Deck - Customer Ready - Long - v1 1

Cybersecurity Briefing Deck - Customer Ready - Long - v1 1

Date post: 14-Apr-2017
Category:
Upload: colin-brown
View: 53 times
Download: 2 times
Share this document with a friend
62
Colin Brown Solution Architect & Chief Security Advisor Microsoft Enterprise Services, UK [email protected]
Transcript

Colin Brown Solution Architect & Chief Security Advisor

Microsoft Enterprise Services, UK

[email protected]

The Evolving Landscape

Q&A, contacts and close.

Why Security and Identity are so important

The Microsoft Commitment to Cybersecurity

Understanding Cyberattacks

What All Customers Need to Do

Take Action

Agenda

Cloud Mobility

The reason most cloud

projects fail to start is

because of Security

The reason most in flight cloud projects fail is because of Identity

Estimated shortfall of 1.5million by 2019

1 million new cybersecurity job openings in 2016

Unavailable or expensive to recruit

Customers will not be able to build their own teams and will be driven to service providers

Average cost of recovery from a single incident is $3.5million

This can rise to > $100million

Incidents are now a near certainty for everyone

“Assume breach” is the new security posture

People lose their jobs

Target’s CEO in the US

This is a boardroom level conversation

If you are not having it, someone else is

Securing the MSIT EnvironmentAn innovative digital foundation for our company

Microsoft Experience & CredentialsSecond decade of perspective & progress

Satya Nadella KeynoteEnterprise security in a mobile-first, cloud-first world, November 2015

http://news.microsoft.com/security2015/

OUR NEWSECURITY POSTURE

!

DETECTusing targeted signals, behavioral monitoring, and machine learning

RESPONDclosing the gap between discovery and action

PROTECTacross all endpoints, from sensors to the datacenter

Satya Nadella Keynote

OUR UNIQUE PERSPECTIVE

300B user authentications each month

1B Windows devices updated

200B emails analyzed for spam and malware

Capabilities are embedded into our products and cloud services

OUR SECURITY PLATFORM

CTIP Report: Company Y

Capabilities are embedded into offerings from Microsoft Enterprise Services.

• Microsoft Security Risk Assessment (MSRA)

• Microsoft Threat Detection Services (MTDS)

• Persistent Adversary Detection Services (PADS)

Satya Nadella Keynote

• Protect Microsoft’s cloud infrastructure, customer-facing cloud services, products and devices, and internal resources 24 x 7 x 365

• Unite personnel, technology, and analytics in a central hub

• Provide world-class security protection, detection, and response

• More than 50 Security Experts and Data Scientists

• Connected to >3500 Security Professionals across Microsoft

• Tight partnerships with Microsoft Research and the Security Development Lifecycle (SDL) team

Satya Nadella KeynoteCyber Defence Operations Center (CDOC)

Digital Crimes Unit and Malware Lab

IDENTITY IS THE

PERIMETER

DEFENCE

IN DEPTH

ASSUME

BREACH

Understanding Cyber AttacksTypical attack stages

What is a Typical Attack Profile?

What is a Typical Attack Profile?

What is a Typical Attack Profile?

What is a Typical Attack Profile?

What is a Typical Attack Profile?

What is a Typical Attack Profile?

What is a Typical Attack Profile?

What is a Typical Attack Profile?

24-48hours

What is a Typical Attack Profile?When you assume breach, you need to detect & respond ASAP

First HostCompromised

CYBERTHREATS

Domain AdminCompromised

DATA LOSS (Attacker Undetected) 7-10 months

Breach Discovered

What is a Typical Attack Profile?

What All Customers Need to Do Roadmap to improve your cybersecurity position

?

Security Navigator – Know Your Position

Identity strategy

Technical appraisal of the security of Active Directory

Extent of environmental compromise and data exfiltration

Tactical recovery of compromise

Identity & Security assessment and strategy

Cybersecurity strategic recommendations

What All Customers Need to Do Roadmap to improve your cybersecurity position

?

Integration, Planning, and OversightEmbedded Microsoft cybersecurity architect providing expert advice, supporting your Cybersecurity

Improvement Roadmap, and supporting successful integration into your organisation

CRITICAL MITIGATIONS THAT EVERY ORGANISATION MUST DO NOW

What All Customers Need to Do Other Critical Mitigations

ASSUME BREACH

Colin Brown

Solution Architect

Cybersecurity, Identity & Security

Microsoft Enterprise Services

+44-1189-095627

+44-7814-285280

[email protected]


Recommended