cybersecurity briefing deck - customer ready - long - v1 1
TRANSCRIPT
Colin Brown Solution Architect & Chief Security Advisor
Microsoft Enterprise Services, UK
The Evolving Landscape
Q&A, contacts and close.
Why Security and Identity are so important
The Microsoft Commitment to Cybersecurity
Understanding Cyberattacks
What All Customers Need to Do
Take Action
Agenda
The reason most cloud
projects fail to start is
because of Security
The reason most in flight cloud projects fail is because of Identity
Estimated shortfall of 1.5million by 2019
1 million new cybersecurity job openings in 2016
Unavailable or expensive to recruit
Customers will not be able to build their own teams and will be driven to service providers
Average cost of recovery from a single incident is $3.5million
This can rise to > $100million
Incidents are now a near certainty for everyone
“Assume breach” is the new security posture
People lose their jobs
Target’s CEO in the US
This is a boardroom level conversation
If you are not having it, someone else is
Satya Nadella KeynoteEnterprise security in a mobile-first, cloud-first world, November 2015
http://news.microsoft.com/security2015/
OUR NEWSECURITY POSTURE
!
DETECTusing targeted signals, behavioral monitoring, and machine learning
RESPONDclosing the gap between discovery and action
PROTECTacross all endpoints, from sensors to the datacenter
Satya Nadella Keynote
OUR UNIQUE PERSPECTIVE
300B user authentications each month
1B Windows devices updated
200B emails analyzed for spam and malware
CTIP Report: Company Y
Capabilities are embedded into offerings from Microsoft Enterprise Services.
• Microsoft Security Risk Assessment (MSRA)
• Microsoft Threat Detection Services (MTDS)
• Persistent Adversary Detection Services (PADS)
• Protect Microsoft’s cloud infrastructure, customer-facing cloud services, products and devices, and internal resources 24 x 7 x 365
• Unite personnel, technology, and analytics in a central hub
• Provide world-class security protection, detection, and response
• More than 50 Security Experts and Data Scientists
• Connected to >3500 Security Professionals across Microsoft
• Tight partnerships with Microsoft Research and the Security Development Lifecycle (SDL) team
Satya Nadella KeynoteCyber Defence Operations Center (CDOC)
24-48hours
What is a Typical Attack Profile?When you assume breach, you need to detect & respond ASAP
First HostCompromised
CYBERTHREATS
Domain AdminCompromised
DATA LOSS (Attacker Undetected) 7-10 months
Breach Discovered
Security Navigator – Know Your Position
Identity strategy
Technical appraisal of the security of Active Directory
Extent of environmental compromise and data exfiltration
Tactical recovery of compromise
Identity & Security assessment and strategy
Cybersecurity strategic recommendations
Integration, Planning, and OversightEmbedded Microsoft cybersecurity architect providing expert advice, supporting your Cybersecurity
Improvement Roadmap, and supporting successful integration into your organisation
CRITICAL MITIGATIONS THAT EVERY ORGANISATION MUST DO NOW
What All Customers Need to Do Other Critical Mitigations
Colin Brown
Solution Architect
Cybersecurity, Identity & Security
Microsoft Enterprise Services
+44-1189-095627
+44-7814-285280