productivity future vision › 2015 › 05 › 4-ms-reto...2015/05/04 · microsoft productivity...
TRANSCRIPT
MicrosoftProductivity Future Vision
THE WORLD HAS CHANGED
Security Challenges Change
MicrosoftProductivity Future Vision
2013 2014 2015 2016 2017 20192018
20
15
10
5 INTERNET OF THINGS
PC, SMARTPHONE & TABLET
GROWTH OF CONNECTED DEVICES
BILLIONS OF UNITS
0
MicrosoftProductivity Future Vision
442020
ZETTABYTES
OF DATA4.42013
0.162006
1 ZETTABYTE = 1 B TERABYTES
MicrosoftProductivity Future Vision
S AT YA N A D E L L A
“ W H AT I S S CA RCE
I N A L L O F T H I S A B U N DA N C E
I S H UM A N AT T E N T I O N ”
MicrosoftProductivity Future Vision
OLD WORLD
Information scarce
Static hierarchies
Compete to win
Individual productivity
Focus on planning ahead
Efficiency of process
NE W WORLD
Information abundant
Dynamic networks
Collaborate to win
Collective value creation
Experiment, learn and respond
Effectiveness of outcomes
THE SHIFT
MicrosoftProductivity Future Vision
BRINGING PEOPLE
TOGETHER
C O L L A B O R A T I V E
L IV ING
SMARTER
I N T E L L I G E N T
FRICTION-FREE
CRE ATIVIT Y
N A T U R A L
FLUID
MOBIL IT Y
M O B I L E
HUMANACTIVITY
MicrosoftProductivity Future Vision
At the Core: Security and Privacy
10
Managing risk in an increasingly connected world
“This Nexus of Forces is impacting
security in terms of new vulnerabilities.
–Ruggero Contu, Christian Canales and Lawrence Pingree. Forecast Overview: Information Security, Worldwide, 2014 Update. Gartner, Inc. June 25, 2014.
Impact of cyber attacks could be
as much as $3 trillion in lost
productivity and growth
ImplicationsJob security Customer loyalty
Intellectual property
Legal liabilityBrand reputation
$ 3.5MAverage cost of
a data breach toa company
15 % increase YoY
median # of days attackers are
present on a victim network
before detection205
level issue
is a
CxO
Security
Because we are under attack
Indiscriminate Targeted
Consumer Enterprise Target
Single Vector Multi-vector
Manual Automated
Desktop Device and Cloud
Visible Concealed
Lone Agent Organised Ecosystem
Spam Information Theft
Information Theft Process Disruption
“The world is changing very fast. Big will not beat small anymore. It will be the fast
beating the slow.” Rupert Murdoch
Verizon, “2015 Data Breach Investigations Report”
63%Percentage of total security
incidents in 2014 were directed
toward public sector
Primary targetsPublic Sector, Information, Financial Services
Manufacturing & Retail are the primary
targets
Coordination
CollaborationDisruption
set policies and principles
identify, block, sinkhole
Seize, prosecute, takedown
security by design
identify, block, partner
starve and inform
Anti-malware and
security ecosystem
Large-scale Public Services
Cloud Providers, Telco’s
Government Enterprises
OEMs
Vendors
CERTs, ISPs &
Law Enforcement
How do we win?It will take a partnership
Microsoft Experience and Credentials
On personal devices
24 x 7 collaborationOn the road In the officeAt home
Through social media
Today: Cloud First, Mobile First
Elements to a Resilient Infrastructure
Protect Detect
Threat Information
Management
Response
18
Resilience against modern
Cyberthreats
-
The Hockey Analogy
19
Coaching
Management
Build the Foundation for Success and Adapt to
Changes
20
Goalie
Protect
Patch, Deploy Newer Products, Apply the SDL
21
Awareness
Detect
Active Attacks
22
Defense
Response
Customer, CSS and Cybersecurity Team
Intelligence
Threat Information
24
Protect
Patch, Deploy Newer
Products, Apply the SDL
Detect
Active Attacks
Response
Customer, CSS and
Cybersecurity Incident
Response
Threat Information
Management
Overa
ll In
tern
et
Resi
lien
ce (
Eco
syst
em
)
Overa
ll R
esi
lien
ce o
f an
Org
an
izati
on
s
IT In
frast
ruct
ure
Security framework: achieving overall resilience
Cloud Resilience
On-Premises Systems Resilience
Aggressively fight
cybercrime and advocate
extensively for enhancing
cybersecurity
Deep Investment in
building a trustworthy
computing platform
and security expertise
Trust in your provider that they are protecting their customers and are a global cybersecurity advocate
Strong principles and
policies that empower
you to be in control of
your information
SecurityPrivacy
Compliance
Transparency
AdvocacyRisk management Governance
MICROSOFT CONFIDENTIAL
Access to a Transparency Center to work directly with source code for certain
high-volume products
Remote access to online source code for certain high-volume products
Technical data about products and services, including about Microsoft’s cloud
services
Information sharing about threats and vulnerabilities from Microsoft
Core Investments
InformationProtection
Secure Identities
Threat Resistance
WINDOWS 10 PROTECTS YOU FROM MODERN SECURITY THREATS
Protect Microsoft & Showcase Learnings
Remote Security Incident Support
On-Site Security Incident Response
AdvisoryServices
Security Solutions & Consulting
Advanced Tools & Technologies
MCS Cybersecurity Services
The Microsoft Digital Crimes Unit (DCU)The Digital Crimes Unit is an international legal and
technical team working with partners, to help create a
safe digital world, by working on issues such as:
• Malicious software crimes
• IP crimes
• Protecting vulnerable populations
The team applies legal and technical expertise to help
enhance cloud security and make the digital world safe
for everyone.
• DCU brings cybercrime experts across the areas of IP crimes,
botnets, malware, and child exploitation under one umbrella,
so that when focus areas intersect we can work better
together to eliminate cyber threats to Microsoft’s businesses,
customers, and the entire digital ecosystem.
• With cooperation across industry, criminal law enforcement
organizations, academia, and NGOs worldwide, DCU aims to
put cybercriminals out of business and create a safe online
experience for everyone.
Every second, 12 people
are victims of cybercrime –
nearly 400 million every
year*
1 in 5 small and medium
enterprises are targeted by
cyber criminals**
Cybercrime costs
consumers $113 billion a
year*
50% of online adults have
been victims in the past
year
Online Child ExploitationThe NCMEC has reviewed more than 90
million images and videos of child
pornography.***
Financial Fraud53% of the world’s securities exchanges were
targeted in 2012
* 2013 Norton Report
** National Cyber Security Alliance
*** National Center for Missing and
Exploited Children
It’s your data
Key Principles for Security and Transparency