How can Cloud help your Security. Christophe Van Mollekot Solution Advisor Microsoft



Similar documents
The Education Fellowship Finance Centralisation IT Security Strategy

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Data In The Cloud: Who Owns It, and How Do You Get it Back?

How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015

White Paper How Noah Mobile uses Microsoft Azure Core Services

Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance. April 2015

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

Microsoft Azure. White Paper Security, Privacy, and Compliance in

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Microsoft s cybersecurity commitment

Media Shuttle s Defense-in- Depth Security Strategy

Azure Active Directory

Security & privacy in the cloud; an easy road?

Westcon Presentation on Security Innovation, Opportunity, and Compromise

SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

Microsoft SharePoint Architectural Models

SANS Top 20 Critical Controls for Effective Cyber Defense

Microsoft Azure. Microsoft Azure Security, Privacy, & Compliance

Identity & Access Management in the Cloud: Fewer passwords, more productivity

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

A Love Affair: Cyber Security, Big-data and Risk

Cyber Security. John Leek Chief Strategist

Appendix D-1 to Aproove Saas Contract : Security and solution hosting provider specs.

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

CA Arcot RiskFort. Overview. Benefits

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Cloud security architecture

Questionmark OnDemand

I believe. Satya Nadella CEO, Microsoft. History of making big bets

Protecting Data and Privacy in the Cloud

A HELPING HAND TO PROTECT YOUR REPUTATION

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Attachment A. Identification of Risks/Cybersecurity Governance

Office 365 Adoption & Risk Report

Building a Business Case:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Cloud Roadmap to Success. October, 2014

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

Microsoft Visual Studio Online Data Protection

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Cloud Security and Managing Use Risks

Securing the Microsoft Cloud Infrastructure. Reto Häni Chief Security Officer Microsoft Western Europe MEET SWISS INFOSEC!

The Protection Mission a constant endeavor

Cloud Security Who do you trust?

Big Data, Big Risk, Big Rewards. Hussein Syed

Ariett Purchasing & Expense Management. Go Paperless, Go Mobile, Go Easy.

Tableau Online Security in the Cloud

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

Virtualization Impact on Compliance and Audit

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

PCI Requirements Coverage Summary Table

Top Ten Technology Risks Facing Colleges and Universities

External Supplier Control Requirements

Brad Smith, General Counsel & Executive Vice President, Legal and Corporate Affairs, Microsoft

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

GoodData Corporation Security White Paper

GE Measurement & Control. Cyber Security for NEI 08-09

OVERVIEW OF MICROSOFT AZURE

White Paper. What is an Identity Provider, and Why Should My Organization Become One?

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

FINRA Publishes its 2015 Report on Cybersecurity Practices

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

Transform the datacenter. Henk Den Baes Technology Advisor Datacenter

Client Update SEC Releases Updated Cybersecurity Examination Guidelines

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Defensible Strategy To. Cyber Incident Response

THE TOP 4 CONTROLS.

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Presented by Evan Sylvester, CISSP

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Breaking the Cyber Attack Lifecycle

Five keys to a more secure data environment

Transcription:

How can Cloud help your Security Christophe Van Mollekot Solution Advisor Microsoft

Global datacenter footprint 100+ Datacenters in over 40 countries

Integral to business transformation 71% of strategic buyers cite scalability, cost and business agility as the most important drivers for using cloud services. Gigaom Research

Efficiently Scalability Scale

Test Costs & Dev

Agility

Global attacks are increasing and costs are rising Risk of cyber attacks can cost business up to $3 trillion a year 1 Cybercrime extracts between 15- of the value created by the Internet. 2 20% 91% agree consumers have lost control over how personal information is collected and used by companies 5 More than 800M in individual records were breached in 2013. 4 The number of recorded data breaches increased 78% 2014. 3

How can Cloud help your Security

How can Cloud help your Security No one is able to use your data in a way that you do not approve. Your content is stored and managed in compliance with applicable laws, regulations and standards. You have visibility into how your data is being handled and used.

12 Infrastructure protection 24 hour monitored physical security System monitoring and logging Patch management Anti-Virus/Anti-Malware protection Intrusion detection/ddos Penetration testing

Network protection Network isolation Encrypted connections Virtual Networks ExpressRoute

Identity & access Enterprise cloud identity Windows Azure AD Access monitoring Single sign-on Multi-Factor Authentication Role based access controls

15 Data protection Encrypted data transfer Encryption options for stored data Data segregation Choice of data location Data redundancy Data destruction

Traditional protect & recover security strategy

The mindset shift

Assume Breach FUNDAMENTALLY, IF SOMEBODY WANTS TO GET IN, THEY'RE GETTING IN ACCEPT THAT. WHAT WE TELL CLIENTS IS: NUMBER ONE, YOU'RE IN THE FIGHT, WHETHER YOU THOUGHT YOU WERE OR NOT. NUMBER TWO, YOU ALMOST CERTAINLY ARE PENETRATED. Michael Hayden Former Director of NSA & CIA

19 If you found out tomorrow that your most critical systems had been infiltrated or that your most critical data was being exfiltrated, would you be prepared to deal with the breach?

RED vs. BLUE All your bases BELONG to us

Assume Breach Execution Wargame exercises Monitor emerging threats Red teaming Execute post breach Insider attack simulation Blue teaming 22

Post Breach Execution Establish security baselines Time to detect Time to contain Time to fix Time to recover Framework to inventory damage Identify reactive security investments Update response plans If you measure MTTR in WEEKS/MONTHS/YEARS instead of hours/days, then YOU VE FAILED! 23

How can Cloud help your Security The confidentiality, integrity, and availability of your data is protected. Your content is stored and managed in compliance with applicable laws, regulations and standards. You have visibility into how your data is being handled and used.

We ll keep your data secure Your data is private and under your control We manage your data in accordance with the law You know what we re doing with your data

How can Cloud help your Security The confidentiality, integrity, and availability of your data is protected. No one is able to use your data in a way that you do not approve. You have visibility into how your data is being handled and used.

Microsoft Cloud Compliance Certifications

How can Cloud help your Security The confidentiality, integrity, and availability of your data is protected. No one is able to use your data in a way that you do not approve. Your content is stored and managed in compliance with applicable laws, regulations and standards.

Law Enforcement Requests http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/

Transparency Center Microsoft NDA-To be shared under NDA only

How can Cloud help your Security

One last word

An on-premises solution to identify advanced security attacks before they cause damage Comparison: Microsoft Advanced Threat Analytics brings this concept to IT and users of a particular organization Credit card companies monitor cardholders behavior. If there is any abnormal activity, they will notify the cardholder to verify charge.

An on-premises solution to identify advanced security attacks before they cause damage Behavioral Analytics Detection for known attacks and issues Advanced Threat Detection

Detect threats fast with Behavioral Analytics Adapt as fast as your enemies Focus on what is important fast using the simple attack timeline Reduce the fatigue of false positives

Thank You

Additional Resources Learn more about the Microsoft Enterprise Cloud Visit the Microsoft Trust Centers: Azure, Intune, Office 365, and Dynamics CRM Review the Microsoft Law Enforcement Request Report and US National Security Orders Report Read our blogs: Microsoft Cyber Trust and Microsoft On the Issues Follow us on Twitter: @MSFTSecurity