SlideShare a Scribd company logo
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
“WHAT HAPPENED AT THE CITY OF
XXX ?”
IMPACT
Own domain Delete backups Exfiltrate data Redirect funds Ransom Botnet
ESCALATION
Pass the hash Pass the ticket
RECON
Target recon Network traversal Mailbox persistence Device persistence
ENTRY
PHISHING
Spear, whaling, trusted user
PASSWORD
Brute force, spray
KNOWN VULNERABILITIES
OS, database, apps
Video
CYBERSECURITY BY THE NUMBERS
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
AUTOMATION
of investigation and
response
INTEGRATION of all
components for coordinated
insights and response
FOUNDATIONS OF A MODERN SECURITY
PLATFORM
MACHINE LEARNING and AI
to separate signal and noise
CLOUD
SCALE
real-time
threat intel
“By 2020, 30% of security
spending will be on vendors that
provide an integrated platform
approach to security”
– 2017 IDC FutureScape report
AN ARGUMENT FOR UTILITY
COMPUTING
IN THE CYBER FIGHT
Hyperscale cloud vendors will far outspend even the Fortune
5 on security because their business model is TRUST.
Radically different economics - customers get access to 1B
in cyber spend, only pay for a “slice”.
Move to cloud is part of a sound risk management strategy –
i.e. transferring risk
Cloud helps you stay continually patched and compliant
Certs AND a track record
Action How We Can Partner
Self-service
Fast
Track
Premier MCS Partner
10. Deploy Azure Backup and Recovery services     
9. Move doc stores to OneDrive for Business     
8. Automate info protection and classification     
7. Deploy Win 10 and Cred Guard to all clients.    
6. Deploy Endpoint Protection with automated
investigation/remediation.
   
5. Monitor and reduce time-to-patch    
4. Deploy next gen Security Information and Event
Management tools
   
3. Deploy behavior-analysis content scanning    
2. Leverage Microsoft Secure Score best practices across
Identity, Office 365, Windows clients and servers.
   
1. Deploy phishproof identities for all users, including
Just-In-Time and Just-Enough admin accounts.
   
BRAKES ARE WHAT ALLOW THE CAR
TO GO FASTER.
FINALLY, PLEASE REMEMBER…
Q & A
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
Our most unique global asset in the
fight, informed by trillions of feeds.
Machine learning helps sort the
signal from the noise. This signal is
leveraged across all of Microsoft’s
security services.
450B
monthly
authentications
18+B
Bing web pages
scanned750M+
Azure user
accounts
Enterprise
security for
90%
of Fortune 500
Malware data
from Windows
Defender
Shared threat
data from partners,
researchers and law
Enforcement
worldwide
Botnet data from
Microsoft Digital
Crimes Unit
1.2B
devices scanned
each month
400B
emails analyzed
200+
global cloud
consumer and
Commercial services
INTELLIGENT SECURITY GRAPH
Back

More Related Content

PPTX
CASB Cases: How Your Peers are Securing the Cloud
PPTX
The Future of CASBs - A Cloud Security Force Awakens
PDF
Sacon - IoT Hackfest (Sri Chakradhar K)
PPTX
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
PDF
SACON - Incident Response Automation & Orchestration (Amit Modi)
PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
PDF
Trend Micro 10 Minute Overview
PDF
Trend Micro Solutions Overview
CASB Cases: How Your Peers are Securing the Cloud
The Future of CASBs - A Cloud Security Force Awakens
Sacon - IoT Hackfest (Sri Chakradhar K)
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
SACON - Incident Response Automation & Orchestration (Amit Modi)
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Trend Micro 10 Minute Overview
Trend Micro Solutions Overview

What's hot (20)

PPTX
Webinar Express: What is a CASB?
PDF
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
PPTX
Zero Trust Cybersecurity for Microsoft Azure Cloud
PPTX
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
PPTX
The Top Three 2021 Cyber Threats
PPTX
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
PDF
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
PPTX
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
PDF
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
PDF
Cloud & Cybersecurity
PDF
API Security Needs AI Now More Than Ever
PDF
What is Cloud and what are the best practices?
PDF
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
PPTX
Cloud Security Strategy by McAfee
PPTX
Jun 15 privacy in the cloud at financial institutions at the object managemen...
PDF
Zero Trust Enterprise Network at Adobe
DOCX
Cloud Access Security Broker (CASB)
PDF
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
PPTX
CASBs - A New Hope
PPTX
Cybersecurity 2020 the biggest threats to watch out for
Webinar Express: What is a CASB?
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Zero Trust Cybersecurity for Microsoft Azure Cloud
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
The Top Three 2021 Cyber Threats
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
Cloud & Cybersecurity
API Security Needs AI Now More Than Ever
What is Cloud and what are the best practices?
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
Cloud Security Strategy by McAfee
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Zero Trust Enterprise Network at Adobe
Cloud Access Security Broker (CASB)
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
CASBs - A New Hope
Cybersecurity 2020 the biggest threats to watch out for
Ad

Similar to CE Cybersecurity Trends and Strategies for Hosting in the Cloud (20)

PDF
Daniel Grabski | Microsofts cybersecurity story
PDF
Secure the modern Enterprise
PDF
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PDF
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PDF
Microsoft 365 Security and Compliance
PPTX
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
DOCX
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
PDF
“8th National Biennial Conference on Medical Informatics 2012”
PDF
Session 1: Windows 8 with Gerry Tessier
PDF
Turning the tables talk delivered at CCISDA conference
PPTX
Softchoice & Microsoft: Public Cloud Security Webinar
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PDF
Strategy Cloud and Security as a Service
PDF
ScotSecure Cyber Security Summit 2025 Edinburgh
PPTX
What affects security program confidence? - may2014 - bill burns
PDF
Unveiling the Latest Threat Intelligence Practical Strategies for Strengtheni...
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PDF
Microsoft Azure Security Techniquesand How Azure security can enhance your or...
Daniel Grabski | Microsofts cybersecurity story
Secure the modern Enterprise
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
Microsoft 365 Security and Compliance
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
“8th National Biennial Conference on Medical Informatics 2012”
Session 1: Windows 8 with Gerry Tessier
Turning the tables talk delivered at CCISDA conference
Softchoice & Microsoft: Public Cloud Security Webinar
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Strategy Cloud and Security as a Service
ScotSecure Cyber Security Summit 2025 Edinburgh
What affects security program confidence? - may2014 - bill burns
Unveiling the Latest Threat Intelligence Practical Strategies for Strengtheni...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Microsoft Azure Security Techniquesand How Azure security can enhance your or...
Ad

More from Case IQ (20)

PPTX
How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
PPTX
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
PPTX
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
PPTX
Protecting the Mental Wellbeing of Corporate Investigators
PPTX
Meric Bloc_Webinar Nov22.pptx
PPTX
5 Steps to Creating an Ethical Work Culture
PPTX
How to Assess, Level Up, and Leverage Your Culture of Compliance
PPTX
Everything You Need to Get E&C Investigations Right (According to the DOJ)
PPTX
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
PPTX
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
PPTX
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
PPTX
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
PPTX
What is Psychological Safety in the Workplace?
PPTX
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
PPTX
Building Effective Sexual Harassment Prevention Policies and Training
PPTX
How to recognize and minimize unconscious bias in the workplace
PPTX
Search Engine Skills for Workplace Investigators
PPTX
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
PPTX
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
PPTX
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
How Best Practices in Triage Protocol Can Boost Compliance and Reduce Risk
How to Drive Efficiency and Reduce Risk with Investigative Case Management So...
Who's Lying? Using the Cognitive Interview to Assess Credibility in Workplace...
Protecting the Mental Wellbeing of Corporate Investigators
Meric Bloc_Webinar Nov22.pptx
5 Steps to Creating an Ethical Work Culture
How to Assess, Level Up, and Leverage Your Culture of Compliance
Everything You Need to Get E&C Investigations Right (According to the DOJ)
5 Ways to Build Employee Trust for Less Turnover and Fewer Incidents
Hybrid Workplace Harassment: Are You Protecting Your Company from Hidden Thre...
Finding Value Before a Crisis: How Workplace DEI Drives Revenue and Prevents ...
How Not to Get Called Out on TikTok: Improving Your Brand Through Employer/Em...
What is Psychological Safety in the Workplace?
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Building Effective Sexual Harassment Prevention Policies and Training
How to recognize and minimize unconscious bias in the workplace
Search Engine Skills for Workplace Investigators
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
Teaching material agriculture food technology
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Approach and Philosophy of On baking technology
PPTX
A Presentation on Artificial Intelligence
PDF
Modernizing your data center with Dell and AMD
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Cloud computing and distributed systems.
PDF
cuic standard and advanced reporting.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
KodekX | Application Modernization Development
Building Integrated photovoltaic BIPV_UPV.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Review of recent advances in non-invasive hemoglobin estimation
Teaching material agriculture food technology
NewMind AI Monthly Chronicles - July 2025
Spectral efficient network and resource selection model in 5G networks
Approach and Philosophy of On baking technology
A Presentation on Artificial Intelligence
Modernizing your data center with Dell and AMD
Advanced methodologies resolving dimensionality complications for autism neur...
Cloud computing and distributed systems.
cuic standard and advanced reporting.pdf
20250228 LYD VKU AI Blended-Learning.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Network Security Unit 5.pdf for BCA BBA.
MYSQL Presentation for SQL database connectivity
KodekX | Application Modernization Development

CE Cybersecurity Trends and Strategies for Hosting in the Cloud

  • 3. “WHAT HAPPENED AT THE CITY OF XXX ?” IMPACT Own domain Delete backups Exfiltrate data Redirect funds Ransom Botnet ESCALATION Pass the hash Pass the ticket RECON Target recon Network traversal Mailbox persistence Device persistence ENTRY PHISHING Spear, whaling, trusted user PASSWORD Brute force, spray KNOWN VULNERABILITIES OS, database, apps Video
  • 6. AUTOMATION of investigation and response INTEGRATION of all components for coordinated insights and response FOUNDATIONS OF A MODERN SECURITY PLATFORM MACHINE LEARNING and AI to separate signal and noise CLOUD SCALE real-time threat intel “By 2020, 30% of security spending will be on vendors that provide an integrated platform approach to security” – 2017 IDC FutureScape report
  • 7. AN ARGUMENT FOR UTILITY COMPUTING IN THE CYBER FIGHT Hyperscale cloud vendors will far outspend even the Fortune 5 on security because their business model is TRUST. Radically different economics - customers get access to 1B in cyber spend, only pay for a “slice”. Move to cloud is part of a sound risk management strategy – i.e. transferring risk Cloud helps you stay continually patched and compliant Certs AND a track record
  • 8. Action How We Can Partner Self-service Fast Track Premier MCS Partner 10. Deploy Azure Backup and Recovery services      9. Move doc stores to OneDrive for Business      8. Automate info protection and classification      7. Deploy Win 10 and Cred Guard to all clients.     6. Deploy Endpoint Protection with automated investigation/remediation.     5. Monitor and reduce time-to-patch     4. Deploy next gen Security Information and Event Management tools     3. Deploy behavior-analysis content scanning     2. Leverage Microsoft Secure Score best practices across Identity, Office 365, Windows clients and servers.     1. Deploy phishproof identities for all users, including Just-In-Time and Just-Enough admin accounts.    
  • 9. BRAKES ARE WHAT ALLOW THE CAR TO GO FASTER. FINALLY, PLEASE REMEMBER…
  • 10. Q & A
  • 13. Our most unique global asset in the fight, informed by trillions of feeds. Machine learning helps sort the signal from the noise. This signal is leveraged across all of Microsoft’s security services. 450B monthly authentications 18+B Bing web pages scanned750M+ Azure user accounts Enterprise security for 90% of Fortune 500 Malware data from Windows Defender Shared threat data from partners, researchers and law Enforcement worldwide Botnet data from Microsoft Digital Crimes Unit 1.2B devices scanned each month 400B emails analyzed 200+ global cloud consumer and Commercial services INTELLIGENT SECURITY GRAPH Back

Editor's Notes

  • #5: 1 Bitsight report cited in NPR article 2 Verizon 2017 Data Breach Report 3 Verizon 2017 Data Breach Report 4 Microsoft Incident Response team 5 2017 Global Information Security Workforce Study 6 Forbes 7 Slate https://slate.com/technology/2015/07/opm-head-katherine-archuleta-resigns-over-data-breach.html
  • #14: To defend against attacks that are ruthlessly fast and extraordinarily complex, the need for sophisticated software utilizing machine learning and operating on as much data as possible has never been greater. This is where we offer something very unique and powerful to every consumer and every organization. We have been quietly building something incredible: The Microsoft Intelligent Security Graph. Every second we are adding hundreds of GBs worth of the telemetry to the Graph. This anonymized data is coming from the 100’s of global cloud services we operate, consumer and commercial, data about the threats faced by the +1B PCs we update via Windows Update every month, aggregated with external data points we collect through extensive research, partnership with industry and law enforcement through our Digital Crime Units, and our Cybersecurity Defense Operations Center. To give you a sense on what that means, we add to the Security Graph with data from the 300B monthly authentications across our consumer and enterprise services, as well as the 200B e-mails that are analyzed each month for malware and malicious web sites. We receive trillions of pieces of data from billions of devices. http://www.gettyimages.com/license/545863031