SlideShare a Scribd company logo
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons it’s Written On - Alex Simons
Without great security,
Digital Identity is not worth
the electrons it’s written on
Alex Simons
DirectorofProgramManagement
MicrosoftCorporation
90%
organizations using
Microsoft Active
Directory WW
500M
10Bdaily Microsoft
Account logons
active Microsoft Account users 5.5M
organizations using
Microsoft Azure
Active Directory
>1,000
Microsoft engineers
working on Identity
and Security
The frequency and sophistication of cybersecurity attacks are
escalating
$500B
total potential cost
of cybercrime to the
global economy
$3.5M
average cost of a
data breach to a
company
200+
median # days attackers
reside within a victim’s
network before detection
network intrusions
due to compromised
user credentials
75%+
rule-based detection
static analysis
machine learning
anomaly detection
real-time risk scoring
device profiling
adaptive authentication
conditional access
smart cards
security tokens
OTPs & OATH codes
authenticator apps
biometrics
dedicated teams
threat intelligence
dark web
shared intelligence
bounties
Credential
Hardening
Dynamic
Mitigation
Attack
Intelligence
Advanced
Detection
On premises
In the cloud
Machine Learning
User and Entity Behavior Analytics
Brute force
cameroncameron1cameron2cameron3cameron4cameron5cameron6cameron7cameron8cameron9cameron10cameron11cameron12cameron13cameron14cameron15cameron16cameron17cameron18cameron19cameron25cameron26cameron27cameron28cameron29cameron30cameron31cameron32cameron33cameron34cameron35cameron36cameron37cameron38cameron39cameron40cameron41cameron42cameron43cameron44cameron45cameron46cameron47cameron48cameron49cameron50
ÛÛÛÛÛÛÛÛÛÛÛÛ
Monitoring abuse across tenants
Bad username
IP address: 199.34.28.10
Probable
Penetration
IP address: 199.34.28.10
Bad username
Bad password
Bad password
Bad username
Bad password
Bad username
Bad username
Logon Successful
Anonymizers
IP address: 199.34.28.10
IP address: 199.34.28.10
N
Botnets
192.168.1.10 10.18.91.42 172.16.4.19 192.168.1.12 172.16.11.14 199.34.28.10 192.168.9.5 172.16.21.98 10.129.6.21 172.16.5.2
172.16.42.2 192.168.14.11 172.16.82.14 10.111.4.53 192.168.21.1 10.34.71.5 172.16.87.9 192.168.28.10 172.16.25.6 10.4.221.34
199.34.28.10
199.34.28.10199.34.28.10
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons it’s Written On - Alex Simons
Security issues and risks
Broken trust
Weak protocols
Known protocol vulnerabilities
Malicious attacks
Pass-the-Ticket (PtT)
Pass-the-Hash (PtH)
Overpass-the-Hash
Forged PAC (MS14-068)
Golden Ticket
Skeleton key malware
Reconnaissance
BruteForce
Abnormal behavior
Anomalous logins
Remote execution
Suspicious activity
Unknown threats
Password sharing
Lateral movement
http://aka.ms/aadtrial
http://aka.ms/atatrial
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons it’s Written On - Alex Simons

More Related Content

PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
IoT security fresh thinking 2017 sep 9
PPTX
IoT Security Briefing FBI 07 23-2017 final
PPTX
The Future of Embedded and IoT Security: Kaspersky Operating System
PPTX
IoT Security: Cases and Methods [CON5446]
PDF
IoT security and privacy: main challenges and how ISOC-OTA address them
PDF
Internet of Things Security Patterns
PDF
IoT Security: How Your TV and Thermostat are Attacking the Internet
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
IoT security fresh thinking 2017 sep 9
IoT Security Briefing FBI 07 23-2017 final
The Future of Embedded and IoT Security: Kaspersky Operating System
IoT Security: Cases and Methods [CON5446]
IoT security and privacy: main challenges and how ISOC-OTA address them
Internet of Things Security Patterns
IoT Security: How Your TV and Thermostat are Attacking the Internet

What's hot (20)

PDF
IoT Security Challenges and Solutions
PDF
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
PPTX
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
PPTX
Zero Trust Cybersecurity for Microsoft Azure Cloud
PPTX
Next-generation Zero Trust Cybersecurity for the Space Age
PDF
IoT Security, Mirai Revisited
PPTX
IoT Security: Cases and Methods
PPTX
Iot Security
PDF
Ryan Wilson - ryanwilson.com - IoT Security
PPTX
Security for iot and cloud aug 25b 2017
PPTX
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PDF
Security in the Internet of Things
PPTX
Iot(security)
PPTX
Internet of Things Security
PPTX
Three ways-zero-trust-security-redefines-partner-access-ch
PPTX
Privacy and security in IoT
PPTX
LoginCat - Zero Trust Integrated Cybersecurity
PPTX
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
PPTX
Enabling Data Protection through PKI encryption in IoT m-Health Devices
IoT Security Challenges and Solutions
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Zero Trust Cybersecurity for Microsoft Azure Cloud
Next-generation Zero Trust Cybersecurity for the Space Age
IoT Security, Mirai Revisited
IoT Security: Cases and Methods
Iot Security
Ryan Wilson - ryanwilson.com - IoT Security
Security for iot and cloud aug 25b 2017
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Adopting A Zero-Trust Model. Google Did It, Can You?
Security in the Internet of Things
Iot(security)
Internet of Things Security
Three ways-zero-trust-security-redefines-partner-access-ch
Privacy and security in IoT
LoginCat - Zero Trust Integrated Cybersecurity
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Ad

Viewers also liked (6)

PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PPTX
CIS 2016 Content Highlights
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2016 Content Highlights
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
Ad

Similar to CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons it’s Written On - Alex Simons (20)

PPTX
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
PDF
Microsoft 365 Security Overview
PPTX
Identity and Security in the Cloud
PPTX
Fundamentals of Microsoft 365 Security , Identity and Compliance
PDF
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
PPTX
Securing your Organization with Microsoft 365
PDF
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PDF
Secure the modern Enterprise
PPTX
3 Modern Security - Secure identities to reach zero trust with AAD
PPTX
Get ahead of cybersecurity with MS Enterprise Mobility + Security
PDF
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
PDF
Protect your data in / with the Cloud
PPTX
Security and compliance in Office 365 -Part 1
PDF
Daniel Grabski | Microsofts cybersecurity story
PPTX
Azure Fundamentals Part 3
 
PPT
Identity Management: Risk Across The Enterprise
PDF
Microsoft 365 Enterprise Security with E5 Overview
PPTX
20181110 sps leicester connect protecting your data in office 365
PDF
December 2019 Microsoft 365 Need to Know Webinar
PDF
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
Microsoft 365 Security Overview
Identity and Security in the Cloud
Fundamentals of Microsoft 365 Security , Identity and Compliance
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Securing your Organization with Microsoft 365
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
Secure the modern Enterprise
3 Modern Security - Secure identities to reach zero trust with AAD
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Protect your data in / with the Cloud
Security and compliance in Office 365 -Part 1
Daniel Grabski | Microsofts cybersecurity story
Azure Fundamentals Part 3
 
Identity Management: Risk Across The Enterprise
Microsoft 365 Enterprise Security with E5 Overview
20181110 sps leicester connect protecting your data in office 365
December 2019 Microsoft 365 Need to Know Webinar
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans

More from CloudIDSummit (20)

PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
PDF
CIS 2015 The Ethics of Personal Data - Robin Wilton
PDF
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
PDF
CIS 2015 OpenID Connect and Mobile Applications - David Chase
PDF
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
PDF
DIRECTORY CIS 2015 - Eric Fazendin
PDF
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
PDF
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
PDF
CIS 2015 User Managed Access - George Fletcher
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
DIRECTORY CIS 2015 - Eric Fazendin
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CIS 2015 User Managed Access - George Fletcher

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Electronic commerce courselecture one. Pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Empathic Computing: Creating Shared Understanding
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Spectral efficient network and resource selection model in 5G networks
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)
Electronic commerce courselecture one. Pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Digital-Transformation-Roadmap-for-Companies.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Empathic Computing: Creating Shared Understanding
The AUB Centre for AI in Media Proposal.docx
Building Integrated photovoltaic BIPV_UPV.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectral efficient network and resource selection model in 5G networks

CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons it’s Written On - Alex Simons