SlideShare a Scribd company logo
Secure the modern Enterprise
“Security is like oxygen.
When you have it, you don't
notice it. But when it’s gone,
you don’t survive long.”
Jessi Hempel
Former Senior Writer, WIRED
WIRED, “DOD Head Ashton Carter Enlists Silicon Valley to Transform
the Military,” November 18, 2015
“Cybersecurity is like going
to the gym. You can’t get
better by watching others,
you’ve got to get there
every day.”
Satya Nadella
CEO, Microsoft
@satyanadella #FIF2017
“People will only use
technology they trust.”
Brad Smith
President & Chief Legal Officer
Microsoft Corporation
Secure the modern Enterprise
Secure the modern Enterprise
200 DAYS between infiltration and detection
HOW DO BREACHES OCCUR?
Malware and
vulnerabilities are
not the only thing
to worry about
99.9%
of exploited Vulnerabilities were
used more than a year after the
CVE was published
46%
of compromised systems had
no malware on them
50%
of those who open and click
attachments do so within the
first hour
23%
of recipients opened phishing
messages (11% clicked on
attachments)
Fast and effective
phishing attacks
leave you little
time to react
74%
of the world’s businesses
expect to be hacked
in the coming year
Secure the modern Enterprise
Secure the modern Enterprise
Microsoft is meeting customer security needs with the industry's largest compliance
portfolio
ISO
27001
PCI DSS Level 1 * SOC 2 Type 2
ISO
27018
Cloud Controls
Matrix
Content Delivery and
Security Association *
Shared
Assessments
SOC 1 Type 2
Worldwide
INDUSTRY’S LARGEST COMPLIANCE PORTFOLIO
Government
FIPS 140-2 DISA Level 2FERPAFedRAMP
JAB P-ATO
FISMACJIS21 CFR
Part 11
IRS 1075Section 508
VPAT
United Kingdom
G-Cloud
NIST 800-
171
National
European Union
Model Clauses
Singapore
MTCS Level 3
New Zealand
GCIO
Australian Signals
Directorate
Japan
Financial
Services
Spain ENS
ENISA
IAF
HIPAA /
HITECH
EU-U.S.
Privacy Shield
China MLPS*,
TRUCS*, GB
18030*
https://www.microsoft.com/en-us/trustcenter/compliance/complianceofferings
ASSUME BREACH!
!
Secure the modern Enterprise
Secure the modern Enterprise
Apps and Data
SaaS
Analysis & Action
Digital Crimes Unit Hunting Teams Security Response Center Malware Protection Center
Device
Antivirus
Network
Infrastructure
Cyber Defense
Operations Center
CERTs and
other partners
PaaS IaaS
Identity
The Microsoft Cyber Defense Operations Center
• Protect Microsoft’s cloud infrastructure, customer-
facing cloud services, products and devices, and
internal resources 24 x 7 x 365
• Unite personnel, technology, and analytics in a
central hub
• Provide world-class security protection, detection,
and response
• More than 50 Security Experts and Data Scientists
• Connected to >3500 Security Professionals across
Microsoft
• Tight partnerships with Microsoft Research and the
Security Development Lifecycle (SDL) team
Focusing
on Trust
MICROSOFT CONFIDENTIAL
Access to a Transparency Center to work directly with source code for certain
high-volume products
Remote access to online source code for certain high-volume products
Technical data about products and services, including about Microsoft’s cloud
services
Information sharing about threats and vulnerabilities from Microsoft
Microsoft Confidential
A safer digital experience for
every person and organization
on the planet
The Microsoft Digital
Crimes Unit
Public and private partnerships to fight
technology facilitated crimes
.
Combining novel legal strategies, cutting-
edge forensics, cloud and big data
analytics
SECURE MODERN ENTERPRISE
Identity Apps
and Data
Infrastructure Devices
Identity
Embraces identity as primary security perimeter and protects
identity systems, admins, and credentials as top priorities
Apps and Data
Aligns security investments with business priorities including
identifying and securing communications, data, and applications
Infrastructure
Operates on modern platform and uses cloud intelligence to
detect and remediate both vulnerabilities and attacks
Devices
Accesses assets from trusted devices with hardware security
assurances, great user experience, and advanced threat detectionSecure Platform (secure by design)
Secure Platform (secure by design)
SECURE MODERN ENTERPRISE
Identity Apps
and Data
Infrastructure Devices
Phase 2: Secure the Pillars
Phase 1: Build the
Security Foundation
Start the journey by getting in
front of current attacks
• Critical Mitigations – Critical
attack protections
• Attack Detection – Hunt for
hidden persistent adversaries
and implement critical attack
detection
• Roadmap and planning –
Share Microsoft insight on
current attacks and strategies,
build a tailored roadmap to
defend your organization’s
business value and mission
Phase 1: Build Security Foundation – Critical Attack Defenses
Phase 2:
Secure the Pillars
Continue building a secure
modern enterprise by
adopting leading edge
technology and approaches:
• Threat Detection – Integrate
leading edge intelligence and
Managed detection and
response (MDR) capabilities
• Privileged Access – continue
reducing risk to business
critical identities and assets
• Cloud Security Risk – Chart a
secure path into a cloud-
enabled enterprise
• SaaS / Shadow IT Risk –
Discover, protect, and monitor
your critical data in the cloud
• Device & Datacenter
Security – Hardware
protections for Devices,
Credentials, Servers, and
Applications
• App/Dev Security – Secure
your development practices
and digital transformation
components
Enterprise identity, security and cybersecurity
• Dynamic Identity Framework Assessment (DIF)
• Azure Active Directory Implementation Services
• Azure Active Directory B2C Architecture Services
• Microsoft Identity Management Foundation
• Design and Implementation for Active Directory (DIAD)
• Enterprise Federated Identity using AD Federation Services (EFI)
• Public Key Infrastructure using AD Certificate Services (PKI)
• Enterprise Modernization – Active Directory Upgrade
• Active Directory Migration Service (ADMS)
• Offline Assessment for Active Directory Security (OAADS)
• Privileged Access Workstation (PAW)
• Persistent Adversary Detection Services (PADS)
• ATA Implementation Services (ATA-IS)
• Enterprise Threat Detection (ETD)
• Enhanced Secure Administrative Environment (ESAE)
• Securing Lateral Account Movement (POP-SLAM)
• Incident Response and Tactical Recovery (I/R & T/R)
• Microsoft Security Risk Assessment
• Windows 10 Enterprise Security Integration Briefing
• Windows 10 security implementation services
• Information Protection using Azure Rights Management Service
• Shielded Virtual Machines (VM) Proof of Concept (PoC)
• Security Development Lifecycle Maturity Assessment
Enterprise services and cybersecurity offersMicrosoft products and capabilities
• Azure AD Identity Protection
• Advanced Threat Analytics
• Enterprise Mobility + Security
• Advanced Threat Protection
• Azure AD B2C
• Microsoft Identity Manager
• Azure Information Protection
• Windows Information
Protection
• Enterprise Mobility + Security
• Customer Lockbox
• Cloud App Security
• Azure SQL Security
• Windows 10
• Device Guard
• Credential Guard
• Windows Defender
• Windows Defender ATP
• Windows Server 2016
• Azure Security Center
• OMS Security Suite
• Shielded VMs
Contact: cyberservices@microsoft.com
PLAN ENTER TRAVERSE EXECUTE MISSION
4
Threat Actors exfiltrate PII and
other sensitive business data
Threat Actor targets employee(s)
via phishing campaign1
Workstation compromised, threat
actor gathers credentials2a
Threat Actors use stolen credentials to move laterally
3a
Employee B opens infected
email (Mobile or PC).
Attacker disables antivirus
2b Compromised credentials/
device used to access
cloud service / enterprise
environment
3bc
Credentials harvested
when employee logs into
fake website
2c
A. Enter and Navigate
Any employee opens
attack email
 Access to most/all
corporate data
B. Device Compromise
Targeted employee opens attack email
 Access to same data as employee
C. Remote Credential
Harvesting
Targeted employee(s) enter credentials in
website
 Access to same data as employee(s)
Common Attacks
Office 365 Technology
• Advanced Threat Protection
(requires E5)
EMS Technology
• Cloud App Security (CASB)
(requires E5)
Office 365 Technology
• Advanced Security Management
(basic CASB) (requires E5)
Azure Technology
• Multi-Factor Authentication
• Azure Identity Protection
Microsoft Incident Response Teams
can be engaged to investigate any
incident type as well as to assess your
organization for existing compromises
Windows 10 Technology
• SmartScreen URL and App reputation
• Application Guard
EMS Technology
• Azure Information Protection
(requires E5)
Office 365 Technology
• Data Loss Prevention
Windows 10 Technology
• Windows Information Protection
Azure Technology
• Disk, Storage, SQL Encryption
• Key Vault
• …
Any
Windows 10 Technology
• Device Guard
• Credential Guard
• Defender Advanced Threat Protection (requires E5)
Managed Detection and Response (MDR)
• Enterprise Threat Detection
Published Guidance
• Securing Privileged Access Roadmap
Professional Services
• Security Foundation
• Enhanced Security Admin Environment (ESAE)
Technology
• Advanced Threat Analytics (in EMS E3)
• Azure Security Center & Operations Management Suite (OMS)
• …and more
EMS Technology
• Intune conditional access
Managed Detection and Response (MDR)
• Enterprise Threat Detection (PCs only)
Secure the modern Enterprise
Secure the modern Enterprise
Secure the modern Enterprise
Secure the modern Enterprise
Secure the modern Enterprise
Secure the modern Enterprise
Secure the modern Enterprise
Secure the modern Enterprise
Secure the modern Enterprise
Secure the modern Enterprise
Secure the modern Enterprise
Secure the modern Enterprise
Why do you want to protect information?
Reduce leakage of data
shared with others
Partitioning of sensitive data
from unauthorized users
Prevent employees from
leaking secrets
Meet compliance
requirements (GDPR, …)
96%
94%
89%
87%
Secure the modern Enterprise
Protect devices with industry-leading
encryption, anti-malware technologies, and
identity and access solutions
Safeguard customer data in the cloud,
including personal data, with industry-leading
security measures and privacy policies
Secure your IT environment and achieve
compliance with enterprise-grade user and
administrative controls
Protect customer data both in the cloud, and
on-premises, with industry-leading security
capabilities
Safeguard customer data in the cloud,
including personal data, with industry-leading
security measures and privacy policies

More Related Content

PDF
Microsoft Digital Crimes Unit
PPSX
Thread Legal and Microsoft 365 Security
PDF
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
PDF
Introduction to Microsoft Enterprise Mobility + Security
DOCX
Security and Compliance In Microsoft Office 365 Whitepaper
PDF
Microsoft Advanced Security & Compliance
PDF
Msft cloud architecture_security_commonattacks
PPTX
2 Modern Security - Microsoft Information Protection
Microsoft Digital Crimes Unit
Thread Legal and Microsoft 365 Security
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Introduction to Microsoft Enterprise Mobility + Security
Security and Compliance In Microsoft Office 365 Whitepaper
Microsoft Advanced Security & Compliance
Msft cloud architecture_security_commonattacks
2 Modern Security - Microsoft Information Protection

What's hot (20)

PDF
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
PDF
Learn how to protect against and recover from data breaches in Office 365
PDF
Daniel Grabski | Microsofts cybersecurity story
PPTX
1 Modern Security - Keynote
PDF
Microsoft Office 365 Security and Compliance
PPTX
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
PPTX
Office365 security in depth
PDF
Azure information protection_datasheet_en-us
PDF
Emma Aubert | Information Protection
PDF
Risk based it auditing for non it auditors (basics of it auditing) final 12
PDF
Microsoft 365 Security and Compliance
PDF
SECURING THE CLOUD DATA LAKES
PPTX
Get ahead of cybersecurity with MS Enterprise Mobility + Security
PDF
Arbel Zinger | Microsoft Advanced Threat Analytics
PDF
Data loss prevention by using MRSH-v2 algorithm
PPTX
Microsoft Cloud Application Security Overview
PPTX
Azure information protection
PDF
Protect customer's personal information eng 191018
PPTX
3 Modern Security - Secure identities to reach zero trust with AAD
PPTX
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Learn how to protect against and recover from data breaches in Office 365
Daniel Grabski | Microsofts cybersecurity story
1 Modern Security - Keynote
Microsoft Office 365 Security and Compliance
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
Office365 security in depth
Azure information protection_datasheet_en-us
Emma Aubert | Information Protection
Risk based it auditing for non it auditors (basics of it auditing) final 12
Microsoft 365 Security and Compliance
SECURING THE CLOUD DATA LAKES
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Arbel Zinger | Microsoft Advanced Threat Analytics
Data loss prevention by using MRSH-v2 algorithm
Microsoft Cloud Application Security Overview
Azure information protection
Protect customer's personal information eng 191018
3 Modern Security - Secure identities to reach zero trust with AAD
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
Ad

Similar to Secure the modern Enterprise (20)

PDF
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PDF
go secure cloud.pdf
PPTX
microsoft-cybersecurity-reference-architectures (1).pptx
PPTX
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
PDF
Microsoft 365 Enterprise Security with E5 Overview
PPTX
Securely Harden Microsoft 365 with Secure Score
PDF
How to Build a Secure IT Infrastructure in 2025.
PDF
How You Can Keep Your Organization Secure
PDF
modernworkplacewithmicrosoft365-180213045346.pdf
PDF
Azure Security Overview
PDF
656704621-Against-Threats-and-Secure-Cloud-Environments-Presentation-Slides-F...
PPTX
Fundamentals of Microsoft 365 Security , Identity and Compliance
PPTX
Modern Workplace with Microsoft 365
PPTX
Webinar Mastering Microsoft Security von Baggenstos
PDF
Turning the tables talk delivered at CCISDA conference
PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
PPTX
cyber-security-reference-architecture
PPTX
Azure security and Compliance
PDF
CSS17: Houston - Azure Shared Security Model Overview
PPTX
TechTalksUtah-Sentinel-20191108.pptx
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
go secure cloud.pdf
microsoft-cybersecurity-reference-architectures (1).pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Microsoft 365 Enterprise Security with E5 Overview
Securely Harden Microsoft 365 with Secure Score
How to Build a Secure IT Infrastructure in 2025.
How You Can Keep Your Organization Secure
modernworkplacewithmicrosoft365-180213045346.pdf
Azure Security Overview
656704621-Against-Threats-and-Secure-Cloud-Environments-Presentation-Slides-F...
Fundamentals of Microsoft 365 Security , Identity and Compliance
Modern Workplace with Microsoft 365
Webinar Mastering Microsoft Security von Baggenstos
Turning the tables talk delivered at CCISDA conference
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
cyber-security-reference-architecture
Azure security and Compliance
CSS17: Houston - Azure Shared Security Model Overview
TechTalksUtah-Sentinel-20191108.pptx
Ad

More from Microsoft Österreich (20)

PDF
Shape the Future
PDF
Information Security @ AVL
PDF
Microsoft: #DigitaleHelden Symposium - Graphic Recording
PDF
Digitale Transformation: Technologie und Mensch - die nächsten 5 Jahre
PPTX
Digital Transformation "Book of Dreams"
PPTX
Smart Buildings & IoT
PDF
Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...
PDF
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...
PPTX
Modernes Rechenzentrum - Future Decoded
PPTX
Microsoft Trusted Cloud - Security Privacy & Control, Compliance, Transparency
PPTX
Microsoft Trusted Cloud - Harald Leitenmüller (Microsoft)
PDF
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - S&T
PDF
IMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOne
PDF
ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics
PDF
New World of Work - Solvion
PDF
Der Hund an der digitalen Leine - tractive
PDF
Der neue Office 365 Plan E5
PDF
Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...
PDF
Microsoft Lizenzierung – Server
PDF
ACP Referenz Österreich Werbung
Shape the Future
Information Security @ AVL
Microsoft: #DigitaleHelden Symposium - Graphic Recording
Digitale Transformation: Technologie und Mensch - die nächsten 5 Jahre
Digital Transformation "Book of Dreams"
Smart Buildings & IoT
Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...
Modernes Rechenzentrum - Future Decoded
Microsoft Trusted Cloud - Security Privacy & Control, Compliance, Transparency
Microsoft Trusted Cloud - Harald Leitenmüller (Microsoft)
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - S&T
IMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOne
ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics
New World of Work - Solvion
Der Hund an der digitalen Leine - tractive
Der neue Office 365 Plan E5
Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...
Microsoft Lizenzierung – Server
ACP Referenz Österreich Werbung

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
Teaching material agriculture food technology
PDF
Encapsulation theory and applications.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Spectral efficient network and resource selection model in 5G networks
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Modernizing your data center with Dell and AMD
Network Security Unit 5.pdf for BCA BBA.
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Teaching material agriculture food technology
Encapsulation theory and applications.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
20250228 LYD VKU AI Blended-Learning.pptx
Big Data Technologies - Introduction.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm

Secure the modern Enterprise

  • 2. “Security is like oxygen. When you have it, you don't notice it. But when it’s gone, you don’t survive long.” Jessi Hempel Former Senior Writer, WIRED WIRED, “DOD Head Ashton Carter Enlists Silicon Valley to Transform the Military,” November 18, 2015
  • 3. “Cybersecurity is like going to the gym. You can’t get better by watching others, you’ve got to get there every day.” Satya Nadella CEO, Microsoft @satyanadella #FIF2017
  • 4. “People will only use technology they trust.” Brad Smith President & Chief Legal Officer Microsoft Corporation
  • 7. 200 DAYS between infiltration and detection
  • 8. HOW DO BREACHES OCCUR? Malware and vulnerabilities are not the only thing to worry about 99.9% of exploited Vulnerabilities were used more than a year after the CVE was published 46% of compromised systems had no malware on them 50% of those who open and click attachments do so within the first hour 23% of recipients opened phishing messages (11% clicked on attachments) Fast and effective phishing attacks leave you little time to react
  • 9. 74% of the world’s businesses expect to be hacked in the coming year
  • 12. Microsoft is meeting customer security needs with the industry's largest compliance portfolio ISO 27001 PCI DSS Level 1 * SOC 2 Type 2 ISO 27018 Cloud Controls Matrix Content Delivery and Security Association * Shared Assessments SOC 1 Type 2 Worldwide INDUSTRY’S LARGEST COMPLIANCE PORTFOLIO Government FIPS 140-2 DISA Level 2FERPAFedRAMP JAB P-ATO FISMACJIS21 CFR Part 11 IRS 1075Section 508 VPAT United Kingdom G-Cloud NIST 800- 171 National European Union Model Clauses Singapore MTCS Level 3 New Zealand GCIO Australian Signals Directorate Japan Financial Services Spain ENS ENISA IAF HIPAA / HITECH EU-U.S. Privacy Shield China MLPS*, TRUCS*, GB 18030* https://www.microsoft.com/en-us/trustcenter/compliance/complianceofferings
  • 16. Apps and Data SaaS Analysis & Action Digital Crimes Unit Hunting Teams Security Response Center Malware Protection Center Device Antivirus Network Infrastructure Cyber Defense Operations Center CERTs and other partners PaaS IaaS Identity
  • 17. The Microsoft Cyber Defense Operations Center • Protect Microsoft’s cloud infrastructure, customer- facing cloud services, products and devices, and internal resources 24 x 7 x 365 • Unite personnel, technology, and analytics in a central hub • Provide world-class security protection, detection, and response • More than 50 Security Experts and Data Scientists • Connected to >3500 Security Professionals across Microsoft • Tight partnerships with Microsoft Research and the Security Development Lifecycle (SDL) team
  • 19. MICROSOFT CONFIDENTIAL Access to a Transparency Center to work directly with source code for certain high-volume products Remote access to online source code for certain high-volume products Technical data about products and services, including about Microsoft’s cloud services Information sharing about threats and vulnerabilities from Microsoft
  • 20. Microsoft Confidential A safer digital experience for every person and organization on the planet The Microsoft Digital Crimes Unit Public and private partnerships to fight technology facilitated crimes . Combining novel legal strategies, cutting- edge forensics, cloud and big data analytics
  • 21. SECURE MODERN ENTERPRISE Identity Apps and Data Infrastructure Devices Identity Embraces identity as primary security perimeter and protects identity systems, admins, and credentials as top priorities Apps and Data Aligns security investments with business priorities including identifying and securing communications, data, and applications Infrastructure Operates on modern platform and uses cloud intelligence to detect and remediate both vulnerabilities and attacks Devices Accesses assets from trusted devices with hardware security assurances, great user experience, and advanced threat detectionSecure Platform (secure by design)
  • 22. Secure Platform (secure by design) SECURE MODERN ENTERPRISE Identity Apps and Data Infrastructure Devices Phase 2: Secure the Pillars Phase 1: Build the Security Foundation Start the journey by getting in front of current attacks • Critical Mitigations – Critical attack protections • Attack Detection – Hunt for hidden persistent adversaries and implement critical attack detection • Roadmap and planning – Share Microsoft insight on current attacks and strategies, build a tailored roadmap to defend your organization’s business value and mission Phase 1: Build Security Foundation – Critical Attack Defenses Phase 2: Secure the Pillars Continue building a secure modern enterprise by adopting leading edge technology and approaches: • Threat Detection – Integrate leading edge intelligence and Managed detection and response (MDR) capabilities • Privileged Access – continue reducing risk to business critical identities and assets • Cloud Security Risk – Chart a secure path into a cloud- enabled enterprise • SaaS / Shadow IT Risk – Discover, protect, and monitor your critical data in the cloud • Device & Datacenter Security – Hardware protections for Devices, Credentials, Servers, and Applications • App/Dev Security – Secure your development practices and digital transformation components
  • 23. Enterprise identity, security and cybersecurity • Dynamic Identity Framework Assessment (DIF) • Azure Active Directory Implementation Services • Azure Active Directory B2C Architecture Services • Microsoft Identity Management Foundation • Design and Implementation for Active Directory (DIAD) • Enterprise Federated Identity using AD Federation Services (EFI) • Public Key Infrastructure using AD Certificate Services (PKI) • Enterprise Modernization – Active Directory Upgrade • Active Directory Migration Service (ADMS) • Offline Assessment for Active Directory Security (OAADS) • Privileged Access Workstation (PAW) • Persistent Adversary Detection Services (PADS) • ATA Implementation Services (ATA-IS) • Enterprise Threat Detection (ETD) • Enhanced Secure Administrative Environment (ESAE) • Securing Lateral Account Movement (POP-SLAM) • Incident Response and Tactical Recovery (I/R & T/R) • Microsoft Security Risk Assessment • Windows 10 Enterprise Security Integration Briefing • Windows 10 security implementation services • Information Protection using Azure Rights Management Service • Shielded Virtual Machines (VM) Proof of Concept (PoC) • Security Development Lifecycle Maturity Assessment Enterprise services and cybersecurity offersMicrosoft products and capabilities • Azure AD Identity Protection • Advanced Threat Analytics • Enterprise Mobility + Security • Advanced Threat Protection • Azure AD B2C • Microsoft Identity Manager • Azure Information Protection • Windows Information Protection • Enterprise Mobility + Security • Customer Lockbox • Cloud App Security • Azure SQL Security • Windows 10 • Device Guard • Credential Guard • Windows Defender • Windows Defender ATP • Windows Server 2016 • Azure Security Center • OMS Security Suite • Shielded VMs Contact: cyberservices@microsoft.com
  • 24. PLAN ENTER TRAVERSE EXECUTE MISSION 4 Threat Actors exfiltrate PII and other sensitive business data Threat Actor targets employee(s) via phishing campaign1 Workstation compromised, threat actor gathers credentials2a Threat Actors use stolen credentials to move laterally 3a Employee B opens infected email (Mobile or PC). Attacker disables antivirus 2b Compromised credentials/ device used to access cloud service / enterprise environment 3bc Credentials harvested when employee logs into fake website 2c A. Enter and Navigate Any employee opens attack email  Access to most/all corporate data B. Device Compromise Targeted employee opens attack email  Access to same data as employee C. Remote Credential Harvesting Targeted employee(s) enter credentials in website  Access to same data as employee(s) Common Attacks Office 365 Technology • Advanced Threat Protection (requires E5) EMS Technology • Cloud App Security (CASB) (requires E5) Office 365 Technology • Advanced Security Management (basic CASB) (requires E5) Azure Technology • Multi-Factor Authentication • Azure Identity Protection Microsoft Incident Response Teams can be engaged to investigate any incident type as well as to assess your organization for existing compromises Windows 10 Technology • SmartScreen URL and App reputation • Application Guard EMS Technology • Azure Information Protection (requires E5) Office 365 Technology • Data Loss Prevention Windows 10 Technology • Windows Information Protection Azure Technology • Disk, Storage, SQL Encryption • Key Vault • … Any Windows 10 Technology • Device Guard • Credential Guard • Defender Advanced Threat Protection (requires E5) Managed Detection and Response (MDR) • Enterprise Threat Detection Published Guidance • Securing Privileged Access Roadmap Professional Services • Security Foundation • Enhanced Security Admin Environment (ESAE) Technology • Advanced Threat Analytics (in EMS E3) • Azure Security Center & Operations Management Suite (OMS) • …and more EMS Technology • Intune conditional access Managed Detection and Response (MDR) • Enterprise Threat Detection (PCs only)
  • 37. Why do you want to protect information? Reduce leakage of data shared with others Partitioning of sensitive data from unauthorized users Prevent employees from leaking secrets Meet compliance requirements (GDPR, …) 96% 94% 89% 87%
  • 39. Protect devices with industry-leading encryption, anti-malware technologies, and identity and access solutions
  • 40. Safeguard customer data in the cloud, including personal data, with industry-leading security measures and privacy policies
  • 41. Secure your IT environment and achieve compliance with enterprise-grade user and administrative controls
  • 42. Protect customer data both in the cloud, and on-premises, with industry-leading security capabilities
  • 43. Safeguard customer data in the cloud, including personal data, with industry-leading security measures and privacy policies