7. Unique IPs by Threat by Day in Belgium 01 – 16 October 2017
8. June 2014
Malware using Dynamic DNS
for command. It involved
password and identity theft,
webcam and other privacy
invasions.
Over 200 different types of
malware impacted by the take
down.
Identity Theft /
Financial Fraud /
Privacy Invasion
Bladabindi &
Jenxcus
4 482
Conficker
5 205
February 2010
Botnet Worm
Sirefef
483
December 2013
ZeroAccess hijacked search
results, taking victims to
dangerous sites. It costs
online advertisers upwards of
$2.7 million each month.
Advertising Click Fraud
Most Common CTIP Malware Threats in
Belgium 1-30 September 2017
10. Our survey reveals that 57% have had a recent significant cybersecurity incident.
Nearly half (48%) cited outdated information security controls or architecture as their
highest vulnerability – an increase from 34% in the 2015 survey.
http://www.ey.com/gl/en/services/advisory/ey-global-information-security-survey-2016
http://www.ey.com/gl/en/newsroom/news-releases/news-global-organizations-better-prepared-to-predict-and-resist-cyber-attacks-
but-struggle-to-recover-from-them-ey-survey-finds
Maturity levels are still too low in many
critical areas.
Percentage who would rate these
information security management
processes as mature:
•Software security: 29%
•Security monitoring: 38%
•Incident management: 38%
•Identity and Access Management: 38%
•Network security: 52%
13. 36 datacenter locations worldwide1
Central US
West US
East US
North Central US
Brazil South
West Europe
Japan East
South India
SE Asia
Australia South East
Australia East
India Central
West India
Japan West
East Asia
China West*
North Europe Germany
Northeast**
Canada East
Canada Central
South Central US
China East*
Germany Central**
West US 2
Korea South
East US 2
Korea Central
100 + datacenters
One of 3 largest networks in the world
United Kingdom West
United Kingdom
South
West Central US
Chile
Asia
Vienna
Finland
14.
15. United
States
IndustryRegional
ISO
27001
PCI DSS
Level 1
SOC 1
Type 2
SOC 2
Type 2
ISO
27018
Cloud Controls
Matrix v3.0.1
Content Delivery and
Security Association
Shared
Assessments
SOC 3 MPAA
Singapore
MTCS Level 3
United Kingdom
G-Cloud
Australian Signals
Directorate
New Zealand
GCIO
China GB
18030
European Union
Model Clauses
Argentine Data
Protection Act 25.326
China
TRUCS
Canadian
Privacy Laws
FISMAHIPAA /
HITECH
FIPS
140-2
DISA
Level 2
(DIACAP)
FERPAFedRAMP
JAB
P-ATO
21 CFR
Part 11
IRS
1075
Section
508
VPATs
NIST
800-171
MARS-E GxP DIACAP
Japan My
Number Act
Japan
Financial Services
ENISA
IAF
Cloud Security
Mark Gold
Spain
ENS
FACT EU-US
Privacy Shield
ISO/IEC
27017
China Multi Layer
Protection Scheme
ISO 22301
Germany IT
Grundschutz
workbook
Compliance assurances
Third party validation, Azure
17. A cloud you
can trust
“Businesses and users are
going to embrace technology
only if they can trust it.”
At Microsoft, we never take your
trust for granted
• We are serious about our
commitment to protect customers
in a cloud first world.
• We live by standards and practices
designed to earn your confidence.
• We collaborate with industry and
governments to build trust in the
cloud ecosystem. – Satya Nadella