SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
Stop attacks with
AI and automation
Focus on what matters
1 https://go.forrester.com/blogs/tech-titans-google-and-microsoft-are-transforming-cybersecurity/
Stop attacks with
AI and automation
Attacks are relentless,
creative, and
constantly changing
Threats
Our environment is growing
and is harder to protect
Growth
We’re understaffed,
overwhelmed, and
barely holding on…
Overload
Automate response
Gain insights
Protect your assets
?
Shared insights
across the security
ecosystem, so every
customer could
benefit.
July 19, 2019: Astaroth attack is stopped by Microsoft Security AI
Microsoft AI automatically uncovered, blocked and reported
the attack at first sight before Astaroth could do any damage.
Microsoft Threat Protection
Azure Security Center
Azure Sentinel
Microsoft Threat Protection Azure Security Center
Azure Sentinel
Brute force account or use
stolen account credentials Attacker collects
reconnaissance &
configuration data
Command
& Control
Exploitation
& Installation
Click a URL
Phishing
mail
Open
attachment
Exfiltrate data
Attacker accesses
sensitive data
Privileged account
compromised
Attacker attempts
lateral movement
Domain
compromised
User account
is compromised
Click a URL
Phishing
mail
Open
attachment
Automated
investigation playbook
Automated and
integrated containment
Automated and
integrated remediation
URL
detonated
Attachment
removed
Automated Investigation
Weaponized URL in email
Threats Found
Compromised user
Remediated
URL blocked
Emails deleted
User Password Reset
MFA enabled
Weaponized URL in email remediated
by Microsoft Threat Protection
Brute force account or use
stolen account credentials Attacker collects
reconnaissance &
configuration data
Command
& Control
Exploitation
& Installation
Click a URL
Phishing
mail
Open
attachment
Exfiltrate data
Attacker accesses
sensitive data
Privileged account
compromised
Attacker attempts
lateral movement
Domain
compromised
User account
is compromised
Azure AD Identity Protection
Identity protection & conditional access
Microsoft Cloud App Security
Extends protection & conditional
access to other cloud apps
Office 365 ATP
Malware detection, safe links,
and safe attachments
Microsoft Defender ATP
Endpoint Detection and Response
(EDR) & End-point Protection (EPP)
Azure ATP
Identity protection
Microsoft security workshop
Security discovery
Security immersion experience
Threat check
© 2020 Razor Technology www.razor-tech.com
@DavidJRosenthal
SlideShare
www.razor-tech.com
5 Tower Bridge
300 Barr Harbor Dr., Suite 705
West Conshohocken, PA 19428
www.razor-tech.com
David.Rosenthal@razor-tech.com
Office: 866.RZR.DATA
LETS KEEP IN TOUCH
23

Contenu connexe

Plus de David J Rosenthal

What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
David J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
David J Rosenthal
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
David J Rosenthal
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Microsoft Viva
Microsoft VivaMicrosoft Viva
Microsoft Viva
David J Rosenthal
 

Plus de David J Rosenthal (20)

A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 
Better Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsBetter Meetings with Microsoft Teams
Better Meetings with Microsoft Teams
 
What is Microsoft Teams
What is Microsoft TeamsWhat is Microsoft Teams
What is Microsoft Teams
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Knowledge and Insights from Microsoft
Knowledge and Insights from MicrosoftKnowledge and Insights from Microsoft
Knowledge and Insights from Microsoft
 
Microsoft SharePoint Syntex
Microsoft SharePoint SyntexMicrosoft SharePoint Syntex
Microsoft SharePoint Syntex
 
Microsoft Viva
Microsoft VivaMicrosoft Viva
Microsoft Viva
 
Secure Access to Your Enterprise
Secure Access to Your EnterpriseSecure Access to Your Enterprise
Secure Access to Your Enterprise
 
Build Agile Business Processes With Power Apps in Modern Workplace
Build Agile Business Processes With Power Apps in Modern WorkplaceBuild Agile Business Processes With Power Apps in Modern Workplace
Build Agile Business Processes With Power Apps in Modern Workplace
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Stop Attacks with AI and Automation from Microsoft

  • 1. Stop attacks with AI and automation Focus on what matters
  • 2.
  • 4.
  • 5. Stop attacks with AI and automation
  • 6. Attacks are relentless, creative, and constantly changing Threats Our environment is growing and is harder to protect Growth We’re understaffed, overwhelmed, and barely holding on… Overload
  • 8. ?
  • 9. Shared insights across the security ecosystem, so every customer could benefit. July 19, 2019: Astaroth attack is stopped by Microsoft Security AI Microsoft AI automatically uncovered, blocked and reported the attack at first sight before Astaroth could do any damage.
  • 10.
  • 13. Microsoft Threat Protection Azure Security Center Azure Sentinel
  • 14. Brute force account or use stolen account credentials Attacker collects reconnaissance & configuration data Command & Control Exploitation & Installation Click a URL Phishing mail Open attachment Exfiltrate data Attacker accesses sensitive data Privileged account compromised Attacker attempts lateral movement Domain compromised User account is compromised
  • 15. Click a URL Phishing mail Open attachment Automated investigation playbook Automated and integrated containment Automated and integrated remediation URL detonated Attachment removed
  • 16. Automated Investigation Weaponized URL in email Threats Found Compromised user Remediated URL blocked Emails deleted User Password Reset MFA enabled Weaponized URL in email remediated by Microsoft Threat Protection
  • 17. Brute force account or use stolen account credentials Attacker collects reconnaissance & configuration data Command & Control Exploitation & Installation Click a URL Phishing mail Open attachment Exfiltrate data Attacker accesses sensitive data Privileged account compromised Attacker attempts lateral movement Domain compromised User account is compromised Azure AD Identity Protection Identity protection & conditional access Microsoft Cloud App Security Extends protection & conditional access to other cloud apps Office 365 ATP Malware detection, safe links, and safe attachments Microsoft Defender ATP Endpoint Detection and Response (EDR) & End-point Protection (EPP) Azure ATP Identity protection
  • 18.
  • 19.
  • 20. Microsoft security workshop Security discovery Security immersion experience Threat check
  • 21. © 2020 Razor Technology www.razor-tech.com @DavidJRosenthal SlideShare www.razor-tech.com 5 Tower Bridge 300 Barr Harbor Dr., Suite 705 West Conshohocken, PA 19428 www.razor-tech.com David.Rosenthal@razor-tech.com Office: 866.RZR.DATA LETS KEEP IN TOUCH 23