Why does security feel like the most frustrating challenge in government IT? In part, because security in a cloud-first, mobile-first world calls for new approaches. Data is accessed, used and shared on-premises and in the cloud–erasing traditional security boundaries.
In this webinar, we’ll examine current trends in cybersecurity and some resulting strategy shifts that have the potential to greatly enhance public sector organizations’ ability to balance risk and access, better detect and respond to attacks and just make faster and more coordinated cybersecurity decisions overall. Finally, we’ll look at a common set of attacks occurring specifically in state and local government and steps you can take right now to help mitigate these.
Join Dean Iacovelli, Director for Secure Enterprise at Microsoft, as he discusses current trends and strategies to mitigate your cybersecurity risk.
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
1.
2.
3. “WHAT HAPPENED AT THE CITY OF
XXX ?”
IMPACT
Own domain Delete backups Exfiltrate data Redirect funds Ransom Botnet
ESCALATION
Pass the hash Pass the ticket
RECON
Target recon Network traversal Mailbox persistence Device persistence
ENTRY
PHISHING
Spear, whaling, trusted user
PASSWORD
Brute force, spray
KNOWN VULNERABILITIES
OS, database, apps
Video
6. AUTOMATION
of investigation and
response
INTEGRATION of all
components for coordinated
insights and response
FOUNDATIONS OF A MODERN SECURITY
PLATFORM
MACHINE LEARNING and AI
to separate signal and noise
CLOUD
SCALE
real-time
threat intel
“By 2020, 30% of security
spending will be on vendors that
provide an integrated platform
approach to security”
– 2017 IDC FutureScape report
7. AN ARGUMENT FOR UTILITY
COMPUTING
IN THE CYBER FIGHT
Hyperscale cloud vendors will far outspend even the Fortune
5 on security because their business model is TRUST.
Radically different economics - customers get access to 1B
in cyber spend, only pay for a “slice”.
Move to cloud is part of a sound risk management strategy –
i.e. transferring risk
Cloud helps you stay continually patched and compliant
Certs AND a track record
8. Action How We Can Partner
Self-service
Fast
Track
Premier MCS Partner
10. Deploy Azure Backup and Recovery services
9. Move doc stores to OneDrive for Business
8. Automate info protection and classification
7. Deploy Win 10 and Cred Guard to all clients.
6. Deploy Endpoint Protection with automated
investigation/remediation.
5. Monitor and reduce time-to-patch
4. Deploy next gen Security Information and Event
Management tools
3. Deploy behavior-analysis content scanning
2. Leverage Microsoft Secure Score best practices across
Identity, Office 365, Windows clients and servers.
1. Deploy phishproof identities for all users, including
Just-In-Time and Just-Enough admin accounts.
9. BRAKES ARE WHAT ALLOW THE CAR
TO GO FASTER.
FINALLY, PLEASE REMEMBER…
13. Our most unique global asset in the
fight, informed by trillions of feeds.
Machine learning helps sort the
signal from the noise. This signal is
leveraged across all of Microsoft’s
security services.
450B
monthly
authentications
18+B
Bing web pages
scanned750M+
Azure user
accounts
Enterprise
security for
90%
of Fortune 500
Malware data
from Windows
Defender
Shared threat
data from partners,
researchers and law
Enforcement
worldwide
Botnet data from
Microsoft Digital
Crimes Unit
1.2B
devices scanned
each month
400B
emails analyzed
200+
global cloud
consumer and
Commercial services
INTELLIGENT SECURITY GRAPH
Back
Notes de l'éditeur
1 Bitsight report cited in NPR article
2 Verizon 2017 Data Breach Report
3 Verizon 2017 Data Breach Report
4 Microsoft Incident Response team
5 2017 Global Information Security Workforce Study
6 Forbes
7 Slate https://slate.com/technology/2015/07/opm-head-katherine-archuleta-resigns-over-data-breach.html
To defend against attacks that are ruthlessly fast and extraordinarily complex, the need for sophisticated software utilizing machine learning and operating on as much data as possible has never been greater. This is where we offer something very unique and powerful to every consumer and every organization.
We have been quietly building something incredible: The Microsoft Intelligent Security Graph. Every second we are adding hundreds of GBs worth of the telemetry to the Graph. This anonymized data is coming from the 100’s of global cloud services we operate, consumer and commercial, data about the threats faced by the +1B PCs we update via Windows Update every month, aggregated with external data points we collect through extensive research, partnership with industry and law enforcement through our Digital Crime Units, and our Cybersecurity Defense Operations Center. To give you a sense on what that means, we add to the Security Graph with data from the 300B monthly authentications across our consumer and enterprise services, as well as the 200B e-mails that are analyzed each month for malware and malicious web sites. We receive trillions of pieces of data from billions of devices.
http://www.gettyimages.com/license/545863031