13
Secure Modern Enterprise Daniel Grabski Executive Security Advisor, Microsoft CEE Enterprise Cybersecurity Group (ECG)

Secure Modern Enterprise - download.microsoft.comdownload.microsoft.com/.../Secure_Modern_Enterprise-Customer...u… · Discover, protect, and monitor your critical data in the cloud

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Secure Modern Enterprise - download.microsoft.comdownload.microsoft.com/.../Secure_Modern_Enterprise-Customer...u… · Discover, protect, and monitor your critical data in the cloud

Secure Modern Enterprise

Daniel Grabski

Executive Security Advisor, Microsoft CEEEnterprise Cybersecurity Group (ECG)

Page 2: Secure Modern Enterprise - download.microsoft.comdownload.microsoft.com/.../Secure_Modern_Enterprise-Customer...u… · Discover, protect, and monitor your critical data in the cloud
Page 3: Secure Modern Enterprise - download.microsoft.comdownload.microsoft.com/.../Secure_Modern_Enterprise-Customer...u… · Discover, protect, and monitor your critical data in the cloud

Systems of

Intelligence

DIGITAL TRANSFORMATION

Engage your customers

Empower your employees

Optimize your operations

Transform your products

Page 4: Secure Modern Enterprise - download.microsoft.comdownload.microsoft.com/.../Secure_Modern_Enterprise-Customer...u… · Discover, protect, and monitor your critical data in the cloud

The world we live in is

increasingly complex

Page 5: Secure Modern Enterprise - download.microsoft.comdownload.microsoft.com/.../Secure_Modern_Enterprise-Customer...u… · Discover, protect, and monitor your critical data in the cloud

EXPERIENCE

• 1M+ Corporate Machines protected by enterprise IT security

• Multi-platform cloud-first hybrid enterprise

• Decades of experience as a global enterprise

• Runs on multi-tenant Azure environment, same as you

VISIBILITY

• Malware largest anti-virus and

antimalware service

• Clients Windows Updates, Error

Reports

• Email Outlook.com, Office 365

• Web content Bing, Azure AD

• Cloud platform Azure IaaS

and PaaS, Azure Security Center

EXPERTISE

• Development Security established Security Development Lifecycle (SDL) - ISO/IEC 27034-1

• Operational Security for Hyper-scale cloud services

• Combatting Cybercrime in the cloud & partnering with law enforcement to disrupt malware

• Incident Investigation and recovery for customers

Visibility

ExpertiseExperience

Context

Industry leading capabilities

CONTEXT

• Trillions of URLs indexed

• Hundreds of Billions of

authentications, monthly emails

analyzed

• Billions of daily web pages

scans, Windows devices reporting

• Hundreds of Millions of

reputation look ups

• Millions of daily suspicious files

detonations

Page 6: Secure Modern Enterprise - download.microsoft.comdownload.microsoft.com/.../Secure_Modern_Enterprise-Customer...u… · Discover, protect, and monitor your critical data in the cloud

Apps and Data

SaaS

Microsoft protecting you

Malware Protection Center Cyber Hunting Teams Security Response Center

DeviceInfrastructure

CERTs

PaaS IaaS

Identity

INTELLIGENT SECURITY GRAPH

Cyber Defense

Operations Center

Digital Crimes Unit

Antivirus NetworkIndustry Partners

Page 7: Secure Modern Enterprise - download.microsoft.comdownload.microsoft.com/.../Secure_Modern_Enterprise-Customer...u… · Discover, protect, and monitor your critical data in the cloud

SECURE MODERN ENTERPRISE

Identity Apps

and Data

Infrastructure Devices

Identity Embraces identity as primary security perimeter and protects

identity systems, admins, and credentials as top priorities

Apps and Data Aligns security investments with business priorities including

identifying and securing communications, data, and applications

InfrastructureOperates on modern platform and uses cloud intelligence to

detect and remediate both vulnerabilities and attacks

Devices

Accesses assets from trusted devices with hardware security

assurances, great user experience, and advanced threat detectionSecure Platform (secure by design)

Page 8: Secure Modern Enterprise - download.microsoft.comdownload.microsoft.com/.../Secure_Modern_Enterprise-Customer...u… · Discover, protect, and monitor your critical data in the cloud

Secure Platform (secure by design)

SECURE MODERN ENTERPRISE

Identity Apps

and Data

Infrastructure Devices

Phase 1: Build Security Foundation – Critical Attack Defenses

Phase 2: Secure the Pillars

Phase 2: Secure the Pillars

Continue building a secure modern enterprise by adopting leading edge technology and architectures:

• Privileged Access Security -

Industrial Grade protections

for critical identities and

assets

• Shadow IT visibility –

Discover, protect, and monitor

your critical data in the cloud

• Device and Datacenter

Security - Hardware rooted

protections for devices,

servers, and credentials

• Threat Detection - Deep

analyst expertise and unique

technical and human insights

into threats

• Cloud Security Risk

Mitigation - Chart a secure

path as a cloud-enabled

enterprise

Phase 1: Build the FoundationStart the journey by getting in

front of current attacks

• Critical Mitigations – Critical

attack protections

• Attack Detection – Hunt for

hidden persistent adversaries

and implement critical attack

detection

• Roadmap and planning –

Share Microsoft insight on

current attacks and strategies,

build a tailored roadmap to

defend your organization’s

business value and mission

Page 9: Secure Modern Enterprise - download.microsoft.comdownload.microsoft.com/.../Secure_Modern_Enterprise-Customer...u… · Discover, protect, and monitor your critical data in the cloud

Phase 1 – Build the Foundation

Aligned with Securing Privileged

Access (SPA) roadmap

http://aka.ms/SPAroadmap

Page 10: Secure Modern Enterprise - download.microsoft.comdownload.microsoft.com/.../Secure_Modern_Enterprise-Customer...u… · Discover, protect, and monitor your critical data in the cloud

Phase 2 – Secure the Pillars

Foundation: Critical Attack Defenses

Page 11: Secure Modern Enterprise - download.microsoft.comdownload.microsoft.com/.../Secure_Modern_Enterprise-Customer...u… · Discover, protect, and monitor your critical data in the cloud

PLAN ENTER TRAVERSE EXECUTE MISSION

4Threat Actors exfiltrate PII and

other sensitive business dataThreat Actor targets employee(s)

via phishing campaign1

Workstation compromised, threat

actor gathers credentials2aThreat Actors use stolen credentials to move laterally

3a

Employee B opens infected

email (Mobile or PC).

Attacker disables antivirus

2b Compromised credentials/

device used to access

cloud service / enterprise

environment

3bc

Credentials harvested

when employee logs into

fake website2c

A. Enter and Navigate

Any employee opens attack email Access to most/all corporate data

B. Device Compromise

Targeted employee opens attack email Access to same data as employee

C. Remote CredentialHarvesting

Targeted employee(s) enter credentials in website Access to same data as employee(s)

Common Attacks

Office 365 Technology

• Advanced Threat Protection

(requires E5)

EMS Technology

• Cloud App Security (CASB)

(requires E5)

Office 365 Technology

• Advanced Security Management

(basic CASB) (requires E5)

Azure Technology

• Multi-Factor Authentication

• Azure Identity Protection

Microsoft Incident Response Teams

can be engaged to investigate any

incident type as well as to assess your

organization for existing compromises

Windows 10 Technology

• SmartScreen URL and App reputation

• Application Guard

EMS Technology

• Azure Information Protection

(requires E5)

Office 365 Technology

• Data Loss Prevention

Windows 10 Technology

• Windows Information Protection

Azure Technology

• Disk, Storage, SQL Encryption

• Key Vault

• …

AnyWindows 10 Technology

• Device Guard

• Credential Guard

• Defender Advanced Threat Protection (requires E5)

Managed Detection and Response (MDR)

• Enterprise Threat Detection

Published Guidance

• Securing Privileged Access Roadmap

Professional Services

• Security Foundation

• Enhanced Security Admin Environment (ESAE)

Technology

• Advanced Threat Analytics (in EMS E3)

• Azure Security Center & Operations Management Suite (OMS)

• …and more

EMS Technology

• Intune conditional access

Managed Detection and Response (MDR)

• Enterprise Threat Detection (PCs only)

Page 12: Secure Modern Enterprise - download.microsoft.comdownload.microsoft.com/.../Secure_Modern_Enterprise-Customer...u… · Discover, protect, and monitor your critical data in the cloud

Industry Leading Technology On-premises

Secure Modern Enterprise

RECOMMENDED FOR EVERY ENTERPRISE ORGANIZATION

Microsoft is committed to mitigating

security threats

Integrated Intelligence

Microsoft is bringing the power of

cloud to securing your assets

In the cloud

Page 13: Secure Modern Enterprise - download.microsoft.comdownload.microsoft.com/.../Secure_Modern_Enterprise-Customer...u… · Discover, protect, and monitor your critical data in the cloud