6. 10
Zero Trust architecture
Devices
Security
Policy Enforcement
Identities
User/session risk
Multi-factor
authentication
Identity provider
Device identity
Device risk &
compliance state
Classify, label,
encrypt
Visibility and Analytics
Automation
Emails & documents
Structured data
Data
Adaptive
Access
Apps
SaaS Apps
On-premises Apps
Network delivery
Internal Micro-segmentation
Network
Infrastructure
JIT and Version Control
IaaS
PaaS
Int.Sites
Containers
Serverless
Access & runtime
control
Threat protection
7. 11
Five domains to secure your Office 365 environment
Defense in Depth
Identity &
Access
Threat
Protection
Information
protection
Security
Management
End User Security
Awareness
11. 17
Identity Protection
malicious sign-in
attempts blocked
in real time in
2019
30B
compromised
users detected in
2019
27M 901 K
high risk enterprise
sign-in attempts
detected in Oct
2019
Identity related attacks · Password Spray · Breach Replay · Phishing
In 2019:
13. 19
Passwordless AuthenticationNot all methods are created equal
Understand the Risks
• Channel jacking
• Intercept and Replay
Again … MFA prevents 99.9% of identity attacks
User Behaviors
Dependencies
Phone Carrier
Access to Internet
Mobile OS notifications
27. Improve Security Posture
Automate updates and configuration
More Visibility, Less Alerts
Focus on what’s important and
reduce noise
Uncover Complex Threats
Understand the entire attack and
Identify Suspicious users
Reduce Mean Time To Response
Automate responses and integrate
with existing tools
Empower your defenders with Azure ATP
Cloud Scale,
Continuous Updates
45. 55Microsoft Information Protection
Discover & classify
sensitive information
Apply protection
based on policy
Monitor &
remediate
Apps On-premisesCloud servicesDevices
Across
Accelerate
Compliance
46. 56
Follow the data—throughout its lifecycle
Apply protection
based on policy
Have you defined what “sensitive data” means
for your company?
Do you have a way to detect sensitive data
across your company?
Do you have a way to ensure that labels persist
with the data—wherever it travels?
Which regulations and compliance factors impact you?
Are you able to empower end-users to classify and label
content themselves, or apply automatically based on
company policies?
Detect &
classify sensitive
information
Monitor &
remediate
Do you have visibility into how sensitive data is being access and shared, even across
3rd-party SaaS apps and cloud services?
Are you able to remediate actions immediately, such as quarantine data or block access?
Are you able to integrate event information into your SIEM system or other tools?
77. 87
Adopt the best practices
◦ Passwords management
◦ Security on social networks
◦ Devices security
◦ The safety of pro-perso uses
◦ Backups
◦ Updates
Understand the risks
◦ Phishing
◦ Ransomware
◦ The fake technical support scam
Keep Everyone Updated About the State of cybersecurity
End users have always been a weak point in enterprise security.