5. “71% of strategic buyers cite scalability, cost and business
agility as the most important drivers for using cloud services.“
– Gigaom Research
Integral to business transformation
9. trillion
a year1
Risk of cyber
attacks can cost
business up to
3
$
individual records
were breached in
2013.4
More than
800M in 2014.3
The number of
recorded data
breaches increased
78%
of the value created
by the Internet.2
Cybercrime
extracts between
15-20% agree consumers have
lost control over how
personal information is
collected and used by
companies5
91%
Global attacks are increasing and costs are rising
11. No one is able to use your
data in a way that you do
not approve.
You have visibility into
how your data is being
handled and used.
Your content is stored and
managed in compliance
with applicable laws,
regulations and standards.
How can Cloud help your Security
14. Enterprise cloud identity – Windows Azure AD
Access monitoring
Single sign-on
Multi-Factor Authentication
Role based access controls
Identity & access
15. Encrypted data transfer
Encryption options for stored data
Data segregation
Choice of data location
Data redundancy
Data destruction
16
Data protection
18. “FUNDAMENTALLY, IF SOMEBODY WANTS TO GET IN,
THEY'RE GETTING IN…ACCEPT THAT.
WHAT WE TELL CLIENTS IS:
NUMBER ONE, YOU'RE IN THE FIGHT, WHETHER YOU
THOUGHT YOU WERE OR NOT. NUMBER TWO,
YOU ALMOST CERTAINLY ARE PENETRATED. ”
Michael Hayden
Former Director of NSA & CIA
Assume
Breach
19. 20
If you found out
tomorrow that your most
critical systems had been
infiltrated or that your
most critical data was
being exfiltrated, would
you be prepared to deal
with the breach?
22. Post
Breach
Execution
24
Establish security baselines
Time to detect
Time to contain
Time to fix
Time to recover
Framework to inventory damage
Identify reactive security investments
Update response plans
If you measure MTTR in
WEEKS/MONTHS/YEARS instead of
hours/days, then YOU’VE FAILED!
23. The confidentiality,
integrity, and availability
of your data is protected.
You have visibility into
how your data is being
handled and used.
Your content is stored and
managed in compliance
with applicable laws,
regulations and standards.
How can Cloud help your Security
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42. We’ll keep your data secure
Your data is private and under your control
We manage your data in accordance with the law
You know what we’re doing with your data
43.
44. No one is able to use your
data in a way that you do
not approve.
The confidentiality,
integrity, and availability
of your data is protected.
You have visibility into
how your data is being
handled and used.
How can Cloud help your Security
46. No one is able to use your
data in a way that you do
not approve.
The confidentiality,
integrity, and availability
of your data is protected.
Your content is stored and
managed in compliance
with applicable laws,
regulations and standards.
How can Cloud help your Security
51. An on-premises solution to identify advanced security attacks before they cause damage
Credit card companies
monitor cardholders’
behavior.
If there is any abnormal
activity, they will notify the
cardholder to verify charge.
Microsoft Advanced Threat Analytics brings this
concept to IT and users of a particular organization
Comparison:
53. Detect threats fast
with Behavioral
Analytics
Adapt as fast as
your enemies
Focus on what is
important fast
using the simple
attack timeline
Reduce the fatigue
of false positives
55. Learn more about the Microsoft Enterprise Cloud
Visit the Microsoft Trust Centers: Azure, Intune,
Office 365, and Dynamics CRM
Review the Microsoft Law Enforcement Request
Report and US National Security Orders Report
Read our blogs: Microsoft Cyber Trust and
Microsoft On the Issues
Follow us on Twitter: @MSFTSecurity
Additional Resources