Microsoft Finland. Microsoft in Finland is a strong millennial, born ,000+ partners generating 8 $ revenue per each $ by MSFT

Similar documents
Microsoft Security Management

Best Practices in Securing a Multicloud World

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Cyber Security Updates and Trends Affecting the Real Estate Industry

THE RISE OF GLOBAL THREAT INTELLIGENCE

2018 Edition. Security and Compliance for Office 365

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

THE CLOUD SECURITY CHALLENGE:

DIGITAL TRUST Making digital work by making digital secure

Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Crash course in Azure Active Directory

with Advanced Protection

Google Identity Services for work

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

CloudSOC and Security.cloud for Microsoft Office 365

Teradata and Protegrity High-Value Protection for High-Value Data

ForeScout Extended Module for Splunk

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

8 Must Have. Features for Risk-Based Vulnerability Management and More

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Securing Your Most Sensitive Data

Go mobile. Stay in control.

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Cybersecurity The Evolving Landscape

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Building an Effective Threat Intelligence Capability. Haider Pasha, CISSP, C EH Director, Security Strategy Emerging Markets Office of the CTO

SECURE DATA EXCHANGE

How to Secure Your Cloud with...a Cloud?

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

Cisco Start. IT solutions designed to propel your business

Microsoft 365 Business FAQs

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

IDENTITY: A KEY ELEMENT OF BUSINESS-DRIVEN SECURITY

FOR FINANCIAL SERVICES ORGANIZATIONS

Securing Digital Transformation

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

Security and Compliance for Office 365

WHY MOBILE SECURITY SHOULD BE IN YOUR TOP PRIORITIES

Identity & Access Management

2017 THALES DATA THREAT REPORT

Run the business. Not the risks.

Why is Office 365 the right choice?

HOSTED SECURITY SERVICES

MITIGATE CYBER ATTACK RISK

Integrated Access Management Solutions. Access Televentures

AKAMAI CLOUD SECURITY SOLUTIONS

CYBER ATTACKS DON T DISCRIMINATE. Michael Purcell, Systems Engineer Manager

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Managing Microsoft 365 Identity and Access

THALES DATA THREAT REPORT

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

Digital Workspace SHOWDOWN

Security in India: Enabling a New Connected Era

Security-as-a-Service: The Future of Security Management

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

Securing Office 365 with Symantec

Data Protection Everywhere

Security Gap Analysis: Aggregrated Results

Secure Access for Microsoft Office 365 & SaaS Applications

6 Ways Office 365 Keeps Your and Business Secure

2018 Cyber Security Predictions

Traditional Security Solutions Have Reached Their Limit

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

ForeScout ControlFabric TM Architecture

EMPLOYEE SKILLS TRAINING PLATFORM. On-access skills training and measurement for all employees

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

Cisco Advanced Malware Protection. May 2016

Welcome to the SafeNet Day! Prague 1st of October Insert Your Name Insert Your Title Insert Date

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

THE ACCENTURE CYBER DEFENSE SOLUTION

News and Updates June 1, 2017

Preparing your network for the next wave of innovation

6 KEY SECURITY REQUIREMENTS

Disaster Recovery Is A Business Strategy

Maximum Security with Minimum Impact : Going Beyond Next Gen

Make security part of your client systems refresh

Windows Server The operating system

Vendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo

Transcription:

Microsoft Finland Microsoft in Finland is a strong millennial, born 1992 2+ million active users in Microsoft Office 365 cloud 2,000+ partners generating 8 $ revenue per each $ by MSFT Partner ecosystem with 40,000 tech jobs in Finland 1,600 start-ups directly supported by Microsoft Close to 90% of the students in Finland using Office 365 51% of major Finnish companies using the cloud

The digital estate is growing

The cybersecurity landscape is rapidly changing Cyberspace is the new battlefield Security skills are in short supply Virtually anything can be attacked

Cloud Technology SaaS adoption Perimeter of a Modern Enterprise Platform as a Service Infrastructure as a Service Internet of Things 1 st class mobile experience

Q: WHERE IS YOUR DATA? A: EVERYWHERE Mobile devices Cloud storage Devices: fixed and mobile SaaS apps & file shares On-premises file shares SaaS apps Online backup Email On-premises

80 % of employees use non-approved SaaS apps at work 85 % of enterprise organizations keep sensitive information in the cloud Mobile devices 88 % of organizations no longer have confidence to detect and prevent loss of sensitive data Cloud storage SaaS apps 58 % have accidentally sent sensitive information to the wrong person Online backup Email On-premises

The challenge of securing your environment Bad actors are using increasingly creative and sophisticated attacks. The digital estate offers a very broad surface area that is difficult to secure. Integrated, intelligent correlation and action on signals is difficult, timeconsuming, and expensive.

IoT Enterprise IT is Cloud Hybrid Cloud adoption is inevitable (Digital Transformation + industry momentum) Legacy systems will take years to migrate or retire Technology Mobility and Volume is Exploding Increasing demand for first class experience on mobile devices Variance in trustworthiness of mobile devices Pervasive Digital Transformation and IoT IoT adoption driving a wave of app development and cloud usage Enterprise PC Security strategies applies poorly to IoT devices Increasingly Hostile Environment Increased attack surface with new technologies creates new blind spots Attacks rising in volume and sophistication to capture illicit opportunities

Enable Seamless and secure identity and access for employees, partners and customers Protect sensitive data wherever it lives or travels. Protect, detect and remediate against threats across the modern workplace. Streamline management with built-in intelligence and recommendations.

Microsoft Security Identities Endpoints User Data Cloud Apps Infrastructure Users and admins Devices and sensors Email messages and documents SaaS applications and data stores Servers, virtual machines, databases, networks Intelligent Security Graph 6.5 TRILLION signals per day

Holistic view on security 1.2 billion devices scanned by Windows Defender 200+ global cloud consumer and commercial services 450 billion authentications 18+ billion web pages scanned by Bing 400 billion e-mails analyzed The Microsoft Intelligent Security Graph

provides new insights 1.2 billion devices scanned by Windows Defender 450 billion authentications 400 billion e-mails analyzed 18+ billion web pages scanned by Bing Intelligence Insights across Clients and Services 200+ global cloud consumer and commercial services The Microsoft Intelligent Security Graph

Microsoft Security Philosophy Access Controls + Encryption + Rights Management + Full Lifecycle Protection (Auto Classification, SaaS) Information Protection Trends Fileshare & USB stick Sprawl SharePoint & Email/Mobile Sprawl Cloud & Shadow IT Sprawl

??

Comprehensive policies to protect and govern your most important data throughout its lifecycle Unified approach Unified approach to discover, classify & label Automatically apply policy-based actions Proactive monitoring to identify risks Broad coverage across locations Discover Sensitivity Encryption Restrict Access Watermark Header/Footer Classify Label Apply label Retention Retention Deletion Records Management Archiving Sensitive data discovery Data at risk Policy violations Monitor Policy recommendations Proactive alerts

If an attacker sends an email to 100 people in your company 23 people will open it 11 people will open the attachment and six will do it in the first hour.

https://www.symantec.com/content/dam/symantec/docs/reports/istr-23-2018-en.pdf

92.4% of malware is delivered via email. https://enterprise.verizon.com/resources/reports/dbir/ Fake invoices are the #1 disguise for distributing malware. https://www.symantec.com/content/dam/symantec/docs/reports/istr-23-2018-en.pdf

Phishing email statistics from Office 365 from January 2018 to September 2018

Rich signal across M365 Artificial Intelligence Rich client & Service Integration

Tech Support: Remote Access Go to www.teamviewer.com ACCESS DATA GRANTED COMPROMISED

https://www.ic3.gov/media/2018/180328.aspx https://cloudblogs.microsoft.com/microsoftsecure/2018/04/20/teamin g-up-in-the-war-on-tech-support-scams/

Tech Support Scams Scope of the problem 2 out of 3 people have experienced a tech support scam in the last year. 1 in 5 consumers surveyed continued with a potential fraudulent interactions; meaning they downloaded software, visited a scam website, gave the fraudsters remote access to their device, or provided credit card information or other form of payment. Nearly 1 in 10 have lost money to a tech support scam. Of those who continued with a fraudulent interaction, 17% of them were older than 55, while 34% were between the ages of 36 and 54. 50% of those who continued were millennials, between the ages of 18 and 34. Source: Ipsos, Global Market Research, commissioned by Microsoft, July 2016.

Protect yourself from tech support scams Microsoft does not send unsolicited email messages or make unsolicited phone calls to request for personal or financial information, or fix your computer. Microsoft will never proactively reach out to you to provide unsolicited PC or technical support Any communication we have with you must be initiated by you. Don t call the number in pop-ups Microsoft s error and warning messages never include a phone number. Report it www.microsoft.com/reportascam

Jatketaan keskustelua Mikko Viitaila Teknologiajohtaja, National Technology Officer (NTO) Microsoft Oy mikko.viitaila@microsoft.com @mikkoviitaila www.linkedin.com/in/viitaila +358 40 8098757