Angela McKay Director, Government Security Policy and Strategy Microsoft

Similar documents
THE POWER OF TECH-SAVVY BOARDS:

Securing Digital Transformation

Commonwealth Cyber Declaration

"DIGITAL GENEVA CONVENTION" IN TIMES OF CYBER (IN)SECURITY?

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Cybersecurity. Securely enabling transformation and change

Position Title: IT Security Specialist

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

The Windstream Enterprise Advantage for Banking

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

Protecting Critical Information Infrastructure in times of increasing cyber conflict

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

Transforming the Data Center Lenovo. All rights reserved.

Emerging Technologies The risks they pose to your organisations

Data Management and Security in the GDPR Era

Continuous protection to reduce risk and maintain production availability

Securing Your Digital Transformation

CLOUD COMPUTING. The Old Ways Are New Again. Jeff Rowland, Vice President, USAA IT/Security Audit Services. Public Information

MITIGATE CYBER ATTACK RISK

Cybersecurity & Digital Privacy in the Energy sector

Cloud Connections SEE Partner Summit Janos Strausz Product Sales Specialist, DC

Best Practices in Securing a Multicloud World

The UK s National Cyber Security Strategy

Cybersecurity Considerations for GDPR

Leading our discussion today

DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

Package of initiatives on Cybersecurity

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

WSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015!

ENISA EU Threat Landscape

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Systemic Analyser in Network Threats

Clarity on Cyber Security. Media conference 29 May 2018

How do you decide what s best for you?

Israel and ICS Cyber Security

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

Cisco Start. IT solutions designed to propel your business

G7 Bar Associations and Councils

The Little Fuchsia Book of HPE Data Center Solutions

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

5 Challenges for Public Sector Data Centre Modernisation. And how to address them

Cybersecurity, Trade, and Economic Development

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Regional Development Forum For the Arab States(RDF-ARB) 2018

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

2017 Company Profile

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

THALES DATA THREAT REPORT

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Data Governance for Smart City Management

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

European Union Agency for Network and Information Security

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

Colocation Enabler for Hybrid and Multi Cloud Solutions. Toan Nguyen, Director Business Development & Cloud Platform, e-shelter services GmbH

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Turning Risk into Advantage

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

Securing Europe's Information Society

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

Does someone else own your company s reputation? EY Global Information Security Survey 2018

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Run the business. Not the risks.

Security and resilience in Information Society: the European approach

Security in India: Enabling a New Connected Era

Cyber Security in Europe

Building Trust in the Era of Cloud Computing

align security instill confidence

Government IT Modernization and the Adoption of Hybrid Cloud

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

THALES DATA THREAT REPORT

DIGITAL TRUST Making digital work by making digital secure

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

RESOLUTION 130 (REV. BUSAN, 2014)

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

Cyber Security Roadmap

Modern Database Architectures Demand Modern Data Security Measures

Joint Declaration by G7 ICT Ministers

Leading the Digital Transformation from the Centre of Government

Risk Advisory Academy Training Brochure

EU policy on Network and Information Security & Critical Information Infrastructures Protection

Government Data Center Modernization

Cyber Security in Smart Commercial Buildings 2017 to 2021

AKAMAI CLOUD SECURITY SOLUTIONS

Cisco Connected Factory Accelerator Bundles

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

The New Healthcare Economy is rising up

THE ACCENTURE CYBER DEFENSE SOLUTION

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

ISAO SO Product Outline

Transformation Through Innovation

Transcription:

Angela McKay Director, Government Security Policy and Strategy Microsoft

Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

.vn.ve.uz.us.uy.uk.ua.tr.tn.th.tw.ch.se.es.kr.za.si.sk.sg.rs.sa.ru.ro.pt.pl.ph.pe.pk.no.ng.nz.nl.ma.mx.my.mk.lt.lv.ke.kz.jp.it.il.ie.ir.id.in.hu.hk.gt.gr.de.ge.fr.fi.ee.eg.ed.do.dk.cz.hr.cr.co.cn.cl.ca.cm.bg.br.ba.bo.be.by.az.at.au.ar.dz.ae.vn.ve.uz.us.uy.uk.ua.tr.tn.th.tw.ch.se.es.kr.za.si.sk.sg.rs.sa.ru.ro.pt.pl.ph.pe.pk.no.ng.nz.nl.ma.mx.my.mk.lt.lv.ke.kz.jp.it.il.ie.ir.id.in.hu.hk.gt.gr.de.ge.fr.fi.ee.eg.ed.do.dk.cz.hr.cr.co.cn.cl.ca.cm.bg.br.ba.bo.be.by.az.at.au.ar.dz.ae Demographic Trends: Internet Users in 2025

Technology Trends 70% of CIOs will embrace a cloud-first strategy in 2016 50bn Mobile and IoT connected devices become ubiquitous Platform diversity 50x Data volumes surge

Third Era of Enterprise IT Every single industry will be digitally remastered. Mark Raskino, VP & Gartner Fellow Era 1: IT Craftsmanship Technology focus Era 2: Industrialization Process focus Era 3: Digitalization Business model focus Today Mobility Social Platform Insights Sporadic automation and innovation; frequent issues Services and solutions; efficiency and effectiveness Digital business innovation; new types of service

Cloud as Enabler of Digital Transformation Redesigning business processes Acquiring new customers through new channels Boosting business agility with instant-on capacity Delighting customers with personalized experiences and service Speed 2 weeks to deliver new services vs. 6-12 months with traditional solution Increasing employee productivity with ubiquitous access Instantly scale business for global reach Productivity Social Platform Insights Entering new markets by innovating with digital products and services Instantly scaling to meet demand Case Study: HarperCollins Publishers Scale Scale from 30,000 to 250,000 site visitors instantly Case Study: Autocosmos Converting capital expenses to operating expenses Redeploying IT talent onto more strategic projects Speeding application development Economics 75% less cost compared to on-premises Microsoft Azure BI Team, STMG Proof Points Central

Government Transformation Start with a trusted & resilient foundation Leverage economies of scale and expertise Use the cloud to drive future technology uptake Reshape how you engage with citizens Enable more productive work Enable domestic IoT economy 8

Economic and Societal Transformation Job Creation through Innovation Democratization of Computing Social Inclusion Increased Agility Cost Savings Security

Cyber Risk Environment Actors Objectives Actions Impacts Many methods of attack Permissive environment Increasing consequences

Escalating Conflict

Dependence and Risks Drive Public Policy

Governments Roles and Regulatory Pressures 42 Countries with Defensive Capabilities 95 Countries Developing Legislative Initiatives PROTECTOR USER 37 Countries with Declared Offensive Capabilities 54 Countries with National Cybersecurity Strategies Rising International Insecurity Increasing Regulatory Pressure EXPLOITER MONITOR Innovation at Risk

Policy Topics at Play

Policy Principles Innovative Flexible Data aware Risk based Standards based Transparent

Beyond Regulation 243 median # of days attackers are present on a victim network before detection Security Impact of cyber attacks could be as much as $3 trillion in lost productivity and growth is a CEO $3.5M Average cost of a data breach to a company 15 % increase YoY level issue Job security Customer loyalty Implications Brand reputation Intellectual property Civil liability

Complexities for the Private Sector in the Digital Age Loss of trust in products and services Complicated response cycles and operational uncertainties Distorted threat models Reciprocity costs from state actions Regulatory costs from dynamic compliance environment

Enterprise Risk Management Continuous risk management is the key to advancing persistent security. Innovating in response to attacks and incidents develops and grows sustained capabilities. Cultural adaptation is required in the face of rapidly changing threats.

Due Diligence for Cybersecurity Integrated, holistic approach beyond just IT Dedicated staff and budget Governance

Microsoft Commitment to Cybersecurity We have built a culture of strong privacy principles and leading security practices We invest deeply in building a trustworthy computing platform and security expertise We proactively fight cybercrime and advocate extensively for policies and action that enhance cybersecurity Compliance Risk management Cybersecurity Transparency Governance Advocacy

Risk Informed Choice private hybrid public CHOICE Environment operated solely for a single organization; it may be managed by that organization or by a cloud service provider. Public or private environments remain unique entities but are bound together with onpremises ICT by common technology that enables data and application portability. Multi-tenant environments in which cloud service providers own and make available to the general public their cloud infrastructure, including storage and applications. Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS)

Trusted Cloud Principles

Synergistic Roles Private Sector ü Manage risks to systems and data ü Exchange information to enable ecosystem risk management ü Enable greater control, demonstrate compliance, be transparent ü Coordinate vulnerability handling ü Provide technical expertise to governments on cybersecurity challenges ü Help identify critical infrastructure functions that would create unacceptable impacts, and should not be subject to offensive actions ü Catalyze action to define cybersecurity norms Public Sector ü Harmonize risk management requirements ü Exchange information to enable ecosystem risk management ü Create agile regimes for compliance that leverage existing standards ü Publish a vulnerability handling policy ü Engage with private sector to understand technical challenges, esp. potential consequences of actions ü Increase transparency on defensive and offensive capabilities and criteria for use ü Define and implement cybersecurity norms

Efficient and Effective Partnership ü Develop new engagement models to be both agile and appropriately inclusive ü Clearly scope to defensive cybersecurity purposes ü Focus on what is truly critical for cyberspace ü Define more specific outcomes ü Deliver, implement, iterate

Advancing Persistent Security Together 1111115556978452 112233669685425212154678 79855643127849568345122397584 589586235164652321515947643582 76732521961946735216497365216694 241651676583261964752526943276195 51656976795652365343664763143646 006436649976334003600606676796232 8456132165498796435132135648498498 651567987894565123413656498749846513 132465498798746513213246498798465143 13216549879/8746541513200000000000000 000000464984131125900000111111555697845 269621200000225587899621122336696854 5212154678974613212012437985564312784 56834512239758458631225895862351646 32151594764358256519476732521961946 2164973652166949768524165167658326 Big data Investigations Legal action 526943276195673725165697679565 36465100006436649976 Commitment to Evolved Partnership Risk management, information sharing, vulnerability handling, critical infrastructure protection, norms Synergistic roles Timely, demonstrable results Transparency Multi-stakeholder Converging Interests Innovative