disrupting the revolution of cyber-threats with ... · of cyber-threats. targeting cation...

30
Disrupting the Revolution of Cyber-Threats with Revolutionary Security

Upload: others

Post on 06-Jun-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

Disrupting the Revolution of Cyber-Threats with Revolutionary Security

Page 2: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

REVOLUTION

TODAY, YOU ARE EXPERIENCING A

OF CYBER-THREATS

Page 3: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

Targeting

So

ph

isticatio

n

2003–2004 2005–present 2012–beyond

Page 4: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:
Page 5: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

Addressing the threats requires a new approach:

Security from the inside out – beyond bigger walls

RUIN THE ATTACKERS ECONOMIC MODEL

BREAK THE ATTACK PLAYBOOK

ELIMINATE THE VECTORS OF ATTACK

Page 6: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

Device Protection Information Protection Identity Protection

Windows 10 Security Approach

Page 7: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

Identity Protection

Page 8: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

SHARED SECRETS

shhh!

Easily mishandled or lost

(Hint: The user is the problem)

Page 9: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

Internet username and password

User

THE SITES WE USE ARE A WEAK LINK

Bad Guy

1

Social

.com

Bank

.com

Network

.com

LOL

.com

Obscure

.com 1

2

Page 10: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

LIMITED USE OF MFA CREATES WEAK LINKS

User

UN/Password

High-value assets

Most network resources

Page 11: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:
Page 12: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:
Page 13: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

WINDOWS HELLO

Facial

Hello Rick

Fingerprint Iris

Page 14: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

FIDO ALLIANCE

Board level members

Page 15: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:
Page 16: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:
Page 17: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

Information Protection

Page 18: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

Protects data when a device is lost or stolen using full disk encryption

Provides single sign on and protection from cold boot attacks

Easy to deploy and manageable at scale

Excellent integration, performance, and reliability

In process for FIPS 140-2 certification

BitLocker data protection

Page 19: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

2HIPPA Secure Now, “A look at the cost of healthcare data breaches,” Art Gross, March 30, 2012

Have accidentally sent sensitive information to the wrong person1

58%

…of senior managers admit to regularly uploading work files to a personal email or cloud account1

87%

Average per record cost of a data breach across all industries2

$240 PER

RECORD

1Stroz Friedberg, “On The Pulse: Information Security In American Business,” 2013

Page 20: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

DEVICE PROTECTION

DATA SEPARATION

LEAK PROTECTION

SHARING PROTECTION

Containment

BYOD separation

DATA SEPARATION

Prevent unauthorized apps from accessing data

LEAK PROTECTION

Page 21: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

HOW OTHERS ARE FILLING THE GAP: PAIN POINTS

Page 22: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:
Page 23: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

Device Protection

Page 24: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

MICROSOFT CONFIDENTIAL – Internal Use Only

Page 25: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

Device Guard

Hardware Rooted App Control

Windows desktop can be locked down to only run trusted apps, just like many mobile OS’s (e.g.: Windows Phone)

Resistant to tampering by an administrator or malware

Requires devices specially configured by either the OEM or IT

Requires Windows Enterprise edition

Untrusted apps and executables, such as malware, are unable to run

Page 26: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

Threat Analysis

Page 27: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

$3.5M The average cost of a data breach to a company

200+ The median # of days that attackers reside within a victim’s network before detection

76% of all network intrusions are due to compromised user credentials

$500B The total potential cost of cybercrime to the global economy

Page 28: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:

Detect threats fast with Behavioral

Analytics

Adapt as fast as your enemies

Focus on what is important fast

using the simple attack timeline

Reduce the fatigue of false positives

No need to create rules or policies,

deploy agents or monitoring a flood of

security reports. The intelligence needed

is ready to analyze and continuously

learning.

ATA continuously learns from the

organizational entity behavior (users,

devices, and resources) and adjusts

itself to reflect the changes in your

rapidly-evolving enterprise.

The attack timeline is a clear, efficient,

and convenient feed that surfaces the

right things on a timeline, giving you

the power of perspective on the

“who-what-when-and how” of your

enterprise. It also provides

recommendations for next steps

Alerts only happen once suspicious

activities are contextually

aggregated, not only comparing the

entity’s behavior to its own behavior,

but also to the profiles of other

entities in its interaction path.

Page 29: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:
Page 30: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach: