steve faehl microsoft tools for cyber security - meec - maryland education enterprise...

36
Steve Faehl Microsoft Tools For Cyber Security

Upload: others

Post on 28-May-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Steve Faehl

Microsoft Tools For Cyber Security

Page 2: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

The world is changing . . .

Page 3: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

. . . so are hackers

Cyber Security is the #1 concern of organizations and governments.

Page 4: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Cybercrime and cyber espionage are big business

Page 5: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

http://www.ibtimes.com/us-confirms-blackenergy-malware-used-ukrainian-power-plant-hac-2263008.

Page 6: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

33% of organizations take 2+ years to

discover breach

$5.9M Average cost of a breach in the

United States

60% of data stolen in hours

65% of organizations say attacks

evaded existing preventative security

tools

Cost to hire an outside firm to

audit level of breach

Costs to remediate breach like

credit monitoring etc

Litigation costs arising from

breach

Cost to Brand Reputation

Page 7: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Identity Security

Network SecurityDevice security

Application Security

Email Security

A Layered security approach is necessary

to safeguard productivity

Document Security

Page 8: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

THE MICROSOFT SECURITY STORY

Page 9: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Microsoft Experience & CredentialsSecond decade of perspective & progress

Page 10: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Big Data in the fight against cybercrime

Page 11: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility
Page 12: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Identity Security

Network SecurityDevice security

Application Security

Email Security

A Layered security approach is necessary

to safeguard productivity

Enterprise Mobility Suite

Document Security

Page 13: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Identity Security

Device security

Application Security

Email Security

A Layered security approach is necessary

to safeguard productivity

Azure AD Premium

Document Security

Network Security

Page 14: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Simplify and ProtectSecuring Identity with AADP

Enabling users and organizations with a common identity

on-premises and in the cloud

Optionally add Multi-Factor Authentication per-app for additional user identity verification

Page 15: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Identity Security

Network SecurityDevice security

Application Security

Email Security

A Layered security approach is necessary

to safeguard productivity

Intune + Azure RMS + DLP

Document Security

Page 16: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

PEOPLE CENTRIC PROTECTION

Page 17: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Device security

Application Security

Email Security

A Layered security approach is necessary

to safeguard productivity

Advanced Threat Analytics

Document Security

Network Security

Identity Security

Page 18: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

24-48hours

Typical Attack ProfileWhen you assume breach, you need to detect & respond ASAP

First HostCompromised

CYBERTHREATS

Domain AdminCompromised

DATA EXFILTRATION (Attacker Undetected) 11-14 months

Breach Discovered

• Active Directory controls

access to business assets

• Attackers commonly

target AD & IT Admins

• Current detection tools

miss most attacks

• You may be under attack

(or compromised)

• Response requires

advanced expertise &

tools

• Expensive & challenging

to successfully recover

Page 19: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

ATA

Advanced Threat AnalyticsBring Microsoft's telemetry in-house

Page 20: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

ATA Topology

Page 21: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Identity Security

Network SecurityDevice security

Application Security

Email Security

A Layered security approach is necessary

to safeguard productivity

Advanced Threat Protection

Document Security

Page 22: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Phishing 101

Jeff Hey <[email protected]>

Page 23: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Phishing TrendsBy the numbers

Page 24: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Malware variant explosion

A.

B.

signature-based AV/AS

Page 25: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Signature based Malware detection has a large latency due to static analysis

Traditional Malware Detection

Page 26: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Exchange Online Advanced Threat Protection

Page 27: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Behavior based Malware detection uses Machine Learning to flag Malware

Next-Gen Malware Detection

Page 28: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

ATP Service architecture

Page 29: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Safe Link Rewrite

Page 30: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Blocked URL

Page 31: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

URL Trace

Page 32: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

32

Blocked Attachment

Page 33: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Advanced Threat Protection Direct, Open, and EES

channels

$1.40/ Faculty/month

$.70/Student/month

Advanced Threat Analytics Direct, Open, and EES

channels

Included with ECAL

or EMS

Enterprise Mobility Suite

(AADP+ Intune+ Azure RMS+ ATA)

Direct, Open, and EES

channels

$1.07/ Faculty/month

Azure AD Premium (stand alone) Direct, Open, and EES $.55/ Faculty/month

$.22/Student/Month

How to Purchase – Education Pricing

Page 34: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility

Thank you for attending!

https://products.office.com/en-us/exchange/online-email-threat-protection

http://www.microsoft.com/ata

http://www.microsoft.com/en-us/server-cloud/enterprise-mobility/

Page 36: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility