Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/...

10

description

Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/ Seniorkonsulent Martin Kiær, Security & Infrastructure Business Lead

Transcript of Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/...

Page 1: Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/ Seniorkonsulent Martin Kiær, Security & Infrastructure Business Lead
Page 2: Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/ Seniorkonsulent Martin Kiær, Security & Infrastructure Business Lead
Page 3: Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/ Seniorkonsulent Martin Kiær, Security & Infrastructure Business Lead

Microsoft Services – SikkerhedsløsningerStrategiske Assessments Løsninger

Dynamic Identity

Framework Assessment

Microsoft Security

Risk Assessment

Intro

One Microsoft SecurityServicesOverblik

One Microsoft SecurityServices Workshop

Active Directory Self Service Migration Service

Access Enablement Gateway

and Identity Service (AEGIS)

Data Protection using Active

Directory Rights Management

Services

Design and Implementation for

Active Directory

Enterprise Identity Management using Microsoft Identity Manager

Office 365 FIM Connector for

Windows Azure Active Directory

Enterprise Federated Identity using Active Directory Federation Services

Seamless Secure Access using

DirectAccess

Enterprise Mobility POC

Strong Authentication using

Smartcards

Public Key Infrastructure using

Microsoft Active Directory

Certificate Services (PKI 2012)

Group Management using

Microsoft Identity Manager

Full Volume Encryption using Windows BitLocker Drive Encryption

Network Isolation Services

Self Service Password

Management

Persistent Advisory Detection Service (PADS)

Windows XP migration Jumpstart

Security Health Check

Security Error Reporting and Analysis (SERA)

Software Update Management

Software Update Management

Process Service Map

SUM Tech Extension – Windows

Server

SUM Tech Extension – Windows Client

Enhanced Security

Administrative Environment

(ESAE)

Securing Lateral Account

Movement (SLAM) Side by Side

Remediation

Active Directory Security Assessment

Security Development

Lifecycle (SDL)

Maturity Assessment

SDL Training

ADSRaaSIncident Response & Recovery

(IR&R)

Information Protection using

Hybrid RMS

Page 4: Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/ Seniorkonsulent Martin Kiær, Security & Infrastructure Business Lead
Page 5: Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/ Seniorkonsulent Martin Kiær, Security & Infrastructure Business Lead
Page 6: Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/ Seniorkonsulent Martin Kiær, Security & Infrastructure Business Lead
Page 7: Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/ Seniorkonsulent Martin Kiær, Security & Infrastructure Business Lead
Page 8: Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/ Seniorkonsulent Martin Kiær, Security & Infrastructure Business Lead
Page 9: Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/ Seniorkonsulent Martin Kiær, Security & Infrastructure Business Lead

Microsoft Security Guidance (gode korte forklaringer og links der omhandler en masse sikkerheds discipliner)http://technet.microsoft.com/en-us/library/cc184906.aspx

En række artikler om nogle af de bedste gratis sikkerhedsværktøjer fra MicrosoftPart 1: Microsoft’s Free Security Tools – Series IntroductionPart 2: Microsoft’s Free Security Tools – Attack Surface AnalyzerPart 3: Microsoft’s Free Security Tools – Enhanced Mitigation Experience ToolkitPart 4: Microsoft’s Free Security Tools – BinScope Binary AnalyzerPart 5: Microsoft’s Free Security Tools – Threat ModelingPart 6: Microsoft’s Free Security Tools – banned.hPart 7: Microsoft’s Free Security Tools – Windows Defender OfflinePart 8: Microsoft’s Free Security Tools – PortqryPart 9: Microsoft’s Free Security Tools – SummaryPart 10: Microsoft’s Free Security Tools – Microsoft Baseline Security AnalyzerPart 11: Microsoft’s Free Security Tools – Microsoft Safety ScannerPart 12: Microsoft’s Free Security Tools – Anti-Cross-Site Scripting LibraryPart 13: Microsoft’s Free Security Tools – Microsoft Security Compliance Manager ToolPart 14: Microsoft’s Free Security Tools – URLScan Security ToolPart 15: Microsoft’s Free Security Tools – Microsoft Assessment and Planning Toolkit

Page 10: Cyber Security Conference - Praktiske erfaringer med Implementering af Cyber Defense, v/ Seniorkonsulent Martin Kiær, Security & Infrastructure Business Lead

Hvis du tror, at teknologien kan løse dine

sikkerhedsproblemer, så du forstår ikke problemerne

og du forstår ikke teknologien.

Bruce Schneier