Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise...
Transcript of Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise...
![Page 1: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/1.jpg)
Steve Faehl
Microsoft Tools For Cyber Security
![Page 2: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/2.jpg)
The world is changing . . .
![Page 3: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/3.jpg)
. . . so are hackers
Cyber Security is the #1 concern of organizations and governments.
![Page 4: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/4.jpg)
Cybercrime and cyber espionage are big business
![Page 5: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/5.jpg)
http://www.ibtimes.com/us-confirms-blackenergy-malware-used-ukrainian-power-plant-hac-2263008.
![Page 6: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/6.jpg)
33% of organizations take 2+ years to
discover breach
$5.9M Average cost of a breach in the
United States
60% of data stolen in hours
65% of organizations say attacks
evaded existing preventative security
tools
Cost to hire an outside firm to
audit level of breach
Costs to remediate breach like
credit monitoring etc
Litigation costs arising from
breach
Cost to Brand Reputation
![Page 7: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/7.jpg)
Identity Security
Network SecurityDevice security
Application Security
Email Security
A Layered security approach is necessary
to safeguard productivity
Document Security
![Page 8: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/8.jpg)
THE MICROSOFT SECURITY STORY
![Page 9: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/9.jpg)
Microsoft Experience & CredentialsSecond decade of perspective & progress
![Page 10: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/10.jpg)
Big Data in the fight against cybercrime
![Page 11: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/11.jpg)
![Page 12: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/12.jpg)
Identity Security
Network SecurityDevice security
Application Security
Email Security
A Layered security approach is necessary
to safeguard productivity
Enterprise Mobility Suite
Document Security
![Page 13: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/13.jpg)
Identity Security
Device security
Application Security
Email Security
A Layered security approach is necessary
to safeguard productivity
Azure AD Premium
Document Security
Network Security
![Page 14: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/14.jpg)
Simplify and ProtectSecuring Identity with AADP
Enabling users and organizations with a common identity
on-premises and in the cloud
Optionally add Multi-Factor Authentication per-app for additional user identity verification
![Page 15: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/15.jpg)
Identity Security
Network SecurityDevice security
Application Security
Email Security
A Layered security approach is necessary
to safeguard productivity
Intune + Azure RMS + DLP
Document Security
![Page 16: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/16.jpg)
PEOPLE CENTRIC PROTECTION
![Page 17: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/17.jpg)
Device security
Application Security
Email Security
A Layered security approach is necessary
to safeguard productivity
Advanced Threat Analytics
Document Security
Network Security
Identity Security
![Page 18: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/18.jpg)
24-48hours
Typical Attack ProfileWhen you assume breach, you need to detect & respond ASAP
First HostCompromised
CYBERTHREATS
Domain AdminCompromised
DATA EXFILTRATION (Attacker Undetected) 11-14 months
Breach Discovered
• Active Directory controls
access to business assets
• Attackers commonly
target AD & IT Admins
• Current detection tools
miss most attacks
• You may be under attack
(or compromised)
• Response requires
advanced expertise &
tools
• Expensive & challenging
to successfully recover
![Page 19: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/19.jpg)
ATA
Advanced Threat AnalyticsBring Microsoft's telemetry in-house
![Page 20: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/20.jpg)
ATA Topology
![Page 21: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/21.jpg)
Identity Security
Network SecurityDevice security
Application Security
Email Security
A Layered security approach is necessary
to safeguard productivity
Advanced Threat Protection
Document Security
![Page 23: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/23.jpg)
Phishing TrendsBy the numbers
![Page 24: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/24.jpg)
Malware variant explosion
A.
B.
signature-based AV/AS
![Page 25: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/25.jpg)
Signature based Malware detection has a large latency due to static analysis
Traditional Malware Detection
![Page 26: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/26.jpg)
Exchange Online Advanced Threat Protection
![Page 27: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/27.jpg)
Behavior based Malware detection uses Machine Learning to flag Malware
Next-Gen Malware Detection
![Page 28: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/28.jpg)
ATP Service architecture
![Page 29: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/29.jpg)
Safe Link Rewrite
![Page 30: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/30.jpg)
Blocked URL
![Page 31: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/31.jpg)
URL Trace
![Page 32: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/32.jpg)
32
Blocked Attachment
![Page 33: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/33.jpg)
Advanced Threat Protection Direct, Open, and EES
channels
$1.40/ Faculty/month
$.70/Student/month
Advanced Threat Analytics Direct, Open, and EES
channels
Included with ECAL
or EMS
Enterprise Mobility Suite
(AADP+ Intune+ Azure RMS+ ATA)
Direct, Open, and EES
channels
$1.07/ Faculty/month
Azure AD Premium (stand alone) Direct, Open, and EES $.55/ Faculty/month
$.22/Student/Month
How to Purchase – Education Pricing
![Page 34: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/34.jpg)
Thank you for attending!
https://products.office.com/en-us/exchange/online-email-threat-protection
http://www.microsoft.com/ata
http://www.microsoft.com/en-us/server-cloud/enterprise-mobility/
![Page 35: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/35.jpg)
Who to contact for price details:
Contract # N139976 Roadshow presentation
35
![Page 36: Steve Faehl Microsoft Tools For Cyber Security - MEEC - Maryland Education Enterprise ...meec-edu.org/files/2015/10/MEEC-Microsoft-EDU-Cyber... · 2016-03-03 · Enterprise Mobility](https://reader033.fdocuments.net/reader033/viewer/2022042307/5ed3c9f07ac79b4400200fc8/html5/thumbnails/36.jpg)