SlideShare a Scribd company logo
1 of 9
Download to read offline
Task Force
Office 365 Security
How Microsoft Helps Keep
Your Data Safe from Constantly
Evolving Threats
Introduction
Data security is a constant arms race.
As developers build stronger walls and more secure
protocols, hackers fashion more sophisticated techniques
to break through.
It’s why Microsoft created their Elite Security Teams:
to identify and neutralize potential threats.
By simulating and defending against the latest cyber
attack strategies, their war games work to secure the
Office 365 Cloud for your sensitive data.
Simulated Attacks
for Real Security
How the game is played.
 
The Attack Team simulates real attacks on
Microsoft data.
The Defense Team stays constantly vigilant
to swiftly identify and respond to these
simulated attacks.
The Attack Team:
Getting in the Enemy’s Head
Think like a hacker.
 
The best way to keep your data secure is to think
like the people trying to get their hands on it.
The Attack Team is a group of highly-skilled IT security
experts with the background to understand the tactics
hackers use to break through security and the know-how
to evolve existing techniques and find new ways to attack.
Their mission: to stage and perform targeted, persistent,
internal attacks.
The Defense Team:
Ever-Vigilant
Knowing is half the battle.
 
Highly trained security experts, the Defense Team works
to stop attacks before they start, repair data, defend
against breaches and intrusions, and prevent vulnerabilities.
Their mission: to sift through petabytes of data and identify
known exploits while searching for “unknown unknowns:”
types of attacks so new they haven’t been catalogued yet.
When the Defense Team identifies an attack, the race
is on to contain and repair, minimizing loss of data.
Attack Team Metrics
These metrics measure the effectiveness of existing
security and provide a benchmark for improvement.
1-Mean Time to Compromise:
From the start of the simulation, how
long does it take to get a foothold?
2-Mean Time to Privilege Escalation:
How long, from the start of the simulation,
to full compromise?
Defense Team Metrics
1-Estimated Time to Detection:
How fast any attempted attacks
were discovered.
2-Estimated Time to Recovery:
How quickly the Attack Team was
neutralized and the breach repaired.
The Defense Team is able to constantly
thwart potential threats based on these
two metrics:
Peace of Mind with
the Office 365 Cloud
To learn more about our Elite Security Teams and
Microsoft’s commitment to keeping your data private
and protected, download our new eBook today.
https://aka.ms/workplace-watchdog  
Together, the Elite Security Teams enable Microsoft
to better anticipate the next stage of data security,
continually identifying threats and closing potential
vulnerabilities before they can be exploited.
The Modern
Workplace
Watchdog
© 2015 Microsoft Corporation. All rights reserved. This document is for informational
purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
SUMMARY. This document is provided “as-is.” Information and views expressed in
this document, including URL and other Internet website references, may change
without notice.
This document does not provide you with any legal rights to any intellectual property
in any Microsoft product. You may copy and use this document for your internal,
reference purposes.
microsoft.com

More Related Content

What's hot

brochure 2016-September (1)
brochure 2016-September (1)brochure 2016-September (1)
brochure 2016-September (1)
Dan Kunkel
 

What's hot (20)

brochure 2016-September (1)
brochure 2016-September (1)brochure 2016-September (1)
brochure 2016-September (1)
 
7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel
 
What is Security Orchestration?
What is Security Orchestration?What is Security Orchestration?
What is Security Orchestration?
 
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic Stack
 
Presentation
PresentationPresentation
Presentation
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
 
Modernize your Security Operations with Azure Sentinel
Modernize your Security Operations with Azure SentinelModernize your Security Operations with Azure Sentinel
Modernize your Security Operations with Azure Sentinel
 
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic Stack
 
Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018
 
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic Stack
 
Elastic Security: Protección empresarial basada en Elastic Stack
Elastic Security: Protección empresarial basada en Elastic StackElastic Security: Protección empresarial basada en Elastic Stack
Elastic Security: Protección empresarial basada en Elastic Stack
 
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)
 
7 cloud security tips
7 cloud security tips7 cloud security tips
7 cloud security tips
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Introduction to Azure Sentinel
Introduction to Azure SentinelIntroduction to Azure Sentinel
Introduction to Azure Sentinel
 
Ransomware: Can you protect against attacks?
Ransomware: Can you protect against attacks?Ransomware: Can you protect against attacks?
Ransomware: Can you protect against attacks?
 
Complete Cyber Security Course
Complete Cyber Security CourseComplete Cyber Security Course
Complete Cyber Security Course
 
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic Stack
 
Petya Ransomware
Petya RansomwarePetya Ransomware
Petya Ransomware
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
 

Viewers also liked

Cross-Platform Barcode Scanning with ZXing, Jonathan Dick
Cross-Platform Barcode Scanning with ZXing, Jonathan DickCross-Platform Barcode Scanning with ZXing, Jonathan Dick
Cross-Platform Barcode Scanning with ZXing, Jonathan Dick
Xamarin
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study
North Bridge
 

Viewers also liked (15)

Total Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester StudyTotal Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester Study
 
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
 
Understanding the Business Value of Migrating to Windows Server 2012
Understanding the Business Value of Migrating to Windows Server 2012Understanding the Business Value of Migrating to Windows Server 2012
Understanding the Business Value of Migrating to Windows Server 2012
 
Office Ergonomics: Dos and Don'ts
Office Ergonomics: Dos and Don'tsOffice Ergonomics: Dos and Don'ts
Office Ergonomics: Dos and Don'ts
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
 
Bring Your Own Device
Bring Your Own DeviceBring Your Own Device
Bring Your Own Device
 
Cross-Platform Barcode Scanning with ZXing, Jonathan Dick
Cross-Platform Barcode Scanning with ZXing, Jonathan DickCross-Platform Barcode Scanning with ZXing, Jonathan Dick
Cross-Platform Barcode Scanning with ZXing, Jonathan Dick
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study
 
Millennials and the Next Generation of IT
Millennials and the Next Generation of ITMillennials and the Next Generation of IT
Millennials and the Next Generation of IT
 
5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your Business5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your Business
 
Build Better Games with Unity and Microsoft Azure
Build Better Games with Unity and Microsoft AzureBuild Better Games with Unity and Microsoft Azure
Build Better Games with Unity and Microsoft Azure
 
This is the Microsoft Cloud
This is the Microsoft CloudThis is the Microsoft Cloud
This is the Microsoft Cloud
 
Microsoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for InvestorsMicrosoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for Investors
 
PPT on Microsoft Corporation
PPT on Microsoft CorporationPPT on Microsoft Corporation
PPT on Microsoft Corporation
 
Top 5 Deep Learning and AI Stories - October 6, 2017
Top 5 Deep Learning and AI Stories - October 6, 2017Top 5 Deep Learning and AI Stories - October 6, 2017
Top 5 Deep Learning and AI Stories - October 6, 2017
 

Similar to Office365 Security Task Force

Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
Janghyuck Choi
 

Similar to Office365 Security Task Force (20)

Microsoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterpriseMicrosoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterprise
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint
 
Cyber security
Cyber securityCyber security
Cyber security
 
Threat Intelligen.pptx
Threat Intelligen.pptxThreat Intelligen.pptx
Threat Intelligen.pptx
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security Simulation
 
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
 
Cyber Security Conference - Microsoft public sector incident response and re...
Cyber Security Conference - Microsoft public sector  incident response and re...Cyber Security Conference - Microsoft public sector  incident response and re...
Cyber Security Conference - Microsoft public sector incident response and re...
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
 
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxOutsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
 
An Ultimate Guide On Cyber Security Solutions.pdf
An Ultimate Guide On Cyber Security Solutions.pdfAn Ultimate Guide On Cyber Security Solutions.pdf
An Ultimate Guide On Cyber Security Solutions.pdf
 
CCI2018 - La "moderna" Sicurezza informatica & Microsoft
CCI2018 - La "moderna" Sicurezza informatica & MicrosoftCCI2018 - La "moderna" Sicurezza informatica & Microsoft
CCI2018 - La "moderna" Sicurezza informatica & Microsoft
 
In hands-on tests, VMRay Email Threat Defender caught malware and phishing at...
In hands-on tests, VMRay Email Threat Defender caught malware and phishing at...In hands-on tests, VMRay Email Threat Defender caught malware and phishing at...
In hands-on tests, VMRay Email Threat Defender caught malware and phishing at...
 
A closer look at CTF challenges
A closer look at CTF challengesA closer look at CTF challenges
A closer look at CTF challenges
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Information security
Information securityInformation security
Information security
 
Threat Detection and Response Solutions
Threat Detection and Response SolutionsThreat Detection and Response Solutions
Threat Detection and Response Solutions
 

More from Microsoft

Top Reasons to Buy
Top Reasons to BuyTop Reasons to Buy
Top Reasons to Buy
Microsoft
 
Enterprise social how to WLAN
Enterprise social how to WLANEnterprise social how to WLAN
Enterprise social how to WLAN
Microsoft
 
3 reasons your biz needs ES
3 reasons your biz needs ES3 reasons your biz needs ES
3 reasons your biz needs ES
Microsoft
 

More from Microsoft (20)

Modern Finance at Microsoft US
Modern Finance at Microsoft USModern Finance at Microsoft US
Modern Finance at Microsoft US
 
Modern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft USModern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft US
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018
 
Norwegian Refugee Council
Norwegian Refugee CouncilNorwegian Refugee Council
Norwegian Refugee Council
 
Reimagining Business Operations
Reimagining Business OperationsReimagining Business Operations
Reimagining Business Operations
 
Top 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future InnovatorsTop 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future Innovators
 
Media in Transformation: A Technology Perspective
Media in Transformation: A Technology PerspectiveMedia in Transformation: A Technology Perspective
Media in Transformation: A Technology Perspective
 
Integrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision DemonstratorIntegrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision Demonstrator
 
Ignite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration ApproachIgnite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration Approach
 
The Digital Airline
The Digital AirlineThe Digital Airline
The Digital Airline
 
Driving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experienceDriving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experience
 
Making Your Marketing More Effective
Making Your Marketing More Effective Making Your Marketing More Effective
Making Your Marketing More Effective
 
10 real-world tips for building relationships and closing more on LinkedIn
10 real-world tips for building relationships and closing more on LinkedIn10 real-world tips for building relationships and closing more on LinkedIn
10 real-world tips for building relationships and closing more on LinkedIn
 
Why Microsoft Dynamics AX
Why Microsoft Dynamics AXWhy Microsoft Dynamics AX
Why Microsoft Dynamics AX
 
Top Reasons to Buy
Top Reasons to BuyTop Reasons to Buy
Top Reasons to Buy
 
5 Steps to Help Your Organization Succeed This Year
5 Steps to Help Your Organization Succeed This Year5 Steps to Help Your Organization Succeed This Year
5 Steps to Help Your Organization Succeed This Year
 
5 Steps to Help Your Organization Succeed This Year
5 Steps to Help Your Organization Succeed This Year5 Steps to Help Your Organization Succeed This Year
5 Steps to Help Your Organization Succeed This Year
 
Enterprise social how to WLAN
Enterprise social how to WLANEnterprise social how to WLAN
Enterprise social how to WLAN
 
3 reasons your biz needs ES
3 reasons your biz needs ES3 reasons your biz needs ES
3 reasons your biz needs ES
 
Why today’s businesses need enterprise social
Why today’s businesses need enterprise socialWhy today’s businesses need enterprise social
Why today’s businesses need enterprise social
 

Recently uploaded

+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
Health
 
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling ManjurJual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
ptikerjasaptiker
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
vexqp
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
ahmedjiabur940
 
PLE-statistics document for primary schs
PLE-statistics document for primary schsPLE-statistics document for primary schs
PLE-statistics document for primary schs
cnajjemba
 
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit RiyadhCytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Abortion pills in Riyadh +966572737505 get cytotec
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
chadhar227
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
nirzagarg
 
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Bertram Ludäscher
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 

Recently uploaded (20)

+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
 
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling ManjurJual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
Jual Cytotec Asli Obat Aborsi No. 1 Paling Manjur
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
Dubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls DubaiDubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls Dubai
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - Almora
 
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
PLE-statistics document for primary schs
PLE-statistics document for primary schsPLE-statistics document for primary schs
PLE-statistics document for primary schs
 
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit RiyadhCytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
 
Sequential and reinforcement learning for demand side management by Margaux B...
Sequential and reinforcement learning for demand side management by Margaux B...Sequential and reinforcement learning for demand side management by Margaux B...
Sequential and reinforcement learning for demand side management by Margaux B...
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
Capstone in Interprofessional Informatic // IMPACT OF COVID 19 ON EDUCATION
Capstone in Interprofessional Informatic  // IMPACT OF COVID 19 ON EDUCATIONCapstone in Interprofessional Informatic  // IMPACT OF COVID 19 ON EDUCATION
Capstone in Interprofessional Informatic // IMPACT OF COVID 19 ON EDUCATION
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 

Office365 Security Task Force

  • 1. Task Force Office 365 Security How Microsoft Helps Keep Your Data Safe from Constantly Evolving Threats
  • 2. Introduction Data security is a constant arms race. As developers build stronger walls and more secure protocols, hackers fashion more sophisticated techniques to break through. It’s why Microsoft created their Elite Security Teams: to identify and neutralize potential threats. By simulating and defending against the latest cyber attack strategies, their war games work to secure the Office 365 Cloud for your sensitive data.
  • 3. Simulated Attacks for Real Security How the game is played.   The Attack Team simulates real attacks on Microsoft data. The Defense Team stays constantly vigilant to swiftly identify and respond to these simulated attacks.
  • 4. The Attack Team: Getting in the Enemy’s Head Think like a hacker.   The best way to keep your data secure is to think like the people trying to get their hands on it. The Attack Team is a group of highly-skilled IT security experts with the background to understand the tactics hackers use to break through security and the know-how to evolve existing techniques and find new ways to attack. Their mission: to stage and perform targeted, persistent, internal attacks.
  • 5. The Defense Team: Ever-Vigilant Knowing is half the battle.   Highly trained security experts, the Defense Team works to stop attacks before they start, repair data, defend against breaches and intrusions, and prevent vulnerabilities. Their mission: to sift through petabytes of data and identify known exploits while searching for “unknown unknowns:” types of attacks so new they haven’t been catalogued yet. When the Defense Team identifies an attack, the race is on to contain and repair, minimizing loss of data.
  • 6. Attack Team Metrics These metrics measure the effectiveness of existing security and provide a benchmark for improvement. 1-Mean Time to Compromise: From the start of the simulation, how long does it take to get a foothold? 2-Mean Time to Privilege Escalation: How long, from the start of the simulation, to full compromise?
  • 7. Defense Team Metrics 1-Estimated Time to Detection: How fast any attempted attacks were discovered. 2-Estimated Time to Recovery: How quickly the Attack Team was neutralized and the breach repaired. The Defense Team is able to constantly thwart potential threats based on these two metrics:
  • 8. Peace of Mind with the Office 365 Cloud To learn more about our Elite Security Teams and Microsoft’s commitment to keeping your data private and protected, download our new eBook today. https://aka.ms/workplace-watchdog   Together, the Elite Security Teams enable Microsoft to better anticipate the next stage of data security, continually identifying threats and closing potential vulnerabilities before they can be exploited. The Modern Workplace Watchdog
  • 9. © 2015 Microsoft Corporation. All rights reserved. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. microsoft.com