SlideShare uma empresa Scribd logo
1 de 55
Le Cloud &
la Sécurité
Christophe Van Mollekot
Solution Advisor – Microsoft
Cloud vs Security
Global datacenter footprint
100+ Datacenters in over 40 countries
“71% of strategic buyers cite scalability, cost and business
agility as the most important drivers for using cloud services.“
– Gigaom Research
Integral to business transformation
Efficiently ScaleScalability
Test & DevCosts
Agility
trillion
a year1
Risk of cyber
attacks can cost
business up to
3$
individual records
were breached in
2013.4
More than
800M in 2014.3
The number of
recorded data
breaches increased
78%
of the value created
by the Internet.2
Cybercrime
extracts between
15-20% agree consumers have
lost control over how
personal information is
collected and used by
companies5
91%
Global attacks are increasing and costs are rising
How can Cloud help your Security
No one is able to use your
data in a way that you do
not approve.
You have visibility into
how your data is being
handled and used.
Your content is stored and
managed in compliance
with applicable laws,
regulations and standards.
How can Cloud help your Security
13
24 hour monitored physical security
System monitoring and logging
Patch management
Anti-Virus/Anti-Malware protection
Intrusion detection/DDoS
Penetration testing
Infrastructure protection
Network protection
Encrypted
connections
Virtual
Networks
ExpressRouteNetwork
isolation
Enterprise cloud identity – Windows Azure AD
Access monitoring
Single sign-on
Multi-Factor Authentication
Role based access controls
Identity & access
Encrypted data transfer
Encryption options for stored data
Data segregation
Choice of data location
Data redundancy
Data destruction
16
Data protection
Traditional protect & recover security strategy
The mindset shift
“FUNDAMENTALLY, IF SOMEBODY WANTS TO GET IN,
THEY'RE GETTING IN…ACCEPT THAT.
WHAT WE TELL CLIENTS IS:
NUMBER ONE, YOU'RE IN THE FIGHT, WHETHER YOU
THOUGHT YOU WERE OR NOT. NUMBER TWO,
YOU ALMOST CERTAINLY ARE PENETRATED. ”
Michael Hayden
Former Director of NSA & CIA
AssumeBreach
20
If you found out
tomorrow that your most
critical systems had been
infiltrated or that your
most critical data was
being exfiltrated, would
you be prepared to deal
with the breach?
RED
All your bases BELONG to us
vs. BLUE
AssumeBreachExecution
23
Wargame
exercises
Blue
teaming
Red
teaming
Monitor
emerging threats
Execute
post breach
Insider attack
simulation
PostBreachExecution
24
Establish security baselines
 Time to detect
 Time to contain
 Time to fix
 Time to recover
Framework to inventory damage
Identify reactive security investments
Update response plans
If you measure MTTR in
WEEKS/MONTHS/YEARS instead of
hours/days, then YOU’VE FAILED!
The confidentiality,
integrity, and availability
of your data is protected.
You have visibility into
how your data is being
handled and used.
Your content is stored and
managed in compliance
with applicable laws,
regulations and standards.
How can Cloud help your Security
We’ll keep your data secure
Your data is private and under your control
We manage your data in accordance with the law
You know what we’re doing with your data
No one is able to use your
data in a way that you do
not approve.
The confidentiality,
integrity, and availability
of your data is protected.
You have visibility into
how your data is being
handled and used.
How can Cloud help your Security
Microsoft Cloud Compliance Certifications
No one is able to use your
data in a way that you do
not approve.
The confidentiality,
integrity, and availability
of your data is protected.
Your content is stored and
managed in compliance
with applicable laws,
regulations and standards.
How can Cloud help your Security
http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/
Law Enforcement Requests
Microsoft NDA-To be shared under NDA only
Transparency Center
How can Cloud help your Security
One last word…
An on-premises solution to identify advanced security attacks before they cause damage
 Credit card companies
monitor cardholders’
behavior.
 If there is any abnormal
activity, they will notify the
cardholder to verify charge.
Microsoft Advanced Threat Analytics brings this
concept to IT and users of a particular organization
Comparison:
Behavioral
Analytics
Detection for known
attacks and issues
Advanced Threat
Detection
An on-premises solution to identify advanced security attacks before they cause damage
Detect threats fast
with Behavioral
Analytics
Adapt as fast as
your enemies
Focus on what is
important fast
using the simple
attack timeline
Reduce the fatigue
of false positives
Thank You
Learn more about the Microsoft Enterprise Cloud
Visit the Microsoft Trust Centers: Azure, Intune,
Office 365, and Dynamics CRM
Review the Microsoft Law Enforcement Request
Report and US National Security Orders Report
Read our blogs: Microsoft Cyber Trust and
Microsoft On the Issues
Follow us on Twitter: @MSFTSecurity
Additional Resources

Mais conteúdo relacionado

Mais procurados

Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security InfographicIdeba
 
Windstream Managed Network Security Ebook
Windstream Managed Network Security EbookWindstream Managed Network Security Ebook
Windstream Managed Network Security EbookIdeba
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesDave Reeves
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Iftikhar Ali Iqbal
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud CrossoverArmor
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security PresentationIdeba
 
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlWhose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlSafeNet
 
User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016patmisasi
 
Whose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudWhose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudSafeNet
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...Ulf Mattsson
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?NTEN
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recoverySameeu Imad
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-managementAmit Bhargava
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - IdealwareIdealware
 

Mais procurados (20)

Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security Infographic
 
Windstream Managed Network Security Ebook
Windstream Managed Network Security EbookWindstream Managed Network Security Ebook
Windstream Managed Network Security Ebook
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlWhose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
 
User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network Security
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
Whose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudWhose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the Cloud
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recovery
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-management
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 
Limitless xdr meetup
Limitless xdr meetupLimitless xdr meetup
Limitless xdr meetup
 
Risk based it auditing for non it auditors (basics of it auditing) final 12
Risk based it auditing for non it auditors (basics of it auditing) final 12Risk based it auditing for non it auditors (basics of it auditing) final 12
Risk based it auditing for non it auditors (basics of it auditing) final 12
 

Destaque

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityMohamed Belhadj
 
Réseaux Sociaux et Stratégie BtoB
Réseaux Sociaux et Stratégie BtoBRéseaux Sociaux et Stratégie BtoB
Réseaux Sociaux et Stratégie BtoBAnthony Cocherie
 
La responsabilité du chef d'entreprise face à une fuite de données
La responsabilité du chef d'entreprise face à une fuite de donnéesLa responsabilité du chef d'entreprise face à une fuite de données
La responsabilité du chef d'entreprise face à une fuite de donnéesTechnofutur TIC
 
Rencontre des epn de wallonie 2016
Rencontre des epn de wallonie 2016Rencontre des epn de wallonie 2016
Rencontre des epn de wallonie 2016Technofutur TIC
 
Dynamiser ses cours grâce aux outils microsoft
Dynamiser ses cours grâce aux outils microsoftDynamiser ses cours grâce aux outils microsoft
Dynamiser ses cours grâce aux outils microsoftTechnofutur TIC
 
Parcours de formations DATA ACADEMY
Parcours de formations DATA ACADEMYParcours de formations DATA ACADEMY
Parcours de formations DATA ACADEMYTechnofutur TIC
 
Creating business value from/with big data - Conférence 17/11
Creating business value from/with big data - Conférence 17/11Creating business value from/with big data - Conférence 17/11
Creating business value from/with big data - Conférence 17/11Technofutur TIC
 
Formations professionnelles digitales & ICT à Technofutur TIC
Formations professionnelles digitales & ICT à Technofutur TICFormations professionnelles digitales & ICT à Technofutur TIC
Formations professionnelles digitales & ICT à Technofutur TICTechnofutur TIC
 
De la business intelligence au Big Data
De la business intelligence au Big DataDe la business intelligence au Big Data
De la business intelligence au Big DataTechnofutur TIC
 
B2B Sales For Startups by @techalamenthe
B2B Sales For Startups by @techalamentheB2B Sales For Startups by @techalamenthe
B2B Sales For Startups by @techalamentheYoussef Rahoui
 
Enterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityEnterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityMark Masterson
 
Le web mapping pour tous
Le web mapping pour tousLe web mapping pour tous
Le web mapping pour tousLoïc Haÿ
 
L'essor des Messaging Apps : Quels enjeux pour les marques ?
L'essor des Messaging Apps : Quels enjeux pour les marques ?L'essor des Messaging Apps : Quels enjeux pour les marques ?
L'essor des Messaging Apps : Quels enjeux pour les marques ?Dagobert
 

Destaque (14)

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Réseaux Sociaux et Stratégie BtoB
Réseaux Sociaux et Stratégie BtoBRéseaux Sociaux et Stratégie BtoB
Réseaux Sociaux et Stratégie BtoB
 
La responsabilité du chef d'entreprise face à une fuite de données
La responsabilité du chef d'entreprise face à une fuite de donnéesLa responsabilité du chef d'entreprise face à une fuite de données
La responsabilité du chef d'entreprise face à une fuite de données
 
Rencontre des epn de wallonie 2016
Rencontre des epn de wallonie 2016Rencontre des epn de wallonie 2016
Rencontre des epn de wallonie 2016
 
Dynamiser ses cours grâce aux outils microsoft
Dynamiser ses cours grâce aux outils microsoftDynamiser ses cours grâce aux outils microsoft
Dynamiser ses cours grâce aux outils microsoft
 
Parcours de formations DATA ACADEMY
Parcours de formations DATA ACADEMYParcours de formations DATA ACADEMY
Parcours de formations DATA ACADEMY
 
Creating business value from/with big data - Conférence 17/11
Creating business value from/with big data - Conférence 17/11Creating business value from/with big data - Conférence 17/11
Creating business value from/with big data - Conférence 17/11
 
Formations professionnelles digitales & ICT à Technofutur TIC
Formations professionnelles digitales & ICT à Technofutur TICFormations professionnelles digitales & ICT à Technofutur TIC
Formations professionnelles digitales & ICT à Technofutur TIC
 
De la business intelligence au Big Data
De la business intelligence au Big DataDe la business intelligence au Big Data
De la business intelligence au Big Data
 
B2B Sales For Startups by @techalamenthe
B2B Sales For Startups by @techalamentheB2B Sales For Startups by @techalamenthe
B2B Sales For Startups by @techalamenthe
 
So3d Earnotz - Mardinnov
So3d Earnotz - MardinnovSo3d Earnotz - Mardinnov
So3d Earnotz - Mardinnov
 
Enterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityEnterprise Cloud Risk And Security
Enterprise Cloud Risk And Security
 
Le web mapping pour tous
Le web mapping pour tousLe web mapping pour tous
Le web mapping pour tous
 
L'essor des Messaging Apps : Quels enjeux pour les marques ?
L'essor des Messaging Apps : Quels enjeux pour les marques ?L'essor des Messaging Apps : Quels enjeux pour les marques ?
L'essor des Messaging Apps : Quels enjeux pour les marques ?
 

Semelhante a Cloud & Sécurité

What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultSOCVault
 
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptxLogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptxCNSHacking
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attackAndreanne Clarke
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxAbimbolaFisher1
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
Get The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsGet The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsParaben Corporation
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Secninjaz Technologies LLP
 
Security Transformation
Security TransformationSecurity Transformation
Security TransformationFaisal Yahya
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 

Semelhante a Cloud & Sécurité (20)

What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptxLogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
 
Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Get The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsGet The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation Tools
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Asset Security
Asset Security Asset Security
Asset Security
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 

Mais de Technofutur TIC

L’entretien d’embauche: 7 astuces pour convaincre votre futur employeur du se...
L’entretien d’embauche: 7 astuces pour convaincre votre futur employeur du se...L’entretien d’embauche: 7 astuces pour convaincre votre futur employeur du se...
L’entretien d’embauche: 7 astuces pour convaincre votre futur employeur du se...Technofutur TIC
 
Bye-bye 9-to-5 : comment j'ai créé mon propre job sur internet
Bye-bye 9-to-5 : comment j'ai créé mon propre job sur internetBye-bye 9-to-5 : comment j'ai créé mon propre job sur internet
Bye-bye 9-to-5 : comment j'ai créé mon propre job sur internetTechnofutur TIC
 
Les leçons de 17 années dans la Silicon Valley. Une autre expérience de la ré...
Les leçons de 17 années dans la Silicon Valley. Une autre expérience de la ré...Les leçons de 17 années dans la Silicon Valley. Une autre expérience de la ré...
Les leçons de 17 années dans la Silicon Valley. Une autre expérience de la ré...Technofutur TIC
 
Le Gaming au service de la formation, où comment apprendre par le jeu
Le Gaming au service de la formation, où comment apprendre par le jeu Le Gaming au service de la formation, où comment apprendre par le jeu
Le Gaming au service de la formation, où comment apprendre par le jeu Technofutur TIC
 
Bosser pour une startup tech: avantages et challenges
Bosser pour une startup tech: avantages et challengesBosser pour une startup tech: avantages et challenges
Bosser pour une startup tech: avantages et challengesTechnofutur TIC
 
Pourquoi et comment sensibiliser vos employés à devenir des acteurs dans votr...
Pourquoi et comment sensibiliser vos employés à devenir des acteurs dans votr...Pourquoi et comment sensibiliser vos employés à devenir des acteurs dans votr...
Pourquoi et comment sensibiliser vos employés à devenir des acteurs dans votr...Technofutur TIC
 
Réussir la transformation digitale de son entreprise
Réussir la transformation digitale de son entrepriseRéussir la transformation digitale de son entreprise
Réussir la transformation digitale de son entrepriseTechnofutur TIC
 
Comment réussir son projet de reconversion professionnelle ? - Job IT day 2018
Comment réussir son projet de reconversion professionnelle ? - Job IT day 2018Comment réussir son projet de reconversion professionnelle ? - Job IT day 2018
Comment réussir son projet de reconversion professionnelle ? - Job IT day 2018Technofutur TIC
 
Le Design Thinking - Job IT day 2018
Le Design Thinking - Job IT day 2018Le Design Thinking - Job IT day 2018
Le Design Thinking - Job IT day 2018Technofutur TIC
 
"Gamification, AI, Big Data, Réalité Augmentée... : les nouveaux métiers de l...
"Gamification, AI, Big Data, Réalité Augmentée... : les nouveaux métiers de l..."Gamification, AI, Big Data, Réalité Augmentée... : les nouveaux métiers de l...
"Gamification, AI, Big Data, Réalité Augmentée... : les nouveaux métiers de l...Technofutur TIC
 
Quels sont les besoins en compétences numériques et comment combler le phénom...
Quels sont les besoins en compétences numériques et comment combler le phénom...Quels sont les besoins en compétences numériques et comment combler le phénom...
Quels sont les besoins en compétences numériques et comment combler le phénom...Technofutur TIC
 
Community manager, content manager
Community manager, content managerCommunity manager, content manager
Community manager, content managerTechnofutur TIC
 
Secure Access: Intégration Checkpoint R80.1
Secure Access: Intégration Checkpoint R80.1Secure Access: Intégration Checkpoint R80.1
Secure Access: Intégration Checkpoint R80.1Technofutur TIC
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTTechnofutur TIC
 
Des outils informatiques abordables pour les associations
Des outils informatiques abordables pour les associationsDes outils informatiques abordables pour les associations
Des outils informatiques abordables pour les associationsTechnofutur TIC
 
Créer un courte vidéo promotionnelle avec un smartphone
Créer un courte vidéo promotionnelle avec un smartphoneCréer un courte vidéo promotionnelle avec un smartphone
Créer un courte vidéo promotionnelle avec un smartphoneTechnofutur TIC
 
La communication dans le non-marchand, une chance à saisir !
La communication dans le non-marchand, une chance à saisir !La communication dans le non-marchand, une chance à saisir !
La communication dans le non-marchand, une chance à saisir !Technofutur TIC
 
Amplifiez votre message grâce à une campagne d'emailing efficace
Amplifiez votre message grâce à une campagne d'emailing efficaceAmplifiez votre message grâce à une campagne d'emailing efficace
Amplifiez votre message grâce à une campagne d'emailing efficaceTechnofutur TIC
 
Les outils collaboratifs pour optimiser sa gestion de projet
Les outils collaboratifs pour optimiser sa gestion de projetLes outils collaboratifs pour optimiser sa gestion de projet
Les outils collaboratifs pour optimiser sa gestion de projetTechnofutur TIC
 

Mais de Technofutur TIC (20)

L’entretien d’embauche: 7 astuces pour convaincre votre futur employeur du se...
L’entretien d’embauche: 7 astuces pour convaincre votre futur employeur du se...L’entretien d’embauche: 7 astuces pour convaincre votre futur employeur du se...
L’entretien d’embauche: 7 astuces pour convaincre votre futur employeur du se...
 
Bye-bye 9-to-5 : comment j'ai créé mon propre job sur internet
Bye-bye 9-to-5 : comment j'ai créé mon propre job sur internetBye-bye 9-to-5 : comment j'ai créé mon propre job sur internet
Bye-bye 9-to-5 : comment j'ai créé mon propre job sur internet
 
Les leçons de 17 années dans la Silicon Valley. Une autre expérience de la ré...
Les leçons de 17 années dans la Silicon Valley. Une autre expérience de la ré...Les leçons de 17 années dans la Silicon Valley. Une autre expérience de la ré...
Les leçons de 17 années dans la Silicon Valley. Une autre expérience de la ré...
 
Le Gaming au service de la formation, où comment apprendre par le jeu
Le Gaming au service de la formation, où comment apprendre par le jeu Le Gaming au service de la formation, où comment apprendre par le jeu
Le Gaming au service de la formation, où comment apprendre par le jeu
 
Bosser pour une startup tech: avantages et challenges
Bosser pour une startup tech: avantages et challengesBosser pour une startup tech: avantages et challenges
Bosser pour une startup tech: avantages et challenges
 
Pourquoi et comment sensibiliser vos employés à devenir des acteurs dans votr...
Pourquoi et comment sensibiliser vos employés à devenir des acteurs dans votr...Pourquoi et comment sensibiliser vos employés à devenir des acteurs dans votr...
Pourquoi et comment sensibiliser vos employés à devenir des acteurs dans votr...
 
Réussir la transformation digitale de son entreprise
Réussir la transformation digitale de son entrepriseRéussir la transformation digitale de son entreprise
Réussir la transformation digitale de son entreprise
 
Comment réussir son projet de reconversion professionnelle ? - Job IT day 2018
Comment réussir son projet de reconversion professionnelle ? - Job IT day 2018Comment réussir son projet de reconversion professionnelle ? - Job IT day 2018
Comment réussir son projet de reconversion professionnelle ? - Job IT day 2018
 
Le Design Thinking - Job IT day 2018
Le Design Thinking - Job IT day 2018Le Design Thinking - Job IT day 2018
Le Design Thinking - Job IT day 2018
 
"Gamification, AI, Big Data, Réalité Augmentée... : les nouveaux métiers de l...
"Gamification, AI, Big Data, Réalité Augmentée... : les nouveaux métiers de l..."Gamification, AI, Big Data, Réalité Augmentée... : les nouveaux métiers de l...
"Gamification, AI, Big Data, Réalité Augmentée... : les nouveaux métiers de l...
 
Quels sont les besoins en compétences numériques et comment combler le phénom...
Quels sont les besoins en compétences numériques et comment combler le phénom...Quels sont les besoins en compétences numériques et comment combler le phénom...
Quels sont les besoins en compétences numériques et comment combler le phénom...
 
Community manager, content manager
Community manager, content managerCommunity manager, content manager
Community manager, content manager
 
Secure Access: Intégration Checkpoint R80.1
Secure Access: Intégration Checkpoint R80.1Secure Access: Intégration Checkpoint R80.1
Secure Access: Intégration Checkpoint R80.1
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINT
 
Des outils informatiques abordables pour les associations
Des outils informatiques abordables pour les associationsDes outils informatiques abordables pour les associations
Des outils informatiques abordables pour les associations
 
Créer un courte vidéo promotionnelle avec un smartphone
Créer un courte vidéo promotionnelle avec un smartphoneCréer un courte vidéo promotionnelle avec un smartphone
Créer un courte vidéo promotionnelle avec un smartphone
 
Crowdfunding Spot
Crowdfunding SpotCrowdfunding Spot
Crowdfunding Spot
 
La communication dans le non-marchand, une chance à saisir !
La communication dans le non-marchand, une chance à saisir !La communication dans le non-marchand, une chance à saisir !
La communication dans le non-marchand, une chance à saisir !
 
Amplifiez votre message grâce à une campagne d'emailing efficace
Amplifiez votre message grâce à une campagne d'emailing efficaceAmplifiez votre message grâce à une campagne d'emailing efficace
Amplifiez votre message grâce à une campagne d'emailing efficace
 
Les outils collaboratifs pour optimiser sa gestion de projet
Les outils collaboratifs pour optimiser sa gestion de projetLes outils collaboratifs pour optimiser sa gestion de projet
Les outils collaboratifs pour optimiser sa gestion de projet
 

Último

JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...
JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...
JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...Escorts service
 
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inEV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inStartupSprouts.in
 
Supply Chain Location Decision and Management
Supply Chain Location Decision and ManagementSupply Chain Location Decision and Management
Supply Chain Location Decision and Managementirahtarando
 
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDCCARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDCFikrie Omar
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607dollysharma2066
 
Famedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . FullsailFamedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . Fullsailfergusonamani
 
EXPERIENCE THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
EXPERIENCE  THE FUTURE OF WORK FOR FUTURE OF BUSINESSESEXPERIENCE  THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
EXPERIENCE THE FUTURE OF WORK FOR FUTURE OF BUSINESSESMotiveflikr Media
 
Bhavnagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girl
Bhavnagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlBhavnagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girl
Bhavnagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlDeepika Singh
 
Dàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptxDàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptxdmtillman
 
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...ZurliaSoop
 
How to structure your pitch - B4i template
How to structure your pitch - B4i templateHow to structure your pitch - B4i template
How to structure your pitch - B4i templateFerruccio Martinelli
 
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024Fikrie Omar
 
Amethyst Benifits and Healing Properties.pdf
Amethyst Benifits and Healing Properties.pdfAmethyst Benifits and Healing Properties.pdf
Amethyst Benifits and Healing Properties.pdfHimalya Quartz
 
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...StartupSprouts.in
 
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdfEnabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdfSmartinfologiks
 
How Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptxHow Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptxDiversity In Toys
 
Indian Call girl in Dubai 0508644382 Dubai Call girls
Indian Call girl in Dubai 0508644382 Dubai Call girlsIndian Call girl in Dubai 0508644382 Dubai Call girls
Indian Call girl in Dubai 0508644382 Dubai Call girlsMonica Sydney
 

Último (17)

JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...
JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...
JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...
 
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inEV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
 
Supply Chain Location Decision and Management
Supply Chain Location Decision and ManagementSupply Chain Location Decision and Management
Supply Chain Location Decision and Management
 
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDCCARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
 
Famedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . FullsailFamedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . Fullsail
 
EXPERIENCE THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
EXPERIENCE  THE FUTURE OF WORK FOR FUTURE OF BUSINESSESEXPERIENCE  THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
EXPERIENCE THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
 
Bhavnagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girl
Bhavnagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlBhavnagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girl
Bhavnagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girl
 
Dàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptxDàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptx
 
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
 
How to structure your pitch - B4i template
How to structure your pitch - B4i templateHow to structure your pitch - B4i template
How to structure your pitch - B4i template
 
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024
 
Amethyst Benifits and Healing Properties.pdf
Amethyst Benifits and Healing Properties.pdfAmethyst Benifits and Healing Properties.pdf
Amethyst Benifits and Healing Properties.pdf
 
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
 
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdfEnabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
 
How Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptxHow Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptx
 
Indian Call girl in Dubai 0508644382 Dubai Call girls
Indian Call girl in Dubai 0508644382 Dubai Call girlsIndian Call girl in Dubai 0508644382 Dubai Call girls
Indian Call girl in Dubai 0508644382 Dubai Call girls
 

Cloud & Sécurité

  • 1. Le Cloud & la Sécurité Christophe Van Mollekot Solution Advisor – Microsoft
  • 3. Global datacenter footprint 100+ Datacenters in over 40 countries
  • 4.
  • 5. “71% of strategic buyers cite scalability, cost and business agility as the most important drivers for using cloud services.“ – Gigaom Research Integral to business transformation
  • 9. trillion a year1 Risk of cyber attacks can cost business up to 3$ individual records were breached in 2013.4 More than 800M in 2014.3 The number of recorded data breaches increased 78% of the value created by the Internet.2 Cybercrime extracts between 15-20% agree consumers have lost control over how personal information is collected and used by companies5 91% Global attacks are increasing and costs are rising
  • 10. How can Cloud help your Security
  • 11. No one is able to use your data in a way that you do not approve. You have visibility into how your data is being handled and used. Your content is stored and managed in compliance with applicable laws, regulations and standards. How can Cloud help your Security
  • 12. 13 24 hour monitored physical security System monitoring and logging Patch management Anti-Virus/Anti-Malware protection Intrusion detection/DDoS Penetration testing Infrastructure protection
  • 14. Enterprise cloud identity – Windows Azure AD Access monitoring Single sign-on Multi-Factor Authentication Role based access controls Identity & access
  • 15. Encrypted data transfer Encryption options for stored data Data segregation Choice of data location Data redundancy Data destruction 16 Data protection
  • 16. Traditional protect & recover security strategy
  • 18. “FUNDAMENTALLY, IF SOMEBODY WANTS TO GET IN, THEY'RE GETTING IN…ACCEPT THAT. WHAT WE TELL CLIENTS IS: NUMBER ONE, YOU'RE IN THE FIGHT, WHETHER YOU THOUGHT YOU WERE OR NOT. NUMBER TWO, YOU ALMOST CERTAINLY ARE PENETRATED. ” Michael Hayden Former Director of NSA & CIA AssumeBreach
  • 19. 20 If you found out tomorrow that your most critical systems had been infiltrated or that your most critical data was being exfiltrated, would you be prepared to deal with the breach?
  • 20. RED All your bases BELONG to us vs. BLUE
  • 22. PostBreachExecution 24 Establish security baselines  Time to detect  Time to contain  Time to fix  Time to recover Framework to inventory damage Identify reactive security investments Update response plans If you measure MTTR in WEEKS/MONTHS/YEARS instead of hours/days, then YOU’VE FAILED!
  • 23. The confidentiality, integrity, and availability of your data is protected. You have visibility into how your data is being handled and used. Your content is stored and managed in compliance with applicable laws, regulations and standards. How can Cloud help your Security
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. We’ll keep your data secure Your data is private and under your control We manage your data in accordance with the law You know what we’re doing with your data
  • 43.
  • 44. No one is able to use your data in a way that you do not approve. The confidentiality, integrity, and availability of your data is protected. You have visibility into how your data is being handled and used. How can Cloud help your Security
  • 45. Microsoft Cloud Compliance Certifications
  • 46. No one is able to use your data in a way that you do not approve. The confidentiality, integrity, and availability of your data is protected. Your content is stored and managed in compliance with applicable laws, regulations and standards. How can Cloud help your Security
  • 48. Microsoft NDA-To be shared under NDA only Transparency Center
  • 49. How can Cloud help your Security
  • 51. An on-premises solution to identify advanced security attacks before they cause damage  Credit card companies monitor cardholders’ behavior.  If there is any abnormal activity, they will notify the cardholder to verify charge. Microsoft Advanced Threat Analytics brings this concept to IT and users of a particular organization Comparison:
  • 52. Behavioral Analytics Detection for known attacks and issues Advanced Threat Detection An on-premises solution to identify advanced security attacks before they cause damage
  • 53. Detect threats fast with Behavioral Analytics Adapt as fast as your enemies Focus on what is important fast using the simple attack timeline Reduce the fatigue of false positives
  • 55. Learn more about the Microsoft Enterprise Cloud Visit the Microsoft Trust Centers: Azure, Intune, Office 365, and Dynamics CRM Review the Microsoft Law Enforcement Request Report and US National Security Orders Report Read our blogs: Microsoft Cyber Trust and Microsoft On the Issues Follow us on Twitter: @MSFTSecurity Additional Resources