accounts hacked
play

accounts hacked among several in recent weeks to come upon security - PowerPoint PPT Presentation

HEADLINES Impact and Cost According to the Ponemon At least 19 states have Institutes most recent introduced or are considering "Annual Study: U.S. Cost of security breach legislation in a Data Breach" (March 2014. Most of the


  1. HEADLINES Impact and Cost According to the Ponemon At least 19 states have Institute’s most recent introduced or are considering "Annual Study: U.S. Cost of security breach legislation in a Data Breach" (March 2014. Most of the bills would 2012), the findings showed amend existing security breach that the average cost … in laws. the education vertical [was] $142 per record. … the University of Nebraska data breach could cost the university over $92 million Data Breaches Put a Costs related to data- “The costs of a cyber attack on the Dent in Colleges’ security lapses dating to University of Maryland that was Finances as Well as made public last month will run into 2011 at the Maricopa County the millions of dollars” Community College District, Reputations in Arizona, could climb to The Chronical of Higher Education: $17.1-million, says Tom At Indiana U.’s data center, in Cyber attack on Gariepy, a district Bloomington, staff members were Twitter, 250,000 spokesman. CHE aghast to learn that the university was accounts hacked among several in recent weeks to come upon security breaches in their AP information-technology operations…………….

  2. � Malware is becoming more complex and short-lived

  3. 420 million 18+ billion Millions 250 million Billions 700 million 40 billion 35 billion messages/month Millions Enterprise Risk Mitigation System

  4. What if I have a Cybersecurity Incident? For Incident Response, use your existing Microsoft Premier Services agreement! GBS Security Cybersecurity Team Deep Remote Technical Onsite Security Incident Premier Support 24x7 Call - 800-936-3100 Support Response Team and mention that you are experiencing a potential cyber security incident. GBS Incident Any staff member who has been Responder authorized with access to open Premier Global Onsite Support within 24-hours or less Support cases should do so with a “Severity A” classification for Cyber incidents. Or you can reach out to your Technical Account Manager.

  5. Microsoft Security Risk RAP as a Service for MS Assessment Security Protect your most valuable assets to help prevent compromise from cyber- Security Development Lifecycle Active Directory Security Protect attacks Offerings* Workshops* Persistent Adversary Detection Enhanced Mitigation Service Experience Toolkit Offerings * Monitor your network for attacks, vulnerabilities, and Microsoft Threat Detection Detect persistent threats Service Incident Response Investigate and disrupt Tactical Recovery suspicious events to provide a diagnosis and potential Respond mitigations Strategic Recovery

  6. Proactive service that collects information on key Offline 4 Days Fixed Price Offering/Premier security technology, people and process areas for Assessment for your environment and analyzes this information 1 Forest; < 100 AD Security against best practices and currently relevant security Domain Controllers (OAADS) threats against your identity store. (DC) Questionnaire + Tools Approx. 4 weeks Active Directory Onsite (duration Review of customer’s Active Directory providing the Security varies) Delivered through Premier or MCS customer with a comprehensive, holistic assessment Assessment of the overall security of the Active Directory 2-3 Forests; >100 Interviews + Tools + Visual (ADSA) implementation. DC’s inspection 3 days Fixed Price Offering/Premier POP - Security AD lab environment. Provides education on credential theft as well as real Minimum: 1 Domain Lateral Account world tested sample capabilities. Helps customers Controller, 1 system Movement begin compartmentalizing local Administrator for each member (SLAM) credentials through password randomization. operating system Education + Planning + Strategy Approx. 25 weeks; Onsite (duration Enhanced varies) Delivered through MCS Designed to help thwart credential theft attacks by Security limiting exposure of domain administrative Implements New Administrative credentials. Implements new secure domain Secure Domain Environment

  7. • Designed to develop and/or adapt your security strategy to help reduce cyber risks across the enterprise. Provides a proactive approach to security that identifies breakdowns in people, processes, and technologies before they affect operations. • Using on-site, in-person interviews and technical examination, MSRA results in the creation of a roadmap customized for your business. • Remediation roadmap prioritizes findings into tactical and systemic recommendations that can be acted upon in a timeframe methodology ABOUT SOLUTION • Two-week engagement with two consultants onsite with your team to gather and validate information through a series of interviews with key personnel, a risk management session and technical inquiry. Specifically, the service involves: ü Risk Management Workshop ü Qualitative Interviews ü Roadmap Presentation ABOUT DELIVERY

  8. Freely downloadable technology that protects against security vulnerability exploitation. Free-Download Enhanced Enhances existing protections in the Windows Mitigation OS and adds new protections that help stop Experience exploitation of unknown or unpatched security Toolkit (EMET) vulnerabilities EMET- Proactive EMET POP includes an Educational workshop 2-3 Days/Onsite Fixed Price Offering through Premier Operations on EMET and EMET deployment, as well as Program assistance with pilot in non-production lab (POP) environment EMET Production Pilot (3 weeks) - Delivered through MCS Assist you with in-depth education and ERS – Production and Deployment (5 weeks) – Through EMET- preparation for an EMET pilot, with conducting MCS Deployment a full EMET production pilot, and with deploying and Reporting an EMET ERS to monitor EMET events and EMET + ERS – Production Deployment (8 weeks)- Through configurations. MCS

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend