Mapping NIST CSF and GDPR Frameworks to Microsoft Technologies

Slides:



Advertisements
Similar presentations
demo Demo.
Advertisements

Secure Hyperconnectivity with TeamViewer and Windows technologies
How Microsoft uses Windows Defender ATP–Welcome to a SecOps world!
Azure on Steroids: Full Automation with PowerShell
How To Deliver Apps Faster And Secure Them The Microsoft Way
Cloud Security IS Application-Centric Security
THR2099 What to do BEFORE all hell breaks loose: Building a modern cybersecurity strategy.
6/5/2018 1:30 PM THR1029 Spend less time managing data and more time with customers: Quick tour of Outlook Customer Manager Welly Lee
Azure Cloud Shell Magic of Modern Command-line Management
Developing Hybrid Apps on Microsoft Azure Stack
6/19/2018 2:57 AM THR3092 Monitor and investigate actions on your user and data with alerts, insights and reports Binyan Chen Program Manager II, Office.
6/26/2018 5:24 AM THR1083 Enabling Advanced Security Capabilities: Drive consistent authorization across multiple applications Bryan Bolling Solution Architect,
Decoding audit events in Microsoft Office 365
Optimizing Microsoft OneDrive for the enterprise
What a Real, Functioning DevOps Team Looks Like
“Enable, Invent & Adopt, Transform”
Protect sensitive information with Office 365 DLP
Location – the next frontier in analytics
SQL Server on Linux on All-Flash Arrays
Microsoft Ignite /31/ :08 AM
Excel and Power BI Better Together Democratization of data
Workflow Orchestration with Adobe I/O
9/6/2018 8:11 PM THR1046 Using Digital Experience Management to Validate the Impact of IT Change Mike Marks Product Evangelist, Riverbed © Microsoft Corporation.
Customize Office 365 Search and create result sources
The utility belt for managing security and compliance in Office 365
Find, try and get line-of-business apps on Microsoft AppSource
Automated Response with Windows Defender ATP
Best Practices for Securing Hybrid Clouds
Azure Security in four steps
Automate all things! Microsoft Azure continuous deployment
Agile Planning with Visual Studio Team Services (VSTS)
9/18/2018 4:59 PM THR2231 How CDM Smith used UWP and Windows 10 to disrupt and lead the AEC industry in the use of mixed reality. Andy King Manager, Software.
Azure PowerShell Aaron Roney Senior Program Manager Cormac McCarthy
Laura A. Robinson July 10, June 30, /15/2018 4:19 PM
11/22/2018 1:43 PM THR3005 How to provide business insight from your data using Azure Analysis Services Peter Myers Bitwise Solutions © Microsoft Corporation.
Continuous Delivery with Visual Studio Team Services
Azure Advisor: Optimization in the best way
Mobile Center and VSTS:​ Better together for your Mobile DevOps
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
Accelerate Office 365 Adoption Through Microsoft FastTrack Services
Microsoft products for non-profits
Automating security for better, continuous compliance in the cloud
Introduction to ASP.NET Core 1.0
Five mistakes to avoid when deploying Enterprise Mobility + Security
Five cool things you can do with Windows PowerShell on Office 365
Microsoft To-Do Preview
Securely pass passwords into your deployment
MDM Migration Analysis Tool (MMAT)
Microsoft Virtual Academy
Overview: Dynamics 365 for Project Service Automation
Understand your Azure cloud assets dependencies with BMC Discovery
Surviving identity management in a hybrid world
Breaking Down the Value of A Yammer Post: 20 Things to Do
Cool Microsoft Edge Tips and Tricks
When Bad Things Happen to Good Applications
Getting the most out of Azure resources with Azure Advisor
“Hey Mom, I’ll Fix Your Computer”
4/21/2019 7:09 AM THR2098 Unlock New Opportunities with Nintex Hawkeye Process Intelligence and Workflow Analytics Sr. Product.
Business Continuity and the Microsoft Cloud
4/28/2019 3:30 AM THR1061 Learn how Dynamics 365, Office 365 and related applications work together to transform the workplace Donna Edwards Solution Architect.
Consolidate, manage, backup, and secure your cloud content
Designing Bots that Fit Your Organization
Ask the Experts: Windows 10 deployment and servicing
Passwordless Service Accounts
Azure Networking inside and out
Digital Transformation: Putting the Jigsaw Together
WCF and .NET Framework Microservices in Containers
Diagnostics and troubleshooting in Azure App Service Support Center
Optimizing your content for search and discovery
Microsoft Data Insights Summit
Presentation transcript:

Mapping NIST CSF and GDPR Frameworks to Microsoft Technologies 6/12/2018 8:16 PM THR3084 Mapping NIST CSF and GDPR Frameworks to Microsoft Technologies Nathan Lasnoski Chief Technology Officer - Concurrency © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Risk Mitigation and Digital Transformation 1 The Digital Transformation is driving change in the way IT is leveraged and secured throughout the business 2 The way IT is secured and risks mitigated within the business will also rapidly evolve with new frameworks (NIST & GDPR). 3 The technologies for mitigating risks are a combination of longstanding best practices and modern capabilities. 4 The defense against the modern (and existing) threats of the Digital Transformation start now

The Digital Transformation is driving change in the way IT is secured throughout the business

Securing Areas of Transformation Customers Partners Employees Securing the customer experience with technology Securing partner interactions through technology Securing efficiency in internal operations

The way IT is secured and risks mitigated within the business will rapidly evolve as threats enter new vectors

Modern Security Layers to Mitigate Risk Network Operating System Identity Application Information Communications Management Physical

The NIST Framework – Intent Framework for Improving Critical Infrastructure Cybersecurity Despite the name, applicable to any organization or business A voluntary, risk-based approach to manage cybersecurity risk, in a cost-effective way, based on business needs The framework is not law There is no compliance requirement What do you do? How well do you do it? What do you need to do? It’s about MANAGING RISKS and making SOUND INVESTMENTS in cybersecurity efforts

NIST Security Framework & GDPR Identify Recover Protect Digital Transformation Respond Detect

Risk Mitigation Combining Layers and NIST Identify Network Cloud threat identification Operating System Recover Protect Identity Declarative configuration Cloud consistent protection patterns Application Digital Transformation Information Communications Respond Detect Management Automated response mechanisms Big data detection patterns Physical

The technologies for mitigating risks are a combination of longstanding best practices and modern capabilities

Mapping in Technology Solutions NIST CSF and GDPR to Category / Microsoft technology map …download the map here: https://www.concurrency.com/landing/nist Protect (PR) Data Security (PR.DS): Information and records (data) are managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability of information. PR.DS-3: Assets are formally managed throughout removal, transfers, and disposition PR.DS-4: Adequate capacity to ensure availability is maintained Cloud Datacenter Operations Management Suite & System Center Modern IT Management PR.DS-5: Protections against data leaks are implemented Customer Enablement Enterprise Mobility Suite Azure Resource Management Standards Office365 PR.DS-6: Integrity checking mechanisms are used to verify software, firmware, and information integrity PR.DS-7: The development and testing environment(s) are separate from the production environment Visual Studio Team Services PR.IP-1: A baseline configuration of information technology/industrial control systems is created and maintained Operations Management Suite &System Center ServiceNow PR.IP-2: A System Development Life Cycle to manage systems is implemented

Anatomy of Attacks and Defense ServiceNow Dynamics Power BI System Center SCCM MIM ATA Azure Stack Hypervisor Network EMS OMS USTS Azure ML Log Data ARM + DSC Code Inventory Automation Log Data/IDS ARM + Code DSC I IoT Suite

Demo

The defense against the modern threats of the Digital Transformation start now

Steps to Starting Out First Second Then Admit that you can do better Know that you can always do better Make a plan for addressing the security threats that are most relevant based on risk and financial impact

Who Do You Want to Be? Disorganized, Hidden, Unprepared Organized, Transparent, Prepared

Get Specific with Prioritization Discover Assess ID System Owner Business Process Hardware Product Software Product Configuration Threat Vulnerability Controls Impact (Low-Med-High) Complexity (Low-Med-High) Risk (Low-Med-Hgih) Priority 00001 Workstations and Servers Denise Smith X Privilege Escalation Local Administrators LAPS High Low 1 00002 Active Directory Qiong Wu Unauthorized Use Privileged Accounts MIM PAM Med 4 00003 Naoki Sato Code Execution Patching SCCM 3 00004 Business Culture Daniel Roth Social Engineering Phishing KnowBe4 2 00005 WiFi Andrea Dunker Pre-shared Key 802.1X 5 00006 Eric Gruber Business Data Loss Malicious Software Device Guard 6

Key points 1 Understand that security is not something to procrastinate on 2 Leverage NIST CSF and GDPR to develop a prioritized plan 3 Address key operating system and identity threats first 4 Don’t underestimate the importance of a security management platform

Please evaluate this session Tech Ready 15 6/12/2018 Please evaluate this session From your Please expand notes window at bottom of slide and read. Then Delete this text box. PC or tablet: visit MyIgnite https://myignite.microsoft.com/evaluations Phone: download and use the Microsoft Ignite mobile app https://aka.ms/ignite.mobileapp Your input is important! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6/12/2018 8:16 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.