12,000 anonymized surveyed results Worldwide user base Cloud Security Readiness Tool Security trends report:

Slides:



Advertisements
Similar presentations
Common Question Who can benefit from Cloud? Every enterprise today can benefit from Cloud.
Advertisements

Records Management for UW-Madison Employees – An Introduction UW-Madison Records Management UW-Archives & Records Management 2012 Photo courtesy of University.
Federal Risk and Authorization Management Program (FedRAMP) Lisa Carnahan, Computer Scientist National Institute of Standards & Technology Standards Coordination.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
DCIM-B221
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information Security Governance
Peter Brudenall & Caroline Evans- Simmons & Simmons Marsh Technology Conference 2005 Zurich, Switzerland. Managing the Security Landscape – Legal and Risk.
Security Controls – What Works
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Pre-adoption concern 60% cited concerns around data security as a barrier to adoption 45% concerned that the cloud would result in a lack of data control.
Computer Security: Principles and Practice
Software Asset Management
60% cited concerns around data security as a barrier to adoption 45% concerned that the cloud would result in a lack of data control Security Privacy.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Microsoft Internet Safety Enforcement: A worldwide team of lawyers, investigators, technical analysts and other specialists whose mission it is to make.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Windows Azure Windows Azure: Security, Privacy, ComplianceTitle: Country Mgrs., Account Mgrs., BG leads, BG execs & speakers Speaker: BDM, ITDMs Audience:
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
MethodGXP The Solution for the Confusion.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
 Protect customers with more secure software  Reduce the number of vulnerabilities  Reduce the severity of vulnerabilities  Address compliance requirements.
SECURITY Is cloud computing secure? Are Microsoft Online Services secure? Is cloud computing secure? Are Microsoft Online Services secure? PRIVACY What.
Dell Connected Security Solutions Simplify & unify.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Microsoft Security Development Lifecycle
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Cyber Security & Fraud – The impact on small businesses.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Introducing Microsoft Azure Government Steve Read Barbara Brucker.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Working with HIT Systems
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Designing Services for Security: Information Security Management throughout the Service Lifecycle Sarah Irwin & Craig Haynal 2015 Penn State Security Conference,
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
What Causes Software Vulnerabilities? _____________________ ___________ ____________ _______________   flaws in developers own code   flaws resulting.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
The NIST Special Publications for Security Management By: Waylon Coulter.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
Managed IT Services JND Consulting Group LLC
Trusting Office 365 Privacy Transparency Compliance Security.
Information Security and Privacy in HRIS
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Information Security Program
Partner Toolbox Cloud Infrastructure & Management
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
Integrated Management System and Certification
CLM USE GUIDE FOR MICROSOFT TRUSTED CLOUD
BioCatch Fights Financial Fraud and Detects Online Threats via Behavioral Biometrics, All Powered by the Microsoft Azure Platform MICROSOFT AZURE TECH.
I have many checklists: how do I get started with cyber security?
8 Building Blocks of National Cyber Strategies
Matthew Christian Dave Maddox Tim Toennies
Securing the Threats of Tomorrow, Today.
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

12,000 anonymized surveyed results Worldwide user base Cloud Security Readiness Tool Security trends report:

38% of surveyed financial organizations do not have budgeted disaster recovery plans 37% of surveyed financial organizations do not use standardized data classification 23% of surveyed financial organizations have adequate policies and practices for secure data disposal Security trends for Banking:

51% of surveyed healthcare organizations conduct system-wide data backups that are tested regularly 31% of surveyed healthcare organizations have a disaster recovery program 23% of surveyed healthcare organizations cannot prevent a power outage from affecting their organization Security trends for Healthcare:

45% of surveyed public sector organizations do not use standardized data classification 40% of surveyed public sector organizations still use paper nondisclosure agreements (NDAs) and use them inconsistently 33% of surveyed public sector organizations do not have uniformly enforced security policies Security trends for Government:

72% of surveyed retail organizations do not have budgeted disaster recovery plans 51% of surveyed retail organizations do not have a plan for responding to security breaches 31% of surveyed retail organizations do not use role-based access control Security trends for Retail:

Security Privacy Reliability 94% experienced security benefits in the cloud that they didn’t previously have on premise 62% said that their levels of privacy protection increased as a result of moving to the cloud 75% said they experienced improved service availability since moving to the cloud Key Findings: Benefits for SMBs that use the cloud

70% Reinvested money saved with cloud in other areas of their business 50% Have pursued new opportunities because of the time they saved managing security USA Summary Key Findings: Reinvesting savings from the cloud

Problems you face Can you improve your people, processes, and technologies? What are your current IT capabilities? Can cloud reduce your risks while reducing cost?

Risks and rewards the cloud BENEFITS privacy security reliability scalability increased agility flexibility Reduced costs CONCERNS

Provider is your partner Risks a CSP can help reduce Risks a customers must manage Data ClassificationEnd point devices PhysicalNetworking Shared risks Identity and Access Management

SDL and ISO/IEC Core Security Training 2. Establish Security and Privacy Requirements 3. Create Quality Gates/ Bug Bars 5. Establish Design Requirements 6. Perform Attack Surface Analysis/ Reduction 8. Use Approved Tools 9. Deprecate Unsafe Functions 11. Perform Dynamic Analysis 12. Perform Fuzz Testing 14. Create an Incident Response Plan 15. Certify Release and Archive 17. Execute Incident Response Plan 4. Perform Security and Privacy Risk Assessments 7. Use Threat Modeling 10. Perform Static Analysis 13. Conduct Attack Surface Review 16. Certify Release and Archive TrainingRequirementsDesignImplementationVerificationReleaseResponse ISO/IEC : 2011 “Annex A” provides example alignment of an existing process based on Microsoft Simplified SDL to the framework and structures of ISO PreparationDevelopment Transition Utilization

Allows organizations to categorize their stored data by sensitivity and business impact Helps optimize data management for cloud adoption Why Data Classification Sensitivity Terminology model 1 Terminology model 2 HighConfidentialRestricted MediumFor internal use onlySensitive LowPublicUnrestricted

Solution for sensitive data

Global not-for-profit organization Provider, and User Certification Accepted global authority for trust in the cloud Cloud Security Alliance (CSA)

Control Areas security policies and procedures? security policies review process? security program is updated? personnel background checks? (NDA) requirements? physical access by role? security policies and procedures? employee change/termination process? physical security access method? equipment support contracts? data classification efforts? Who grants access to data? data retention and recovery program? destroys data? security policies and procedures? staging to production requirements? application testing using customer data? asset inventory program? conducts risk assessments? responds to an incident ? disaster recovery plan? capacity planning efforts? selects its data center location(s)? redundancy if utility service outages should occur? patch management processes? antivirus efforts? firewalls to protect data? time setting policies?

Cloud Security Readiness Tool Where are we? Where will we be?

Cyber - Security Building a Trustworthy cloud Transparency Operation Security Assurance Privacy Compliance Secure Development Lifecycle Privacy by Design

Microsoft Security Intelligence Report (SIR) Promoting Understanding of Today’s Threats

The Microsoft Security Development Lifecycle Verification Secure Design Secure Impleme ntation Final Security Review Incident Response (MSRC) Release Start Goals Protect Microsoft customers by Reducing the number of vulnerabilities Reducing the severity of vulnerabilities Key Principles Secure by design Eliminate security problems early Prescriptive yet practical approach Proactive – not just “looking for bugs”

Operational Security Assurance (OSA) Complements industry standards Builds upon Microsoft experience with operating cloud services at scale Proven, scalable methodology Internet-based threatsContinuously updated

Complementary Model

OSA Methodology

International Organization for Standardization (ISO) Cloud Security Alliance Cloud Control Matrix (CCM) European Union Data Privacy Family Educational Rights and Privacy Act (FERPA)The Gramm-Leach-Bliley Act (GLBA) UK Government accreditation for Impact Level (IL) 2 data Health Insurance Portability and Accountability Act (HIPAA) Business Associate Agreement (BAA)Federal Risk and Authorization Management Program (FedRAMP)Service Organization Control SOC 2European Union (EU) Model Clauses Federal Information Security Management Act (FISMA) Authorization to Operate (ATO) Microsoft Certifications & Attestations

CSA Security, Trust & Assurance Registry Cloud Security Alliance (CSA) The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider. Microsoft’s Standard Responses for STAR Specific details about Office 365, Windows Azure and Dynamics CRM controls are mapped to the CCM. Available on Microsoft trust centers.

Worldwide Public Sector Digital Crimes Unit Microsoft’s Commitment Microsoft IT Microsoft Services Criminal Law Enforcement, Government, Industry Solutions, Initiatives, Innovations Policy, Innovation, Consulting Response, Support, Risk Assessment, Cyber Security Services Trustworthy Computing Security, Reliability, Privacy Secure Development & Secure Operations TwC Network Security Microsoft Security Response Center Global Security Strategy & Diplomacy Product Life Cycle Release Conception Ecosystem & Policy Innovation InternalExternal Fundamentals Innovation Partnerships Security Development Lifecycle (SDL) Operational Security Assurance (OSA) Investigate and respond to all security concerns that affect Microsoft products and services. Identity & Access Management solutions Protect against the latest malware threats Business and IT Risk Management Remote Security Incident Reporting Policy & Advocacy Fight IP Crimes, Fraud, and Child Exploitation Provide early access to intel for security partners Advisory Services and Risk Assessments