Download presentation
Presentation is loading. Please wait.
Published byAlison Gallagher Modified over 6 years ago
1
12/6/ :19 AM Customer story: How to protect against security breaches and insider threats Edward Panzeter Sr. Systems Engineer Universal Health Services Ian Lindsay Strategic Systems Consultant Quest © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
2
Ian S. Lindsay Almost 30 years in IT Master Scuba Diver
12/6/ :19 AM Ian S. Lindsay Almost 30 years in IT 5 as a developer 5 as a consultant / trainer 14 with Microsoft Last 5 with Quest Master Scuba Diver 4th degree black belt (Sho Ryn Ru) Based in Pittsburgh Pa. Married / No kids © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
3
Edward Panzeter III In IT since 1998
12/6/ :19 AM Edward Panzeter III In IT since 1998 Multiple Industries (Eng., Manu., Pharm. and Healthcare) Multiple Sizes (80 employees to 80,000) Master’s of Science in Information Technology Based out of Philadelphia suburbs Married with 2 kids – son (3) and daughter (9) © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
4
Who is Universal Health Services?
12/6/ :19 AM Who is Universal Health Services? © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
5
Insider threat security trends
12/6/ :19 AM Insider threat security trends Only 27% Expect additional budget to address problem 62% Say insider threats are more frequent last 12 months 64% Find it difficult to investigate damage. Half Lack controls to prevent insider attacks 24,000 Average records breached 59% Say privileged users pose biggest insider threat to organization $7.35M Average cost of breach in US 191 days Average days to identify data breach $3.62M Average cost of breach globally Sources: LinkedIn Information Security Community Insider Threat Spotlight report 2017 Ponemon Cost of Data Breach Study © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
6
Mergers and acquisitions
12/6/ :19 AM Mergers and acquisitions © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
7
Ongoing security challenges
12/6/ :19 AM Ongoing security challenges © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
8
12/6/ :19 AM Insider threats © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
9
Forensic investigation
12/6/ :19 AM Forensic investigation © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
10
12/6/ :19 AM Demo © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
11
Questions?
12
Come see Quest at booth 717! Get a personalized demo
Drinks, food, daily raffle prizes
13
Please evaluate this session Your feedback is important to us!
12/6/ :19 AM Please evaluate this session Your feedback is important to us! From your PC or Tablet visit MyIgnite at From your phone download and use the Ignite Mobile App by scanning the QR code above or visiting © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.