Productivity Future Vision › 2015 › 05 › 4-ms-reto...2015/05/04  · Microsoft Productivity...

Preview:

Citation preview

MicrosoftProductivity Future Vision

THE WORLD HAS CHANGED

Security Challenges Change

MicrosoftProductivity Future Vision

2013 2014 2015 2016 2017 20192018

20

15

10

5 INTERNET OF THINGS

PC, SMARTPHONE & TABLET

GROWTH OF CONNECTED DEVICES

BILLIONS OF UNITS

0

MicrosoftProductivity Future Vision

442020

ZETTABYTES

OF DATA4.42013

0.162006

1 ZETTABYTE = 1 B TERABYTES

MicrosoftProductivity Future Vision

S AT YA N A D E L L A

“ W H AT I S S CA RCE

I N A L L O F T H I S A B U N DA N C E

I S H UM A N AT T E N T I O N ”

MicrosoftProductivity Future Vision

OLD WORLD

Information scarce

Static hierarchies

Compete to win

Individual productivity

Focus on planning ahead

Efficiency of process

NE W WORLD

Information abundant

Dynamic networks

Collaborate to win

Collective value creation

Experiment, learn and respond

Effectiveness of outcomes

THE SHIFT

MicrosoftProductivity Future Vision

BRINGING PEOPLE

TOGETHER

C O L L A B O R A T I V E

L IV ING

SMARTER

I N T E L L I G E N T

FRICTION-FREE

CRE ATIVIT Y

N A T U R A L

FLUID

MOBIL IT Y

M O B I L E

HUMANACTIVITY

MicrosoftProductivity Future Vision

At the Core: Security and Privacy

10

Managing risk in an increasingly connected world

“This Nexus of Forces is impacting

security in terms of new vulnerabilities.

–Ruggero Contu, Christian Canales and Lawrence Pingree. Forecast Overview: Information Security, Worldwide, 2014 Update. Gartner, Inc. June 25, 2014.

Impact of cyber attacks could be

as much as $3 trillion in lost

productivity and growth

ImplicationsJob security Customer loyalty

Intellectual property

Legal liabilityBrand reputation

$ 3.5MAverage cost of

a data breach toa company

15 % increase YoY

median # of days attackers are

present on a victim network

before detection205

level issue

is a

CxO

Security

Because we are under attack

Indiscriminate Targeted

Consumer Enterprise Target

Single Vector Multi-vector

Manual Automated

Desktop Device and Cloud

Visible Concealed

Lone Agent Organised Ecosystem

Spam Information Theft

Information Theft Process Disruption

“The world is changing very fast. Big will not beat small anymore. It will be the fast

beating the slow.” Rupert Murdoch

Verizon, “2015 Data Breach Investigations Report”

63%Percentage of total security

incidents in 2014 were directed

toward public sector

Primary targetsPublic Sector, Information, Financial Services

Manufacturing & Retail are the primary

targets

Coordination

CollaborationDisruption

set policies and principles

identify, block, sinkhole

Seize, prosecute, takedown

security by design

identify, block, partner

starve and inform

Anti-malware and

security ecosystem

Large-scale Public Services

Cloud Providers, Telco’s

Government Enterprises

OEMs

Vendors

CERTs, ISPs &

Law Enforcement

How do we win?It will take a partnership

Microsoft Experience and Credentials

On personal devices

24 x 7 collaborationOn the road In the officeAt home

Through social media

Today: Cloud First, Mobile First

Elements to a Resilient Infrastructure

Protect Detect

Threat Information

Management

Response

18

Resilience against modern

Cyberthreats

-

The Hockey Analogy

19

Coaching

Management

Build the Foundation for Success and Adapt to

Changes

20

Goalie

Protect

Patch, Deploy Newer Products, Apply the SDL

21

Awareness

Detect

Active Attacks

22

Defense

Response

Customer, CSS and Cybersecurity Team

Intelligence

Threat Information

24

Protect

Patch, Deploy Newer

Products, Apply the SDL

Detect

Active Attacks

Response

Customer, CSS and

Cybersecurity Incident

Response

Threat Information

Management

Overa

ll In

tern

et

Resi

lien

ce (

Eco

syst

em

)

Overa

ll R

esi

lien

ce o

f an

Org

an

izati

on

s

IT In

frast

ruct

ure

Security framework: achieving overall resilience

Cloud Resilience

On-Premises Systems Resilience

Aggressively fight

cybercrime and advocate

extensively for enhancing

cybersecurity

Deep Investment in

building a trustworthy

computing platform

and security expertise

Trust in your provider that they are protecting their customers and are a global cybersecurity advocate

Strong principles and

policies that empower

you to be in control of

your information

SecurityPrivacy

Compliance

Transparency

AdvocacyRisk management Governance

MICROSOFT CONFIDENTIAL

Access to a Transparency Center to work directly with source code for certain

high-volume products

Remote access to online source code for certain high-volume products

Technical data about products and services, including about Microsoft’s cloud

services

Information sharing about threats and vulnerabilities from Microsoft

Core Investments

InformationProtection

Secure Identities

Threat Resistance

WINDOWS 10 PROTECTS YOU FROM MODERN SECURITY THREATS

Protect Microsoft & Showcase Learnings

Remote Security Incident Support

On-Site Security Incident Response

AdvisoryServices

Security Solutions & Consulting

Advanced Tools & Technologies

MCS Cybersecurity Services

The Microsoft Digital Crimes Unit (DCU)The Digital Crimes Unit is an international legal and

technical team working with partners, to help create a

safe digital world, by working on issues such as:

• Malicious software crimes

• IP crimes

• Protecting vulnerable populations

The team applies legal and technical expertise to help

enhance cloud security and make the digital world safe

for everyone.

• DCU brings cybercrime experts across the areas of IP crimes,

botnets, malware, and child exploitation under one umbrella,

so that when focus areas intersect we can work better

together to eliminate cyber threats to Microsoft’s businesses,

customers, and the entire digital ecosystem.

• With cooperation across industry, criminal law enforcement

organizations, academia, and NGOs worldwide, DCU aims to

put cybercriminals out of business and create a safe online

experience for everyone.

Every second, 12 people

are victims of cybercrime –

nearly 400 million every

year*

1 in 5 small and medium

enterprises are targeted by

cyber criminals**

Cybercrime costs

consumers $113 billion a

year*

50% of online adults have

been victims in the past

year

Online Child ExploitationThe NCMEC has reviewed more than 90

million images and videos of child

pornography.***

Financial Fraud53% of the world’s securities exchanges were

targeted in 2012

* 2013 Norton Report

** National Cyber Security Alliance

*** National Center for Missing and

Exploited Children

It’s your data

Key Principles for Security and Transparency

Recommended