Cybersecurity Reference Architecture & Strategies: How to Plan for and Implement a Cybersecurity Strategy

Sign in to queue

Description

Planning and implementing a security strategy to protect a hybrid of on-premises and cloud assets against advanced cybersecurity threats is one of the greatest challenges facing information security organizations today.

Join Lex Thomas as he welcomes back Mark Simos to the show as they discuss how Microsoft has built a robust set of strategies and integrated capabilities to help you solve these challenges so that you can build a better understanding how to build an identity security perimeter around your assets.

  • [02:58] What does a Cybersecurity architecture guide look like?
  • [06:31] What does the Cybersecurity landscape look like?
  • [12:57] What does the evolution of IT and Microsoft Security look like?
  • [17:20] What does a platform security approach look like?
  • [21:38] Can you describe the benefits of an Integrated Security Experience?
  • [25:29] How do you measure security success?

Learn More about this topic by visiting these sites:

Learn more about  Microsoft Premier Support Services.

__________________________

Websites & Blogs:

Videos:

Embed

Download

Download this episode

Download captions

The Discussion

  • User profile image
    Larry_B

    Hello guys,

    I'm taking care of the security of computers on my environment. I have been implementing for many years the latest MS security/mitigation technologies...

    We are running Win 10 enterprise with updated UEFI bios, secure boot, device guard, credential guard, virtualized based security....

    BUT

    for me, all of these investments in securing computers are pointless and this is discouraging, for me security is still an illusion. The whole security of Windows 10 and the efforts done by MS can be easily bypassed by hackers thanks to spychips directly implemented into motherboards:

    - Computrace (Absolute): it's a feature we can choose to enable and to subscribe to. But this feature is acting like a rootkit see https://securelist.com/absolute-computrace-revisited/58278. Windows mitigation technologies is to avoid this kind of driver injection that open doors in the system, how do you explain MS is allowing this kind of intrusion into their OS that MS doesn't control ?

    -Intel Management Engine (ME): It's dangerous, not documented and vulnerable, see new vuln: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr

    Most companies don't use the remote control features provided by Intel ME (and most don't perform BIOS upgrade regurlarly), most IT guys don't even know what is this. It's a big concern that must be addressed, why MS don't react? I would expect MS to push Intel to disable by default the remote control features of ME/AMT because it's a big security hole leaving millions computers vulnerable. 

     

     

     

     

     

     

     

     

     

     

  • User profile image
    Paul Hoffman

    Very good presentation! No way that everything can now live behind a firewall. PaaS a total different mind set. Very hard to move the "aircraft carrier" of mindsets. This helps. Thank you

Add Your 2 Cents