CORPORATE VICE PRESIDENT KIRK KOENIGSBAUER.
GOOD MORNING, EVERYBODY. YES, LET'S
ENJOYED SATYA'S PRESENTATION EARLIER
ALL OF YOU TO IGNITE AND THANK YOU
A GREAT OPPORTUNITY TO GET FEEDBACK
PLANS AND ENGAGE IN GREAT DISCUSSION.
MY GOAL TODAY IS TO PROVIDE YOU
AND OUR PLANS IN THE SECURITY, COMPLIANCE
THIS, WE'RE GOING TO HAVE THREE
GO A LOT DEEPER IN EACH OF THESE
NOW, TODAY EVERY BUSINESS IS EMBARKING
IT MAY BE HAPPENING AT DIFFERENT
DIFFERENT INDUSTRIES BUT IT'S HAPPENING.
COMPANY. AS YOU THINK ABOUT YOUR
THIS DIGITAL AREA, THE SECURITY,
INFRASTRUCTURE, ALL OF THIS ARE
SUCH A BIG INDUSTRY CHALLENGE? WELL,
COMPLEXITY, THE SCALE, AND THE SOPHISTICATION
THREATS. LET'S TAKE DEVICES AS AN
THE WORLD IS EXPECTED TO EXCEED
IT'S NOT JUST ABOUT PCS AND LAPTOPS.
EVERYTHING FROM PRINTERS TO IOT
THAT ARE ALL CONNECTED INTO YOUR
ALL POTENTIALLY BROADENING YOUR
THIS MASSIVE GROWTH OF DATA THAT'S
TODAY. MORE DATA WILL BE CREATED
WAS CREATED OVER THE LAST TEN YEARS.
RECORDS HAVE ALREADY BEEN EXPOSED
A LOT WRITTEN ABOUT NATION STATE
THREATENING BUSINESSES FROM THE
VERY REAL AND VERY, VERY IMPORTANT,
INCREASINGLY COMING FROM WITHIN
EXPERIENCE AN INSIDER ATTACK IN
OF THAT, THE REGULATORY LANDSCAPE
200 REGULATORY UPDATES ARE ISSUED
LIKE THE CALIFORNIA CONSUMER PRIVACY
SO MANY BUSINESS PROCESSES, SO MANY
KEY POINT HERE
IS THESE ISSUES ARE
OFFICER OR THE CHIEF COMPLIANCE
NEED TO CARE ABOUT. THESE ARE NOW
AFFECT ALL OF BUSINESS AND ALL OF
INFORMATION TECHNOLOGY.
AT ENTERPRISE SECURITY IS THIS CONCEPT
SO MANY REMOTE WORKERS, SO MUCH
PERIMETER-BASED MODELS OF THE PAST
KEEP UP WITH THE SCALE AND SOPHISTICATION
TRUST ASSUMES NEVER TRUST ANYTHING
CORPORATE NETWORK, JUST NEVER TRUST
THAT I WANT TO GO THROUGH NOW QUICKLY.
EVERY REQUEST, OF COURSE THE IDENTITY
ARE OTHER FACTORS THAT WE NEED TO
LOCATION, THEIR DEVICE HEALTH, ARE
HAPPENING ON THE DEVICE OR WITH
IS THE NOTION OF LEAST PRIVILEGED
PEOPLE ONLY THE ACCESS THAT THEY
THEY NEED IT AND FOR THE SPECIFIC
A BUNCH OF AUDIT RIGHTS THAT CAN
WHAT'S HAPPENING. ZERO TRUST ALSO
JUST EXPECT IT TO HAPPEN. THEREFORE,
WHEN THOSE BREACHES OR IF THOSE
NETWORK PETIT PETITIONING, STRONG
IN ANALYTICS AND TELEMETRY SO YOU
HAPPEN IN YOUR ORGANIZATION
SOONER AND FASTER.
D DEVELOPING IT TAKES TIME AND PLANNING.
ALL WORKING ON. LATER IN OUR TALK,
GOING TO TALK ABOUT HOW HE ROLLED
A GREAT CONVERSATION THAT WE'LL
I'D LIKE TO DO IS TRANSITION AND TALK
HOW WE'RE GOING TO BE DELIVERING
OUR INVESTMENTS OVER THE COURSE
ARE THREE CORE PRINCIPLES THAT ARE
SECURITY AND COMPLIANCE DIRECTLY
INTO MICROSOFT 365, DIRECTLY INTO
DEEP USE OF AI, MACHINE LEARNING
THESE SOLUTIONS VERY CLOSELY TOGETHER
INDUSTRY SOLUTIONS TOO. I'M GOING
LET ME START WITH THE
NOTION OF
AND PHISHING PROTECTION DIRECTLY
POINT PROTECTION DIRECTLY INTO WINDOWS
INTO WORD, EXCEL, POWER POINT, TEAMS
ON THE INFRASTRUCTURE SIDE, AZURE
BUILT-IN SECURITY POSTURE MANAGEMENT.
GENIUS ENVIRONMENTS SO WE'RE 100
THAT WORK ACROSS PLATFORMS, WHETHER
WE'RE ALSO BUILDING SOLUTIONS THAT
AMAZON, WEB SERVICES, GOOGLE CLOUD
YOU HEARD SATYA TALK ABOUT EARLY THIS
MORNING.
AI AND AUTOMATION. REALISTICALLY
COMBAT THIS RAPID GROWTH IN CYBER
OF COMPLIANCE RISK IS WITH SOLUTIONS
BY AI, BACKED BY AUTOMATION. TO
OVER 8 TRILLION SIGNALS EVERY DAY
TRILLION SIGNALS. FRANKLY, THERE'S
TO REASON OVER THIS AMOUNT OF SIGNAL,
MACHINE LEARNING, WITHOUT HYPER
ON TOP OF THESE SYSTEMS, WE HAVE
PROFESSIONALS, THAT ARE SUPPORTING
OUR CUSTOMERS, EACH OF YOU, THROUGH
IN FACT, LATER IN OUR TALK, ANN
SOLUTIONS IS GOING TO TALK ABOUT
ALSO TALK ABOUT HOW SOME OF THESE
NOW, THE THIRD PRINCIPLE IS DELIVERING
THAT ARE DEEPLY INTEGRATED TOGETHER.
IDENTITY, WE OFFER THE MOST COMPREHENSIVE
ACCESS MANAGEMENT TO THREAT PROTECTION
PROTECTION AND GOVERNANCE, INSIDER
CAPABILITIES. WE'VE BEEN HUMBLED
RECOGNIZE THESE SOLUTIONS AS LEADERS IN
MANAGEMENT TO UNIFIED END POINT MANAGEMENT.
OF MANAGING COSTS AND IN TERMS OF
BUT THE REAL VALUE COMES FROM INTEGRATING
AN EXAMPLE OF THIS WOULD BE MICROSOFT
JUST LAST YEAR HERE AT IGNITE. IT
APPS, PROTECTS THE END POINT. WHAT'S
MTP OF THE SHARED SIGNAL, LEARNING,
IS WHAT MAKES MTP, MICROSOFT THREAT
TO GOING
WITHSTAND ALONE POINT SOLUTIONS.
INTEGRATE WITHIN OUR OWN PRODUCTS,
MEAN WITHIN THE MICROSOFT FAMILY
ACROSS THE ECOSYSTEM AND ON THIS
IS ONE SUCH EXAMPLE WITH OVER 80
IT'S REALLY TREMENDOUS. ANOTHER
WE'VE ALWAYS HAD THE CAPABILITY
INTO MICROSOFT'S FIRST PARTY SETS
WITH THIRD PARTIES AS WELL. IN FACT,
ABOUT OUR IDENTITY SOLUTIONS IN
TO MAKE THIS SIMPLER FOR COMPLEX
WE'RE PROVIDING AROUND HYBRID ENVIRONMENTS.
FEW MOMENTS. WITH SECURITY AND PRIVACY
FROM OUR PERSPECTIVE THAT YOU UNDERSTAND
WE BELIEVE DATA PRIVACY IS A CRITICAL
DEVELOPED THREE KEY PRINCIPLES AROUND
OF YOUR DATA. IT'S YOUR DATA. YOU
TO IT. THE SECOND IS IS ALSO COMMITTED
WE MEAN THAT WE'RE CLEAR WITH YOU
DO WE COLLECT IT AND WHAT DO WE
DATA PRIVACY CAPABILITIES IN THE
WE'RE PROVIDING ENTERPRISE CUSTOMERS
MANAGE EVER INCREASING REGULATORY
OF EXAMPLES TODAY AND THE NEXT FEW
THE NEW COMPLIANCE SCORE WHICH WE'LL
OF SERVICES THAT WE
OFFER. NOW,
ABOUT SECURITY, COMPLIANCE AND IDENTITY.
OUR CORPORATE VICE PRESIDENT OF
TO TALK ABOUT SOME OF HER OWN CUSTOMER
OPERATIONAL CAPABILITY IN THIS AREA.
TO COME ON UP TO THE STAGE. ANN.
YOU AND GOOD MORNING, EVERYONE.
TALK A LOT ABOUT PRIVACY AT MICROSOFT,
DATA. WE WANT TO MAKE CERTAIN THAT
THAT YOUR DATA IS YOUR DATA. IT'S
A PRIVACY AND COMPLIANCE STANDPOINT,
BECAUSE THE AMOUNT OF DATA THAT
YOUR BUSINESS OPERATIONS WILL BE
BYTES BY 2025. YOU NEED TO THINK
ASSETS AND ONE OF THE GREATEST RISKS
ECONOMIC FORUM ACTUALLY LISTED DATA
CAUSE A WHOLESALE OUTAGE FOR OUR
TO YOU I'M GOING TO TALK ABOUT SOMETHING
IS THE ABILITY FOR YOU TO MAINTAIN
OF ANY EVENT. MOST OF US THINK ABOUT
BUSINESS OUTAGES AS MAYBE YOU HAVE
A FIRE, BUT WE'RE NOT THINKING ABOUT
ABOUT DATA THEFT, DATA FRAUD, AND
MANNER AS WE'RE THINKING ABOUT ANY
HAS A WIDE VARIETY OF TEAMS THAT
SAFE AND WORK TO KEEP MICROSOFT
CENTER WHICH IS WHAT WE CALL THE
OPERATIONS CENTERS WITHIN YOUR ENTERPRISE.
24/7 TO KEEP THE ORGANIZATION SAFE
SAFE. IN ADDITION, WE HAVE OTHER
ADVANCED MALWARE RESEARCH. WE HAVE
ADVANCED THREAT HUNTING IN THE WILD.
GLOBAL LAW ENFORCEMENT ENTITIES
TO JUSTICE. WE'VE RECOVERED 500
THOSE GLOBAL PARTNERSHIPS. WE ALSO
THE PURPOSES OF KEEPING US SAFE AT
LEARNINGS FROM ALL OF THESE TEAMS
AND OUR BEST PRACTICES FOR OUR CUSTOMERS
ORGANIZATION. WE ALSO HAVE A TEAM
TEAM OR THE DART TEAM. THIS IS THE
YOU NEVER NEED. THE DART TEAM IS
HAVE A BREACH IN YOUR ORGANIZATION.
AND WORKS WITH YOUR TEAM MEMBERS
AND RECOVER FROM THAT BREACH. THEY
YEAR GLOBALLY WITH OUR CUSTOMERS
FROM THE DART TEAM AND COMBINE THOSE
TEAMS THAT ARE WORKING ON ADVANCED
GLOBAL LAW ENFORCEMENT AND WE BRING
CUSTOMERS. IT'S THE BEST WAY WE
KEEP YOU PROTECTED, TO BUILD YOUR
TO MAKE YOU MORE OPERATIONALLY RESILIENT.
AN UNPARALLELED INCREASE IN ATTACKS
CYBER CRIMINALS OR EVEN INSIDERS
WE'VE LEARNED THAT THEY'RE NOT ALWAYS
HAVE A LOT OF THINGS IN COMMON.
FOLLOW THE ENCRYPTION POLICY. WE
ROLES. WE'RE NOT USING MULTI-FACTOR
ATTACKS ARE STILL INITIATED VIA
A PHISHING EVENT, WHETHER IT'S A
A PASSWORD SPRAY EVENT. AS A MATTER
ENGINEERING LEADERS IN IDENTITY
9 OF ATTACKS HE STUDIED RESULTED
THESE ARE THE TYPES OF THINGS THAT
A WE TENT OCCA UTHENTICATION AND
IMPORTANT AS YOU THINK ABOUT YOUR
SOME PROACTIVE GUIDANCE THAT HOPEFULLY
YOUR ORGANIZATIONS TO PUT IN PLACE
TO MAKE THAT INVESTMENT IN THEIR
OPERATIONALLY RESILIENT AND WITHSTAND
INCREDIBLY IMPORTANT. IN SPEAKING
YOU'RE NOT READY, AND THAT'S OKAY.
TALKING ABOUT ARSENAL BRIEFLY, HE
TOGETHER FOR A
FEW YEARS NOW OUR
AND OUR CYBER RESILIENCE CAPABILITIES.
THE CASE OF A NATURAL DISASTER RUN
WE HAVE THAT MENTALITY AND WE WANT
SO YOU DON'T SUFFER SOME OF THE
FINANCIAL LOSSES WE'VE SEEN OUR
LIKE MANY OF YOU, YOU'RE ALL IN
ON THIS EVERY SINGLE DAY. I WANT
YOU'RE HAVING AN IMPACT. IT'S NOT
SEE IN THE NEWS, THERE'S HUNDREDS
BEEN STOPPED BECAUSE OF THE CONTROLS
NEED TO GET BETTER AS A COMMUNITY.
EXECUTIVES FEEL COMFORTABLE THAT
A CYBER ATTACK AND RESUME NORMAL
IMPROVE THAT. THAT MEANS MORE THAN
THEY CAN KEEP THEIR BUSINESS RUNNING
ORGANIZATIONS MUST HAVE A CYBER
SIMILAR TO ANY OTHER DISASTER RECOVERY
ORGANIZATION HAS SOME TYPE OF DISASTER
COMMUNICATION, TECHNICAL, PEOPLE
I WANT YOU TO ENCOURAGE YOUR ORGANIZATION
RECOVERY PLAN. IT NEEDS TO BE TESTED.
IT NEEDS TO INCLUDE ALL OF THE SAME
YOUR NATURAL DISASTER RECOVERY PLAN.
TECHNOLOGY. THE ONE THING WE LEARNED
PEOPLE WERE NOT EQUIPPED WHEN THEY
UNFORTUNATELY WE'RE LIVING IN A
GOING TO CONTINUE AND THEY'RE GOING
THOSE LEARNINGS NOT ONLY INTO OUR
THE OPERATIONAL GUIDANCE OF THE
CUSTOMERS. SO WITH ALL THAT BEING
YOU TO LEAVE, AT LEAST FROM MY PIECE
THAT OUR DART TEAM TELLS ME ARE
FOLKS THAT GO OUT
AND DO GLOBAL
PLEASE TURN ON AND ENABLE MULTI-FACTOR
100 OF THE TIME SHOULD BE USING
SAID 99. 9 OF BREACHES HAD SOME
TO THEM. MFA COULD HAVE PREVENTED
IN THE IDENTITY COMMUNITY. WE SUPPORT
WE DO THAT IS IN ORDER FOR ALL OF
THE EMPLOYEES 100 OF THE TIME TO
WE WANT THE METHODS WE'RE ASKING
WAY YOU'LL INCREASE EMPLOYEE ADOPTION
IS PLEASE STAY CURRENT. WHEN I SAY
ON YOUR OPERATING SYSTEMS, PATCH,
ALL OF YOUR SYSTEMS. WE WANT YOU
MANAGEMENT SO YOU UNDERSTAND WHAT
SURE THAT THAT IS PATCHED AND UPDATED IN
THAT CAN'T BE PATCHED AND UP UPDATED,
THAT COULD CAUSE A WHOLESALE BREACH
MAKE SURE THAT THOSE ARE CONTAINED,
ENVIRONMENT SO THEY CAN'T IMPACT
PATCH WHAT YOU CAN PATCH, KEEP UPDATED
TO THOSE DEVICES THAT CAN'T BE PATCHED.
GUIDANCE. MICROSOFT SOLUTIONS ACTUALLY
POSTURE ACROSS THE ENTIRETY OF YOUR
IT GIVE YOU THE SCORE AND A RED,
YOU PRESCRIPTIVE GUIDANCE OF THE
YOUR ENVIRONMENT MORE SECURE. TURN
AND FOLLOW THE GUIDANCE IT GIVES
ULTIMATELY BY IMPLEMENTING JUST
STAYING CURRENT, AND USING SECURE
SECURITY POSTURE OF YOUR ORGANIZATION.
RESILIENCE, AND THAT WILL LEAD YOU
RESILIENT ORGANIZATION. THANK YOU
[ APPLAUSE ] >> THANKS, ANN. SO
GOING TO TAKE A LITTLE BIT OF A
OF THE SPECIFIC DETAILS IN SECURITY,
EACH OF THESE CATEGORIES WITH A
WE'RE GOING TO START WITH IDENTITY.
A PRODUCT MANAGER ON THE SECURITY
SOME OF THE WORK WE'RE DOING THERE.
KIM, COME ON OUT.
IDENTITY IS AT THE CENTER OF SECURITY
DEVICES AND RESOURCES IN ACHIEVING
WE WANT TO HELP YOU CONNECT AND
SO TODAY I'M GOING TO SHOW YOU HOW
TO ON BOARD APPS AND MAKE THEM DISCOVERABLE
THERE'S NO NEED FOR OTHER IDENTITY
ONE. IT'S BUILT IN WITH OFFICE 365
I'M ALSO GOING TO SHOW YOU HOW IT
SECURITY BROKER TO MONITOR AND CONTROL
TAKE A LOOK. THOUSANDS OF YOUR FAVORITE
80 MAKING IT EASY TO CONNECT AND
THIS COMPANY. HERE YOU WANT TO STREAMLINE THE
PROCESS
PILOT THIS WITHIN THE SEAMS AND
I NEED TO DO IS ON BOARD IT TO MY
U SIGN AND QUICK CREATE. I WANT TO ON BOARD IT TO
AND SECURITY. IN THE PAST ONE OF
HAVING TO COPY CERTIFICATES BETWEEN
NOW WITH THE SINGLE CLICK OF A BUTTON
THE INFORMATION IN THE DOCU SIGN
EXTENSION. LET'S HEAD OVER TO DOCU
IT ASKS ME TO AUTO FILL ALL THE
I'M GOING TO CLICK YES HERE. THEN
OF THOSE CHANGES.
I'M GOING TO DO
GOING TO TAKE ME STRAIGHT BACK TO
WE'RE ENABLING YOU TO AUTOMATE MUNDANE
MAKING IT EASIER THAN EVER TO ON
COURSE I NEED TO MAKE THAT APP DISCOVERABLE
ALL THE APGS APPS IN MY ORGANIZATION.
OF APPS MAKING IT HARD FOR END USERS
TO AND WHERE DO I EVEN FIND THEM.
WITH A CENTRAL PLACE TO DISCOVER
OF THOSE APPS IN YOUR COMPANY, WE'RE
WORK SPACES. THIS GIVES THE OPPORTUNITY
LET'S LOOK AT THE ONES I'VE ALREADY
APPS THAT MATTER TO ALL EMPLOYEES
WE HAVE ONE THAT'S SPECIFICALLY
THAT'S THE ONE I WANT TO LOOK AT
ALL OF THE APPS THAT ARE ALREADY
I'M GOING TO ADD OUR NEW APPLICATION,
SELECT DOCU SIGN AND ADD IT TO THE
AVAILABLE TO EVERYONE ASSIGNED TO
WE'RE GIVING YOU A WAY TO PROVIDE
ACCESS OPTION IN THE MY APPS PORTAL
THE APPS THAT ARE RELEVANT TO THEM.
ANY APP ROLLOUT YOU ALSO WANT TO
APP IN A COMPLIANT AND SECURE MANNER.
TO SECURING IDENTITIES AND ACCESS
AND APP CONTEXT TO DEFEND AGAINST
CONDITION ACCESS IS ONE OF THE MOST
IN AZURE ACTIVE DIRECTORY. IT USES
INTELLIGENCE SECURITY GRAPH AND
TO PROVIDE YOU WITH MODERN, RISK-BASED
SEE THE POLICIES I'VE ALREADY SET
AT THE ONE BY FACEBOOK. YOU CAN
REPORT ONLY MODE BECAUSE I WANT
ENFORCING IT. I'M NOT READY TO TURN
UNDER GROUPS, I'VE SELECTED THE
HERE I'VE SELECTED THE APP THAT
IN HERE, I'VE SELECTED USER RISK
OF AZ AZURE IDENTITY PROTECTION
AN ACCOUNT HAS BEEN COMPROMISED
LEARNING AND REAL TIME DETECTION.
THIS ALLOWS YOU TO TAKE THE CONTROL
MONITOR AND CONTROL ALL OF THE USER
ENABLED THROUGH A ONE OF A KIND
AND MICROSOFT CLOUD APP SECURITY.
THEY'LL BE ROUTED TO REAL TIME CONTROL.
LET'S HEAD OVER TO THE CLOUD APP
LOOK AT THAT SESSION CONTROL. WITH
THAT NOTHING RELATED TO THE SECRET
A POPULAR CHAT APP IN MY COMPANY.
AND THE DESCRIPTION. UNDER THE ACTIVITY
TO ALL MESSAGES AND GROUP POSTS IN THIS
APP.
SENSITIVITY MEANS TO YOU. YOU CAN
AND USE ONE OF THE MORE THAN 100
TYPES. THIS CAN BE, FOR EXAMPLE,
I'M GOING TO MAKE SURE THAT THIS
THE SECRET PROJECT NAME JUPITER.
IS I ACTUALLY WANT THE IMS AND POSTS
TO HAPPEN. TO QUICKLY RECAP, WHAT
IT EASIER THAN EVER TO ON BOARD
MACHINE LEARNING TO ENABLE YOU TO
HOW OUR INTEGRATIONS ENHANCE SECURITY
YOU PROBABLY WANT TO SEE WHAT THE
LET'S TAKE A LOOK AT THE END USER EXPERIENCE.
SALES AND MARKETING DEPARTMENT AND,
JUPITER. WHAT I HAVE IS MY WINDOWS
GOING TO LOG INTO THIS COMPUTER
I PLUG IN THAT USB WHICH IS GOING
GOING TO USE MY FINGERPRINT AND
TO THE INTEGRATION BETWEEN WINDOWS
ABSOLUTE BEST SIGN-ON EXPERIENCE.
I'M GOING TO LAUNCH EDGE. I'M DIRECTLY
MY CENTRAL STARTING PLACE WHERE
THAT I NEED TO GET STARTED AND ACCESS
AT THE TOP YOU CAN SEE ALL THE GREAT
BUT IT DOESN'T STOP THERE. I ALSO
MY ORGANIZATION. LET'S LOOK ON ALL
THAT WE LOOKED AT EARLIER. THIS
OF THAT LOOKS LIKE. DOWN HERE I'M
THE APPS THAT MATTER TO EVERYONE
SEE THE APPS THAT ARE MORE RELEVANT
AND MARKETING DEPARTMENT. THAT'S
SIGN THAT WE ON BOARDED A FEW MOMENTS
PLACES ON OFFICE. COM AND THE MY
THAN EVER TO FIND AND ACCESS ALL
OF THE POLICY THAT CONTROLS ALL
IS ENABLED THROUGH A ONE OF A KIND
SOLUTION AND A CLOUD ACCESS SECURITY
HOW YOU DON'T JUST PROVIDE SECURITY
AND THIS ONE'S IMPORTANT, FOR ANY
WANT TO APPLY ADDITIONAL RISK CONTROLS.
CONNECTED MORE THAN 1. 4 MILLION
DIRECTORY. EMPLOYEES ARE USING MORE
JUST ABOUT SINGLE SIGN-ON BUT ENSURING
THE PRINCIPLES OF ZERO TRUST. THAT'S
YOUR APPS TO AZURE AD AND SECURE
WITH THAT, LET ME HAND IT OVER TO
TEAM WHO'S GOING TO SHOW YOU MORE
SENSITIVE DATA. THANK YOU.
[ APPLAUSE
CUSTOMERS, I OFTEN HEAR ABOUT TWO
OF DATA AND PROTECTING IT FROM EXTERNAL
IS THE FAST CHANGING REGULATORY
PROTECTION. OF COURSE TO ADDRESS
SOLUTIONS THAT INTEGRATE WITH YOUR
THE USER EXPERIENCES AND OF COURSE
TEAM AT MICROSOFT, COMPLIANCE IS
CHALLENGES. WE'RE EXCITED TO SHOW
THE AREAS OF INFORMATION PROTECTION,
SCORE. NOW CONSIDER THAT 80 OF DATA
WHAT THAT MEANS IS YOU DON'T KNOW WHERE
HOW IT SHOULD BE HANDLED RELATIVE
CAN GET AFTER TACKLING THESE CHALLENGES
IMAGINE THAT I'M WORKING ON A TOP
AN EMAIL REQUESTING THE BLUEPRINTS
THE BLUEPRINT AND RIGHT FROM OUTLOOK
OF BOTH THE EMAIL AND ITS ATTACHMENT
SIMPLE CLICKS, I CAN NOW SET THE
BE HANDLED APPROPRIATELY. THIS LETS
WHILE APPLYING THE RIGHT DATA PROTECTION
OUTLOOK MOBILE ARE AVAILABLE ON
LOOK AT WHAT LYDIA'S EXPERIENCE
LYDIA RECEIVES THE EMAIL IN OUTLOOK
PDF ATTACHMENT. AS YOU CAN SEE,
EDGE BROWSER AND THE DATA PROTECTION
TO IT. THE NEW MICROSOFT EDGE POWERED
IS SECURE BY
DESIGN. YOU CAN ALSO
THIS DOCUMENT ARE FAIRLY RESTRICTED
OF THE CONTENT. SHE CAN BASICALLY
NOT MUCH MORE. THIS IS INFORMATION
THEIR WORK FLOW WITHOUT COMPROMISE.
IT'S CLEARLY AUTOMATION AND MACHINE
HERE. LET'S SEE WHAT THAT LOOKS
WORKING ON A BLUEPRINT SPECIFICATION
THE PROJECT NAME, INSERTS THE BLUEPRINT
A PART NUMBER. NOTICE THE YELLOW
THIS IS WHERE IT AUTOMATICALLY AND
FOR THIS DOCUMENT WHICH IS TOP SECRET.
THIS RECOMMENDATION AND WANTS TO
SENSITIVE CONTENT TO UNDERSTAND
SHE GOT. AS SHE CAN SEE, IT'S PROJECT
THAT HAS TRIGGERED THIS CLASSIFICATION.
THAT IS UNIQUE TO YOUR ORGANIZATION.
MODELS AND INFORMATION THAT YOU
OUR CLASSIFIERS TO FIND THE SENSITIVE
TO ACCEPT THE SENSITIVITY RECOMMENDATION
A HEADER THAT MARKS THIS DOCUMENT
DECIDES TO SHARE THIS DOCUMENT TO
DOCUMENTS THAT HAVE ALSO BEEN CLASSIFIED.
FEW DOCUMENTS THAT SHE NOTICES THAT
SENSITIVITY. THAT'S NOT A PROBLEM.
THIS CONTENT BASED ON THE SAME MACHINE
IN WORD EARLIER. THESE ARE NOW AVAILABLE
SUCH AS EXCHANGE AND TEAMS AS WELL.
PROTECTION SHOULD WORK AT ENTERPRISE
AND HELPING REDUCE YOUR RISK. THESE
MICROSOFT 365 AND WILL BE ROLLING
YOUR SENSITIVE INFORMATION IS A
RISKS FROM WITHIN THE ORGANIZATION?
FEELING VULNERABLE TO RISK FROM
THOSE ARE MALICIOUS. NOW THAT WE'VE
OUR SENSITIVE INFORMATION, LET'S
IDENTIFY AND TAKE ACTION ON INSIDER
NEW INSIDER RISK MANAGEMENT SOLUTION.
[ APPLAUSE
ACTION ON RISKS FROM WITHIN THE
GRAPH AND THE TRILLIONS OF SIGNALS
EMAIL DOCUMENTS AND MANY MORE TO
IT EVEN CONNECTS WITH THIRD PARTY
FOR EXAMPLE, YOU HAVE CONNECTORS
FACTORS AND WORK DAY THAT BRING
CTIONS THAT WE'RE GETTING. THESE
THE INSIDER RISK MANAGEMENT SOLUTION.
LIKE. THIS IS THE NEW INSIDER RISK
GET A QUICK OVERVIEW OF YOUR CRITICAL
ALERTS THAT TRIGGER, AS WELL AS
BE WORKING ON. AS KIRK SAID A BIT
KEY ENTERPRISE CONSIDERATION. WE
SOLUTION. JUST ONE OF THE WAYS YOU'LL
THERE'S NO USER NAMES VISIBLE IN
IT LOOKS LIKE AN ALERT HAS COME
LET'S TAKE A LOOK. WHAT YOU'RE LOOKING
ALL THE ACTIVITY FROM A USER THAT
ME GET A QUICK OVERVIEW OF THE ENTIRE
START TO DIG IN TO SEE WHAT TRIGGERED
USER THERE IS AN HR POLICY VIOLATION
ACTION WAS TAKEN AND AFTER REMEDIATION
THE SAME USER HAD A POSSIBLE DATA
TIME FRAME. THERE'S A PATTERN STARTING
I CAN SEE MOST RECENTLY THIS USER
FROM SHARE POINT THAT WERE MARKED
WHICH WERE MARKED AS TOP SECRET
DRIVE. HMM, THE PLOT IS THICKENING.
INTO THE FUTURE, REMEMBER THOSE
ABOUT EARLIER. WE CAN START TO SEE
DATE INTO THE FUTURE. I NEED TO
BEEN COPYING TO THE USB DRIVE. I
I CAN SEE THESE FILES. AS I LOOK
JUPITER FILE AND AS I CLICK IN,
HAD BEEN WORKING ON THAT HAD BEEN
NO REASON THIS BLUEPRINT NEEDS TO
IS CLEARLY AN IP THEFT SCENARIO
FROM WITHIN THE SOLUTION I CAN ESCALATE
AND THE NEXT STEPS CAN BE TAKEN.
IS AVAILABLE IN PRIVATE PREVIEW
I'VE SHOWN YOU TODAY BUT THERE'S
FOR YOU IN YOUR OWN PERSONAL BENCHMARK,
THE COMPLIANCE SCORE IS INTENDED
YOU REDUCE YOUR RISK. IT CONTINUOUSLY
STATUS OF YOUR DATA PROTECTION CONTROLS.
YOU WITH YOUR REGULATORY REQUIREMENTS.
RECOMMENDED ACTIONS FOR IMPROVEMENTS
AND MANY MORE. WE'VE ALSO RELEASED
CONSUMER PRIVACY ACT AND THE COMPLIANCE
THE COMPLIANCE SCORE IS AVAILABLE
BY LOGGING INTO YOUR MICROSOFT 365
LET ME RECAP WHAT I SHOWED YOU TODAY.
INSIDER RISK MANAGEMENT WITH AN
TO HELP YOU SIMPLIFY COMPLIANCE,
HELP YOU SAFEGUARD YOUR DATA. SHOW
IN THREAT PROTECTION, I'D LIKE TO
THANKS. TODAY I'M GOING TO SHOW
THREAT PROTECTION USE AI AND AUTOMATION
START WITH AZURE SENTINEL. THAT'S
SIM. SIM TECHNOLOGY SERVE AS THE
THREAT RESPONSE. THEY'VE BEEN AROUND
AREN'T STANDING UP WELL TO MODERN
OF AZURE SENTINEL JUST A FEW WEEKS
CLOUD ERA. CAN I GET A ROUND OF
YES, AZURE SENTINEL DELIVERS LIMITLESS
OF SECURITY DATA IN YOUR ORGANIZATION.
IMPROVE THE EFFECTIVENESS OF YOUR
SPEED RESPONSE. MORE THAN 12, 000
SENTINEL TO ANALYZE MORE THAN TWO
SEE WHAT ALL THE BUZZ IS ABOUT.
ALREADY FLOWING IN. IN FACT, MORE
24 HOURS. THAT MAY SOUND LIKE A
REALITY IS THAT MANY ENTERPRISES
SECURITY DATA AND MUCH MORE. DON'T
SENTINEL. WE MAKE IT EASY FOR YOU
DATA SOURCES. WE OFFER DATA CONNECTORS
365 SERVICES. YOU CAN ENABLE THOSE
DATA CONNECTORS FOR OTHER CLOUDS
HEAR ABOUT AWS THIS WEEK AT IGNITE,
HELP PROTECT YOUR AWS ENVIRONMENT.
WITH STANDARD SECURITY FORMATS AND
OF SECURITY PRODUCTS AND SERVICES
C SCALER WHICH WE'LL SEE HERE. YOU
SECURITY DATA WITHOUT EVER HAVING
NOW, ONCE ALL OF YOUR SECURITY DATA
REAL THREATS OUT OF THAT SEA OF
BY MICROSOFT SECURITY ANALYSTS,
OUR OWN SERVICES AT MASSIVE SCALE.
OF SECURITY EXPERTS WHO WRITE AND
HUB. AZURE SENTINEL DOES EVEN MORE
FROM THOSE MILLIONS OF EVENTS WE
OF PRIORITIZED INCIDENTS. ONLY THE
IN THE PAST IT COULD HAVE TAKEN
TO FIND SOME OF THESE THREATS AND
HERE WE SEE A HIGH SEVERITY INCIDENT
SOURCES. I'LL CLICK IN TO INVESTIGATE.
IS THIS MALICIOUS NETWORK ALERT
ON THAT WE CAN LEARN THAT AZURE
AND HAS DETECTED TRAFFIC TO A POTENTIALLY
179 ADDRESS THAT WE SEE IN THE CENTER OF
ARE PRETTY COMMON AND THIS MAY HAVE
SENTINEL HAS FOUND A SECOND ALERT.
RECENTLY SIGNED IN FOR THE FIRST
IT'S THE COMBINATION OF THESE TWO
CONCERNING. WE CAN CONTINUE OUR
ON THAT USER. WE CAN SEE RECENT
MORE BUT WE'LL START BY LOOKING
RELATED TO THIS USER. SURE ENOUGH,
CLICKING ON THIS NEW ALERT REVEALS
THREAT PROTECTION HAS DETECTED THAT
POWER SHELL ON ANOTHER MACHINE WITHIN
THESE SECURITY ALERTS AND EVENTS,
A TON OF TIME. IF THIS WERE A MORE
MORE ALERTS AND MORE ENTITIES HERE
JOIN ME FOR MY BREAKOUT SESSION
ABOUT THE LANGUAGE THAT YOU CAN
AND TO BUILD YOUR OWN THREAT DETEXTS.
THIS ATTACK, WE CAN TAKE AUTOMATED
CAN DO THAT BY LAUNCHING AN INTEGRATED
FROM AZURE SENTINEL. THIS PLAYBOOK
OF STEPS. IT'S GOING TO BLOCK THAT
DIRECT DIRECTLY LAUNCH A FIRE WALL
EMAIL TO THE NETWORK ADMINISTRATOR
TO THE NETWORK WAS MADE. WE'LL LET
WE'VE DISRUPTED THIS ATTACK BUT
ISN'T ALWAYS THAT EASY. WE'RE GOING
IN AZURE SENTINEL INTO MICROSOFT
MORE ABOUT THE DEVICES, USERS AND
THIS ATTACK. LAST YEAR RIGHT HERE
ABOUT OUR PLANS TO TAKE MACHINE,
TO THE NEXT LEVEL BY ENT INTEGRATING
AS KIRK SHOWED YOU EARLIER, THESE
MAGIC QUAD QUADRANTS. WE'VE ALSO
TO MAKE THESE SOLUTIONS EVEN BETTER
PLAYS AN IMPORTANT ROLE HERE, HELPING
TOGETHER SUSPICIOUS ACTIVITY, IN
365 SERVICES. WE SEE THAT INTEGRATED
SUSPICIOUS COMMAND THAT WE SAW EARLIER
TO TRIGGER A SERIES OF AUTOMATED
DOTS BETWEEN YOUR MICROSOFT 365
CAN DELIVER A LIST OF COMPROMISED
NOW, EVERY SECOND COUNTS WHEN YOU'RE
PROTECTION CAN TAKE AUTOMATED ACTION
BASED ON THE POLICIES THAT YOUR
WE'VE TAKEN THE INITIATIVE HERE.
IDENTIFIED AND TERMINATED SUSPICIOUS
IT'S REMOVED MAILBOX FORWARDING
IT'S ALSO IDENTIFIED POTENTIALLY
WHICH OF THOSE TO REMEDIATE. NOW,
HERE AS WELL BUT IN THIS CASE THE
APPROVAL BEFORE CONDITIONAL ACCESS
NOW FOR THIS COMPROMISED USER. WE'VE
DAMAGE WAS DONE, BUT WE KNOW THAT
AND COUNTLESS OTHER ADVERSARIES
ANALYTICS REPORTS COME IN. MICROSOFT
AVAILABLE AS THEY IDENTIFY NEW THREATS.
WE BUILD THAT INTO OUR PRODUCTS
THREATS, ALERTING YOU TO ATTACKS
PROVIDING INSIGHTS INTO THOSE THREATS
PROTECTIONS. IN THE CASE OF THE
CAN PROVIDE INVALUABLE CONTEXT ABOUT
AND GOALS. BUT PERHAPS MORE IMPORTANTLY,
IS IMPACTING YOUR ORGANIZATION,
WHICH OF YOUR MACHINES ARE VULNERABLE.
RECOMMENDATIONS FOR SECURITY CONTROLS
ATTACKS. HOPEFULLY I'VE INSPIRED
SILO DATA AND INFRASTRUCTURE LIMITATIONS,
AND MICROSOFT THREAT PROTECTION
AND INSIGHTS ACROSS YOUR ENTIRE
AI, AND REALIZE THE POTENTIAL OF
DEFENSES. WITH THAT I'LL HAND IT BACK TO
OUR THANKS TO KIM, RUDY, SARAH.
THROUGH THESE PARTICULAR SECTIONS.
THIS SESSION TODAY AFTER THE LUNCH
THOSE OUT. FOR THE LAST PART WE
A LITTLE ABOUT SOME OF HIS EXPERIENCES
TALK A LITTLE BIT ABOUT ZERO TRUST
SO BRETT, WHY DON'T YOU COME OUT
] >> GOOD SEAHAWKS WIN LAST NIGHT.
AND PROBABLY RUNNING THE INFRASTRUCTURE
PROBABLY MORE THAN ANY OTHER COMPANY
ABOUT YOUR WORST DAY. >> OTHER THAN
IT'S AN INTERESTING ROLE AND PROBABLY
OF. SEPTEMBER 20 -- LET'S GO TO
JUNE 27TH OF 2017 AT :00TH OF 2017
AND I GOT A NOTICE THAT ONE OF OUR
HAD BEEN INFECTED AND THIS WAS RIGHT
WAS A PROBLEM AND THIS BECAME KNOWN
WE HAD SECONDS TO MAKE THE DECISION
OUR NETWORK TO LIMIT THE IMPACT
JUNE 27 IS FISCAL CLOSE SO ANY TIME
PUT THAT AT RISK. THAT'S THE DAY
BAD CHOICES AND WORST CHOICES SO
A HURRICANE, A CATEGORY 4 HURRICANE
DON'T KNOW WE HAD ABOUT 365 PEOPLE
WE WERE CONCERNED ABOUT THEM AND
PROCESSES THERE. I DON'T KNOW HOW
8, 000 GALLONS OF FUEL INTO THREE
TO GO THROUGH. THERE'S A WOMAN I
HAS HER PHD BUT HER THESIS WAS IN
NOT FLY FUEL IN BUT INSTEAD FLY
OTHER LOCA LOCATIONS. >> EARLIER
TRUST AND I WONDER IF YOU CAN TALK
INTO MICROSOFT. >> FOR ME, IT REALLY
IT DOWN AND THINK ABOUT IDENTITY
PERSPECTIVE, THAT'S WHAT YOU'RE
EMPLOYEE EXPERIENCE FEEL LIKE FROM
FASCINATING ACTUALLY. THE EMPLOYEE
BALANCE BETWEEN PRODUCTIVITY USER
THE USER CONNECTS TO THE INTERNET
OR AT A COFFEE SHOP AND THEY GO
GIVES YOU ACCESS TO ANY APP, WHETHER
THE EXPERIENCE IS ACTUALLY REALLY
AS FAST AND WE CAN USE AUTHENTICATED
>> THAT'S GREAT. >> YEAH, PEOPLE
CHANGED YOUR PASSWORD? >> I DON'T
SHOULDN'T KNOW YOUR PASSWORD. >>
THAT SECURITY AND COMPLIANCE HAVE
CAN YOU TELL ME ABOUT YOUR EXPERIENCE.
WHAT ARE THOSE MEETINGS LIKE? >>
THREAT LANDSCAPES SO THEY UNDERSTAND
HOW DO WE THINK ABOUT THOSE, HOW
WE SEE THINGS AHEAD OF TIME THAT'S
THACHLT . THAT'S IMPORTANT BECAUSE
QUESTION. I THINK THE CEO IS REALLY
YOU'RE TRYING TO DO AND MORE IMPORTANTLY
OVERWHELMING. WHAT ARE THE KEY THREE
DO? >> IT'S INTERESTING. IT'S JUST
UNDERESTIMATE JUST MFA. THE PEOPLE
THE USERS WILL LOVE IT AND I.T. WILL BE HAPPY BIT.
WERE PREVENTABLE. WE ALL HAVE LIMITED
RESOURCES AND GET YOU THE MOST BANG
LEAST EXPENSIVE THING THAT YOU CAN
PROGRESS OVER PERFECTION. >> ONE
OF THESE 4:13 A. M. CALLS HOW DO
I'VE DONE THIS JOB TEN YEARS AND
2:00 IN THE MORNING EVERY NIGHT
OF THE TOOLS WE SAW HERE HAVE BEEN
THE TELEMETRY COMBINED WITH ARTIFICIAL
YOUR ABILITY. I BELIEVE THE GOOD
GOING FORWARD. >> AWESOME. THANKS
] >> I HOPE YOU'VE ENJOYED THIS
US. WE'RE EAGER TO SHARE MORE THIS
THAT ARE GOING TO HAPPEN THIS AFTERNOON.
IT'S A SOLVABLE ONE WITH CLOUD,
HAVE A GREAT REST OF YOUR NIGHT.
CUSTOMERS. WE CHOSE MICROSOFT BECAUSE
THINK MICROSOFT PLAYS A VERY IMPORTANT
>> WHAT'S IMPORTANT ABOUT MICROSOFT
THE PORTFOLIO. WE DO LESS INTEGRATION
GOING INTO OUR WORKFORCE. >> ABOUT
30, 000 RECORDS AND KEEPING OUR
MICROSOFT IS HELPING US DO THAT.
WE'RE GETTING DATA FASTER. WE'RE
GAINING MUCH MORE SECURITY THAN
>> PROVIDING ABILITY FOR A CHANGING
WE NEED TO MAKE SURE WE CONTINUE
>> WE WANT TO FOCUS ON HOW FAST
GIVEN US MUCH MORE VISIBILITY OVER
COST OF OWNERSHIP. >> MICROSOFT'S
