Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat (Sun Tzu)
It takeshackers 4 minutesto get into networks through email attacks,286 days for detection, followed by an additional80 days for Damage Control
Threat protection is more than end point protection, it’s the ability to respond effectively when an attack is underway – Detection and Response (EDR) is critical. Rather than taking the approach of evicting or removing an attacker – push the boundaries out and prevent them ever getting inside. Learn how to elevate your visibility of the threat landscape through the intelligent security graph and better position yourself to respond effectively.
Do you have a mixed fleet of devices to protect, are devices registered or managed, do you have a mix of Windows and MacOS devices, do you suspect that individuals are using non sanctioned or private cloud sharing applications, or are you simply making assumptions that your current end point protection strategy has you covered? Simply – do you feel out of your depth or out of control to some extent? Read on.
Visibility is everything, without it we cannot begin to make the right strategic decisions, in this session we will share with you how to gain visibility of suspicious behavior and define the “known good or normal”.
2 Billion records compromised in the last year
85% of enterprise organisations keep sensitive information in the cloud
80% of employees use non-approved SaaS apps for work
58% of users accidently share sensitive information
928 – average number of cloud apps used per organisation
Only 47% of breaches use Malware which are missed by legacy endpoint protection approaches.
53% of breaches are Non-Malware attacks
55,000 average devices compromised by ransomware every month
200,000 PC’s attacked by WannaCry across 150 countries
463,841 Ransomware detections in 2017
$1,077 average ransomware amount
WHAT YOU NEED TO KNOW
In this session we will be going beyond legacy end point protection and exploring how you can significantly reduce the attack surface by integrating O365 Advanced Threat Protection, Windows Defender Advanced Threat Protection (WDATP), Cloud App Security and O365 Advanced security management
HOW DO WE DO IT
See how mail in O365 is protected with advanced threat protection, attachments scanned by ATP prior to arriving in your inbox. See how the Azure Windows defender ATP portal can give you visibility of advanced threat protection across windows, MacOS, and Linux systems. See how Cloud App Security can protect what is entering and existing your business.
WHAT YOU NEED TO CONSIDER
You might be thinking I don’t have the problem – why should I need this?
We have endpoint protection in place, we are covered! Wrong. Legacy endpoint protection or AV is no longer viable.
“Attack Obfuscation” is not an attack itself. However, it is an attack enabler. “Attack Obfuscation” describes all techniques to hide the attack from the components designed to detect the attack.