Rising Cyberthreats In Taiwan - Amazon S3

1y ago
9 Views
2 Downloads
3.95 MB
26 Pages
Last View : 4m ago
Last Download : 2m ago
Upload by : Luis Wallis
Transcription

Rising Cyberthreats in Taiwan –Building a Security PlatformMichael F MontoyaChief Cybersecurity OfficerMicrosoft Enterprise CyberSecurity Group, Asia

How did we end up here?140 Security Solutions at average Enterprise

Our traditional solutionsComplexityInitial setup, fine-tuning,creating rules andthresholds/baselinescan take a long time.Prone to falsepositivesDesigned to protectthe perimeterYou receive too manyreports in a day withseveral false positivesthat require valuabletime you don’t have.When user credentials arestolen and attackers are inthe network, your currentdefenses provide limitedprotection.

Asia cybersecurity amongst the least mature 95%2XENTERPRISES UNKNOWINGLYHOST COMPROMISEDENDPOINTSLIKELIHOOD TO BEHACKED VS. THEGLOBAL AVERAGE510 DAYSTO DETECT ACOMPROMISE86% of Attacks55%MINUTES FOR ATTACKERS TO COMPROMISE THESYTEMSDETECTIONS FROMEXTERNAL SOURCE

Hard truths

Taiwan active risk

Harder factsGlobal Malware Encounter RateMicrosoft Security Intelligence Report (SIR), Volume 21

Taiwan malwareTop Active Malware inTaiwan

Malware encountered in Taiwan vs Global

Cybersecurity isMicrosoft’s #1 priority

Building a cybersecurity postureASSUME YOU ARE BREACHED!1IT Hygiene matters2No more Antivirus3Protect the critical email application vector4Implement an intelligence detection platform not dependent on signatures5Employ an advanced cybersecurity response and operations

1Hygiene – minimum operating guidelinesKnow your environment How many users, endpoints, network devices, data classification and locationPatching and maintenance updates Ensure genuine software, current versions, hotfixes and security updatesStrong password management and disc encryption Complex passwords and change policy, multi-factor authentication, discencryptionHardened Administration and Network configurations Hardened networks, ports, authentication and access controlsLogging Maintain accurate logs and reporting

2Endpoint protect hasta la vista AntivirusTHE WINDOWS 10 DEFENSE STACKPROTECT, DETECT & reach detectioninvestigation icecontrolSmartScreenWindowsBuilt-inHello2FA nGuardDeviceBitLockerprotectionand/ BitLockerDrive encryptionto GoConditionalWindowsAccessDefenderATPWindowsDevice GuardMicrosoftDevice onConditionalDefender ATPDevice ControlCredential GuardMicrosoftPassportWindows Hello :)accessSecurity policiesNetwork/Firewall

2 Endpoint protect hasta la vista AntivirusPass the Hash (PtH) attacks arethe #1 go-to tool for hackers.Used in nearly every majorbreach and APT type of attackCredential Guard uses VBS toisolate Windows authenticationfrom Windows operating systemProtects LSA Service (LSASS) andderived credentials (NTLM Hash)Fundamentally breaks derivedcredential theft using MimiKatzPA S S T H E H A S H S O LU T I O N :CREDENTIAL GUARD

2 Endpoint protect hasta la vista AntivirusPass the Hash (PtH) attacks arethe #1 go-to tool for hackers.Used in nearly every majorbreach and APT type of attackCredential Guard uses VBS toisolate Windows authenticationfrom Windows operating systemProtects LSA Service (LSASS) andderived credentials (NTLM Hash)Fundamentally breaks derivedcredential theft using MimiKatzPA S S T H E H A S H S O LU T I O N :CREDENTIAL GUARD

3Protect email No Phishing allowedSenderAttachmentSafe Attachmentsdetonation chamber(sandbox)Behavioral analysis withmachine learningExecutable? Registry call?Elevation?UnsafeSafe Supported file type Clean by AV/ASfilters Not in ReputationlistExchange Online Protection Multiple filters Three anti-virus enginesLinks Continuouslyupdated lists ofmalicious URLsSafe Links rewriteRecipient

4Intel platform to detect the unknownMaliciousSoftwareRemoval Tool1 billion customersacross enterprise andconsumer segments200 cloud services

4Indicators of CompromiseMonitoring “What (who) we know”Threat Intelligence database of known adversary and campaign IOCsStrontium IOCs – files and spoofed domains

4Indicators of AttackMonitoring “What (whom) we don’t recognize – yet”Generic IOA Dictionary of attack-stage behaviors, tools, and techniques

4Intel platform to detect the unknown

5Advanced cybersecurity responseIndustry PartnersAnti-MalwareNetworkINTELLIGENT SECURITYGRAPHSensor NetworkCERTsCyber DefenseOperations CenterMalware ProtectionCenterCyber Hunting TeamsSecurity Response CenterAugment your security operations:Continuous monitoring of your network forattacks, vulnerabilities, and persistent threatsIncident Response:Investigate and disrupt suspicious events toprovide a diagnosis and potential mitigationsEnterprise ThreatDetection (ETD)Tactical RecoveryIncident ResponseStrategic RecoveryDigital Crimes UnitEnterprise CybersecurityPersistent Adversary DetectionService

If notYOU,WHO?

PROTECTDETECTRESPOND

Hardened Administration and Network configurations Hardened networks, ports, authentication and access controls . Microsoft Passport Windows Hello :) Identity protection Conditional Access Windows Defender ATP Device integrity Device control BitLocker and BitLocker to Go Windows Information Protection Windows Firewall Microsoft Edge .

Related Documents:

K64931WW ClickSafe Security Anchor Adapter Kit 9.99 Taiwan K64995WW Security Slot Adapter Kit for Ultrabook 12.99 Taiwan K66103WW Portable Lock Box 49.99 Taiwan K67700US Partition Cable Anchor 19.99 Taiwan K67760WW CSA M3x10 Machine Screw Taiwan K67850WW Mounted Lock CSA 1.29 Taiwan K67853WW CSA Through-Hole, Only 0.49 Taiwan

LIANG Ben Chung-Pin Dermatologist Taipei, Taiwan LIAO Yi-Hua Dermatologist Taipei, Taiwan LIM Ting Song Aesthetic Physician Kuala Lumpur, Malaysia LIN Chrang-Shi Dermatologist Taipei, Taiwan LIN I-Yin Aesthetic Physician Taipei, Taiwan LIN Ian Aesthetic & Anti-Aging Physician Kaohsiung, Taiwan LIN Jeng-Hsien Dermatologist Kaohsiung, Taiwan .

CONTENTS 2 Introduction 4 Rising Stars in Artist Management 8 Rising Stars in Orchestra Leadership 13 Rising Stars in Presenting 18 Rising Stars in Communications/Public Affairs 22 Adventuresome Programming. Rising Stars in Education 28 Rising Stars in Radio and Recording 32

Amazon SageMaker Amazon Transcribe Amazon Polly Amazon Lex CHATBOTS Amazon Rekognition Image Amazon Rekognition Video VISION SPEECH Amazon Comprehend Amazon Translate LANGUAGES P3 P3dn C5 C5n Elastic inference Inferentia AWS Greengrass NEW NEW Ground Truth Notebooks Algorithms Marketplace RL Training Optimization Deployment Hosting N E W AI & ML

he People’s Republic of China’s (PRC) interference in Taiwan’s democracy—efforts to influence politics in Taiwan through both overt and covert, both legal and illicit means—is a matter of importance not only for Taiwan but for the United States as well. As the Taiwan Rel

You can offer your products on all Amazon EU Marketplaces without having to open separate accounts locally. Amazon Marketplaces include Amazon.co.uk, Amazon.de, Amazon.fr, Amazon.it and Amazon.es, countries representing over 80% of European Ecommerce spend. You have a single user interface to manage your European seller account details.

Why Amazon Vendors Should Invest In Amazon Marketing Services 7 The Amazon Marketing Services program provides vendors an opportunity to: Create engaging display ad content Measure ad content success Reach potential customers throughout Amazon and Amazon-owned & operated sites Amazon Marketing Services offers targeting options for vendors to optimize their

analytical thermal model. 2. System Dynamics The dynamic representation of the drivetrain system is achieved through a multi-degree of freedom system model. The torsional model comprises 9 degrees of freedom (9-DOF) including a dry friction clutch disc as shown schematically in Figure1. Each inertial element represents a component of the .