Events Add an event Speakers Talks Collections
 
Vasu Jakkal
CVP Microsoft Security, Compliance & Identity at Element
+ 4 speakers
  • Video
  • Table of contents
  • Video
Microsoft Ignite 2021
March 2, 2021, Online, USA
Microsoft Ignite 2021
Request Q&A
Microsoft Ignite 2021
From the conference
Microsoft Ignite 2021
Request Q&A
Video
Security for All | KEY05
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Add to favorites
2 K
I like 0
I dislike 0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
  • Description
  • Transcript
  • Discussion

About the talk

Learn how to reduce complexity and defend your organization against business risk with innovations in security, compliance, identity, and management.

Explore deeper content & training -- https://aka.ms/learnatignite?wt.mc_id=ignite2021spring_addlresourcesfeaturedsession_webpage_mw

Microsoft Virtual Training Days -- https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmvtd.events.microsoft.com%2FSecurity%3Fwt.mc_id%3Donedestination&data=04%7C01%7Cv-abmasc%40microsoft.com%7Ccd932c695e314239ad9908d8d79c6f9b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637496414173417482%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=sJ14YJ4woKvU5St3vlAYjgZp8uW3DTc1leZKdldpyK0%3D&reserved=0

4 ways Microsoft is delivering security for all in a Zero Trust world -- https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F%3Fp%3D92885&data=04%7C01%7Cv-mygard%40microsoft.com%7Ced5b079c8ede4d1dc28608d8dd83e2a0%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637502907371250339%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=9PYuL7GuIgHXs4wbHb791E%2FTWd%2Fr4DD8ib8ipWHL9pY%3D&reserved=0

Microsoft Security on Twitter -- https://twitter.com/msftsecurity

Microsoft Security -- http://www.microsoft.com/security

#MSIgnite

About speakers

Vasu Jakkal
CVP Microsoft Security, Compliance & Identity at Element
Irina Nechaeva
Senior Marketing Director at Microsoft
Andrew Conway
General Manager Security Marketing at Microsoft
Alym Rayani
General Manager, Microsoft Compliance Marketing at Microsoft
Tom Burt
Corp. VP, Customer Security & Trust at Microsoft

Passionate, customer-centric and purpose-driven marketing & business leader, able to drive transformation, build inspiring brands, create disruptive thought leadership and bolster demand. Recognized by Forbes as "CMO Next" one of 50 Marketing Chiefs redefining the role and shaping the future of marketing. Recognized as Top 25 women in Cyber Security by the Software Review. Recognized as 10 Best CMOs of 2019 by Silicon Review. 2018 Woman of the Year finalist by Women in IT Awards. Marketers that Matter Innovation Council 2018, 2019. Silicon Valley Exec Network Board of Directors.

View the profile

I have a 15+ year record of success in both emerging and developed markets, and I've led both turnarounds and significant growth of brands in the consumer goods, technology, and computer software industries. In my experience, teams achieve peak function when they are provided with clear vision, aspirational goals, and challenging targets that can be pursued in an entrepreneurial environment. This opens up pathways to critical opportunities that businesses so often miss. I provide dynamic leadership to capture these entrepreneurial opportunities, and maximize performance culture to exceed core business objectives. I deliver marketing strategies & campaigns rooted in deep customer insight, and vision that unites us with our customers under a common goal.

View the profile

I am a passionate product marketing executive currently working on security cloud services (SaaS) across multiple product lines. This encompasses identity and access management (IAM), mobile device management (MDM), threat protection, UEBA, CASB, information protection, and security management. I am experienced in all aspects of product marketing in fast-paced, ambiguous environments, including more than ten years of leadership across diverse teams. My experiences have covered business strategy, multiple acquisitions, product line exits, and the growth of a cloud business from zero to more than 90 million seats, and billions of dollars in revenue. I am a skilled product advocate and company spokesperson at industry events, and with customers, partners, press and analysts.

View the profile

As head of Microsoft’s Customer Security and Trust (CST) team, I work with an incredibly sharp and passionate group of policy advocates, project managers, engineers, lawyers, data analysts and cybercrime investigators to ensure that customers can trust in the security of Microsoft’s products and services. Some of the things we’re working on include: - Advancing a Digital Geneva Convention to help protect civilians and infrastructure from cyberattacks in times of peace. - Developing Microsoft’s Defending Democracy Program, which seeks to work with all stakeholders in democratic countries globally to protect campaigns from hacking, to increase political advertising transparency online, to explore technological solutions to preserve and protect electoral processes, and to defend against disinformation campaigns. - Collaborating with public and private organizations to disrupt cyberattacks and support deterrence efforts.

View the profile
Share

Security is at an incredible inflection point as a second wave of this, the transformation. Accelerate Based on data, we know it's a job. That's not getting any easier. Like you. Microsoft, slice of spice every single day on the tool is not just in the financial cost, the government organizations and individuals, that's what inspires me every single day knowing that we're working together communities of craft. Recently Microsoft has a community of the solar wind speed. One of the most widespread and complex event in cybersecurity

history. It was a reminder of what we all of Microsoft's corporate vice president of customer evolving. What are the trends that are emerging and what is? It's all really mean to us as a global Community. Watch me how to say We know we publish the Microsoft digital defense report in September that pulled together data from all over the company to look at exactly this question and what we saw is an incredible increase in cyber crime and a nation-state attacks cybercrime. You know, there is a business email compromise

attacks that are increasing in sophistication and in the impact to our customers and is everyone knows ransomware has become an incredible Challenge in a big problem in the cybercrime arena, and then a nation-state attacks. We see an increase in the volume of attacks. We see an increase in the sophistication of those attacks and their lead primarily by attacks emanating from Russia, but also from a r on North Korea and China. Our approach to digital safety is unique in our industry because we're going to Sis's. Howard,

waited into and approved at automation punishment, interdependent hole. So you can protect everything, business risk and don't open doors. It's a footprint across many technologies that. In a unique position to think about security. At some point email, an application security and say that it's truly an end. And they have the ability to Rai to work for you with the power of a trillion things to give you enhanced visibility and guess what, others? Miss we build this protection into a platform for seamless experiences

that won't slow us down with Solutions with a broad ecosystem of the things you already have. Simplify the complex security posture and Achieve better outcomes as Defenders ourselves. That if I explicitly to widely spread, which aspect, and always is in which, we believe zero, trust is the phone Stone of effective protection and the foundation has your future. So, let's jumper and take a look at some of our latest Innovations around. These principles of the

fruit is iryna. Iryna, thanks. So I don't think he wrote a strategy is a journey which is unique for every organization and every single step you take will make you more secure in a corporate Network. It's our identity is just first line of defense will be unique. Where to start. The answer is clear. Strong Cloud, identity Foundation. The most fundamental devices are the most essential. Those steps to help me with the first zero, trust principal verify explicit if you are and what you're trying

to do. I do can see the information I have for each other. In case in your test, I will buy this information to make precise in sports in the second principle, least privilege taxes of our zero test solution to verify the contents of the request for Sleep playlist. And the resources and more users, do we continue to make conditional access even smarter? Our latest addition is a contact based on the user access within the app. For example, you can allow users to sign into your company's invoicing up from the personal devices. V multi-factor authentication compliance device to do a wire

transfer. You can also block access to specific access within other portal if any Reese's present documents to Geauga fits in with your organization, a break. Are the weakest link in your defenses. So we've been Pioneer in a world without passports, for all. More than 200 million people already signed into their personal, Microsoft accounts, or their work accounts, powered by our charity. With many of you have been piloting and rolling like Windows. Hello. Our built-in experience in

Windows platform, Microsoft, authenticator a popular app for Android and iOS cubicle space and technologists elephant. Rent today, we're announcing that pass was the first indication is generally available. Now, you can create an to and experiences for all employees so that they no longer need passwords to sign into the network. You can customize policies for different users group and types of credentials and Trust progressives in your reporting tools. Account and Recovery also password, let's take the temporary access pass. Now in

public preview, temporary access passes, a time-limited coat that can be used to set up a password to sign in to replace the worst Prudential more security. For example, to set up a new account user was trying to answer their email address and the temporary pass the receipt from their manager, right? And then said, no passwords across their entire journey and their identity is protected against compromise and with you, As I mentioned earlier, a spiritual journey is unique

but explicit verification powered. By a strong identity is a great way to start a hundred and seventy-five million users. Try password authentication and help us make the world a safer place for all answers over to you. Thank you, Irina. The solo incident is a powerful reminder that your security approach must be designed with this key zero trust principle of a scheme bridge to Austin today, complexity and fragmentation is standing in the way of security teams achieving this, it's a commitment

to solve this. As we build security delivered from the cloud. This stops by empowering your security teams with Integrated Solutions that minimize unimportant and deliver that visibility across the fylde. When does the liver endpoint protection? Some vendors deliver Sim tools the pieces work, but integrating those pieces together remains a time-consuming challenge. Microsoft takes a holistic approach that combines the best of breed Sim and XTR tools built from the ground up in the cloud to improve your posture protection and your response. Azure Sentinel

Elida in the forest away for security analytics platforms. Collect signal from your entire organization, it correlates that signal with a, i and identifies the most critical incidents that you must address immediately as the world's only cloud-native Sim you can add capacity seamlessly, it only 15 months more than 9,000 customers have joined us on this journey to redefine security analytics and after interviewing some of our customers Forester founded as a sentinel has a

48% lower cost compared to a legacy Sims while reducing 78% of false positives. Today, we're adding more than 30 new connectors for Sentinel that simplify data collection across all of your Cloud environments and make it easier to pull that data is from Salesforce service Cloud, VA Cisco umbrella, and many, many more of the fender provides that in depth protection for the broadest. Set our resources in the industry. That's both multi-cloud and multi-platform. So when you need security insights from

iOS, Android Mac Linux, Google Cloud platform and a w s in one place, you can get that from Defender. Today, we're announcing that next milestone in our journey to create the most integrated Sim and in the industry and Sentinel now, Incident scheme and integrated user experiences with Defender. Sentinel provides a unified view of incidents that span xdr and Sim this incident. Looks like it has a user involved and I need to drill down and act. I'm transferred to Microsoft 365 Defender where I can

continue my investigation with that, rich contacts. That I need, I can remediate and even close the incident right there. With this combination of sim Defenders are now armed with the prior ties incidents and more contacts than automation than ever before to rapidly resolve. Brett's this level and end-to-end visibility has proved critical frog. Zozo group operates, Japan's largest fashion shopping website. They have shifted to the cloud to accelerate the business in a soup, a

competitive landscape playing Sentinel. Alongside Defender to support the many, many different devices platforms and the clouds that their employees need and today. Security team is more efficient and more effective than ever before their organization to innovate. Now, finally, I'd like to end with one big piece of the Texas back to today's threat environment. We launching the new threat analytics, as part of Microsoft 365 Defender deliver has curated

threat, intelligence reports highlighting specific threats like the recent Sullivan's attack and does that right into the Microsoft 365 Defender experience. In addition to documentation, describing the threat sauce from both Microsoft thread, experts and the broader industry, it includes the relevant incident and associated with this threat in your environment and it recommends the mitigation and Remediation steps that you can take right there. Together we must walk across the industry. Business is government and the broader public

to tackle, these adversities head-on has defended ourselves at Microsoft, we are committed to working every day to be your trusted partner and to do our part to build a secure foundation for your business to innovate and grow. I leaned over the space, Andrew. Microsoft, we think of zero trust as not only the practice of protecting his outside interests, but also protecting from the inside out for us, addressing the area of compliance is inclusive of managing risk related to data

stored in the Microsoft cloud, but across your environment for all clouds and all platforms, to even Desitin cream Inside Out protection by extending our capabilities to third parties to help you reduce risk across your entire digital estate. Let's look at some of these new Innovations. You may already be familiar with capabilities in Microsoft information protection that help you protect Office 365 documents today or an ounce in the ability for users to simultaneously at an Office 365. Document that has been encrypted with Microsoft,

information protection and edit in Word, Excel and PowerPoint simultaneously without friction or extra stuff to regrip or resend the document. It all happens automatically, this means I can make edits for my Mac, on my calling Kathy Harris from her Windows PC. This Confidential document will stay protected on both devices and platforms with the same sensitive label and protection, applied unlike some other Solutions. Now, you don't have to make the trade-off between modern collaboration and modern security. Another area of innovation is data loss.

Prevention recently, we announced Microsoft unified data loss, prevention solution. This fish is already available for Microsoft 365 whether that's on the endpoint in teams or another Microsoft 365 service. We even extended the lp with finding controls to Microsoft Edge, you can set policies for what can be shared on the web. Of course we understand your environment goes beyond, Microsoft apps and services. So let's talk about how we're working to bring this to all your platforms. We have many capabilities, that protect and govern data across a synapse and platforms. You can

order add plastic and protection natively to Adobe PDF. You can classify office, documents on IOS and Android. And today, we're not seeing the extension of our modern-day LP solution, to the Chrome browser on the web, the actions blocked. This is powered by the same Dedication that many of you or to use in Microsoft 365. Another exciting investment is the new as your purview service as your purview is a unified data governance service that helps you manage and govern your data on premises multi-cloud, Aiden's fast. Apps per view works

with Microsoft information, protection. Help you find and classify sensitive information. There is a dramatic ability to scan and classified data, Amazon, AWS S3, and other Azure Kinect, This means customers can scan a label data within the Microsoft first, five, compliance Center, and then use purview to get that holistic view of their sensitive data. They cannot quickly determine where different types of sensitive data exists, across many data sources. As I mentioned earlier,

zero trust is about protecting your data from both the outside in. And inside out today we're announcing inside of risk management analytics with one click, you can scan your tenant audit logs in Microsoft 365 to identify potentially risky activity. This helps you customize are out of the box inside of his policies to fit your needs as we can hang with this new normal of hybrid work. We understand it's critical to keep her data safe and to respond to risk across all your clouds and all your Platforms in the intelligent and efficient way. Whether a company like Sterner trying to modernize

Healthcare or Frost Bank providing critical pandemic relief loans for small businesses, we want to help protect data and reduce risk for all. Pursue back to you. Thanks so much Saline. He has been a challenge for all the fuss has really inspired by the way. I was a rising to the challenge in one of the stories. How much is Beach? Let's do many companies supposed to 500, its partners and supplies now to do. So design of Base in Virginia, security by setting up my dry faster, a tent acacian in Windows Virtual desktop, but I

think needs information in addition. How much is a child support automated investigation in Microsoft? Size alerts within Microsoft Exchange online for greater Effectiveness, really, really not something you can do today to strengthen your security Force to protect your identity. Second not understand and use your secure for compliance manager cybersecurity professionals. We have for new security, compliance and identity certification. Regardless of short, to take advantage of that resource into a closed today, I want to thank each and everyone

of you for being with us here, to make a safer place for all. We add Microsoft security because the work you do matters. Security is a team sport and we are all in this together. Security is an inflection point, the second wave of digital transformation. This thing attacks surfaces, increase exponentially, and direct attack escalating in terms of specification and complexity to talk about this and what this means for us. With me today, I'm delighted and honored to have a rockstar Stone Bridge, High doll

and it's white landscape Timber stapled together. Data from all over the company to look at exactly this question. And what we saw is an incredible increase in cyber crime and a nation-state attacks cybercrime. You know, there is a business, email compromise attacks that are increasing in sophistication and in the impact to our customers and as everyone knows ransomware has become an incredible challenge. Problem. I'm in the cybercrime arena and then a nation-state attacks. We see an increase in the volume of attacks and we see an increase in the

sophistication of those attacks and their lead primarily by attacks emanating from Russia, but also from a r on North Korea and China. In the recent few months, I've had a moment of Reckoning for our industry and a society dominated by one of the most sophisticated cyberattacks that these things. What can you tell us about solar winds and what happened in the impact of this attack? We learned about it at first from FireEye, when they discovered that they've been compromised, and they knew it was a sophisticated attack. They invited us to come help them, which we did understand what

was happening there. And as we learned about it, what we discovered was that this actor for the US government has said with a Russian actor, actually compromised, the build process for a an application called Orien, by the company solar win and they put their malware into the build as it was being built, so that it would be signed. And so was really hard to detect and that caused them to compromise 18,000 solarwinds customers, around the world, got that malware and then this after the nation-state actor, picked up a much smaller number of those infected

companies. Actually, then drop a second stage of malware and go in and conduct their African artwork. it's fascinating, I'm still interesting many were surprised that Microsoft became the first responder in the that as a cyber security, company, Microsoft, full, and what we did then, Was really exciting, work vasu that that happened then because what the next step was for the Microsoft threat Intelligence Center, The Mystic team, took the data that we have that 8 trillion signals a day that come in to Microsoft from our ecosystem. And they

were able to take some of that data and examine it for patterns of activity, that this nation state actor would leave behind as a trail, that shows that some of our customers were compromised. It was hard to find this actor was good. They were hiding in the network traffic. They were closing the doors that they open when they no longer needed them, but our teams were able to find these traces than hints sufficiently, so that we could notify our customers when we knew they'd been compromised. Petroglyph point and you make a great point about the need for

technology and human intelligence and expertise to go hand-in-hand. Can you talk a little more about that. It really took both of those things for us to do the work that we did as a company to respond to solarwinds because we needed all the data and analytics we could bring to bear on all of that data we had. But we also needed the humans, the threat intelligence Analyst at Mystic the rest of our Defender Community because Microsoft was also attacked by the doctor and is our team's work to understand exactly what the actor was doing. In our own environment that helped inform how

we could help our customers and so we had both of those things happening at once, but we were First Responders in the sense that we could use the, the data that we had, and the ability to sort through that to find customers notify, our customers that they've been attacked and they Help them understand what they could do to respond. Microsoft angles, inside a compliance management, we have technology and expertise. As you said, really important element, which of the intersection of this but just fall asleep and diplomacy and whose engagement. Can you tell us more about our

role? And how we influence and not respond to incidents, we don't just feel great products and services to protect our customers, but we're working to try to reduce the number and volume of cybercrime attacks and nation-state attacks are digital crimes unit Works to disrupt cybercriminals everyday, and we've taken some of the great work. We did disrupting botnets in creating creative ways to do that. And we brought it into the To State arena for the. We also are disrupting nation-state actors and

taking away the resources and the infrastructure that they use to conduct their attacks. And we have a policy team that works with are our government in the United States. But governments around the world, to try to encourage governments, to adopt enforceable, rules of conduct that will describe, and to find the activity of nation-states in cyberspace. So that citizens in and Enterprises are protected against these nation-state attacks model Spotify, thank you for doing the work you do every single day. I definitely feel so much safer, having you by my side.

I hope you enjoy that and I hope you're inspired by that as much as I see. It is obviously, it is our mission at Microsoft, all to protect that what matters is to safeguard our world and our societies. And we look forward to working with Ian type. To make it a better word. Thank you.

Cackle comments for the website

Buy this talk

Access to the talk “Security for All | KEY05”
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Ticket

Get access to all videos “Microsoft Ignite 2021”
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Ticket

Interested in topic “Startups & Entrepreneurship”?

You might be interested in videos from this event

April 29, 2020
Online
21
177
covid-19, fundraising, fundraising leader, help, motivation, philanthropic organization, practical advice, training

Similar talks

Judson Althoff
Executive Vice President at Microsoft
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Jared Spataro
Corporate Vice President at Microsoft
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Scott Guthrie
Executive Vice President at Microsoft
+ 1 speaker
Merrie Williamson
Vice President, Azure Apps and Infrastructure, Worldwide Commercial Business at Microsoft
+ 1 speaker
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Buy this video

Video
Access to the talk “Security for All | KEY05”
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Conference Cast

With ConferenceCast.tv, you get access to our library of the world's best conference talks.

Conference Cast
943 conferences
37475 speakers
14289 hours of content
Vasu Jakkal
Irina Nechaeva
Andrew Conway
Alym Rayani
Tom Burt