0% found this document useful (0 votes)
21 views14 pages

Info-Sec Landscape

Uploaded by

itzheroxmc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views14 pages

Info-Sec Landscape

Uploaded by

itzheroxmc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Information Security

Trends 2022

October 2022
Background #ONETEAM

• Raffik Basha
Cyber Security Architect | CISSP | PMP | SOC | ITIL | ISO 27001 | NIST | Azure

• Education

• BFSI

• OT Security

#ONETEAM
Agenda

Cybersecurity Landscape 2022 Cybersecurity Trends 2022

1 The continuous improvement and development of


technology and recent cyber threats have triggered a
2 The continuous improvement and development of
technology and recent cyber threats have triggered a
change in the cybersecurity Landscape of 2022. change in the cybersecurity trends of 2022.

Cyber Essential Zero Trust Model


3 Essential policy and controls to protect the IT 4 A zero trust architecture (ZTA) is an enterprise cybersecurity
architecture that is based on zero trust principles and designed
infrastructures
to prevent data breaches and limit internal lateral movement

Awareness and User Training Microsoft 365 Security Solutions


5 A report by Info-sec indicates that around 97% of people globally
do not know how to identify a phishing email. Thus, human error
6 Microsoft 365 E5 /A5 includes products for IDaM, threat
protection, information protection, and security
remains a significant factor in many data breaches, management that work together to keep organization safe.
Business Landscape
Cybersecurity Landscape
Major Threat to all the organization
Cybersecurity Trends
Cybersecurity Essential Controls
Zero-Trust Architecture
Zero-Trust Core Principles

Never trust, always Assume breach—By Apply least-privileged


verify -Always assuming your defenses access—Zero Trust follows
authenticate and authorize have already been the
based on all available data infiltrated, you can take a Principle of Least Privilege (P
oLP)
points stronger security posture
, which is the practice of
against potential threats,
limiting access rights for any
minimizing the impact if a entity and only permitting
breach does occur the minimum privileges
necessary to perform its
function.
Security Awareness Training
Microsoft 365 Security Solutions
rbasha@usaindia.online
#ONETEAM

Thank You

#ONETEAM

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy