Measuring security success by sizing up the “cost of attack” is just one of the many highlights of Cybersecurity Reference Strategies, a new course for CISOs and other security professionals, now available on Microsoft Virtual Academy.

Build on the foundation of the MVA Cybersecurity Reference Architecture course and the basic map of the detailed reference architecture, and join us for a deep dive into proven strategies that can help you manage the continuous flow of threats that modern enterprises face. Get the details on key trends, critical success criteria, best approaches, and important technical capabilities to make these strategies real—so you can apply them in your organization.

If you’re building cybersecurity strategies to protect an enterprise that includes cloud and mobile devices outside your network, learn from Microsoft experts who share real-life lessons from protecting our customers, our hyper-scale cloud services, and our own IT environment. Focus on four main areas: Security Management Learnings and Principles, Identity and Access Management, Threat Protection, and Information Protection.

Microsoft ECG Executive Security Advisor Shawn Anderson, Microsoft Chief Security Advisor, Americas, Ken Malcolmson, and Microsoft Enterprise Cybersecurity Group Lead Architect Mark Simos, explore issues that are top of mind for CISOs, security architects, and other security professionals, including:

  • Getting visibility, control, and guidance over cloud and mobile assets.
  • How to move from a network security perimeter to an identity security perimeter.
  • Balancing investments between preventive measures and detection/response capabilities.
  • Using cost of attack to prioritize investments and measure security program progress.
  • Protecting information anywhere it goes (SaaS services, mobile devices, USB drives, etc.).
  • Applying military lessons learned like the Observe / Orient / Decide / Act (OODA) loop.

Other highlights include how Digital Transformation drives the need to secure cloud access, and how identity is replacing network as the primary security perimeter.

And lots more. Learn—from the pros who know—all about “success criteria,” what a successful cybersecurity strategy looks like, what the standards are, how to apply and measure them in your organization, and how to best spread your cyberdefenses beyond the firewall to along the kill chain.

Get started now!