Andrea Valboni National Technology Officer Public Sector Microsoft Italy



Similar documents
Kevin Dean Technology Strategist Education Southeast Microsoft Corporation

Operating System Security

Microsoft Security Intelligence Report volume 7 (January through June 2009)

Securing the Cloud Infrastructure

Microsoft s cybersecurity commitment

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?

Student Tech Security Training. ITS Security Office

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

Managing Security Risks in Modern IT Networks

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Protecting Your Organisation from Targeted Cyber Intrusion

Proven LANDesk Solutions

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

National Cyber Security Policy -2013

The Information Security Problem

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Windows Embedded Security and Surveillance Solutions

Securing the Microsoft Cloud

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

The Security Development Lifecycle. Steven B. Lipner, CISSP Senior Director Security Engineering Strategy Microsoft Corp.

ZENworks Patch Management. Doc Hodges Opportunity Response Team Novell, Inc.

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

FORBIDDEN - Ethical Hacking Workshop Duration

Endpoint protection for physical and virtual desktops

Injazat s Managed Services Portfolio

Best Practices for a BYOD World

Loophole+ with Ethical Hacking and Penetration Testing

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Microsoft Security Development Lifecycle for IT. Rob Labbé Application Consulting and Engineering Services

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Microsoft Technologies

Emerging Security Technological Threats

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Understanding Anti-Malware Research and Response at Microsoft. An introduction to the Malware Protection Center

Endpoint protection for physical and virtual desktops

IBM Endpoint Manager for Core Protection

Securing the Microsoft Cloud

External Supplier Control Requirements

How To Buy Nitro Security

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Total Defense Endpoint Premium r12

Defending against modern threats Kruger National Park ICCWS 2015

Information Security Threat Trends

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Cyber Security nei prodotti di automazione

HIPAA DATA SECURITY & PRIVACY COMPLIANCE

Windows Phone 8 Security Overview

The Value of Vulnerability Management*

Information Security Incident Management Guidelines

Trend Micro. Advanced Security Built for the Cloud

The Key to Secure Online Financial Transactions

HP Security Assessment Services

CompTIA Security+ (Exam SY0-410)

Implementing Security Update Management

Symantec Endpoint Protection

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Privilege Gone Wild: The State of Privileged Account Management in 2015

Payment Card Industry Data Security Standard

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Privilege Gone Wild: The State of Privileged Account Management in 2015

Windows 7. Qing Liu Michael Stevens

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Information Technology Solutions

IBM Endpoint Manager Product Introduction and Overview

Symantec Protection Suite Small Business Edition

Cyber Essentials Scheme

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

Data Management Policies. Sage ERP Online

Simphony v2 Antivirus Recommendations

Symantec Protection Suite Small Business Edition

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Cyber R &D Research Roundtable

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

IBM Tivoli Endpoint Manager for Security and Compliance

CA Host-Based Intrusion Prevention System r8.1

Transcription:

Andrea Valboni National Technology Officer Public Sector Microsoft Italy CRITIS Frascati, 15 Ottobre 2008

Evolving Security Threat Landscape Trustworthy Computing Vision Addressing Security Threats Public Private Partnership

Where are threats heading next?

Within 1 day Within 2 hours 2 days prior Within 10 days Within 2 days Same day Within 38 days Within 3 days Within 3 days Within 7 days Within 11 days

Viruses, Spyware and Worms Botnets and Rootkits Phishing and Fraud Regulatory Compliance Development & Implementation Security Policies Reporting and Accountability Identity Management and Access Control Managing Remote Access Security Risk of Unmanaged PCs Deploying Security Updates System Identification and Configuration Security Policy Enforcement

Local Area Networks First PC virus Boot sector viruses Create notoriety or cause havoc Slow propagation 16-bit DOS Internet Era Macro viruses Script viruses Create notoriety or cause havoc Faster propagation 32-bit Windows Broadband prevalent Spyware, Spam Phishing Botnets Rootkits Financial motivation Internet wide impact 32-bit Windows Hyper jacking Peer to Peer Social engineering Application attacks Financial motivation Targeted attacks 64-bit Windows

Exponential Growth of IDs Identity and access management challenging Increasingly Sophisticated Malware Anti-malware alone is not sufficient Number of Digital IDs client/server Internet B2E mobility B2C B2B Number of variants from over 7,000 malware families (1H07) mainframe Pre-1980s 1980s 1990s 2000s Source: Microsoft Security Intelligence Report (January June 2007) Crime On The Rise Attacks Getting More Sophisticated Traditional defenses are inadequate National Interest Personal Gain Personal Fame Curiosity Largest segment by $ spent on defense Largest area by $ lost Thief Trespasser Vandal Largest area by volume Author Spy Fastest growing segment User GUI Applications Drivers O/S Hardware Physical Examples Spyware Rootkits Application attacks Phishing/Social engineering Script-Kiddy Amateur Expert Specialist

Major sections cover Software Vulnerability Disclosures Software Vulnerability Exploits Malicious Software and Potentially Unwanted Software Privacy and Security Breach Notifications www.microsoft.com/sir

Malicious Software and Potentially Unwanted Software Data from several hundred million computers MSRT has a user base of 450+ million unique computers During 2H07 MSRT executed 2.5 billion times Since January 2005 total MSRT executions surpass 10 billion

More than 2,700 new vulnerabilities disclosed in 2H07 2H07 had the lowest number of disclosures since 2H05 Total vulnerabilities for 2007 lower than 2006 Industry-wide vulnerability disclosures by half-year, 2003 2007 2007 Industry-wide vulnerability disclosures by year, 2003 2007 2007

900 security breach notifications, 12 countries Exploits, malware and hacking less than 23 percent of all notifications from 2000-2007, only 13 percent during 2H07 Breaches in 2H07 involved proportionally fewer hacking incidents than the last eight years as a whole 57% of breaches in 2H07 resulted from lost or stolen equipment Security breach incidents by type, 2000 1H07, and 2H07 alone, expressed as percentages of the total Data sourced from the Data Loss Database at http://attrition.org/dataloss

Trustworthy Computing Vision

Predictable, Commitment, consistent, Microsoft responsive to customer-centric Security service centric Response Microsoft Interoperability Center Privacy (MSRC) Guidelines Maintainable,, easy Microsoft Automated configure Malware and Policy manage Protection based for developing solutions Center Software (MMPC) and Services Resilient, Recognized, works despite Secure changes industry leader, Windows Microsoft, world-class Initiative Data (SWI) partner Governance Framework Recoverable,, easily restored Open, Security transparent Science Managing and Protecting Proven,, ready to operate Personal Information Secure against attacks Protects confidentiality, TWC integrity and availability of data and systems Announced SDL begins Windows Server 2003 Build solutions that protect privacy Microsoft Online Crash Analysis Interop Vendor Alliance SQL Server 2005 Safe guard your corporate data Engineering Excellence Training and Guidelines Visual Studio 2005 Open Source Software Lab Protect Personal Privacy Microsoft Online Services with high Windows reliability Server Windows Transparent Practices in multiple data centers Windows 2003 SP1 Defender Windows (SDL, Vista Codeplex, etc.) Windows Vendor Engagement and Windows Hardware Quality Lab XP SP2 Malicious SW Windows Office 2007 Server 2008 Business Continuity explicitly designed DSI Launched Removal Tool in with prescriptive Live OneCare guidance Forefront SQL Server 2008

At Microsoft, we believe that delivering secure software requires Executive commitment SDL a mandatory policy at Microsoft since 2004 Core training Analyze security and privacy risk Define quality gates Threat modeling Attack surface analysis Specify tools Enforce banned functions Static analysis Dynamic/Fuzz testing Verify threat models/attack surface Response plan Final security review Release archive Response execution Ongoing Process Improvements 6 month cycle

First Year of Vulnerabilities* 2007* Vulnerabilities Fixed One Year After Release* Vulnerabilities disclosed and fixed Quarterly totals, 2000-2006** 2006** *Source: http://blogs.csoonline.com/blog/jeff_jones **Source: Which database is more secure? Oracle vs. Microsoft, David D Litchfield, NGS Software, 21-November November-2006

Framework for Data Governance

Policy, People, Processes (and Technology)

No common identity management model No desktop or server standards, many images, no management standards Federated Identity Management across org. and platform boundaries Automated IT management, dynamic resource usage No networks and security standards Automated security and network management Adhoc protection of key data End to end data protection and disaster recovery Adhoc, reactive Proactive, Optimize cost & quality, End-to to-end service & policy management

Global Phishing Enforcement Initiative Digital PhishNet Global Infrastructure Alliance for Internet Safety Virus Information Alliance

I+4A Identity Claims Authentication Authorization Access Control Mechanisms Audit Trusted Data Trusted People Trusted Software Trusted Hardware Integrated Protection

Economic Forces Political/ Legislative Core Security Components Trusted Stack Identity Claims Authentication Authorization Access Control Mechanisms Audit I+4A Social Requirements Secure Foundation SDL and SD3 Integrated Protection Defense in Depth Threat Mitigation

A well Managed Secure Infrastructure is the key! Services Edge Fo re fro nt Edge er s Servlication A pp St irl in gm an ag em en t Enc ryp ting F i le Syst BitL em ock ( EF S er ) Server Applications d t an S n e i Cl ver O Ser Active Directory Federation Services (ADFS) Operations Manager 2007 Information Protection Client and Server OS Identity & Access Management Certificate Lifecycle Management Mobile Device Data Manager 2008 Protection Configuration Manager Manager 2007 Systems Management TWC SDL

Initiatives in Italy during 2007

La scuola ricomincia navigando (School starts again. Surfing) A pilot project for a single local municipality (Comune di Roma) with the following format: The Rome municipality send mail with project presentation to all the schools managers in Rome (kids aged 11-13) proposing them 1. One day of Classroom lessons by the local law enforcement agency (Polizia Postale e delle Comunicazioni) for all the students and the teachers using the Get Net Safe deck for presentation 2. Specific teacher training (Partner in Learning train the trainer with Microsoft security curricula) and resources to create classroom lessons 3. A contest for all the classroom involved (video production) 4. Materials for kids and parents to be distributed to all the participants

Child Exploitation Tracking System is a unique software tool that helps protect children from exploitation online. It enables more effective identification and prosecution of offenders by allowing governments to store, search, share, and analyze evidence in child exploitation cases across police agencies As of June 2007, the Child Exploitation Tracking System has been deployed in seven countries and is being used by over 400 investigators worldwide. With it, law enforcement agencies can break down borders through collaboration and information sharing Polizia Postale is the Italian Partner for this world wide program

Computer Online Forensic Evidence Extractor (COFEE) Not to cause unnecessary input to the target machine Collect the volatile data including network, and memory information for investigation Documentation of execution flow for court presentation Backup passwords from the machine for future forensic purpose Reconnaissance Digital Forensics Relevancy Reliability

Security Cooperation Program Designed to help government CERT in defending critical infrastructure in the PA space from IT threats, through advanced information sharing on MS security bullettins, workshops and training. Ad hoc local programs to address unique requirements for a given Country Might include the creation of competence centers on IT security, citizen s security initiative, Public Protection.

Microsoft Security Home Page: www.microsoft.com/security www.mcrosoft.cm/italy/security Microsoft Trustworthy Computing: www.microsoft.com/security/twc Microsoft Forefront: www.microsoft.com/forefront Infrastructure Optimization: www.microsoft.com/io Microsoft Security Assessment Tool: www.microsoft.com/security/msat General Information: Microsoft Live Safety Center: safety.live.com Microsoft Security Response Center: www.microsoft.com/security/msrc Security Development Lifecycle: msdn.microsoft.com/security/sdl Get the Facts on Windows and Linux: www.microsoft.com/windowsserver/compare Anti-Malware: Microsoft OneCare Live: beta.windowsonecare.com Microsoft Defender: www.microsoft.com/athome/security/spyware/software Spyware Criteria: www.microsoft.com/athome/security/spyware/software/isv Guidance Centers: Security Guidance Centers: www.microsoft.com/security/guidance Security Guidance for IT Professionals: www.microsoft.com/technet/security The Microsoft Security Developer Center: msdn.microsoft.com/security The Security at Home Consumer Site: www.microsoft.com/athome/security

2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

http://blogs.csoonline.com/blog/jeff_jones

Windows Vista in 2007 20% fewer vulnerabilities than Windows XP 74% fewer vulnerabilities than the next closest (Ubuntu) 47% fewer high severity vulnerabilities than the next closest (Red Hat) Source: http://blogs.csoonline.com/blog/jeff_jones