keynote: consumer security and privcay, challenges and strategy by bruno schroder

23
Bruno Schroder National Technology Officer Microsoft Belux

Upload: infosecuritybe

Post on 18-Nov-2014

578 views

Category:

Technology


0 download

DESCRIPTION

Seminar by Bruno Schroder during Infosecurity.be 2011

TRANSCRIPT

Page 1: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Bruno Schroder National Technology Officer Microsoft Belux

Page 2: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

Page 3: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

• Hotmail

• 1.3 billion mailboxes

• 155PB storage, growing 2PB per month (70.000 LTE)

• Windows Live Messenger

• 300 million users

• 76 countries, 48 languages

• ~40 million people simultaneous connections

• 9.9 billion messages a day via Windows Live Messenger

• 600 million unique users every month on Windows Live & MSN

• 1M Business Productivity Online Suite users in 36 countries & regions

• 5 petabytes of content served by Xbox Live during Christmas week

• 1 Petabyte+ of updates served every month by Windows Update to

millions of servers and hundreds of millions of PCs worldwide

Page 4: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

C o n s u m e r

d r i v e n

E n t e r p r i s e

d r i v e n

Page 5: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

In 2010, close to 2 billion people are using Internet

In 2010, over 500 million Facebook

users

Page 6: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

Source: http://socialmediagraphics.posterous.com/the-world-map-of-social-networks?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+SocialMediaGraphics+%28Social+Media+Gr

aphics%29

Page 7: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

Page 8: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

Page 9: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

Private Life Information is a new internet currency

Re-identification technologies

Page 10: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

Private Life Information is a new internet currency

Re-identification technologies

10.000.000 Belgians

80 years expected life : 29.200 birthdates

589 municipalities: 0.58 individual

2 sexes: 0.29 individual

Page 11: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

Page 12: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

Page 13: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

PandaLabs found that 34 percent of all existing malware has been concocted by cyber criminals in the last year.

Rustock:

1.300.000 infested computers botnet

30 billion spams a day

Source : PandaLabs Annual Report .

Page 14: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

Page 15: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

Page 16: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

Critical Infrastructure Protection

Page 17: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

IE9 tracking protection tool

Hotmail Enhanced Security

Microsoft Security Essentials

Windows Intune

Page 18: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

MARS (Microsoft Active Response for Security): a joint effort between DCU, Microsoft Malware Protection Center and Trustworthy Computing to disrupt botnets and help victims regain control of their infected computers. The Rustock botnet was officially taken offline after a months-long investigation by DCU and our partners, a successful pleading before the U.S. District Court for the Western District of Washington (including supportive declarations from Pfizer, security experts at FireEye and researchers at University of Washington) and a simultaneous seizure of command and control servers in multiple hosting locations across the U.S. by Microsoft escorted by the U.S. Marshals Service. The Dutch High Tech Crime Unit and CNCERT also supported Microsoft in the takedown in the Netherlands and China respectively. See http://blogs.technet.com/b/microsoft_on_the_issues/archive/2011/03/17/taking-down-botnets-microsoft-and-the-rustock-botnet.aspx

Microsoft Proposes Comprehensive Self-Regulatory Approach for Online Privacy:

In Federal Trade Commission filing, Microsoft advocates adoption of a more comprehensive framework to protect consumer privacy. See http://www.microsoft.com/presspass/press/2008/apr08/04-11ftconlinepr.mspx

2Center Belgium

Page 19: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

Page 20: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing

Cybercrime has to be combated holistically at many levels including improved technology, legal rulings and new policies; and through

ongoing collaboration between industry, community and policy stakeholders.

Page 21: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing Microsoft Confidential

www.twitter.com/Safer_Online

www.youtube.com/MSFTOnlineSafety

[email protected]

www.microsoft.com/security

www.facebook.com/SaferOnline

Page 22: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Trustworthy Computing Microsoft Confidential

White Paper: Personal Safety in the Cloud: Enabling

Trusted Interactions and Minimizing Risks in the

Online World

http://www.microsoft.com/downloads/en/details.aspx?Fa

milyID=3fd72593-7287-4467-a3bd-15f2d9b67a00

Microsoft Proposes Comprehensive Self-Regulatory

Approach for Online Privacy

http://www.microsoft.com/presspass/press/2008/apr08/0

4-11ftconlinepr.mspx

Page 23: Keynote: Consumer security and privcay, challenges and strategy by bruno schroder

Thank you.

Brunosch at microsoft.com