keynote: consumer security and privcay, challenges and strategy by bruno schroder
DESCRIPTION
Seminar by Bruno Schroder during Infosecurity.be 2011TRANSCRIPT
Bruno Schroder National Technology Officer Microsoft Belux
Trustworthy Computing
Trustworthy Computing
• Hotmail
• 1.3 billion mailboxes
• 155PB storage, growing 2PB per month (70.000 LTE)
• Windows Live Messenger
• 300 million users
• 76 countries, 48 languages
• ~40 million people simultaneous connections
• 9.9 billion messages a day via Windows Live Messenger
• 600 million unique users every month on Windows Live & MSN
• 1M Business Productivity Online Suite users in 36 countries & regions
• 5 petabytes of content served by Xbox Live during Christmas week
• 1 Petabyte+ of updates served every month by Windows Update to
millions of servers and hundreds of millions of PCs worldwide
Trustworthy Computing
C o n s u m e r
d r i v e n
E n t e r p r i s e
d r i v e n
Trustworthy Computing
In 2010, close to 2 billion people are using Internet
In 2010, over 500 million Facebook
users
Trustworthy Computing
Source: http://socialmediagraphics.posterous.com/the-world-map-of-social-networks?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+SocialMediaGraphics+%28Social+Media+Gr
aphics%29
Trustworthy Computing
Trustworthy Computing
Trustworthy Computing
Private Life Information is a new internet currency
Re-identification technologies
Trustworthy Computing
Private Life Information is a new internet currency
Re-identification technologies
10.000.000 Belgians
80 years expected life : 29.200 birthdates
589 municipalities: 0.58 individual
2 sexes: 0.29 individual
Trustworthy Computing
Trustworthy Computing
Trustworthy Computing
PandaLabs found that 34 percent of all existing malware has been concocted by cyber criminals in the last year.
Rustock:
1.300.000 infested computers botnet
30 billion spams a day
Source : PandaLabs Annual Report .
Trustworthy Computing
Trustworthy Computing
Trustworthy Computing
Critical Infrastructure Protection
Trustworthy Computing
IE9 tracking protection tool
Hotmail Enhanced Security
Microsoft Security Essentials
Windows Intune
Trustworthy Computing
MARS (Microsoft Active Response for Security): a joint effort between DCU, Microsoft Malware Protection Center and Trustworthy Computing to disrupt botnets and help victims regain control of their infected computers. The Rustock botnet was officially taken offline after a months-long investigation by DCU and our partners, a successful pleading before the U.S. District Court for the Western District of Washington (including supportive declarations from Pfizer, security experts at FireEye and researchers at University of Washington) and a simultaneous seizure of command and control servers in multiple hosting locations across the U.S. by Microsoft escorted by the U.S. Marshals Service. The Dutch High Tech Crime Unit and CNCERT also supported Microsoft in the takedown in the Netherlands and China respectively. See http://blogs.technet.com/b/microsoft_on_the_issues/archive/2011/03/17/taking-down-botnets-microsoft-and-the-rustock-botnet.aspx
Microsoft Proposes Comprehensive Self-Regulatory Approach for Online Privacy:
In Federal Trade Commission filing, Microsoft advocates adoption of a more comprehensive framework to protect consumer privacy. See http://www.microsoft.com/presspass/press/2008/apr08/04-11ftconlinepr.mspx
2Center Belgium
Trustworthy Computing
Trustworthy Computing
Cybercrime has to be combated holistically at many levels including improved technology, legal rulings and new policies; and through
ongoing collaboration between industry, community and policy stakeholders.
Trustworthy Computing Microsoft Confidential
www.twitter.com/Safer_Online
www.youtube.com/MSFTOnlineSafety
www.microsoft.com/security
www.facebook.com/SaferOnline
Trustworthy Computing Microsoft Confidential
White Paper: Personal Safety in the Cloud: Enabling
Trusted Interactions and Minimizing Risks in the
Online World
http://www.microsoft.com/downloads/en/details.aspx?Fa
milyID=3fd72593-7287-4467-a3bd-15f2d9b67a00
Microsoft Proposes Comprehensive Self-Regulatory
Approach for Online Privacy
http://www.microsoft.com/presspass/press/2008/apr08/0
4-11ftconlinepr.mspx
Thank you.
Brunosch at microsoft.com