14
Hans Bos National Technology Officer Microsoft The Netherlands [email protected] Security

2012-10-15 On Trustworthy Computing inthe context of Energy

Embed Size (px)

DESCRIPTION

Slides used to bring across a view on how a high availability of digital infrastructure, leads to benefits and responsibilities.

Citation preview

Page 1: 2012-10-15 On Trustworthy Computing inthe context of Energy

Hans BosNational Technology OfficerMicrosoft The [email protected]

Security

Page 2: 2012-10-15 On Trustworthy Computing inthe context of Energy

The Netherlands

#6 ICT Development IndexITU Information Society 2012

Measuring the Information Society 2012

#5 Global CompetitivenessGlobal Competitiveness 2012-2013World Economic Forum

#11 Networked ReadinessGlobal IT Report 2010-2011World Economic Forum

Page 3: 2012-10-15 On Trustworthy Computing inthe context of Energy

94% with internet access

94% own one or more PC’s

83% broadband internet

79% active e-commerce

Households in The Netherlands

Page 4: 2012-10-15 On Trustworthy Computing inthe context of Energy

Age: 12 to 25 Age: 25 to 45 Age: 65 to 75Age: 45 to 65

Source: CBS, Central Bureau for Statistics in The Netherlands

Example: TelebankingUse of internet for telebanking in 2011 as percentage of internet users.

62% 93% 85% 68%

Page 5: 2012-10-15 On Trustworthy Computing inthe context of Energy

It’s not just that software runs the power grid, the global financial system, and the armed forces around the world, but that the fabric of society is connected through email, browsing, social networking, search, and web applications.Scott CharneyCVP Trustworthy ComputingMicrosoft

Page 6: 2012-10-15 On Trustworthy Computing inthe context of Energy

By THE ASSOCIATED PRESSPublished: September 5, 2011

AMSTERDAM (AP) — Attackers who hacked into a Dutch Web security firm have issued hundreds of fraudulent security certificates for intelligence agency Web sites, including the C.I.A., as well as for Internet giants like Google, Microsoft and Twitter, the Dutch government said on Monday. Experts say they suspect the hacker — or hackers — operated with the cooperation of the Iranian government, perhaps in attempts to spy on dissidents. The latest versions of browsers including Microsoft’s Internet Explorer, Google’s Chrome and Mozilla’s Firefox are now rejecting certificates issued by the firm that was hacked, DigiNotar. But in a statement on Monday, the Dutch Justice Ministry published a list of the fraudulent certificates that greatly expands the scope of the July hacking attack that DigiNotar acknowledged only last week. The list also includes certificates that were sent to sites operated by Yahoo, Facebook, Microsoft, Skype, AOL, the Tor Project, WordPress, and by intelligence agencies like Israel’s Mossad and Britain’s MI6. (…)

Hacking in the Netherlands Took Aim at Internet Giants

Page 7: 2012-10-15 On Trustworthy Computing inthe context of Energy

Trustworthy Computing

CoordinatedVulnerability Disclosure

Bill Gate’s TwC Memo CSA Founded TwC NextXP SP2

InternetTidal Wave

Blaster / Slammer SIRv1 SDL AgileMicrosoft

Server Proliferation

Devices Everywhere

2003 2004 2006 2008 2009 2010 20121990 20021994 1998

Page 8: 2012-10-15 On Trustworthy Computing inthe context of Energy

Example: Microsoft IT

RISK MANAGEMENT

Intellectual property protectionIncreased Data Leakage and PortabilityInsider ThreatsRisk Management vs Risk EliminationBusiness Continuity

BUSINESS ENVIRONMENT

Support the rapidly changing businessImproved Business IntelligenceRobust continuity plansDeliver fist and best

41,000 Windows Phones

700,000 Sharepont Sites

102,000 Windows clients

49% of users on Lync

100+ countries

190,000 end users

1.3 million devices

1.7B hits/day microsoft.com

7M spam filtered per day

85M Ims per month

34K Lync sessions per month

TECHNICAL EXCELLENCE

Cloud ComputingData loss preventionSIEM platforms and programsIAM Governance and processEmerging technologies

OPERATIONAL EXCELLENCE

Better integration with board/ERMVendor and 3rd party managementAsset and configuration managementExecutive reporting and metricsAwareness and training

Page 9: 2012-10-15 On Trustworthy Computing inthe context of Energy

Example: Security Intelligence ReportWorldwide Threat Assesment

Infiltration of Supply Chain

Vulnerability trends

Criminal focus on Java and HTML

Exploit trends

Malware / potentially unwanted software

SPAM, Phishing and drive-by attacks

Regional Threat Assessment105 regions

www.microsoft.com/sir

Page 10: 2012-10-15 On Trustworthy Computing inthe context of Energy

Example: Security Intelligence Report

HTML/Java 70% of Top Exploit Families

Top Exploits

1Q11 2Q11 3Q11 4Q11 1Q12 2Q12

HTML/JavaScript

Java

Documents

Operating System

ShellcodeAdobe Flash (SWF)OtherHeapspray

Page 11: 2012-10-15 On Trustworthy Computing inthe context of Energy

Smart Energy Reference Architecture (SERA)

Global Performance

Networks

Forces Shaping Industry

Hosted PLM

Data Integration & Enterprisewide Data Mapping

Distributed Asset Management

Governance, Risk & Compliance

UX & Information Composition

Connected Device Services

Performance Oriented Infrastructure: Management, Secure, Scalable, Virtualized, Location AgnosticHolistic Life-User Experience: Rich User Experience, Collaboration, Communication, Content ManagementEnergy Network Optimization: Data Synchronization, Embedded Edge Devices, Flexible CommunicationsPartner Enabling Rich Application Platform: Analytics, Optimization, CEP, Service Bus, Storage, Workflow

Interoperability: Published Interfaces, Standards

Operational EfficiencyEnergy Technology Consumerization

Climate Change Sustainability & Resource Adequacy

Smart GridWorkforce Challenge

Microsoft SolutionEnablers

Reliability Performance Safety

Industry BusinessSolutions

Enterprisewide Security

Business Processes

Regulatory Uncertainty

Cloud Computing

Business Intelligence & Analytics

Location Agnostic

Enterprise-wide Modeling

Delivery (Smart Grid)

Regulatory Compliance & Controls

Customer Service & SalesGeneration & Supply

EnvironmentBusiness

Imperatives

Complex Event Processing & System Wide Eventing

Page 12: 2012-10-15 On Trustworthy Computing inthe context of Energy
Page 13: 2012-10-15 On Trustworthy Computing inthe context of Energy

© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Page 14: 2012-10-15 On Trustworthy Computing inthe context of Energy

“My dear fellow," said Sherlock Holmes as we sat on either side of the fire in his lodgings at Baker Street, "life is infinitely stranger than anything which the mind of man could invent.”

A Case of IdentityThe Adventures of Sherlock HolmesArthur C. Doyle