Microsoft Internet Safety Enforcement: A worldwide team of lawyers, investigators, technical analysts and other specialists whose mission it is to make.

Slides:



Advertisements
Similar presentations
Primary Threats to Computer Security
Advertisements

USING EMET TO DEFEND AGAINST TARGETED ATTACKS PRESENTED BY ROBERT HENSING – SENIOR CONSULTANT – MICROSOFT CORPORATION MICHAEL MATTES – SENIOR CONSULTANT.
Industrial Automation Security April 6 th, 2011 Oliver Niedung Microsoft OEM EMEA Embedded Server.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
Bernhard van der Feen Product Solution Manager Security Microsoft.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Gabriel Fedorko Microsoft Slovakia. Evolving Security Threat Landscape Methods to Addressing Security Threats Microsoft Trustworthy Computing Addressing.
Around the World, Around the Corner WorldPay for Small Business.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Internet Fraud By: Shanna. Explanation of Fraud Internet fraud is a crime in which a person develops a way to invade your privacy by retrieving your personal.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Top 7 Things to Know about Activation and Genuine Software with Windows 7 For computers with perpetual licensing obtained through Microsoft volume licensing.
1 Challenges For A Credit Bureau In Emerging Markets.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Information Assurance... Smart Card Interoperability Steve Haynes Phone
Critical Emerging Network-Centric Applications Tele-control/tele-presence Defense Tele-medicine Remote plane/vehicle/robot control Distance learning Real-time.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Global Foundation Services (GFS) Malware Protection Center Microsoft Security Response Center (MSRC)
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
Doug Cavit Chief Security Strategist Trustworthy Computing.
12,000 anonymized surveyed results Worldwide user base Cloud Security Readiness Tool Security trends report:
Unethical use of Computers and Networks
INDUSTRY COMMITMENT TO INNOVATION IN NOTICE AND CHOICE AAAA, ANA, CBBB, DMA, IAB Convene Task-Force (April 2008) Coalition begins drafting industry principles.
+ Regulation and Compliance Summary “ Making Great Ideas Become Reality”
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
Introducing Microsoft Azure Government Steve Read Barbara Brucker.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
CLOUD COMPUTING cloud computing and its importance to large scale firms such as Apple and Microsoft.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Web Page Design and Development I Standards Standard A Safety and Ethics – 3 Identify potential abuse and unethical uses of computers and networks.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
John Weigelt, MEng, PEng, CISSP, CISM National Technology Officer Microsoft Canada November 2005 Fighting Fraud Through Data Governance.
Creating Value Professor Jason Chen School of Business Administration Gonzaga University Spokane, WA 99258, USA
1. You Are Making A Difference World Finance: Companies Cope with Declining Dollar Feb 13 th, 2008 Australia Braces For Rate Increases To Curb Inflation.
TÜBİTAK – BİLGEM – SGE Cyber Security Institute Asım Gençer Gökce TÜBİTAK BİLGEM Cyber Security Institute (SGE) Role: Cyber.
Tim Rains Group Product Manager Microsoft Session Code: SIA101.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Top Tips for Online Safety Speaker Name Speaker Organization.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Partner Toolbox Cloud Infrastructure & Management
Microsoft’s Security Strategy
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Call us Make You Unique Website Designer Company in Udaipur Best website designer is a leading IT company Solutions providing Latest innovative.
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
CYB 110 Education for Service-- tutorialrank.com
Get instant internet security | | Wire IT Solutions
Privacy by Design The Microsoft Experience
Csilla Farkas Cybersecurity Csilla Farkas
Securing the Threats of Tomorrow, Today.
Chapter 1: Information Security Fundamentals
Powerful Partnerships with Industry Leaders
Web Information Systems Engineering (WISE)
Cybersecurity Simplified: Phishing
Presentation transcript:

Microsoft Internet Safety Enforcement: A worldwide team of lawyers, investigators, technical analysts and other specialists whose mission it is to make the Internet safer for everyone through game-changing legal solutions, enforcement, partnerships, cooperation and technology that: Defend against digital crime and abuse Protect children from technology-facilitated crimes Advance safety and integrity in the online advertising marketplace Ensure security and safety in cloud computing and emerging technologies

Secure against attacks Protects confidentiality, integrity and availability of data and systems Manageable Protects from unwanted communication Controls for informational privacy Products, online services adhere to fair information principles Dependable, Available Predictable, consistent, responsive service Maintainable Resilient, works despite changes Recoverable, easily restored Proven, ready Commitment to customer-centric Interoperability Technology Accessibility Recognized industry leader, world-class partner Open, transparent

TwC Security Protecting Microsoft customers throughout the entire life cycle (in development, deployment and operations) Microsoft Security Engineering Center (MSEC) Security Assurance Security Science SDLSDL Microsoft Malware Protection Center (MMPC) Microsoft Security Response Center (MSRC) (MSRC) MSRC Engineering MSRC Ops EcoStratEcoStrat Conception Release

Operating System 8.8% National Interest Personal Gain Personal Fame Curiosity AmateurExpertSpecialist Largest area by volume Script-Kiddy Largest segment by $ spent on defense Author Vandal Thief Spy Trespasser Largest area by $ lost Fastest growing segment

Fraud is not new to the world – it certainly happened long before the Internet was even an idea. But the Internet has changed and in some ways expanded how it’s done: Advance fee fraud and fake lotteries/sweepstakes Credit repair, mortgage and other financial scams Counterfeit software or other products sold online Scareware

Impacts everyone who advertises online or who rely on online services funded by advertising. In short… Everyone who uses the Internet. The fraud and malware threat is still just being understood, but includes things like: Click fraud Malvertising Online advertising networks like Microsoft are working on this, but it is an issue to watch closely

These threats may impact your business in a myriad of ways: Talk to your ad department: about the ads you place online and what’s happening to make sure you’re getting your money’s worth Talk to your legal team: about potential online fraud being done in your company’s name Talk to your IT department: about the security measures in place in your corporate infrastructure as technology evolves and more data moves into ‘the cloud’ Talk to your employees: to ensure they are exercising best practices Talk to your family: about ways they can better stay safe online (see microsoft.com/protect for more information)

Trustworthy Computing