SlideShare una empresa de Scribd logo
1 de 20
Chris Hallum
Senior Product Manager
Windows 8.1
Security Advancements
Key Threats
• Passwords under attack
• Digital identity theft and
misuse
• Signatures based AV unable
to keep up
• Digital signature tampering
• Browser plug-in exploits
• Data loss on BYOD devices
Key Threats
• Melissa (1999), Love Letter
(2000)
• Mainly leveraging social
engineering
Key Threats
• Code Red and Nimda
(2001), Blaster (2003),
Slammer (2003)
• 9/11
• Mainly exploiting buffer
overflows
• Script kiddies
• Time from patch to exploit:
Several days to weeks
Key Threats
• Zotob (2005)
• Attacks «moving up the
stack» (Summer of Office
0-day)
• Rootkits
• Exploitation of Buffer
Overflows
• Script Kiddies
• Raise of Phishing
• User running as Admin
Key Threats
• Organized Crime
• Botnets
• Identity Theft
• Conficker (2008)
• Time from patch to exploit:
days
Key Threats
• Organized Crime, potential
state actors
• Sophisticated Targeted
Attacks
• Operation Aurora (2009)
• Stuxnet (2010)
Windows 8.1
• Touch Fingerprint Sensors
• Improved Biometrics
• TPM Key Attestation
• Certificate Reputation
• Improved Virtual
Smartcards
• Provable PC Health
• Improved Windows
Defender
• Improved Internet Explorer
• Device Encryption (All
Editions)
• Remote Business Data
Removable
Windows XP
• Logon (Ctrl+Alt+Del)
• Access Control
• User Profiles
• Security Policy
• Encrypting File System (File
Based)
• Smartcard and PKI Support
• Windows Update
Windows XP SP2
• Address Space Layout
Randomization (ASLR)
• Data Execution Prevention
(DEP)
• Security Development
Lifecycle (SDL)
• Auto Update on by Default
• Firewall on by Default
• Windows Security Center
• WPA Support
Windows Vista
• Bitlocker
• Patchguard
• Improved ASLR and DEP
• Full SDL
• User Account Control
• Internet Explorer Smart
Screen Filter
• Digital Right Management
• Firewall improvements
• Signed Device Driver
Requirements
• TPM Support
• Windows Integrity Levels
• Secure “by default”
configuration (Windows
features and IE)
Windows 7
• Improved ASLR and DEP
• Full SDL
• Improved IPSec stack
• Managed Service Accounts
• Improved User Account
Control
• Enhanced Auditing
• Internet Explorer Smart
Screen Filter
• AppLocker
• BitLocker to Go
• Windows Biometric Service
• Windows Action Center
• Windows Defender
Windows 8
• UEFI (Secure Boot)
• Firmware Based TPM
• Trusted Boot (w/ELAM)
• Measured Boot and
Remote Attestation
Support
• Significant Improvements
to ASLR and DEP
• AppContainer
• TPM Key Protection
• Windows Store
• Internet Explorer 10
(Plugin-less and Enhanced
Protected Modes)
• Application Reputation
moved into Core OS
• BitLocker: Encrypted Hard
Drive and Used Disk Space
Only Encryption Support
• Virtual Smartcard
• Picture Password, PIN
• Dynamic Access Control
• Built-in Anti-Virus
20132001 2004 2007 2009 2012
Windows 8 Security Capabilities
The largest volume of security investments ever made in a single release of
Windows have yielded great results.
Those who realize they’ve been hacked.
Those who haven’t yet realized they’ve been hacked.
There are threats that are familiar
and those that are modern.
Script Kiddies; Cybercrime Cyber-espionage; Cyber-warfare
Cybercriminals State sponsored actions; Unlimited resources
Attacks on fortune 500 All sectors and even suppliers getting targeted
Software solutions Hardware rooted trust the only way
Secure the perimeter Assume breach. Protect at all levels
Hoping I don‘t get hacked You will be hacked. Did I successfully mitigate?
Familiar Modern
Company owned and tightly managed devices Bring your own device, varied management
“Commercial based antivirus and security products are designed for and focus on
protecting you from prevalent classes of in the wild threats coming from criminals, thugs
and digital mobsters (and it's a constant battle). It is not designed to protect you from
the digital equivalent of Seal Team Six. So if you're the guy that finds himself in the
crosshairs… you're not safe.”
-- F-Secure “News from the Lab”, May 30, 2012
A Lockheed Martin official said the firm is “spending more time helping deal with attacks
on the supply chain” of partners, subcontractors and suppliers than dealing with attacks
directly against the company. “For now, our defenses are strong enough to counter the
threat, and many attackers know that, so they go after suppliers. But of course they are
always trying to develop new ways to attack.”
-- Washington Post “Confidential report lists U.S. weapons system designs compromised
by Chinese cyberspies”, May 27, 2013
“When discussing the importance of information security we’ve probably
heard excuses such as “we’re too small to be a target” or “we don’t have
anything of value”, but if there is anything this report can teach us, is that
breaches can and do occur in organizations of all sizes and across a large
number of industries.”
-- TechRepublic speaking on the 2013 edition of Verizon’s Data Breach
Investigations Report (DBIR).
Windows 8 and 8.1Security Capabilities
First Class Biometric Experience
Multifactor Authentication for BYOD
Trustworthy Identities and Devices
Provable PC Health
Improved Windows Defender
Improved Internet Explorer
Pervasive Device Encryption
Selective Wipe of Corp Data
UEFI Modern Biometric Readers TPM
Universal Extensible Firmware Interface (UEFI)
Trusted Platform Module (TPM)
Key Improvements in Trustworthy Hardware
The Opportunity
• Improve security for Consumer and BYOD
• Leverage TPM in new way to address modern threats
History in Windows
• TPM is currently optional component in most devices
• Pervasive on commercial devices, and most tablets
Our Goal in Windows 8.1
• Drive adoption of InstantGo architecture with OEM’s
• Work with Intel to make PTT pervasive on all proc’s
• Add TPM requirement to 2015 Windows cert reqs
• Secure approval in regions such as Russia and China
What is UEFI?
• A modern replacement for traditional BIOS
• A Windows Certification Requirement (UEFI 2.3.1)
Key Benefits
• architecture-independent
• initializes device and enables operation (e.g.; mouse, apps)
Key Security Benefits:
• Secure Boot - Supported by Windows 8, Linux, …
• Encrypted Drive support for BitLocker
• Network unlock support for BitLocker
Modern Authenticators
Trustworthy Identities and Devices
Secure Access to Resources
Key Improvements in Modern Access Control
Securing the Code and Core
Securing the Boot
Securing After the Boot
Key Improvements in Malware Resistance
Pervasive Device Encryption
Selective Wipe of Corp Data
Key Improvements for Protecting Sensitive Data
Remote Business Data Removal is a platform feature
that:
• protects corporate data using Encrypting File System (EFS)
• enables IT to revoke access to corp data on managed and
unmanaged devices
• requires application support.
• Current applications that support RBDR:
• Mail
• WorkFolders
Data protection (FDE) is now considered a
fundamental OS feature
• Device Encryption included in all editions of Windows
• Prevents unauthorized access on lost or stolen devices
• enabled out of the box
• requires devices with InstantGo technology
• built on BitLocker tech; commercial grade protection
BitLocker
• provides additional configuration options and
management capabilities that are attractive to enterprises
• easy to deploy and available in Pro and Enterprise editions
• enterprise management available with MBAM
Windows 8 and 8.1 Security Capabilities
First Class Biometric Experience
Multifactor Authentication for BYOD
Trustworthy Identities and Devices
Provable PC Health
Improved Windows Defender
Improved Internet Explorer
Pervasive Device Encryption
Selective Wipe of Corp Data
UEFI Modern Biometric Readers TPM
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)

Más contenido relacionado

La actualidad más candente

Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
IS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data ProtectionCreatorsCircle
 
Bryley - mobility in the work place
Bryley  - mobility in the work placeBryley  - mobility in the work place
Bryley - mobility in the work placeBryley Systems Inc.
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Insights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for SuccessInsights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for SuccessWindham Brannon
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internetArthur Landry
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessPrecisely
 
Guardium
GuardiumGuardium
Guardiumgigamon
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Mobile Device Security Training
Mobile Device Security TrainingMobile Device Security Training
Mobile Device Security TrainingBryan Len
 
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
Unix / Linux Privilege Management: What a Financial Services CISO Cares AboutUnix / Linux Privilege Management: What a Financial Services CISO Cares About
Unix / Linux Privilege Management: What a Financial Services CISO Cares AboutBeyondTrust
 

La actualidad más candente (20)

Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
IS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions Company Presentation
IS Decisions Company Presentation
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Bryley - mobility in the work place
Bryley  - mobility in the work placeBryley  - mobility in the work place
Bryley - mobility in the work place
 
Password Problem - Solved!
Password Problem - Solved!Password Problem - Solved!
Password Problem - Solved!
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Insights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for SuccessInsights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for Success
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
Guardium
GuardiumGuardium
Guardium
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Mobile Device Security Training
Mobile Device Security TrainingMobile Device Security Training
Mobile Device Security Training
 
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
Unix / Linux Privilege Management: What a Financial Services CISO Cares AboutUnix / Linux Privilege Management: What a Financial Services CISO Cares About
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
 

Destacado

Who is Intergen?
Who is Intergen?Who is Intergen?
Who is Intergen?Intergen
 
Intergen Smarts 30 New Zealand (2012)
Intergen Smarts 30 New Zealand (2012)Intergen Smarts 30 New Zealand (2012)
Intergen Smarts 30 New Zealand (2012)Intergen
 
Dynamics Day 2014: Microsoft Dynamics CRM - Client Success Stories - Beef + Lamb
Dynamics Day 2014: Microsoft Dynamics CRM - Client Success Stories - Beef + LambDynamics Day 2014: Microsoft Dynamics CRM - Client Success Stories - Beef + Lamb
Dynamics Day 2014: Microsoft Dynamics CRM - Client Success Stories - Beef + LambIntergen
 
Intergen Smarts 12 (2006)
Intergen Smarts 12 (2006)Intergen Smarts 12 (2006)
Intergen Smarts 12 (2006)Intergen
 
Dynamics Day 2012: Deep Dive - Dynamics NAV 2013 client options
Dynamics Day 2012: Deep Dive - Dynamics NAV 2013 client optionsDynamics Day 2012: Deep Dive - Dynamics NAV 2013 client options
Dynamics Day 2012: Deep Dive - Dynamics NAV 2013 client optionsIntergen
 
CRM Anywhere: Improve Sales Mobility
CRM Anywhere: Improve Sales MobilityCRM Anywhere: Improve Sales Mobility
CRM Anywhere: Improve Sales MobilityIntergen
 
Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)Intergen
 
Signal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency managementSignal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency managementIntergen
 
Intergen Smarts 31 Australia (2013)
Intergen Smarts 31 Australia (2013)Intergen Smarts 31 Australia (2013)
Intergen Smarts 31 Australia (2013)Intergen
 
Windows Accelerate IT Pro Bootcamp: UE-V (Module 5 of 8)
Windows Accelerate IT Pro Bootcamp: UE-V (Module 5 of 8)Windows Accelerate IT Pro Bootcamp: UE-V (Module 5 of 8)
Windows Accelerate IT Pro Bootcamp: UE-V (Module 5 of 8)Intergen
 
SharePoint 2013 Insights
SharePoint 2013 InsightsSharePoint 2013 Insights
SharePoint 2013 InsightsIntergen
 
Dynamics Day 2014: Microsoft Dynamics CRM - Roadmap
Dynamics Day 2014: Microsoft Dynamics CRM - RoadmapDynamics Day 2014: Microsoft Dynamics CRM - Roadmap
Dynamics Day 2014: Microsoft Dynamics CRM - RoadmapIntergen
 
IT Projects Within a Strategy
IT Projects Within a StrategyIT Projects Within a Strategy
IT Projects Within a StrategyIntergen
 
The changing face of CRM
The changing face of CRMThe changing face of CRM
The changing face of CRMIntergen
 
TechEd AU 2014: Microsoft Azure DocumentDB Deep Dive
TechEd AU 2014: Microsoft Azure DocumentDB Deep DiveTechEd AU 2014: Microsoft Azure DocumentDB Deep Dive
TechEd AU 2014: Microsoft Azure DocumentDB Deep DiveIntergen
 
Dynamics Day 2014: Microsoft Dynamics NAV - Business Insight (Reporting and A...
Dynamics Day 2014: Microsoft Dynamics NAV - Business Insight (Reporting and A...Dynamics Day 2014: Microsoft Dynamics NAV - Business Insight (Reporting and A...
Dynamics Day 2014: Microsoft Dynamics NAV - Business Insight (Reporting and A...Intergen
 
Dynamics Day 2014: Microsoft Dynamics AX - Optimising Supply Chain
Dynamics Day 2014: Microsoft Dynamics AX - Optimising Supply ChainDynamics Day 2014: Microsoft Dynamics AX - Optimising Supply Chain
Dynamics Day 2014: Microsoft Dynamics AX - Optimising Supply ChainIntergen
 
Dynamics Day 2012: Dynamics AX Update and Roadmap
Dynamics Day 2012: Dynamics AX Update and RoadmapDynamics Day 2012: Dynamics AX Update and Roadmap
Dynamics Day 2012: Dynamics AX Update and RoadmapIntergen
 

Destacado (18)

Who is Intergen?
Who is Intergen?Who is Intergen?
Who is Intergen?
 
Intergen Smarts 30 New Zealand (2012)
Intergen Smarts 30 New Zealand (2012)Intergen Smarts 30 New Zealand (2012)
Intergen Smarts 30 New Zealand (2012)
 
Dynamics Day 2014: Microsoft Dynamics CRM - Client Success Stories - Beef + Lamb
Dynamics Day 2014: Microsoft Dynamics CRM - Client Success Stories - Beef + LambDynamics Day 2014: Microsoft Dynamics CRM - Client Success Stories - Beef + Lamb
Dynamics Day 2014: Microsoft Dynamics CRM - Client Success Stories - Beef + Lamb
 
Intergen Smarts 12 (2006)
Intergen Smarts 12 (2006)Intergen Smarts 12 (2006)
Intergen Smarts 12 (2006)
 
Dynamics Day 2012: Deep Dive - Dynamics NAV 2013 client options
Dynamics Day 2012: Deep Dive - Dynamics NAV 2013 client optionsDynamics Day 2012: Deep Dive - Dynamics NAV 2013 client options
Dynamics Day 2012: Deep Dive - Dynamics NAV 2013 client options
 
CRM Anywhere: Improve Sales Mobility
CRM Anywhere: Improve Sales MobilityCRM Anywhere: Improve Sales Mobility
CRM Anywhere: Improve Sales Mobility
 
Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)
 
Signal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency managementSignal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency management
 
Intergen Smarts 31 Australia (2013)
Intergen Smarts 31 Australia (2013)Intergen Smarts 31 Australia (2013)
Intergen Smarts 31 Australia (2013)
 
Windows Accelerate IT Pro Bootcamp: UE-V (Module 5 of 8)
Windows Accelerate IT Pro Bootcamp: UE-V (Module 5 of 8)Windows Accelerate IT Pro Bootcamp: UE-V (Module 5 of 8)
Windows Accelerate IT Pro Bootcamp: UE-V (Module 5 of 8)
 
SharePoint 2013 Insights
SharePoint 2013 InsightsSharePoint 2013 Insights
SharePoint 2013 Insights
 
Dynamics Day 2014: Microsoft Dynamics CRM - Roadmap
Dynamics Day 2014: Microsoft Dynamics CRM - RoadmapDynamics Day 2014: Microsoft Dynamics CRM - Roadmap
Dynamics Day 2014: Microsoft Dynamics CRM - Roadmap
 
IT Projects Within a Strategy
IT Projects Within a StrategyIT Projects Within a Strategy
IT Projects Within a Strategy
 
The changing face of CRM
The changing face of CRMThe changing face of CRM
The changing face of CRM
 
TechEd AU 2014: Microsoft Azure DocumentDB Deep Dive
TechEd AU 2014: Microsoft Azure DocumentDB Deep DiveTechEd AU 2014: Microsoft Azure DocumentDB Deep Dive
TechEd AU 2014: Microsoft Azure DocumentDB Deep Dive
 
Dynamics Day 2014: Microsoft Dynamics NAV - Business Insight (Reporting and A...
Dynamics Day 2014: Microsoft Dynamics NAV - Business Insight (Reporting and A...Dynamics Day 2014: Microsoft Dynamics NAV - Business Insight (Reporting and A...
Dynamics Day 2014: Microsoft Dynamics NAV - Business Insight (Reporting and A...
 
Dynamics Day 2014: Microsoft Dynamics AX - Optimising Supply Chain
Dynamics Day 2014: Microsoft Dynamics AX - Optimising Supply ChainDynamics Day 2014: Microsoft Dynamics AX - Optimising Supply Chain
Dynamics Day 2014: Microsoft Dynamics AX - Optimising Supply Chain
 
Dynamics Day 2012: Dynamics AX Update and Roadmap
Dynamics Day 2012: Dynamics AX Update and RoadmapDynamics Day 2012: Dynamics AX Update and Roadmap
Dynamics Day 2012: Dynamics AX Update and Roadmap
 

Similar a Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)

Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierCTE Solutions Inc.
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresAlexander Benoit
 
Trusted Computing _plate form_ model.ppt
Trusted Computing _plate form_ model.pptTrusted Computing _plate form_ model.ppt
Trusted Computing _plate form_ model.pptnaghamallella
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...Ulf Mattsson
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication Precisely
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessRobert Crane
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyMicrosoft Österreich
 
Microsoft on open source and security
Microsoft on open source and securityMicrosoft on open source and security
Microsoft on open source and securityDavid Voyles
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practiceteam-WIBU
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iPrecisely
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Alexander Benoit
 

Similar a Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8) (20)

Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
biometrics and cyber security
biometrics and cyber securitybiometrics and cyber security
biometrics and cyber security
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
 
Trusted Computing _plate form_ model.ppt
Trusted Computing _plate form_ model.pptTrusted Computing _plate form_ model.ppt
Trusted Computing _plate form_ model.ppt
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Microsoft on open source and security
Microsoft on open source and securityMicrosoft on open source and security
Microsoft on open source and security
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
 

Más de Intergen

Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...Intergen
 
Taming the feral Teams
Taming the feral TeamsTaming the feral Teams
Taming the feral TeamsIntergen
 
Customer Insights: It's time to get personal
Customer Insights: It's time to get personalCustomer Insights: It's time to get personal
Customer Insights: It's time to get personalIntergen
 
Working Remotely with Microsoft Technologies
Working Remotely with Microsoft TechnologiesWorking Remotely with Microsoft Technologies
Working Remotely with Microsoft TechnologiesIntergen
 
Intergen Convergence 2017 - Digital workplace
Intergen Convergence 2017 - Digital workplaceIntergen Convergence 2017 - Digital workplace
Intergen Convergence 2017 - Digital workplaceIntergen
 
Intergen Convergence 2017 - Customer engagement (Toyota)
Intergen Convergence 2017 - Customer engagement (Toyota)Intergen Convergence 2017 - Customer engagement (Toyota)
Intergen Convergence 2017 - Customer engagement (Toyota)Intergen
 
Intergen Convergence 2017 - Customer engagement (Green Cross Health)
Intergen Convergence 2017 - Customer engagement (Green Cross Health)Intergen Convergence 2017 - Customer engagement (Green Cross Health)
Intergen Convergence 2017 - Customer engagement (Green Cross Health)Intergen
 
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)Intergen
 
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...Intergen
 
Intergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journeyIntergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journeyIntergen
 
Intergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformationIntergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformationIntergen
 
Intergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterpriseIntergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterpriseIntergen
 
Intergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is hereIntergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is hereIntergen
 
Intergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safeIntergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safeIntergen
 
Intergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer EngagementIntergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer EngagementIntergen
 
Intergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important assetIntergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important assetIntergen
 
Intergen Interconnect
Intergen InterconnectIntergen Interconnect
Intergen InterconnectIntergen
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Dynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first lookDynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first lookIntergen
 
Dynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project ServiceDynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project ServiceIntergen
 

Más de Intergen (20)

Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...
 
Taming the feral Teams
Taming the feral TeamsTaming the feral Teams
Taming the feral Teams
 
Customer Insights: It's time to get personal
Customer Insights: It's time to get personalCustomer Insights: It's time to get personal
Customer Insights: It's time to get personal
 
Working Remotely with Microsoft Technologies
Working Remotely with Microsoft TechnologiesWorking Remotely with Microsoft Technologies
Working Remotely with Microsoft Technologies
 
Intergen Convergence 2017 - Digital workplace
Intergen Convergence 2017 - Digital workplaceIntergen Convergence 2017 - Digital workplace
Intergen Convergence 2017 - Digital workplace
 
Intergen Convergence 2017 - Customer engagement (Toyota)
Intergen Convergence 2017 - Customer engagement (Toyota)Intergen Convergence 2017 - Customer engagement (Toyota)
Intergen Convergence 2017 - Customer engagement (Toyota)
 
Intergen Convergence 2017 - Customer engagement (Green Cross Health)
Intergen Convergence 2017 - Customer engagement (Green Cross Health)Intergen Convergence 2017 - Customer engagement (Green Cross Health)
Intergen Convergence 2017 - Customer engagement (Green Cross Health)
 
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
 
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
 
Intergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journeyIntergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journey
 
Intergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformationIntergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformation
 
Intergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterpriseIntergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterprise
 
Intergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is hereIntergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is here
 
Intergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safeIntergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safe
 
Intergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer EngagementIntergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer Engagement
 
Intergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important assetIntergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important asset
 
Intergen Interconnect
Intergen InterconnectIntergen Interconnect
Intergen Interconnect
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Dynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first lookDynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first look
 
Dynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project ServiceDynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project Service
 

Último

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 

Último (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 

Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)

  • 1. Chris Hallum Senior Product Manager Windows 8.1 Security Advancements
  • 2.
  • 3. Key Threats • Passwords under attack • Digital identity theft and misuse • Signatures based AV unable to keep up • Digital signature tampering • Browser plug-in exploits • Data loss on BYOD devices Key Threats • Melissa (1999), Love Letter (2000) • Mainly leveraging social engineering Key Threats • Code Red and Nimda (2001), Blaster (2003), Slammer (2003) • 9/11 • Mainly exploiting buffer overflows • Script kiddies • Time from patch to exploit: Several days to weeks Key Threats • Zotob (2005) • Attacks «moving up the stack» (Summer of Office 0-day) • Rootkits • Exploitation of Buffer Overflows • Script Kiddies • Raise of Phishing • User running as Admin Key Threats • Organized Crime • Botnets • Identity Theft • Conficker (2008) • Time from patch to exploit: days Key Threats • Organized Crime, potential state actors • Sophisticated Targeted Attacks • Operation Aurora (2009) • Stuxnet (2010) Windows 8.1 • Touch Fingerprint Sensors • Improved Biometrics • TPM Key Attestation • Certificate Reputation • Improved Virtual Smartcards • Provable PC Health • Improved Windows Defender • Improved Internet Explorer • Device Encryption (All Editions) • Remote Business Data Removable Windows XP • Logon (Ctrl+Alt+Del) • Access Control • User Profiles • Security Policy • Encrypting File System (File Based) • Smartcard and PKI Support • Windows Update Windows XP SP2 • Address Space Layout Randomization (ASLR) • Data Execution Prevention (DEP) • Security Development Lifecycle (SDL) • Auto Update on by Default • Firewall on by Default • Windows Security Center • WPA Support Windows Vista • Bitlocker • Patchguard • Improved ASLR and DEP • Full SDL • User Account Control • Internet Explorer Smart Screen Filter • Digital Right Management • Firewall improvements • Signed Device Driver Requirements • TPM Support • Windows Integrity Levels • Secure “by default” configuration (Windows features and IE) Windows 7 • Improved ASLR and DEP • Full SDL • Improved IPSec stack • Managed Service Accounts • Improved User Account Control • Enhanced Auditing • Internet Explorer Smart Screen Filter • AppLocker • BitLocker to Go • Windows Biometric Service • Windows Action Center • Windows Defender Windows 8 • UEFI (Secure Boot) • Firmware Based TPM • Trusted Boot (w/ELAM) • Measured Boot and Remote Attestation Support • Significant Improvements to ASLR and DEP • AppContainer • TPM Key Protection • Windows Store • Internet Explorer 10 (Plugin-less and Enhanced Protected Modes) • Application Reputation moved into Core OS • BitLocker: Encrypted Hard Drive and Used Disk Space Only Encryption Support • Virtual Smartcard • Picture Password, PIN • Dynamic Access Control • Built-in Anti-Virus 20132001 2004 2007 2009 2012
  • 4. Windows 8 Security Capabilities
  • 5. The largest volume of security investments ever made in a single release of Windows have yielded great results.
  • 6. Those who realize they’ve been hacked. Those who haven’t yet realized they’ve been hacked.
  • 7. There are threats that are familiar and those that are modern.
  • 8. Script Kiddies; Cybercrime Cyber-espionage; Cyber-warfare Cybercriminals State sponsored actions; Unlimited resources Attacks on fortune 500 All sectors and even suppliers getting targeted Software solutions Hardware rooted trust the only way Secure the perimeter Assume breach. Protect at all levels Hoping I don‘t get hacked You will be hacked. Did I successfully mitigate? Familiar Modern Company owned and tightly managed devices Bring your own device, varied management
  • 9. “Commercial based antivirus and security products are designed for and focus on protecting you from prevalent classes of in the wild threats coming from criminals, thugs and digital mobsters (and it's a constant battle). It is not designed to protect you from the digital equivalent of Seal Team Six. So if you're the guy that finds himself in the crosshairs… you're not safe.” -- F-Secure “News from the Lab”, May 30, 2012 A Lockheed Martin official said the firm is “spending more time helping deal with attacks on the supply chain” of partners, subcontractors and suppliers than dealing with attacks directly against the company. “For now, our defenses are strong enough to counter the threat, and many attackers know that, so they go after suppliers. But of course they are always trying to develop new ways to attack.” -- Washington Post “Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies”, May 27, 2013 “When discussing the importance of information security we’ve probably heard excuses such as “we’re too small to be a target” or “we don’t have anything of value”, but if there is anything this report can teach us, is that breaches can and do occur in organizations of all sizes and across a large number of industries.” -- TechRepublic speaking on the 2013 edition of Verizon’s Data Breach Investigations Report (DBIR).
  • 10. Windows 8 and 8.1Security Capabilities First Class Biometric Experience Multifactor Authentication for BYOD Trustworthy Identities and Devices Provable PC Health Improved Windows Defender Improved Internet Explorer Pervasive Device Encryption Selective Wipe of Corp Data UEFI Modern Biometric Readers TPM
  • 11. Universal Extensible Firmware Interface (UEFI) Trusted Platform Module (TPM)
  • 12. Key Improvements in Trustworthy Hardware The Opportunity • Improve security for Consumer and BYOD • Leverage TPM in new way to address modern threats History in Windows • TPM is currently optional component in most devices • Pervasive on commercial devices, and most tablets Our Goal in Windows 8.1 • Drive adoption of InstantGo architecture with OEM’s • Work with Intel to make PTT pervasive on all proc’s • Add TPM requirement to 2015 Windows cert reqs • Secure approval in regions such as Russia and China What is UEFI? • A modern replacement for traditional BIOS • A Windows Certification Requirement (UEFI 2.3.1) Key Benefits • architecture-independent • initializes device and enables operation (e.g.; mouse, apps) Key Security Benefits: • Secure Boot - Supported by Windows 8, Linux, … • Encrypted Drive support for BitLocker • Network unlock support for BitLocker
  • 13. Modern Authenticators Trustworthy Identities and Devices Secure Access to Resources
  • 14. Key Improvements in Modern Access Control
  • 15. Securing the Code and Core Securing the Boot Securing After the Boot
  • 16. Key Improvements in Malware Resistance
  • 18. Key Improvements for Protecting Sensitive Data Remote Business Data Removal is a platform feature that: • protects corporate data using Encrypting File System (EFS) • enables IT to revoke access to corp data on managed and unmanaged devices • requires application support. • Current applications that support RBDR: • Mail • WorkFolders Data protection (FDE) is now considered a fundamental OS feature • Device Encryption included in all editions of Windows • Prevents unauthorized access on lost or stolen devices • enabled out of the box • requires devices with InstantGo technology • built on BitLocker tech; commercial grade protection BitLocker • provides additional configuration options and management capabilities that are attractive to enterprises • easy to deploy and available in Pro and Enterprise editions • enterprise management available with MBAM
  • 19. Windows 8 and 8.1 Security Capabilities First Class Biometric Experience Multifactor Authentication for BYOD Trustworthy Identities and Devices Provable PC Health Improved Windows Defender Improved Internet Explorer Pervasive Device Encryption Selective Wipe of Corp Data UEFI Modern Biometric Readers TPM

Notas del editor

  1. The reviews and feedback Windows 8 security have been great and we’ve received many accolades We have achieved many of our goals that we set out to achieve particularly in area of Malware Resistance Take a look at how much more secure you are on Windows 8 vs 7 and XP Windows XP is 21 times more likely to be infected by malware than Window 8 Windows 7 is 6 times more likely to be infected by malware than Window 8 We can conclude that these great numbers were direct result of technologies like UEFI, Trusted Boot, ASLR, DEP, SmartScreen just to name a few For customers who are wondering about the Vista numbers which are better than 7 our answer is that there was a very limited sample due to share, attackers aren’t targeting the platform, and because of this the numbers are skewed.
  2. As we worked on developing Windows 7 and increasingly so on 8 we began to see strong evidence that the likelihood of a organization being hacked had become more likely than not The statistics prove it. For instance the Verizon data breach report where surveyed customers provide information about the data breaches within their organizations had 60+% of the respondents admitting that they had been hacked. How many customers didn’t admit it or simply didn’t know? Hard to say… Regardless the numbers are high enough that we have come to believe that there are customers who realize they’ve been hacked and there are those that simply haven’t realized it yet.
  3. We’ve been talking about familiar threats forever now and with each version of Windows we’ve improved our capabilities to combat them But we’re starting to see that as Windows defenses becomes increasingly strong that new avenues of attack are being pursued and With it we foresee an entire new class of new attacks that will feel new and quite modern
  4. So lets compare and contrast the familiar vs the modern We’re all familiar with script kiddies and cybercrime but now were facing cyber espionage and warfare We’re all familiar with cyber criminals and thugs but now we’re talking about teams of full time hacker possible being funded by nation states We’re all familiar with software solutions to solve every security problem but now we’re facing threats where only hardware rooted trust is up to the task We’ve protected the perimeter to keep bad guys out but now they are getting in so you need to assume breach and proytect at all levels We’re familiar with attacks on big well known companies but now small businesses are in the crosshairs We used to own and tighly control all of the devices but now BYOD is going beyond mobile phones And finally we’re all familiar with hoping we don’t get hacked but the reality is that you will and it all comes down to how well you were able to limit your losses
  5. Here on this slide we have some great quote to help the points just made sink in The first quote here is from F-Secure in response to the Flame virus. They feel, and we agree, that the software that companies having been using to protect themselves isn’t good enough to protect them against the modern attacker who often times is the digital equivalent to Seal Team Six. Think about that. How do you defend against that kind of talent and backing behind it? The second quote is from the 2013 Verizon Data Breach report and in they show us that businesses of all sizes are being attacked. If you think your too small your wrong. If you’ve ever swiped a credit card, which is almost every business, your going to be target as there is a prolific black market to sell they credit card data. If you’re not worried about that think about what happens when the passwords from an another ecommerce site are hacked and now hackers have the passwords to your users accounts since more times than users use the same password everywhere they go. The third quote is from Lockheed and in it they’re telling us that they’re spending as much to protect their vendors, suppliers, contractors, etc as they are on protecting their own assets. Think about that for a minute. Why are they doing this? That’s because they know that if your doing biz with them, even if it’s making nuts and bolts, you’re going to be targeted as possibly they get to you through them.