Cyber Security - cip-asia.com

22
Cyber Security Microsoft Vision and How Microsoft Protect Itself from Cyber Attacks Prof Chris Peiris

Transcript of Cyber Security - cip-asia.com

Page 1: Cyber Security - cip-asia.com

Cyber Security

Microsoft Vision and How Microsoft Protect Itself from Cyber Attacks

Prof Chris Peiris

Page 2: Cyber Security - cip-asia.com

AgendaMicrosoft Vision on Cyber Security• Advance Persistent Threat (APT) and Zero days

• Microsoft Security Intelligence Report – Thailand

• Case studies : How Microsoft Protect its assets against Cyber Attacks

Cyber Security Solution Portfolio• Cyber Security Solution Introduction

• Solutions on Protecting, Detecting and Responding to Cyber threats

• Unique Microsoft IP that protects

• at the “Windows Kernel” level.

• Converts whole Windows Operating System into a sensor to detect attacks

• Solution Roadmap

• Case studies : How Executive Yuan protect Taiwan from Cyber Attacks

• Next steps and actions

Page 3: Cyber Security - cip-asia.com

Is the threat real to us?

Page 4: Cyber Security - cip-asia.com

http://www.creditcards.com/credit-card-news/credit-card-fraud-price-list-1282.php

Page 5: Cyber Security - cip-asia.com

Changing Threat Landscape –The numbers game

Page 6: Cyber Security - cip-asia.com

Source: Microsoft Security Intelligence Report & Verizon 2013 Data Breach Investigations Report

Page 7: Cyber Security - cip-asia.com

Is the threat real to Enterprises?

Page 8: Cyber Security - cip-asia.com

Security Intelligence Report

Page 9: Cyber Security - cip-asia.com

18+ billion420 million

35 billion messages/month

250 million Millions

Billions700 million

40 billion

Millions

Enterprise Risk Mitigation System

Leveraging Cyber Threat Intelligence

Page 10: Cyber Security - cip-asia.com

Malware trends in Thailand

Page 11: Cyber Security - cip-asia.com

Malware encounters and infectionsThailand

0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

3Q13 4Q13 1Q14 2Q14

En

cou

nte

r ra

te (

perc

en

t o

f all r

ep

ort

ing

co

mp

ute

rs)

Encounter rate

0

5

10

15

20

25

30

35

3Q13 4Q13 1Q14 2Q14

Co

mp

ute

rs c

lean

ed

per

1,0

00 s

can

ned

(C

CM

)

Infection rate

Thailand Worldwide

Page 12: Cyber Security - cip-asia.com

Top threat families by CCM in 2Q14Thailand

Family Most significant category CCM

1 Win32/Sality Worms & Viruses 5.1

2 Win32/Sefnit Trojans 4.1

3 Win32/Gamarue Worms & Viruses 3.5

4 Win32/Wysotot Trojans 1.8

5 MSIL/Bladabindi Backdoors 1.6

6 Win32/Ramnit Trojans 1.5

7 Win32/Nitol Other Malware 1.4

8 Win32/Pramro Trojans 0.9

9 VBS/Jenxcus Worms & Viruses 0.8

10 MSIL/Spacekito Trojans 0.6

Page 13: Cyber Security - cip-asia.com

Security Strategy Change

Perimeter Security DiD

Trust All Internal Assume Breach

Cyber Strategy

Page 14: Cyber Security - cip-asia.com

APT Firewall Network Anti Virus HW Fireeye

Win Kernel

Page 15: Cyber Security - cip-asia.com

How do we address these threats?

Microsoft Cyber Security Portfolio

Page 16: Cyber Security - cip-asia.com

Threat of not deploying the latest products

Security risks on desktops more than a decade ago don’t come close to today’s threat landscape

Protection against threats begins with modern software and hardware with the latest operating system

Windows XP is 6 x more likely

more likely than Windows 8

to be infected with malware than Windows 7

21xand

• Many companies don’t even think about upgrading an application which appears to function normally• Known, dangerous and exploitable security holes remain open on millions of PCs months and even

years after discovery and when updates are provided.• Software security flaws are a time bomb waiting to be detonated by a cybercriminal`

03.02.14

Page 17: Cyber Security - cip-asia.com

Cyber Security Services and Solutions Portfolio

Protect Enhanced Security Admin Environment (ESAE) Security Development Lifecycle Services (SDL) Microsoft Security Risk Assessment (MSRA)

Detect Microsoft Threat Detection Services (MTDS)

On Premise & Hosted Persistent Adversary Detection Service (PADS)

Respond Incident Response (IR)

Recover Tactical and Strategic Recovery Enterprise Security Strategy (CSA)

Identify

Protect

DetectRespond

Recover

Identify Active Directory Security Assessment (ADSA) Foundational Security Monitoring (FSM) Strategy/Cybersecurity Architect (CSA)

Page 18: Cyber Security - cip-asia.com

Case Study

How Taiwan Executive Yuan protects Taiwan from Cyber attacks

Page 19: Cyber Security - cip-asia.com

Security Improvement Program

Partitioning

Principles of a resilient architecture The overarching goal of a resilient architecture is to build a platform that can dynamically evolve in response to cyber threats and progressively adapt

to support the changing business mission. A resilient architecture incorporates design strategies, techniques and technologies that combine protective, detective, containment and recovery controls.

Microsoft Objective for Customer 1. Improve the resiliency and security maturity of credentials and information that supports Customers business critical platforms, enabling

continuity of operations whilst actively under attack. 2. Support Customer to achieve its organisational compliance outcomes.

Time

Objective Maturity

Level

Stage 1 Stage 2 Stage 3 Stage 4

ESAE AD # 1 Project

Adapt and deploy Tier 0 partitioning to a broader set of environments

Tier 0 - Broad (User & Services) privilege minimisation

Tier 2 - End point resilience – localised containment

Tier 1 – (Apps and Data) privilege minimisation and protection

Ongoing Assessments and Health Checks (Recurring Activity) – for measurement of progress, status and compliance activities

Training, organisation and operational change management

Advanced threat detection and monitoring

Architectural guidance, coordination, planning and risk management

Trusted identity and information services

Tier 0

Tier 2

Tier 1

Undefined and Inconsistent - Basic

Structured and Consistent -

Standardised

Integrated and Controlled - Rationalised

Basic

Standardised

Rationalised

Security Improvement Program

Page 20: Cyber Security - cip-asia.com

Contacts - Prof Chris Peiris Architect Lead – Public Sector Asia Pacific Japan @ Microsoft

- Leading sales and delivery capability for CyberSecurity solutions, Public Safety & National Security solutions and Government solutions.

- [email protected]

- +612 6122 4687

Speaker Profile- Thought leader in the “Enterprise Architecture” space.

- Authored 10 books (including topics on Cloud, Enterprise Architecture, SOA, WCF, Security, Web services, Java, IIS and Windows Server topics),

- 25+ technical articles and reviews

- Frequent speaker at 25+ leading industry conferences / events.

- 18+ years of IT experience with Enterprise clients

- Education – PhD on Cloud, IT Masters, Bach Accounting & Computing.

- Associate Professor (Adjunct) at University of Canberra as recognition of thought leadership on Cloud Computing and Enterprise Architecture.

Linked In Profile

www.ChrisPeiris.com

Page 21: Cyber Security - cip-asia.com

Questions and feedback?

Next Steps?• Cyber Security EBC in Redmond, USA

Page 22: Cyber Security - cip-asia.com

Links:

See Public Whitepapers: Determined Adversaries and Targeted Attacks (Oct 2012)

Microsoft Security Intelligence Report, Jan-June 2012, vol 13, section “Defending Against Pass-the-Hash Attacks”

Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques (Dec 2012),with step-by-step instructions in Appendix A

Securing Active Directory: An Overview of Best Practices (Apr 2013)http://technet.microsoft.com/en-us/library/dn205220.aspx