Case Studies in Public Private Partnership Click to edit Master text styles – Second level Third level – Fourth level Fifth level Cheri McGuire Principal Security Strategist Trustworthy Computing Critical Infrastructure Protection Microsoft's Critical Infrastructure Protection Program Click to edit Master text styles – Second level Third level – Fourth level Fifth level Drive strategic ecosystem and internal change that enhances critical infrastructure security and resiliency, builds trust and alignment of action with governments and critical infrastructure providers. Critical Infrastructure Protection The World Today Click to edit Master text styles – Second level Third level – Fourth level Fifth level Instant Messenger traffic – one day in June 2006 Almost 1 billion different sessions with more than 7 billion IM messages sent Aproximately 93 million users logged in with 64 million different users becoming engaged in conversations Approximately 1.5 million new users that were not registered within Microsoft Messenger were invited to join Planetary‐ Planetary‐Scale Views on a Large Instant‐ Scale Views on a Large Instant‐Messaging Network Jure Leskovec Carnegie Mellon University and Erik Horvitz Microsoft Research Jure Leskovec Carnegie Mellon University and Erik Horvitz Microsoft Research Critical Infrastructure Protection Threat Trends Exponential Growth of IDs Increasingly Sophisticated Malware Identity and access management challenging Anti‐ Anti‐malware alone is not sufficient Number of variants from over 7,000 malware families (1H07) Number of Digital IDs B2C styles Click to edit MasterB2Etext – Second level Third level Internet – Fourth level Client/server Fifth level Mainframe B2B Mobility Pre‐ Pre‐1980s 1980s 1990s 2000s Crime On The Rise Attacks Getting More Sophisticated Traditional defenses are inadequate Largest segment by $ spent on defense National Interest Source: Microsoft Security Intelligence Report (January – June 2007) Largest area by $ lost Spy Fastest growing segment Thief Personal Gain GUI Applications Drivers Trespasser Personal Fame User O/S Vandal Curiosity Largest area by Author volume Examples: • Spyware • Rootkits • Application attacks • Phishing/Social engineering Hardware Physical Script‐ Script‐Kiddy Amateur Expert Specialist Critical Infrastructure Protection CIIP Partnership Fundamentals Click to edit Master text styles Embraces – Secondcore levelaspects of terms "public-private" and "partnership" Third Provides the level structure, processes, and environment for "Trusted – Fourth level Collaboration" Fifth Aligns industry and level government requirements, priorities, goals and objectives Flexible and adaptable to address changing risk landscape Provides value for both government and industry members Focuses on continual improvement and assessment of lessons learned Critical Infrastructure Protection International Partnerships International Click to edit Telecommunication Master text styles Union -– Second Member of the ITU’s Development Sector to build cyber security level - capacity and promote effective risk management skills Third level Contributed to report for national administrations with a – Fourth level for addressing cybersecurity at the management framework national level and for organizing and implementing a national Fifth level cybersecurity strategy International Botnet Task Force - - Dedicated to sharing information about botnets, including intelligence, technical details, and strategies in order to combat the botnet problems Includes 130 law enforcement participants from over 30 countries, and 50 industry participants from over 40 private companies Critical Infrastructure Protection National-level Partnerships Japan Japan Computer Emergency Click to edit Master text styles Response Team Coordination Center – Second level National Infrastructure Security Third level Center – Fourth level Fifth level Australia Infrastructure Assurance Advisory Group United Kingdom Centre for the Protection of National Infrastructure Vendor Security Information Exchange United States Critical Infrastructure Partnership Advisory Council Network Security and Information Exchange National Security Telecommunications Advisory Committee Critical Infrastructure Protection Private Sector Partnerships Click to edit Master text styles – Second level Third level – Fourth level Industry Consortium for Fifth level Advancement of Security on the Internet Enhances the global security landscape by driving excellence and innovation in security response practices Enables its members to proactively collaborate to analyze, mitigate, and resolve multi‐vendor, global security challenges Software Assurance Forum for Excellence in Code Dedicated to increasing trust in ICT products and services through the advancement of proven software assurance methods Paper released tomorrow: Fundamental Practices for Secure Software Development: A Guide to the Most Common and Effective Secure Development Practices in Use Today Critical Infrastructure Protection Resources Critical Infrastructure Resiliency Exercise Guide cipteam@microsoft.com Click to edit Master text styles Security Intelligence Report – Second level http://www.microsoft.com/downloads/Search.aspx?displaylang=en# Third level Security Cooperation Program – Fourth level http://www.microsoft.com/Industry/government/scp.mspx Fifth level Microsoft Security Response Center secure@microsoft.com SAFECode www.safecode.org ICASI www.icasi.org My Contact Information: Cheri McGuire – cheri.mcguire@microsoft.com Critical Infrastructure Protection Click to edit Master text styles – Second level Third level – Fourth level Fifth level © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. Critical Infrastructure Protection