1. Trust, Security, and ResiliencyEmpowering the Information Society Angela McKay Senior Security Strategist Lead Global Security Strategy and Diplomacy Trustworthy Computing
2. Understanding the Cyber Threat Challenges Many malicious actors Similar techniques Many motives Shared integrated domain Consequences hard to predict Worst case scenarios alarming Attribution
3. Cyber Threat Categories & Solutions Economic Espionage Cybercrime Cyber Warfare Military Espionage www.microsoft.com/downloadRethinking the Cyber Threat by Scott Charney
4. Trust Trust in the Info Society Reputation Establishment Mechanisms to uniquely identify, authenticate, and establish trust Revocation Mechanisms for revoking claims Identity Minimal Disclosure Mechanisms to limit information revealed to only what is essential for the transaction Broker-mediated Disclosure Mechanisms enabling trusted 3rd-parties to minimize data shared Privacy
5. Trust Enabling Interoperability Microsoft has released portions of the U-Prove technology to the open source community, customers, developers and the industry, in order to gather feedback. The following are available now: Two specifications published under the Microsoft Open Specification Promise, making the technology and guidance available to a broad audience of commercial and open source developers Open source software developer kits in C# and Java software developer kits available under the Berkley Software Distribution license A Community Technology Preview of U-Prove, providing integration with Active Directory Federation Services 2.0, Windows Identity Foundation and Windows CardSpace v2
26. Resiliency Microsoft Programs Training - Security Cooperation Program (SCP) Rapid Response Communications – SCPCert Defensive Security Information – Defensive Information Sharing Program (DISP) Policy Guidance – Critical Infrastructure Partner Program www.microsoft.com/industry/publicsector/government/programs/default.mspx