SlideShare a Scribd company logo
Chris Hallum
Senior Product Manager
Windows 8.1
Security Advancements
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)
Key Threats
• Passwords under attack
• Digital identity theft and
misuse
• Signatures based AV unable
to keep up
• Digital signature tampering
• Browser plug-in exploits
• Data loss on BYOD devices
Key Threats
• Melissa (1999), Love Letter
(2000)
• Mainly leveraging social
engineering
Key Threats
• Code Red and Nimda
(2001), Blaster (2003),
Slammer (2003)
• 9/11
• Mainly exploiting buffer
overflows
• Script kiddies
• Time from patch to exploit:
Several days to weeks
Key Threats
• Zotob (2005)
• Attacks «moving up the
stack» (Summer of Office
0-day)
• Rootkits
• Exploitation of Buffer
Overflows
• Script Kiddies
• Raise of Phishing
• User running as Admin
Key Threats
• Organized Crime
• Botnets
• Identity Theft
• Conficker (2008)
• Time from patch to exploit:
days
Key Threats
• Organized Crime, potential
state actors
• Sophisticated Targeted
Attacks
• Operation Aurora (2009)
• Stuxnet (2010)
Windows 8.1
• Touch Fingerprint Sensors
• Improved Biometrics
• TPM Key Attestation
• Certificate Reputation
• Improved Virtual
Smartcards
• Provable PC Health
• Improved Windows
Defender
• Improved Internet Explorer
• Device Encryption (All
Editions)
• Remote Business Data
Removable
Windows XP
• Logon (Ctrl+Alt+Del)
• Access Control
• User Profiles
• Security Policy
• Encrypting File System (File
Based)
• Smartcard and PKI Support
• Windows Update
Windows XP SP2
• Address Space Layout
Randomization (ASLR)
• Data Execution Prevention
(DEP)
• Security Development
Lifecycle (SDL)
• Auto Update on by Default
• Firewall on by Default
• Windows Security Center
• WPA Support
Windows Vista
• Bitlocker
• Patchguard
• Improved ASLR and DEP
• Full SDL
• User Account Control
• Internet Explorer Smart
Screen Filter
• Digital Right Management
• Firewall improvements
• Signed Device Driver
Requirements
• TPM Support
• Windows Integrity Levels
• Secure “by default”
configuration (Windows
features and IE)
Windows 7
• Improved ASLR and DEP
• Full SDL
• Improved IPSec stack
• Managed Service Accounts
• Improved User Account
Control
• Enhanced Auditing
• Internet Explorer Smart
Screen Filter
• AppLocker
• BitLocker to Go
• Windows Biometric Service
• Windows Action Center
• Windows Defender
Windows 8
• UEFI (Secure Boot)
• Firmware Based TPM
• Trusted Boot (w/ELAM)
• Measured Boot and
Remote Attestation
Support
• Significant Improvements
to ASLR and DEP
• AppContainer
• TPM Key Protection
• Windows Store
• Internet Explorer 10
(Plugin-less and Enhanced
Protected Modes)
• Application Reputation
moved into Core OS
• BitLocker: Encrypted Hard
Drive and Used Disk Space
Only Encryption Support
• Virtual Smartcard
• Picture Password, PIN
• Dynamic Access Control
• Built-in Anti-Virus
20132001 2004 2007 2009 2012
Windows 8 Security Capabilities
The largest volume of security investments ever made in a single release of
Windows have yielded great results.
Those who realize they’ve been hacked.
Those who haven’t yet realized they’ve been hacked.
There are threats that are familiar
and those that are modern.
Script Kiddies; Cybercrime Cyber-espionage; Cyber-warfare
Cybercriminals State sponsored actions; Unlimited resources
Attacks on fortune 500 All sectors and even suppliers getting targeted
Software solutions Hardware rooted trust the only way
Secure the perimeter Assume breach. Protect at all levels
Hoping I don‘t get hacked You will be hacked. Did I successfully mitigate?
Familiar Modern
Company owned and tightly managed devices Bring your own device, varied management
“Commercial based antivirus and security products are designed for and focus on
protecting you from prevalent classes of in the wild threats coming from criminals, thugs
and digital mobsters (and it's a constant battle). It is not designed to protect you from
the digital equivalent of Seal Team Six. So if you're the guy that finds himself in the
crosshairs… you're not safe.”
-- F-Secure “News from the Lab”, May 30, 2012
A Lockheed Martin official said the firm is “spending more time helping deal with attacks
on the supply chain” of partners, subcontractors and suppliers than dealing with attacks
directly against the company. “For now, our defenses are strong enough to counter the
threat, and many attackers know that, so they go after suppliers. But of course they are
always trying to develop new ways to attack.”
-- Washington Post “Confidential report lists U.S. weapons system designs compromised
by Chinese cyberspies”, May 27, 2013
“When discussing the importance of information security we’ve probably
heard excuses such as “we’re too small to be a target” or “we don’t have
anything of value”, but if there is anything this report can teach us, is that
breaches can and do occur in organizations of all sizes and across a large
number of industries.”
-- TechRepublic speaking on the 2013 edition of Verizon’s Data Breach
Investigations Report (DBIR).
Windows 8 and 8.1Security Capabilities
First Class Biometric Experience
Multifactor Authentication for BYOD
Trustworthy Identities and Devices
Provable PC Health
Improved Windows Defender
Improved Internet Explorer
Pervasive Device Encryption
Selective Wipe of Corp Data
UEFI Modern Biometric Readers TPM
Universal Extensible Firmware Interface (UEFI)
Trusted Platform Module (TPM)
Key Improvements in Trustworthy Hardware
The Opportunity
• Improve security for Consumer and BYOD
• Leverage TPM in new way to address modern threats
History in Windows
• TPM is currently optional component in most devices
• Pervasive on commercial devices, and most tablets
Our Goal in Windows 8.1
• Drive adoption of InstantGo architecture with OEM’s
• Work with Intel to make PTT pervasive on all proc’s
• Add TPM requirement to 2015 Windows cert reqs
• Secure approval in regions such as Russia and China
What is UEFI?
• A modern replacement for traditional BIOS
• A Windows Certification Requirement (UEFI 2.3.1)
Key Benefits
• architecture-independent
• initializes device and enables operation (e.g.; mouse, apps)
Key Security Benefits:
• Secure Boot - Supported by Windows 8, Linux, …
• Encrypted Drive support for BitLocker
• Network unlock support for BitLocker
Modern Authenticators
Trustworthy Identities and Devices
Secure Access to Resources
Key Improvements in Modern Access Control
Securing the Code and Core
Securing the Boot
Securing After the Boot
Key Improvements in Malware Resistance
Pervasive Device Encryption
Selective Wipe of Corp Data
Key Improvements for Protecting Sensitive Data
Remote Business Data Removal is a platform feature
that:
• protects corporate data using Encrypting File System (EFS)
• enables IT to revoke access to corp data on managed and
unmanaged devices
• requires application support.
• Current applications that support RBDR:
• Mail
• WorkFolders
Data protection (FDE) is now considered a
fundamental OS feature
• Device Encryption included in all editions of Windows
• Prevents unauthorized access on lost or stolen devices
• enabled out of the box
• requires devices with InstantGo technology
• built on BitLocker tech; commercial grade protection
BitLocker
• provides additional configuration options and
management capabilities that are attractive to enterprises
• easy to deploy and available in Pro and Enterprise editions
• enterprise management available with MBAM
Windows 8 and 8.1 Security Capabilities
First Class Biometric Experience
Multifactor Authentication for BYOD
Trustworthy Identities and Devices
Provable PC Health
Improved Windows Defender
Improved Internet Explorer
Pervasive Device Encryption
Selective Wipe of Corp Data
UEFI Modern Biometric Readers TPM
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)

More Related Content

PDF
2012 12-04 --ncc_group_-_mobile_threat_war_room
PDF
Design%20Considerations%20for%20Mobile%20Security[1]
PDF
Solving problems with authentication
PPTX
​Understanding the Internet of Things
PDF
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
PPTX
Understanding passwordless technologies
PDF
2012 State of Mobile Survey Global Key Findings
PDF
Windows 10: Security Focus (part II)
2012 12-04 --ncc_group_-_mobile_threat_war_room
Design%20Considerations%20for%20Mobile%20Security[1]
Solving problems with authentication
​Understanding the Internet of Things
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
Understanding passwordless technologies
2012 State of Mobile Survey Global Key Findings
Windows 10: Security Focus (part II)

What's hot (20)

PDF
Mobile Security for Smartphones and Tablets
PPTX
IS Decisions Company Presentation
PPTX
Mobile application securitry risks ISACA Silicon Valley 2012
PPTX
Mobile Application Security
PPTX
2015 Endpoint and Mobile Security Buyers Guide
PDF
Mobile Security
PPT
Marcos de Pedro Neoris authenware_cybersecurity step1
PPT
Personal Data Protection
PPTX
Bryley - mobility in the work place
PPTX
Password Problem - Solved!
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PPTX
Insights 2015 - Cybersecurity- Game Planning for Success
PDF
Symantec Mobile Security Whitepaper June 2011
PPTX
Staying safe on the internet
PDF
Protecting Your Business from Unauthorized IBM i Access
PPT
Guardium
PDF
2010: Mobile Security - Intense overview
PPTX
Mobile Security for the Enterprise
PPTX
Mobile Device Security Training
PDF
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
Mobile Security for Smartphones and Tablets
IS Decisions Company Presentation
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile Application Security
2015 Endpoint and Mobile Security Buyers Guide
Mobile Security
Marcos de Pedro Neoris authenware_cybersecurity step1
Personal Data Protection
Bryley - mobility in the work place
Password Problem - Solved!
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Insights 2015 - Cybersecurity- Game Planning for Success
Symantec Mobile Security Whitepaper June 2011
Staying safe on the internet
Protecting Your Business from Unauthorized IBM i Access
Guardium
2010: Mobile Security - Intense overview
Mobile Security for the Enterprise
Mobile Device Security Training
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
Ad

Viewers also liked (18)

PPTX
Who is Intergen?
PDF
Intergen Smarts 30 New Zealand (2012)
PPTX
Dynamics Day 2014: Microsoft Dynamics CRM - Client Success Stories - Beef + Lamb
PDF
Intergen Smarts 12 (2006)
PDF
Dynamics Day 2012: Deep Dive - Dynamics NAV 2013 client options
PDF
CRM Anywhere: Improve Sales Mobility
PDF
Intergen Smarts 9 (2005)
PDF
Signal - social media, considerations for public safety and emergency management
PDF
Intergen Smarts 31 Australia (2013)
PPTX
Windows Accelerate IT Pro Bootcamp: UE-V (Module 5 of 8)
PDF
SharePoint 2013 Insights
PPTX
Dynamics Day 2014: Microsoft Dynamics CRM - Roadmap
PPTX
IT Projects Within a Strategy
PDF
The changing face of CRM
PPTX
TechEd AU 2014: Microsoft Azure DocumentDB Deep Dive
PPTX
Dynamics Day 2014: Microsoft Dynamics NAV - Business Insight (Reporting and A...
PPTX
Dynamics Day 2014: Microsoft Dynamics AX - Optimising Supply Chain
PDF
Dynamics Day 2012: Dynamics AX Update and Roadmap
Who is Intergen?
Intergen Smarts 30 New Zealand (2012)
Dynamics Day 2014: Microsoft Dynamics CRM - Client Success Stories - Beef + Lamb
Intergen Smarts 12 (2006)
Dynamics Day 2012: Deep Dive - Dynamics NAV 2013 client options
CRM Anywhere: Improve Sales Mobility
Intergen Smarts 9 (2005)
Signal - social media, considerations for public safety and emergency management
Intergen Smarts 31 Australia (2013)
Windows Accelerate IT Pro Bootcamp: UE-V (Module 5 of 8)
SharePoint 2013 Insights
Dynamics Day 2014: Microsoft Dynamics CRM - Roadmap
IT Projects Within a Strategy
The changing face of CRM
TechEd AU 2014: Microsoft Azure DocumentDB Deep Dive
Dynamics Day 2014: Microsoft Dynamics NAV - Business Insight (Reporting and A...
Dynamics Day 2014: Microsoft Dynamics AX - Optimising Supply Chain
Dynamics Day 2012: Dynamics AX Update and Roadmap
Ad

Similar to Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8) (20)

PDF
Windows 10: Windows 10 de ITPros a ITPros
PPTX
Microsoft on open source and security
PDF
Session 1: Windows 8 with Gerry Tessier
PDF
Smau Milano 2016 - Paola Presutto, Microsoft
PDF
Cyber security-briefing-presentation
PDF
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
PDF
Windows 8 Security Free eBook
PPTX
Windows 8 security eCore
PDF
Beveilig je data met windows 10
PPS
Microsoft (Data Protection Solutions)
PPTX
La sécurité de l'emploi : protégez votre SI
PDF
Disrupt Hackers With Robust User Authentication
PDF
CSF18 - BitLocker Deep Dive - Sami Laiho
PDF
Security Lock Down Your Computer Like the National Security Agency (NSA)
PDF
CNIT 123 Ch 8: OS Vulnerabilities
PPSX
Vista Presentation
PDF
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
PDF
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
PPTX
Securing embedded systems
PPT
A Critical Analysis of Microsoft Data Protection Solutions
Windows 10: Windows 10 de ITPros a ITPros
Microsoft on open source and security
Session 1: Windows 8 with Gerry Tessier
Smau Milano 2016 - Paola Presutto, Microsoft
Cyber security-briefing-presentation
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Windows 8 Security Free eBook
Windows 8 security eCore
Beveilig je data met windows 10
Microsoft (Data Protection Solutions)
La sécurité de l'emploi : protégez votre SI
Disrupt Hackers With Robust User Authentication
CSF18 - BitLocker Deep Dive - Sami Laiho
Security Lock Down Your Computer Like the National Security Agency (NSA)
CNIT 123 Ch 8: OS Vulnerabilities
Vista Presentation
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Securing embedded systems
A Critical Analysis of Microsoft Data Protection Solutions

More from Intergen (20)

PDF
Creating intelligent content: How to automate personalised, one-to-one market...
PPTX
Taming the feral Teams
PPTX
Customer Insights: It's time to get personal
PPTX
Working Remotely with Microsoft Technologies
PPTX
Intergen Convergence 2017 - Digital workplace
PPTX
Intergen Convergence 2017 - Customer engagement (Toyota)
PPTX
Intergen Convergence 2017 - Customer engagement (Green Cross Health)
PPTX
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
PPTX
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
PPTX
Intergen Convergence 2017 - Bringing your people on the change journey
PPTX
Intergen Convergence 2017 - Why digital transformation
PPTX
Intergen Convergence 2017 - Unleash your digital enterprise
PPTX
Intergen Convergence 2017 - The future is here
PPTX
Intergen Convergence 2017 - Keeping safe, staying safe
PPTX
Intergen Convergence 2017 - Customer Engagement
PPTX
Intergen Convergence 2017 - Data as your most important asset
PDF
Intergen Interconnect
PPTX
Your cyber security webinar
PPTX
Dynamics Day 2016: Microsoft Dynamics 365 first look
PPTX
Dynamics Day 2016: CRM Field Service and Project Service
Creating intelligent content: How to automate personalised, one-to-one market...
Taming the feral Teams
Customer Insights: It's time to get personal
Working Remotely with Microsoft Technologies
Intergen Convergence 2017 - Digital workplace
Intergen Convergence 2017 - Customer engagement (Toyota)
Intergen Convergence 2017 - Customer engagement (Green Cross Health)
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - The future is here
Intergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Data as your most important asset
Intergen Interconnect
Your cyber security webinar
Dynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: CRM Field Service and Project Service

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
KodekX | Application Modernization Development
PPTX
Spectroscopy.pptx food analysis technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation theory and applications.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Cloud computing and distributed systems.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Encapsulation_ Review paper, used for researhc scholars
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Understanding_Digital_Forensics_Presentation.pptx
KodekX | Application Modernization Development
Spectroscopy.pptx food analysis technology
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation theory and applications.pdf
Programs and apps: productivity, graphics, security and other tools
The AUB Centre for AI in Media Proposal.docx
Cloud computing and distributed systems.

Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)

  • 1. Chris Hallum Senior Product Manager Windows 8.1 Security Advancements
  • 3. Key Threats • Passwords under attack • Digital identity theft and misuse • Signatures based AV unable to keep up • Digital signature tampering • Browser plug-in exploits • Data loss on BYOD devices Key Threats • Melissa (1999), Love Letter (2000) • Mainly leveraging social engineering Key Threats • Code Red and Nimda (2001), Blaster (2003), Slammer (2003) • 9/11 • Mainly exploiting buffer overflows • Script kiddies • Time from patch to exploit: Several days to weeks Key Threats • Zotob (2005) • Attacks «moving up the stack» (Summer of Office 0-day) • Rootkits • Exploitation of Buffer Overflows • Script Kiddies • Raise of Phishing • User running as Admin Key Threats • Organized Crime • Botnets • Identity Theft • Conficker (2008) • Time from patch to exploit: days Key Threats • Organized Crime, potential state actors • Sophisticated Targeted Attacks • Operation Aurora (2009) • Stuxnet (2010) Windows 8.1 • Touch Fingerprint Sensors • Improved Biometrics • TPM Key Attestation • Certificate Reputation • Improved Virtual Smartcards • Provable PC Health • Improved Windows Defender • Improved Internet Explorer • Device Encryption (All Editions) • Remote Business Data Removable Windows XP • Logon (Ctrl+Alt+Del) • Access Control • User Profiles • Security Policy • Encrypting File System (File Based) • Smartcard and PKI Support • Windows Update Windows XP SP2 • Address Space Layout Randomization (ASLR) • Data Execution Prevention (DEP) • Security Development Lifecycle (SDL) • Auto Update on by Default • Firewall on by Default • Windows Security Center • WPA Support Windows Vista • Bitlocker • Patchguard • Improved ASLR and DEP • Full SDL • User Account Control • Internet Explorer Smart Screen Filter • Digital Right Management • Firewall improvements • Signed Device Driver Requirements • TPM Support • Windows Integrity Levels • Secure “by default” configuration (Windows features and IE) Windows 7 • Improved ASLR and DEP • Full SDL • Improved IPSec stack • Managed Service Accounts • Improved User Account Control • Enhanced Auditing • Internet Explorer Smart Screen Filter • AppLocker • BitLocker to Go • Windows Biometric Service • Windows Action Center • Windows Defender Windows 8 • UEFI (Secure Boot) • Firmware Based TPM • Trusted Boot (w/ELAM) • Measured Boot and Remote Attestation Support • Significant Improvements to ASLR and DEP • AppContainer • TPM Key Protection • Windows Store • Internet Explorer 10 (Plugin-less and Enhanced Protected Modes) • Application Reputation moved into Core OS • BitLocker: Encrypted Hard Drive and Used Disk Space Only Encryption Support • Virtual Smartcard • Picture Password, PIN • Dynamic Access Control • Built-in Anti-Virus 20132001 2004 2007 2009 2012
  • 4. Windows 8 Security Capabilities
  • 5. The largest volume of security investments ever made in a single release of Windows have yielded great results.
  • 6. Those who realize they’ve been hacked. Those who haven’t yet realized they’ve been hacked.
  • 7. There are threats that are familiar and those that are modern.
  • 8. Script Kiddies; Cybercrime Cyber-espionage; Cyber-warfare Cybercriminals State sponsored actions; Unlimited resources Attacks on fortune 500 All sectors and even suppliers getting targeted Software solutions Hardware rooted trust the only way Secure the perimeter Assume breach. Protect at all levels Hoping I don‘t get hacked You will be hacked. Did I successfully mitigate? Familiar Modern Company owned and tightly managed devices Bring your own device, varied management
  • 9. “Commercial based antivirus and security products are designed for and focus on protecting you from prevalent classes of in the wild threats coming from criminals, thugs and digital mobsters (and it's a constant battle). It is not designed to protect you from the digital equivalent of Seal Team Six. So if you're the guy that finds himself in the crosshairs… you're not safe.” -- F-Secure “News from the Lab”, May 30, 2012 A Lockheed Martin official said the firm is “spending more time helping deal with attacks on the supply chain” of partners, subcontractors and suppliers than dealing with attacks directly against the company. “For now, our defenses are strong enough to counter the threat, and many attackers know that, so they go after suppliers. But of course they are always trying to develop new ways to attack.” -- Washington Post “Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies”, May 27, 2013 “When discussing the importance of information security we’ve probably heard excuses such as “we’re too small to be a target” or “we don’t have anything of value”, but if there is anything this report can teach us, is that breaches can and do occur in organizations of all sizes and across a large number of industries.” -- TechRepublic speaking on the 2013 edition of Verizon’s Data Breach Investigations Report (DBIR).
  • 10. Windows 8 and 8.1Security Capabilities First Class Biometric Experience Multifactor Authentication for BYOD Trustworthy Identities and Devices Provable PC Health Improved Windows Defender Improved Internet Explorer Pervasive Device Encryption Selective Wipe of Corp Data UEFI Modern Biometric Readers TPM
  • 11. Universal Extensible Firmware Interface (UEFI) Trusted Platform Module (TPM)
  • 12. Key Improvements in Trustworthy Hardware The Opportunity • Improve security for Consumer and BYOD • Leverage TPM in new way to address modern threats History in Windows • TPM is currently optional component in most devices • Pervasive on commercial devices, and most tablets Our Goal in Windows 8.1 • Drive adoption of InstantGo architecture with OEM’s • Work with Intel to make PTT pervasive on all proc’s • Add TPM requirement to 2015 Windows cert reqs • Secure approval in regions such as Russia and China What is UEFI? • A modern replacement for traditional BIOS • A Windows Certification Requirement (UEFI 2.3.1) Key Benefits • architecture-independent • initializes device and enables operation (e.g.; mouse, apps) Key Security Benefits: • Secure Boot - Supported by Windows 8, Linux, … • Encrypted Drive support for BitLocker • Network unlock support for BitLocker
  • 13. Modern Authenticators Trustworthy Identities and Devices Secure Access to Resources
  • 14. Key Improvements in Modern Access Control
  • 15. Securing the Code and Core Securing the Boot Securing After the Boot
  • 16. Key Improvements in Malware Resistance
  • 18. Key Improvements for Protecting Sensitive Data Remote Business Data Removal is a platform feature that: • protects corporate data using Encrypting File System (EFS) • enables IT to revoke access to corp data on managed and unmanaged devices • requires application support. • Current applications that support RBDR: • Mail • WorkFolders Data protection (FDE) is now considered a fundamental OS feature • Device Encryption included in all editions of Windows • Prevents unauthorized access on lost or stolen devices • enabled out of the box • requires devices with InstantGo technology • built on BitLocker tech; commercial grade protection BitLocker • provides additional configuration options and management capabilities that are attractive to enterprises • easy to deploy and available in Pro and Enterprise editions • enterprise management available with MBAM
  • 19. Windows 8 and 8.1 Security Capabilities First Class Biometric Experience Multifactor Authentication for BYOD Trustworthy Identities and Devices Provable PC Health Improved Windows Defender Improved Internet Explorer Pervasive Device Encryption Selective Wipe of Corp Data UEFI Modern Biometric Readers TPM

Editor's Notes

  • #6: The reviews and feedback Windows 8 security have been great and we’ve received many accolades We have achieved many of our goals that we set out to achieve particularly in area of Malware Resistance Take a look at how much more secure you are on Windows 8 vs 7 and XP Windows XP is 21 times more likely to be infected by malware than Window 8 Windows 7 is 6 times more likely to be infected by malware than Window 8 We can conclude that these great numbers were direct result of technologies like UEFI, Trusted Boot, ASLR, DEP, SmartScreen just to name a few For customers who are wondering about the Vista numbers which are better than 7 our answer is that there was a very limited sample due to share, attackers aren’t targeting the platform, and because of this the numbers are skewed.
  • #7: As we worked on developing Windows 7 and increasingly so on 8 we began to see strong evidence that the likelihood of a organization being hacked had become more likely than not The statistics prove it. For instance the Verizon data breach report where surveyed customers provide information about the data breaches within their organizations had 60+% of the respondents admitting that they had been hacked. How many customers didn’t admit it or simply didn’t know? Hard to say… Regardless the numbers are high enough that we have come to believe that there are customers who realize they’ve been hacked and there are those that simply haven’t realized it yet.
  • #8: We’ve been talking about familiar threats forever now and with each version of Windows we’ve improved our capabilities to combat them But we’re starting to see that as Windows defenses becomes increasingly strong that new avenues of attack are being pursued and With it we foresee an entire new class of new attacks that will feel new and quite modern
  • #9: So lets compare and contrast the familiar vs the modern We’re all familiar with script kiddies and cybercrime but now were facing cyber espionage and warfare We’re all familiar with cyber criminals and thugs but now we’re talking about teams of full time hacker possible being funded by nation states We’re all familiar with software solutions to solve every security problem but now we’re facing threats where only hardware rooted trust is up to the task We’ve protected the perimeter to keep bad guys out but now they are getting in so you need to assume breach and proytect at all levels We’re familiar with attacks on big well known companies but now small businesses are in the crosshairs We used to own and tighly control all of the devices but now BYOD is going beyond mobile phones And finally we’re all familiar with hoping we don’t get hacked but the reality is that you will and it all comes down to how well you were able to limit your losses
  • #10: Here on this slide we have some great quote to help the points just made sink in The first quote here is from F-Secure in response to the Flame virus. They feel, and we agree, that the software that companies having been using to protect themselves isn’t good enough to protect them against the modern attacker who often times is the digital equivalent to Seal Team Six. Think about that. How do you defend against that kind of talent and backing behind it? The second quote is from the 2013 Verizon Data Breach report and in they show us that businesses of all sizes are being attacked. If you think your too small your wrong. If you’ve ever swiped a credit card, which is almost every business, your going to be target as there is a prolific black market to sell they credit card data. If you’re not worried about that think about what happens when the passwords from an another ecommerce site are hacked and now hackers have the passwords to your users accounts since more times than users use the same password everywhere they go. The third quote is from Lockheed and in it they’re telling us that they’re spending as much to protect their vendors, suppliers, contractors, etc as they are on protecting their own assets. Think about that for a minute. Why are they doing this? That’s because they know that if your doing biz with them, even if it’s making nuts and bolts, you’re going to be targeted as possibly they get to you through them.