SlideShare uma empresa Scribd logo
1 de 5
Information Age Border Protection SECURING SOVEREIGNTY  Paul Nicholas Director, Global Security Strategy& Diplomacy
SOVEREIGNTY & SECURITY ISSUES ,[object Object],[object Object],[object Object]
INFORMATION AGE BORDERS Physical Borders Cyber Borders Many Malicious Actors Many Motives Similar Techniques Worst Case Scenarios Alarming Speed of Attack/Impact Consequences Hard to Predict Many Malicious Actors Many Motives Similar Techniques Worst Case Scenarios Alarming Speed of Attack/Impact Consequences Hard to Predict
FRAMEWORK FOR SECURITY
© 2010 Microsoft Corporation. All rights reserved. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation..  MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Mais conteúdo relacionado

Destaque

David silverberg presentation
David silverberg presentationDavid silverberg presentation
David silverberg presentationsvito
 
Kevin Plexico presentation
Kevin Plexico presentationKevin Plexico presentation
Kevin Plexico presentationsvito
 
SMi Group's Border Security 2014 conference & exhibition
SMi Group's Border Security 2014 conference & exhibitionSMi Group's Border Security 2014 conference & exhibition
SMi Group's Border Security 2014 conference & exhibitionDale Butler
 
CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1svito
 
1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)ronald2505
 
Mark Borkowski Presentation
Mark Borkowski PresentationMark Borkowski Presentation
Mark Borkowski Presentationsvito
 
Dr Mohamed Reda Presentation on Egypt
Dr Mohamed Reda Presentation on EgyptDr Mohamed Reda Presentation on Egypt
Dr Mohamed Reda Presentation on Egyptsvito
 
Hello everybody it is a custom meaning.
Hello everybody it is a custom meaning.Hello everybody it is a custom meaning.
Hello everybody it is a custom meaning.cantrellngkzwhnyri
 
Report – Port Facility Security Officer Training
Report – Port Facility Security Officer TrainingReport – Port Facility Security Officer Training
Report – Port Facility Security Officer Trainingnavinvd
 
675.cross border strategy and operations finnish companies in russia a collec...
675.cross border strategy and operations finnish companies in russia a collec...675.cross border strategy and operations finnish companies in russia a collec...
675.cross border strategy and operations finnish companies in russia a collec...efwd2ws2qws2qsdw
 
Customs and Border Management
Customs and Border ManagementCustoms and Border Management
Customs and Border ManagementAlain Clo
 
6 Ways to Quit Bullet Points with Style
6 Ways to Quit Bullet Points with Style6 Ways to Quit Bullet Points with Style
6 Ways to Quit Bullet Points with StylePodium Wisdom
 
7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenecEugene Cheng
 

Destaque (13)

David silverberg presentation
David silverberg presentationDavid silverberg presentation
David silverberg presentation
 
Kevin Plexico presentation
Kevin Plexico presentationKevin Plexico presentation
Kevin Plexico presentation
 
SMi Group's Border Security 2014 conference & exhibition
SMi Group's Border Security 2014 conference & exhibitionSMi Group's Border Security 2014 conference & exhibition
SMi Group's Border Security 2014 conference & exhibition
 
CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1
 
1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)
 
Mark Borkowski Presentation
Mark Borkowski PresentationMark Borkowski Presentation
Mark Borkowski Presentation
 
Dr Mohamed Reda Presentation on Egypt
Dr Mohamed Reda Presentation on EgyptDr Mohamed Reda Presentation on Egypt
Dr Mohamed Reda Presentation on Egypt
 
Hello everybody it is a custom meaning.
Hello everybody it is a custom meaning.Hello everybody it is a custom meaning.
Hello everybody it is a custom meaning.
 
Report – Port Facility Security Officer Training
Report – Port Facility Security Officer TrainingReport – Port Facility Security Officer Training
Report – Port Facility Security Officer Training
 
675.cross border strategy and operations finnish companies in russia a collec...
675.cross border strategy and operations finnish companies in russia a collec...675.cross border strategy and operations finnish companies in russia a collec...
675.cross border strategy and operations finnish companies in russia a collec...
 
Customs and Border Management
Customs and Border ManagementCustoms and Border Management
Customs and Border Management
 
6 Ways to Quit Bullet Points with Style
6 Ways to Quit Bullet Points with Style6 Ways to Quit Bullet Points with Style
6 Ways to Quit Bullet Points with Style
 
7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec
 

Semelhante a Information Age Border Protection SECURING SOVEREIGNTY

Evolution of Security
Evolution of SecurityEvolution of Security
Evolution of SecurityDM_GS
 
Measurement, Quantitative vs. Qualitative and Other Cool Stuff
Measurement, Quantitative vs. Qualitative and Other Cool StuffMeasurement, Quantitative vs. Qualitative and Other Cool Stuff
Measurement, Quantitative vs. Qualitative and Other Cool StuffJody Keyser
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementThomas Ewert
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3Asad Zaman
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINETopCyberNewsMAGAZINE
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityPC Doctors NET
 
Measurement, Qualitative vs Quantitative Methods, and other Cool Stuff
Measurement, Qualitative vs Quantitative Methods, and other Cool StuffMeasurement, Qualitative vs Quantitative Methods, and other Cool Stuff
Measurement, Qualitative vs Quantitative Methods, and other Cool StuffPatrick Florer
 
AFCOM - Information Security State of the Union
AFCOM - Information Security State of the UnionAFCOM - Information Security State of the Union
AFCOM - Information Security State of the UnionEvan Francen
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxGovernment Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxbenjaminjames21681
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information SecuritySimoun Ung
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTopCyberNewsMAGAZINE
 
UMUC Cyber Day Program
UMUC Cyber Day  ProgramUMUC Cyber Day  Program
UMUC Cyber Day ProgramTroy Thompson
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Ludmila Morozova-Buss
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 

Semelhante a Information Age Border Protection SECURING SOVEREIGNTY (20)

3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
 
Evolution of Security
Evolution of SecurityEvolution of Security
Evolution of Security
 
Measurement, Quantitative vs. Qualitative and Other Cool Stuff
Measurement, Quantitative vs. Qualitative and Other Cool StuffMeasurement, Quantitative vs. Qualitative and Other Cool Stuff
Measurement, Quantitative vs. Qualitative and Other Cool Stuff
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk Management
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
Measurement, Qualitative vs Quantitative Methods, and other Cool Stuff
Measurement, Qualitative vs Quantitative Methods, and other Cool StuffMeasurement, Qualitative vs Quantitative Methods, and other Cool Stuff
Measurement, Qualitative vs Quantitative Methods, and other Cool Stuff
 
AFCOM - Information Security State of the Union
AFCOM - Information Security State of the UnionAFCOM - Information Security State of the Union
AFCOM - Information Security State of the Union
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxGovernment Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
 
Cyber security vs information assurance
Cyber security vs information assuranceCyber security vs information assurance
Cyber security vs information assurance
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
 
UMUC Cyber Day Program
UMUC Cyber Day  ProgramUMUC Cyber Day  Program
UMUC Cyber Day Program
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 

Information Age Border Protection SECURING SOVEREIGNTY

  • 1. Information Age Border Protection SECURING SOVEREIGNTY Paul Nicholas Director, Global Security Strategy& Diplomacy
  • 2.
  • 3. INFORMATION AGE BORDERS Physical Borders Cyber Borders Many Malicious Actors Many Motives Similar Techniques Worst Case Scenarios Alarming Speed of Attack/Impact Consequences Hard to Predict Many Malicious Actors Many Motives Similar Techniques Worst Case Scenarios Alarming Speed of Attack/Impact Consequences Hard to Predict
  • 5. © 2010 Microsoft Corporation. All rights reserved. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation.. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Notas do Editor

  1. To address cyber threats generally, and botnets in particular, governments, industry and consumers should support cyber security efforts modeled on efforts to address human illnesses. The public health model relies upon several core concepts that can be applied to Internet security. For a society to be healthy, its members must be aware of basic health risks and educated on how to avoid them. Common practices to limit the propagation of disease range from the simple (e.g., washing hands) to the systematic (e.g., in schools, students may be required to be vaccinated before admission; warned if other students show symptoms; required to stay at home if infected; and notified of the criteria for readmission to school). In the physical world, there are also international, national and local health systems that identify, track, and control the spread of disease including, where necessary, quarantining people to avoid the infection of others. Governments and industry could similarly engage in more methodical and systematic activities to improve and maintain the health of the population of devices in the computing ecosystem by promoting preventative measures, detecting infected devices, notifying affected users, enabling those users to treat devices that are infected with malware, and taking additional actions to ensure that infected computers do not put other systems at risk.   Enterprise IT departments (including those in government organizations) have professional staff to help do this already. They often have Chief Information Officers, Chief Security Officers, professional IT staff, incident response teams, employee education and training, and tools to inspect and quarantine machines. Consumers have no such support. Moreover, many consumers have no desire to become IT professionals, let alone security experts, and information technology is certainly complex enough that knowing how to protect ones’ self online is not intuitive. As a result, many consumers may be unwittingly running malware and their computers may be part of a botnet. Such botnets may be used to send spam and engage in illegal activities, including launching denial of service attacks against critical infrastructures. Some of these activities create enough traffic on the network to make other egregious activity harder to detect and respond to. Against that backdrop, it is clear that the ability to address infected consumer devices generally – and botnets in particular – is an important part of any computer security strategy, including strategies to protect critical infrastructures.   The challenge is how do to so in a meaningful way. For years, governments, the IT industry, and concerned citizen groups have engaged in myriad   activities designed to help consumers manage their security risks. For example, they have worked to educate users about common threats and how to mitigate them, providing actionable advice regarding firewalls, anti-virus, and patching. Tools have been built to automatically scan machines, patch programs, update virus signatures, and remove malware when found. As helpful as education and these tools are, they have proven to be inadequate to the task of preventing botnets for a host of reasons.  Some consumers do not follow the guidance provided or engage in other unsafe actions – such as downloading files from unknown sources – leading to a large number of machines becoming and remaining infected. Moreover, even a diligent consumer will be challenged by persistent, well-funded, and more technically adept adversaries who are intent on targeting an increasing number and diversity of devices. Although addressing these threats in any context is a challenge, we need a better process of ensuring the health of the IT ecosystem. Simply put, we need to improve and maintain the health of consumer devices connected to the Internet. This will benefit not only users, but also the IT ecosystem as a whole. To realize this vision, governments, the IT industry and Internet access providers should ensure the health of consumer devices before granting them unfettered access to the Internet. On the international level, the World Health Organization tracks the evolving infectious disease situation, sounds the alarm when needed, shares expertise, and mounts the kind of response needed to protect populations from the consequences of epidemics, whatever and wherever might be their origin. Individual countries utilize that system and may require the treatment and quarantine of individuals. In the United States, the Centers for Disease Control is the responsible U.S. Government agency. http://www.who.int/csr/alertresponse/en/ http://emergency.cdc.gov/preparedness/quarantine/