1 / 6

Navigating the Evolving Security Landscape: Strategies and Insights

Explore the changing threats in today's world, from legacy crimes to evolving solutions and security strategies. Dive into vulnerability timelines and the gap between patches and exploits. Understand the complex interplay between security researchers, software companies, and hackers. Gain insights into the types of attackers, from hobbyists to specialists, and their motives. Anticipate future challenges and strengthen your security posture. Stay ahead in the cybersecurity game with this comprehensive session.

gainey
Download Presentation

Navigating the Evolving Security Landscape: Strategies and Insights

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security: The Changing Threat Environment David Aucsmith Architect and CTOSecurity Business & Technology Unit awk @ microsoft.com Microsoft Corporation

  2. Session Outline • The World Today • Threats • Bad Guys • How We Got There • Legacy • Crime • Evolving the Solution • Security Strategy • A Look Ahead

  3. Vulnerability Timeline Why does this gap exist? Attacks occur here Rarely discovered The World Today

  4. Vulnerability Timeline Days between patch & exploit 331 180 151 25 Nimda SQL Slammer Welchia/ Nachi Blaster • Days From Patch To Exploit • Have decreased so that patching is not a defense in large organizations • Average 6 days for patch to be reverse engineered to identify vulnerability Source: Microsoft The World Today

  5. The Forensics of a Virus July 1 July 16 July 25 Aug 11 Vulnerability reported to us / Patch in progress Bulletin & patch available No exploit Exploit code in public Worm in the world Report • Vulnerability in RPC/DDOM reported • MS activated highest level emergency response process Bulletin • MS03-026 delivered to customers (7/16/03) • Continued outreach to analysts, press, community, partners, government agencies Exploit • X-focus (Chinese group) published exploit tool • MS heightened efforts to get information to customers Worm • Blaster worm discovered –; variants and other viruses hit simultaneously (i.e. “SoBig”) Blaster shows the complex interplay between security researchers, software companies, and hackers Source: Microsoft The World Today

  6. Understanding the Landscape National Interest Personal Gain Personal Fame Curiosity Spy Fastest growing segment Thief Tools created by experts now used by less-skilled attackers and criminals Trespasser Vandal Author HobbyistHacker Script-Kiddy Expert Specialist The World Today

More Related