Microsoft Digital Crimes Unitdownload.microsoft.com/download/8/6/5/865FA3AD-9488-402C... ·...

11
Microsoft Confidential Microsoft Digital Crimes Unit Joachim Rosenögger Snr. Manager Investigations D / WE South

Transcript of Microsoft Digital Crimes Unitdownload.microsoft.com/download/8/6/5/865FA3AD-9488-402C... ·...

Page 1: Microsoft Digital Crimes Unitdownload.microsoft.com/download/8/6/5/865FA3AD-9488-402C... · 2018-10-15 · Microsoft Confidential A Layered Approach to Security Helping to protect

Microsoft Confidential

Microsoft Digital Crimes Unit

Joachim RosenöggerSnr. Manager Investigations D / WE South

Page 2: Microsoft Digital Crimes Unitdownload.microsoft.com/download/8/6/5/865FA3AD-9488-402C... · 2018-10-15 · Microsoft Confidential A Layered Approach to Security Helping to protect

Microsoft Confidential

Cybersecurity is a Boardroom-level Issue

160MData records compromised

from top 8 breaches in 2015

556Mvictims of cybercrime

per year

$400Bcost of cyberattacks to

companies each year

71%of companies admit they

fell victim to a successful

cyber attack the prior year

$3 Trillionestimated cost in economic

value from cybercrime

industry by 2020

140+Median # of days between

infiltration and detection

Page 3: Microsoft Digital Crimes Unitdownload.microsoft.com/download/8/6/5/865FA3AD-9488-402C... · 2018-10-15 · Microsoft Confidential A Layered Approach to Security Helping to protect

Microsoft Confidential

A Layered Approach to Security

Helping to protect our customers, our company, and our world

These growing threats demand a coordinated response:

• Cyber Security Services Engineering

• Digital Crimes Unit

• Information Security & Risk Management

• Microsoft Azure

• Microsoft Security Response Center

• Microsoft Threat Intelligence Center

• Office 365

• Windows & Devices Group

Cyber Defense Operations Center

Page 4: Microsoft Digital Crimes Unitdownload.microsoft.com/download/8/6/5/865FA3AD-9488-402C... · 2018-10-15 · Microsoft Confidential A Layered Approach to Security Helping to protect

Microsoft Confidential

A safer digital experience for

every person and organization

on the planet

The Microsoft Digital Crimes Unit

Public and private partnerships to fight

technology facilitated crimes

.

Combining novel legal strategies, cutting-

edge forensics, cloud and big data

analytics

Page 5: Microsoft Digital Crimes Unitdownload.microsoft.com/download/8/6/5/865FA3AD-9488-402C... · 2018-10-15 · Microsoft Confidential A Layered Approach to Security Helping to protect

Microsoft Confidential

Protecting Vulnerable Populations

www.support.microsoft.com/reportascam

Microsoft Taking Action:

DCU investigates tech fraud cases globally building evidence to take action

Education programs through media, Microsoft Retail Stores, and the Cybercrime Center

The Scheme:

Fraudsters pose online and on phone as tech

support from high tech companies including

Microsoft

A victim is often asked for remote access and

charged for unnecessary technical services

Victims may lose money, personal

information or be exposed to malware

Technical Support Scams

Page 6: Microsoft Digital Crimes Unitdownload.microsoft.com/download/8/6/5/865FA3AD-9488-402C... · 2018-10-15 · Microsoft Confidential A Layered Approach to Security Helping to protect

Microsoft Confidential

Protecting Vulnerable Populations

PhotoDNA has helped detect

millions of illegal images online

www.microsoft.com/photodna

Free cloud-based service

PhotoDNA

Over 100 organizations use the

technology to keep their

platforms safe

Illegal images are reported to the

National Center for Missing and

Exploited Children and other

appropriate authorities

Page 7: Microsoft Digital Crimes Unitdownload.microsoft.com/download/8/6/5/865FA3AD-9488-402C... · 2018-10-15 · Microsoft Confidential A Layered Approach to Security Helping to protect

Microsoft Confidential

Malware

DisruptionsDCU acquires targets,

investigates, and orchestrates

global partnerships to take

actionWorking with Law Enforcement and others to disrupt the criminal infrastructure

Our malware intelligence is

embedded into Microsoft’s

products and services

We enable CERTs/ISPs globally

to notify and remediate

Page 8: Microsoft Digital Crimes Unitdownload.microsoft.com/download/8/6/5/865FA3AD-9488-402C... · 2018-10-15 · Microsoft Confidential A Layered Approach to Security Helping to protect

Microsoft Confidential

Actionable Intelligence from Malware Disruptions

Page 9: Microsoft Digital Crimes Unitdownload.microsoft.com/download/8/6/5/865FA3AD-9488-402C... · 2018-10-15 · Microsoft Confidential A Layered Approach to Security Helping to protect

Microsoft Confidential

Digital Risk Dashboards

Organizations are exposed to risk when they deploy and use unlicensed software and/or compromised product keys

Risks include compromised security and increased exposure to malware

Page 10: Microsoft Digital Crimes Unitdownload.microsoft.com/download/8/6/5/865FA3AD-9488-402C... · 2018-10-15 · Microsoft Confidential A Layered Approach to Security Helping to protect

Microsoft Confidential

Cortana Intelligence Suite

Data in

Motion

Data

at Rest

Transforming data into intelligent action

Data Subscribers

Microsoft Products

Microsoft Services

Governments, ISPs and others

Dashboards | Visualizations

O365

Power BI

Kibana*

Elastic Search*

Machine Learning | Advanced Analytics

Azure Machine Learning

Azure HDInsight

Azure Data Lake Analytics

Azure Stream Analytics

Big Data Stores

Azure Data Lake

Azure SQL Data Warehouse

Information Management

Azure Data Factory

Azure Event Hubs

*Open source software

Page 11: Microsoft Digital Crimes Unitdownload.microsoft.com/download/8/6/5/865FA3AD-9488-402C... · 2018-10-15 · Microsoft Confidential A Layered Approach to Security Helping to protect