• Off to See the World

    If you follow my blog you saw recently that there are two themes constantly popping up: One is everything about a government’s Cybersecurity Agenda (or the lack thereof) and the second one is the Cloud.

    Let me briefly line them out: When I talk to governments I often feel that there is a lack of internal coordination when Cybersecurity is addressed. No too many people in governments are trying to get a holistic view on their Cybersecurity agenda and the sequence things should be addressed. I am convinced that an effective program or agenda will drive the growth of an economy as there will be increased trust in the respective country. If I may give you an example of what I mean: I am often asked whether governments could get more intelligence from us. Therefore we recently launched a program called DISP (Defensive Intelligence Sharing Program) where we share vulnerability information with governments. This information is only useful to the government if they can do something with it like if they have a Critical Infrastructure Protection program in place where they have the technical people understanding the information, being able to aggregate it to the right level and distribute it to the critical infrastructure provider in due time.

    The Cloud is the other big theme. You know that I am convinced that there is too much fuzz out there and not enough guidance. Therefore we published our Cloud Security Considerations paper to elevate the discussion and give a framework which works for high-level people. The framework has been very effective and I used it often with customers so far. However, to me there is a huge necessity to work closer with customers and governments on a very senior level on how to approach those challenges and what is needed to enable the customer to move to the cloud – from a technical, regulatory but from an emotional perspective as well.

    All these points, made us re-think our strategy around the Chief Security Advisor (CSA) community, where I was responsible for EMEA (yes, was but I am coming back to that). Today we are covering in

    • Americas Time Zone: Brazil, LATAM, US
    • Asia Time Zone: APAC, Australia, Korea, Greater China Region, India, Japan
    • EMEA Time Zone: EMEA, Russia, France, Germany, Austria, Finland, the Netherlands, Norway

    This is simply not enough for the work to be done. Therefore, we decided to significantly invest in Chief Security Advisors around the Globe to get closer to the businesses of our customers and governments and to help to leverage security as an enabler, rather than a disabler. Therefore we will broaden the coverage and end up with the following countries (the underlined countries/regions are the ones we are in the process of hiring or will kick the hiring process off):

    • Americas Time Zone: Americas Time Zone Lead, LATAM, Brazil
    • Asia Time Zone: Asia Time Zone Lead, Australia, Korea, Greater China Region, India, Japan
    • EMEA Time Zone: EMEA Time Zone Lead, Poland, Russia, France, Germany, UK, Austria, Denmark, Finland, Italy, the Netherlands, Norway, Spain, Sweden, Switzerland, South Africa, Turkey

    These will be very senior security people being able to work on eye’s level with CxOs, government elites and policy maker – if you think that you suit this high-level description and are interested, get in touch with me and I could link you to the relevant people.

    This is a huge investment in time and an investment I am convinced is needed to drive the market and support governments in their initiatives.

    Finally, I have the great pleasure to move on – well, partly. I will move away from my EMEA position to take over the worldwide Chief Security Advisor role, being responsible for Microsoft’s global CSA community. This is a great challenge, which I am looking forward to. To remain close to the field and close to the customer’s need, I decided to stay in Switzerland and not to move to the headquarters (well, there are some family reasons as well Smile).

    I will continue my blog but will broaden the scope from EMEA to the world.

    Roger

  • Secunia: Apple makes the most vulnerable software in the market today

    And everybody tells me how secure they are….. So,according to this article Secunia: Apple makes the most vulnerable software in the market today, apple hast most vulns, then Oracle and then us (and then the rest). And you know, the interesting thing is that the comparison is not “apples with apples” as we tend to have somewhat more products out in the market than all of them together (at least this would be my guess)…

    Roger

  • A new Chief Security Advisor in the UK

    As you have seen in my post Off to see the World, we are hiring Chief Security Advisors all over the place. The first one was announced last week: Stuart Aston was announced to take over the Chief Security Advisor in the UK.

    Have a good start!

    Roger

  • Chief Security Advisor in Sweden: Magnus is back

    After my overall announcement that we grow the community in Off to See the World, and Stuart Aston joining as the CSA in the UK, it is a great pleasure to see Magnus Lindkvist coming back. Magnus was the CSA in Sweden a few years back and accepted the offer now to come back and re-join the community.

    Welcome back Magnus!

    Watch out, there are more to come Smile

    Roger

  • How to Deal With Vulnerabilities

    This is always a fairly emotional theme. What is better to protect the ecosystem? Public or private disclosure? Should somebody paying for vulnerabilities or not? Is a vulnerability auction ethical or not?

    I know that there are numerous views on that and I do not want to debate them here and now. What I just want to do here, is to show Microsoft’s position:

    Since a long time Microsoft is working with the researcher community in close collaboration and my understanding is that the researcher community is fairly impressed with what we do, once they get the opportunity to look behind the scenes. One of the outcomes of this outreach is Bluehat – a Microsoft internal event where the researcher talk to our developers. A very and interesting and insightful get together.

    When it comes to handling vulnerabilities, I guess you know Microsoft Security Response Center – the group within Microsoft chartered with handling security vulnerabilities. The policies behind working with the researcher community is two-fold:

    For me, the joint goal between researcher and vendors has to be to protect the ecosystem against the criminals. And with ecosystem I mean not only the big enterprises, having security teams which are able to work on detailed vulnerability information but small and medium businesses as well as the consumer like my mom and dad as well. Therefore we think that the point above help to meet the requirements.

    What are your thoughts on that?

    Roger