Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

RSAC: Microsoft Makes Case for "Security Optimism"

Speaking to a large crowd of security professionals at the RSA Conference 2013 in San Francisco this morning, Microsoft Corporate Vice President of Trustworthy Computing Scott Charney argued that despite the almost daily reports of data breaches and cyberattacks on companies and governments that the audience was getting accustomed to reading about, the security industry had made great strides towards combating cyber attacks in recent years.

In a blog post timed to coincide with his RSA keynote, Charney writes that the industry is much more well prepared than the constant drumbeat of headlines discussing cyber attacks and data breaches. “In the midst of sometimes provocative headlines, the tangible progress being made to advance the industry is often overlooked…however look at the breadth of the good work that industry and government is doing, I’m encouraged.”

Microsoft RSA Conference 2013

A slide from Charney’s RSA Conference 2013 keynote, visually demonstrating aspects of Microsoft’s Trustworthy Computing model.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

Charney lumped the areas the industry had made progress in into three large groups, which he dubbed fundamentals, influences, and management. Fundamentals cover how computers, smartphones and tablets are engineered and added to an IT infrastructure, while influences deal with outside forces — like the larger economy, state, federal, national, and international politics — that have an impact on IT security. Management is focused on the basic blocking and tackling of security operations, and Charney made the case that great strides have been made in all of these areas.

Charney mentioned the Unified Extensible Firmware Interface (UEFI) as being one of the tools that are helping make PCs safer and more secure. UEFI allows PCs to be configured to have a trusted boot process which improves protection against malware, root kits, and other hostile software. While Charney made a compelling argument that the industry has made compelling security progress, he did point out that the four most common security threats are currently arriving in the form of corporate espionage, cybercrime, military espionage, and outright cyberwarfare.

Charney closed his keynote by describing security optimism as a “future state…[where] we can be less reactive, and more predictive” and that all of the improvements he’s described contribute to placing the industry on the cusp of achieving that reality. You can watch Charney’s keynote in it’s entirety via the RSA Conference keynote archives.

Are you attending the RSA Conference in San Francisco this week? Add a comment to this blog post and let me know what you think of the conference so far.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (2)

2 responses to “RSAC: Microsoft Makes Case for “Security Optimism””

Leave a Reply

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: