Microsoft participates in PROTECT 2015, strengthens commitment to cybersecurity

Microsoft global executives Scott Deacon and Keshav Dhakad share the latest in cybersecurity trends and how businesses and governments can be protected

MANILA, Philippines, March 24, 2015 – Driven to be a strategic partner of the community in achieving efficiency through technology, Microsoft Philippines participated in PROTECT 2015 to share the latest in cybersecurity to signify its commitment to helping the public and private sectors remain protected from cybercriminals.

PROTECT 2015 is a security conference/exhibit launched in 2005 by Leverage International in partnership with the Anti-Terrorism Task Force. Recognizing that critical infrastructures which are the hard targets of terrorists are owned and operated by the private sector, PROTECT builds awareness that all security threats must be a commonly shared task between the government and the private sector.

Microsoft’s global executives Scott Deacon, an Architect in the Microsoft Cybersecurity Global Practice, and Keshav Dhakad, Senior Attorney & Regional Director of IPR & Digital Crimes Unit (DCU), Microsoft Asia Region, took part in the conference to discuss cybersecurity and data protection, and how transnational crimes impact businesses.

“Technology has by and large been a cause for good, driving economic growth across developed and emerging economies. Both governments and the private sector use the Internet, cloud services, and mobile technology to enhance their productivity. Unfortunately, the benefits of greater connectivity have also brought about increased information security threats,” said Deacon, “Yet not all businesses have the right security infrastructure to protect themselves against cyber threats, and more importantly, even few have contingent plans in case their security and operations are compromised.”

Cybersecurity has also become a priority for governments around the world. Major cyber-attacks, data losses, and compromised networks fill the headlines, and governments, the private sector, and citizens all recognize the need for action to improve cybersecurity. Governments worldwide are struggling with questions around how to do this while balancing privacy, civil liberties, and cost.

Over the past decade, national governments have been developing strategies to address emerging security issues associated with the rapidly expanding use of information and communications technology (ICT). These “cybersecurity” issues have developed into significant national-level problems that require government consideration, including the protection of assets, systems, and networks vital to the operation and stability of a nation and the livelihood of its people. Threats against these vital assets target corporations and citizens, and include cybercrime such as identity theft and fraud, politically motivated “hacktivism” and sophisticated economic and military espionage.

“Governments are under extreme pressure to provide improved services with reduced costs. Agencies need to increase collaboration, empower people, and share resources more effectively—all while protecting assets and infrastructure,” shared Keshav.

Providing secure, private, and reliable experiences in the computing ecosystem is central to Microsoft’s vision for its software and services. Microsoft delivers robust security that can strengthen the IT infrastructure of organizations. These services include Identity and Access Management, which enables more secure, identity-based access to applications from virtually anywhere; Data Protection that allows organizations to integrate and extend data security and systems across the environment while sharing and collaborating with trusted parties; Compliance and Monitoring of risk exposure to allow IT teams to make informed decisions on whether to mitigate, transfer, or accept risks; and finally, Secure Deployment and Development, which offers training, consulting, and tools services designed to increase productivity within organizations, all while making security and privacy an integral part of the software development process.

“It’s clear that businesses and governments need to do more to fight the increasing threat of hackers, do more to protect their assets and prevent huge losses. We’re seeing policy and technology developments that will help businesses beef up security on premises, in the cloud and across mobile devices, and we’re working closely with private and public organizations to ensure that people everywhere can use technology with confidence,” concluded Deacon.

Tags: