Security

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happened


op-ed Microsoft will host a security summit next month with CrowdStrike and other "key" endpoint security partners joining the fun — and during which the CrowdStrike-induced outage that borked millions of Windows machines will undoubtedly be a top-line agenda item. 

We won't know for sure, however, because the summit will be held behind closed doors. It won't be live-streamed, and Redmond has said members of the press aren't welcome.

"This event will not be open to press, and the company has nothing else to share at this time," a Microsoft spokesperson told The Register.

In announcing the September 10 Windows Endpoint Security Ecosystem Summit to take place at its Redmond, Washington headquarters, Microsoft Corporate VP Aidan Marcuss said participants will discuss steps that vendors can take to "improve security and resiliency for our joint customers." 

Marcuss cited the July CrowdStrike fiasco and the "important lessons" learned from that disaster. "Our discussions will focus on improving security and safe deployment practices, designing systems for resiliency and working together as a thriving community of partners to best serve customers now, and in the future."

While he didn't specify what these measures might involve, we'd bet that booting security vendors off of the Windows kernel is one of them, and it's likely to be met with a great deal of pushback from providers.

In addition to its fellow software manufacturers, Microsoft will also "invite government  representatives to ensure the highest level of transparency to the community's collaboration to deliver more secure and reliable technology for all."

US Senator Ron Wyden (D-OR), who has been very critical of Microsoft's shoddy security performance while raking in billions of dollars in government contracts, didn't get an invite, we're told.

So…some friendly government officials and security vendors but no press or members of the public ensure "the highest level of transparency" in Microsoft's book?

We shouldn't be surprised. Redmond follows a very specific playbook following all of its security snafus. Transparency about what happened, along with concrete measures to actually fix the problem, isn't part of it.

Granted, this latest fiasco is a CrowdStrike — not Microsoft — blunder. But the Windows giant is facing mounting criticism of its own security practices following years of breaches by Chinese and Russian nation-state hackers and teenage Lapsus$ hoodlums alike.

Earlier this summer, Microsoft president Brad Smith testified before Congress about his company's repeated security failings. This was in response to a Homeland Security report blasting the IT giant for allowing Beijing-backed cyberspies to steal tens of thousands of sensitive emails from the Microsoft-hosted Exchange Online inboxes of high-ranking US government officials.

In most of these major mishaps, Microsoft rolls out a shiny new security initiative such as its Secure Future Initiative after the most recent Cozy Bear attack.

With this, and all of its carefully cultivated wordy efforts, Redmond promises transparency and accountability. But at the same time, it pushes back against things like minimum cybersecurity standards for government technology vendors, as Wyden has previously suggested, and independent audits, which also go a long way in trying to prove transparency and openness.

So do open summits, like the one happening next month. Instead of talking about transparent — or security, for that matter — simply doing it would be a welcome change. ®

Send us news
11 Comments

Microsoft security tools questioned for treating employees as threats

Cracked Labs examines how workplace surveillance turns workers into suspects

Microsoft patches scary wormable hijack-my-box-via-IPv6 security bug and others

Plus more pain for Intel which fixed 43 bugs, SAP and Adobe also in on the action

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

From Copilot to Copirate: How data thieves could hijack Microsoft's chatbot

Prompt injection, ASCII smuggling, and other swashbuckling attacks on the horizon

Microsoft's Patch Tuesday borks dual-boot Linux-Windows PCs

Plus: Three-year-old ProxyOracle flaw added to CISA's exploited bugs list

House to grill CrowdStrike exec on epic IT meltdown... no, not the CEO

VP Adam Meyers to testify about that faulty software update which ruined July and some of August

Proof-of-concept code released for zero-click critical IPv6 Windows hole

If you haven't deployed August's patches, get busy before others do

Microsoft pushing, pushing, pushing Edge in Defender slammed as a 'dark pattern'

Is it an ad? Or serious infosec advice?

Copilot for Microsoft 365 might boost productivity if you survive the compliance minefield

Loads of governance issues to worry about, and the chance it might spout utter garbage

Post-CrowdStrike, Microsoft to discourage use of kernel drivers by security tools

Now there's an idea – parsing config data in user mode

If every PC is going to be an AI PC, they better be as good at all the things trad PCs can do

Microsoft's Copilot+ machines suck at one of computing's oldest use cases

Microsoft PC accessories rise from the grave just in time for Christmas

Incase revives Windows giant's abandoned peripherals range