In-depth

How an FBI agent transformed Microsoft security

In time for Infosecurity 2009, IT PRO talks to Edward Gibson, one of the main figures behind Microsoft's computer security in Britain.

Edward Gibson, Microsoft's chief security advisor in the UK, is more qualified than most to talk about the computer threats that we face today.

Having held special positions as a FBI Special Agent for 20 years, he was also at one time assigned to the US embassy in London, in charge of the FBI's hi-tech cyber terrorism work in the UK.

Between 2000 and 2005, he was responsible for establishing strategic intelligence alliances between the FBI, UK police agencies, security services and private sector companies.

Gibson helped launch the original national hi-tech crime unit in 2001 and worked with the Crown Prosecution Service in developing standards on how cyber crime could be prosecuted.

Working for Microsoft

It was after that experience that he was headhunted by Microsoft to become their chief security advisor. "I was wary of doing that because I had practiced corporate law for a major company, and it wasn't the highest company on my list to work for," he said.

At the time, Gibson also believed that there were areas which he thought that Microsoft could have be doing better in when it came to security.

He said: "That was in my very narrow area which was post 9/11 - responding to suspected terrorist incidents, that were using the various services of Microsoft, Yahoo, AOL and other free mail services for example."

He said that although security in the UK had really developed by 2005, Microsoft had no credibility. "I wanted to be convinced that they had the will to make the changes in security that would actually make a difference."

Gibson made two requirements that the company had to agree to before he joined. The first was that he had to interview with senior executives, and the second was that Microsoft needed to comply with the UK Regulation of Investigatory Powers Act (RIPA).

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Most Popular

Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020
What is Neuralink?
Technology

What is Neuralink?

24 Oct 2020
Hackers demand ransom from therapy patients after clinic data breach
Security

Hackers demand ransom from therapy patients after clinic data breach

27 Oct 2020