Roger Halbheer

Job title:
Chief security advisor, Microsoft

Areas of expertise:
Policy, architecture, law enforcement, cybersecurity, processes

Biography:
Roger Halbheer joined Microsoft as Chief Security Advisor of Microsoft Switzerland in 2001 and was promoted to the role of Chief Security Advisor for Microsoft Europe, the Middle East and Africa (EMEA) in February 2007. Roger leads a team of national Chief Security Advisors across EMEA who work with organizations in the commercial and public sectors - including national governments, law enforcement and intelligence agencies - on information technology issues and strategies. He is a trusted advisor to C-level executives, governments and law enforcement agencies and has established relationships with security communities and government agencies across the region. Roger is a regular speaker at industry events and has worked with national and international print and broadcast media both to represent Microsoft and to provide expert comment on broader security issues. A Swiss national, Roger holds a Master of Computer Science degree from the Federal Institute of Technology in Zurich and is a Certified Information System Security Professional (CISSP). Before joining Microsoft, he was responsible for e-Business Risk Management at PricewaterhouseCoopers in Switzerland. He lives in Zurich and is married with two sons.

Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

All Bloggers » Roger Halbheer
0
comments
Addressing the Consumerization of IT
Bring Your Own Device or Consumerization of IT are fairly hot themes in a lot of customer organizations. When I talk to customers, there are typically different reactions, once we bring this up. Some tell us that it is not part of their strategy; some tell us that they plan to do it but that they ha ...
Posted 26 April 2012 by Roger Halbheer
0
comments
Before joining Microsoft a little bit more than 10 years ago, I ran a team at PricewarehoureCoopers on e-Business Risk Management – classical security consulting in the Internet bubble time. When I announced that I will leave PwC and join Microsoft, I got interesting reactions (and remember, ...
Posted 12 January 2012 by Roger Halbheer
1
comment
10 Reasons to Migrate Off Windows XP
I would like you to sit back, close your eyes and think about the year 2001. Think about how you used technology back then, how you used the Internet. Now, let’s take it a little bit further back in history and think of the year 2000. Just after we realized that the Year-2000-Problem was handl ...
Posted 22 December 2011 by Roger Halbheer
0
comments
Implementing the Top 4 Defense Strategies
The Australian Defense Signals Directorate maintains a list of the Top 35 Mitigation Strategies against targeted intrusions. This is just a reference to the top strategies: Patch Applications Patch the Operating System Minimize the use of local admin Application whitelisting ...
Posted 13 December 2011 by Roger Halbheer
0
comments
l am still sitting in the parliament room of the Council of Europe at the celebration event for the Budapest Convention. It was another very good event advancing the challenges fighting Cybercrime. Let me try to summarize a few thoughts: The Budapest Convention is probably the best convention ...
Posted 23 November 2011 by Roger Halbheer
0
comments
Cyber War Will Not Take Place
I have to admit – it is not my title but it caught my attention. Over the course of the last few years, the term “Cyberwar” came up all over the place. I was recently reading a book on it, where there was a chapter called “Definition of Cyberwar” and I thought that fina ...
Posted 17 November 2011 by Roger Halbheer
1
comment
  Yesterday, looking at my RSS-Feed I saw the post in here called Cloud Security Considerations – and immediately wanted to read it as we (a friend of mine and me) wrote a paper with exactly the same title. I was so thrilled that somebody else takes this to blog about – however I w ...
Posted 16 November 2011 by Roger Halbheer
0
comments
How to Manage “Bring Your Own Device”
Long time since I blogged. It is time to "come back :-)". The kick was that I started to work on a Windows 8 Slate as a secondary PC and thought about the consumerization scenario once more: A few years back a customer’s CSO left the room when I said that this customer sho ...
Posted 10 November 2011 by Roger Halbheer
0
comments
Cybersecurity: The Road Ahead
This paper by the Geneva Centre for the Democratic Control of Armed Forces (DCAF) was just brought to my attention. A piece of work that is definitely worth reading through. It lays out the problem space and then does a deep dive into the different sections: Governments Legislative Bo ...
Posted 14 April 2011 by Roger Halbheer
0
comments
Aligning Security with the Business
Do you know the feeling? You should share a large file with somebody outside your organization. The file is too big to be sent by e-mail. What can you do? Well, you might have a service by internal IT (we have one) that is not really user-friendly, hard to use and – as you do not need it too o ...
Posted 01 March 2011 by Roger Halbheer
0
comments
Quit Worrying About Cloud Security?
Well, it is not THAT easy but at least there are people starting to claim that it is not as hard as it seems to be sometimes. I stumbled across the following article: Why you can quit worrying about cloud security (thank you Jim), which makes a lot of interesting statements on how the US Federal Gov ...
Posted 04 February 2011 by Roger Halbheer
0
comments
There is an good article on CIO Central: Are You Focused On The Wrong Security Risks? An interesting discussion, and I partly agree that we have to challenge the way we look at the security risks. I would even broaden the questions he raises. When I talk about industry trends that impact your ris ...
Posted 28 January 2011 by Roger Halbheer
0
comments
From tomorrow on, UNDOC invited for an Open Ended Expert Group on Cybercrime in Vienna. I am really interested in seeing how these discussions will go. If – by any chance – you are there as well, please ping me and we will have a chat. Otherwise, I will see what I can blog about. But at ...
Posted 16 January 2011 by Roger Halbheer
0
comments
Cybercrime as a Service – Our Future?
It is not really surprising that criminals will leverage the economy of Cloud Computing for their illegal purposes. Especially activities that consume a lot of processor power will be moved to the Cloud – like any other business. Some way back, there were discussions on how to leverage GPUs t ...
Posted 12 January 2011 by Roger Halbheer
0
comments
Mitigating the use of Local Admin
We recently had internal discussions on the use of local admin and how to mitigate it. During this, Richard Diver, a Premier Field Engineer in APAC, wrote a great article how to do it. I wanted to make sure you can all see this as well. So, this is a guest blog. General Goals of Strategic Desktop ...
Posted 05 December 2010 by Roger Halbheer
0
comments
The Cloud is Also Green
Yes, not only gray :-) Seriously, we commissioned a study to see what the impact of cloud computing is not only to efficiency but the the environment. Can you save CO2 by moving to the cloud? I think its something we do not look at often enough. As pictures say more than 1000 words, here you see th ...
Posted 22 November 2010 by Roger Halbheer
0
comments
Fixing Risk Management
I am not satisfied with the way we (in the industry) are doing risk management. In my early days, before I was actually entering the security space, I was doing project management and as part of it, risk management. The way we did it was fairly simple (as probably most of you do): We had an impact o ...
Posted 15 November 2010 by Roger Halbheer
0
comments
The Value of Government Clouds
Microsoft recently released a paper called The Economics of Cloud Computing for the EU Public Sector, which is actually valid for every other European country as well, as it is not too narrowly focused on the EU only. Additionally there is a US version of the paper. It is definitely worth reading. ...
Posted 12 November 2010 by Roger Halbheer
0
comments
Turkey signed Cybercrime Convention
We are huge supporter of the Convention on Cybercrime by the Council of Europe. The reason for this is that we are convinced that there is a need of a certain level of harmonization across the Globe regarding cybercrime laws. Today I learned that Turkey signed the convention yesterday. This is a gr ...
Posted 11 November 2010 by Roger Halbheer
0
comments
Russia to revise Cybercrime Legislation?
You know that I am propagating the adoption of cybercrime legislation, which is aligned across the Globe. Something, which is absolutely necessary if we want to fight Cybercrime. Basically we are asking governments to consider the Cybercrime Convention (also known as Budapest Convention) by the Coun ...
Posted 05 November 2010 by Roger Halbheer
Showing 1 - 20 of 74 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×