Presentation delivered at the Cybercrime conference of the World Union of Arab Bankers on Nov 5th, 2016.
It explains how digital technologies are pushing us to rethink the traditional model of securing the enterprise.
Generative AI for Technical Writer or Information Developers
The End of the Fortress: The new Approach to Cybersecurity
1. The Fortress has fallen: the new approach to
Cybersecurity
Marc Nader
@mourcous
Date | November-2016
2. 2
Leaders in Information &
Communication Technology
Leaders in
Virtualization & Cloud
Computing
Leaders in IT
Outsourcing & Cloud
Solutions
3. The fortress approach
Breaking through the walls: Digitization, IoT & Cloud
The Zero-Trust network
Redefining the rules of the game
The new approach & the promise of the cloud
Agenda
3
26. The zero Trust Network
• Secure the data and not the perimeter
• Everybody is untrusted
• All resources are accessed securely
• Design the network from the inside out
• Security Analytics
23
28. The new Security Framework
25
Authentication: endpoints should be
fingerprinted.
Authorization: establishing the cross
platform trust relationships.
Network Enforced Policy: all
elements that route and transport
endpoint traffic securely over the
infrastructure.
Analytics: Data, generated by the IoT
devices, is only valuable if the right
analytics algorithms or other
security intelligence processes are
defined to identify the threat.
Ref.:Cisco
29. BeyondCorp
Unprivileged Network in a
private space with limited
network services
Authenticating endpoints
Access-proxies
Access-control
Security Analytics
Ref.:Google
26
34. Can we catch up?
“[Google's] ability to build, organize, and operate
a huge network of servers and fiber-optic cables
with an efficiency and speed that rocks physics
on its heels.
This is what makes Google Google: its physical
network, its thousands of fiber miles, and those
many thousands of servers that, in aggregate,
add up to the mother of all clouds.”
- Wired
31
36. Why is security so tough?
33
Data Problem: Users want to access their data anytime, from anywhere
of corporate data
resides unprotected on PC
desktops and laptops
60%
laptop computers will
be stolen within 12 months
of purchase
1-out-of-10
of USB thumb drive owners report
losing them, over 60% with private
corporate data on them
66%
37. Takeways
34
Protect UsersProtect
Information
Protect the
Company
• Digitization has broken down the perimeter
• No one can be trusted
• Zero trust architecture moves the security efforts to each transaction
• Cloud architectures are the most ready to deliver on this promise