PRINT THE CYBER THREAT YOU'D NEVER EXPECT 1 2 Local, regional - - PDF document

print
SMART_READER_LITE
LIVE PREVIEW

PRINT THE CYBER THREAT YOU'D NEVER EXPECT 1 2 Local, regional - - PDF document

2/26/2020 PRINT THE CYBER THREAT YOU'D NEVER EXPECT 1 2 Local, regional and national sales, service and support Print Security Assessment, 2019 Marco serves over $ 35,000 clients nationwide from 64 locations Quocirca 3 4 1 2/26/2020


slide-1
SLIDE 1

2/26/2020 1

PRINT

THE CYBER THREAT YOU'D NEVER EXPECT

Local, regional and national sales, service and support

Marco serves over 35,000 clients nationwide from 64 locations

Print Security Assessment, 2019

Quocirca

$

1 2 3 4

slide-2
SLIDE 2

2/26/2020 2

State of Print Security

Endpoint Focused Breach Focused

Breach Focused

Controlling the transmission, storage, and processing of data

Secure data at rest, and in transit

  • Print Data Flows
  • Scan Data Flows

Breach Focused Controls:

Hard Drives

Encryption

Output Tray

Secure Printing

Data Loss Prevention

Non-repudiation

Endpoint Focused

Printers as fully fledged network endpoints Printers are endpoints that:

  • … are network connected
  • … process sensitive data
  • … have credentials
  • … require patching
  • … stick around past EOL

Endpoint Focused Framework

Hardware

Lifecycle Management (EOL)

Firmware

Patch Management

Configuration

Device Hardening

  • Scarily Updated
  • Featureless
  • Long Lived
  • Default Configs

5 6 7 8

slide-3
SLIDE 3

2/26/2020 3

  • Average Skill

Attacks at Every Skill Level

  • Low Skill

PRIVILEGE ESCALATION UNAUTHORIZED ACCESS

Print Security is Complicated Hacking Printers is Not hacking-printers.net

Advanced Controls

Organization Specific Innovative Controls

Advanced Breach & Endpoint Controls

  • OCR Breach Monitoring (detect/respond)
  • SIEM Integration (detect/respond)
  • Secure Faxing Solutions (protect)
  • Workflow Automation (risk reduction)

9 10 11 12

slide-4
SLIDE 4

2/26/2020 4

Industry Updates

How is the industry responding

Manufacturers and resellers are responding:

  • Hardware Improvements
  • Professional Services
  • Configuration Management Solutions

Solution Architecting

Solutioning Realities:

  • No Silver Bullets
  • No Single Software
  • Not Always Single Manufacturer

Every environment is unique

Control Planning

Endpoint Focused Breach Focused

Control Planning, Breach

Endpoint Focused Breach Focused Data Loss Prevention

Non-repudiation

13 14 15 16

slide-5
SLIDE 5

2/26/2020 5

Control Planning, Endpoint

Hardware

Lifecycle Management (EOL)

Firmware

Patch Management

Configuration

Device Hardening

Endpoint Focused Breach Focused

stay connected. @marcotechnology facebook.com/marcoculture

17 18 19