print
play

PRINT THE CYBER THREAT YOU'D NEVER EXPECT 1 2 Local, regional - PDF document

2/26/2020 PRINT THE CYBER THREAT YOU'D NEVER EXPECT 1 2 Local, regional and national sales, service and support Print Security Assessment, 2019 Marco serves over $ 35,000 clients nationwide from 64 locations Quocirca 3 4 1 2/26/2020


  1. 2/26/2020 PRINT THE CYBER THREAT YOU'D NEVER EXPECT 1 2 Local, regional and national sales, service and support Print Security Assessment, 2019 Marco serves over $ 35,000 clients nationwide from 64 locations Quocirca 3 4 1

  2. 2/26/2020 State of Print Security Breach Focused Controlling the transmission, storage, and processing of data Secure data at rest, and in transit  Print Data Flows Breach Endpoint  Scan Data Flows Focused Focused Breach Focused Controls: Hard Drives Output Tray Data Loss Prevention Encryption Secure Printing Non-repudiation 5 6 Endpoint Focused Framework Endpoint Focused Printers as fully fledged network endpoints Default Configs  Configuration Device Hardening Printers are endpoints that:  Scarily Updated Firmware  … are network connected Patch Management  … process sensitive data Long Lived   … have credentials Hardware  … require patching  Featureless Lifecycle Management (EOL)  … stick around past EOL 7 8 2

  3. 2/26/2020 Attacks at Every Skill Level Print Security is Complicated  Average Skill  Low Skill PRIVILEGE UNAUTHORIZED ESCALATION ACCESS 9 10 Hacking Advanced Printers is Controls Organization Specific Innovative Controls Not Advanced Breach & Endpoint Controls hacking-printers.net  OCR Breach Monitoring (detect/respond)  SIEM Integration (detect/respond)  Secure Faxing Solutions (protect)  Workflow Automation (risk reduction) 11 12 3

  4. 2/26/2020 Solution Industry Architecting How is the industry responding Updates Solutioning Realities:  No Silver Bullets  No Single Software Manufacturers and resellers are responding:  Not Always Single Manufacturer  Hardware Improvements Every environment is unique  Professional Services  Configuration Management Solutions 13 14 Control Planning Control Planning, Breach Breach Endpoint Breach Endpoint Focused Focused Focused Focused Data Loss Prevention Non-repudiation 15 16 4

  5. 2/26/2020 Control Planning, Endpoint Configuration Device Hardening Breach Endpoint Firmware Focused Focused Patch Management Hardware Lifecycle Management (EOL) stay connected. @marcotechnology facebook.com/marcoculture 17 18 19 5

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend