Zero Trust & The Flaming Sword of Justice Dave Lewis, Global - - PowerPoint PPT Presentation

zero trust the flaming sword of justice
SMART_READER_LITE
LIVE PREVIEW

Zero Trust & The Flaming Sword of Justice Dave Lewis, Global - - PowerPoint PPT Presentation

Zero Trust & The Flaming Sword of Justice Dave Lewis, Global Advisory CISO September 26th, 2018 Please Allow Me To Introduce Myself.. #WHOAMI Dave Lewis, Global Advisory CISO Castles Dont Scale Dont trust something just because


slide-1
SLIDE 1

Zero Trust & The Flaming Sword of Justice

Dave Lewis, Global Advisory CISO September 26th, 2018

slide-2
SLIDE 2

Please Allow Me To Introduce Myself..

slide-3
SLIDE 3

#WHOAMI

Dave Lewis, Global Advisory CISO

slide-4
SLIDE 4
slide-5
SLIDE 5
slide-6
SLIDE 6
slide-7
SLIDE 7
slide-8
SLIDE 8

Castles Don’t Scale

slide-9
SLIDE 9

Don’t trust something just because it’s on the “inside” of your firewall

slide-10
SLIDE 10

Is the password…password?

slide-11
SLIDE 11

No!! Now go away, or I shall taunt you a second time!

slide-12
SLIDE 12

Lessons From History

The sack of Rome in 410 AD

slide-13
SLIDE 13

Remember when you

  • nly had to outrun

the other hiker?

slide-14
SLIDE 14

Now there’s more than enough bear to go around

slide-15
SLIDE 15

The Flaming Sword of Justice

slide-16
SLIDE 16

Data Breaches

slide-17
SLIDE 17

The Summer of Breach 2012

slide-18
SLIDE 18

Been There…

slide-19
SLIDE 19

What’s Open In Chicago?

slide-20
SLIDE 20

149,040,804

slide-21
SLIDE 21

Meanwhile, In Illinois

slide-22
SLIDE 22

So, Why Should We Be Concerned?

Open Webcams Compromised Databases

1,872

13,027

50,547

Industrial Control Systems

slide-23
SLIDE 23

M’kay

slide-24
SLIDE 24

ZTN

slide-25
SLIDE 25

ZTN Value Proposition

  • Devaluation of stolen credentials
  • Low hanging fruit sours.
  • Complicates lateral movement

through uniform security policy.

  • Attackers have to work that much

harder.

slide-26
SLIDE 26

Unified Access Security, Value Proposition

  • Devaluation of stolen credentials
  • Low hanging fruit sours.
  • Complicates lateral movement

through uniform security policy.

  • Attackers have to work that much

harder.

slide-27
SLIDE 27

Bastion Hosts

slide-28
SLIDE 28

From DMZ To The Soft Chewy Centre

slide-29
SLIDE 29

Setting Expectations

slide-30
SLIDE 30

Aspire to a Zero Trust Network

slide-31
SLIDE 31

A Game of Increments

slide-32
SLIDE 32

Determining Priorities

slide-33
SLIDE 33

Zero Trust Shopping List

  • Asset Inventory.
  • User Management.
  • Device Management through uniform

security policy.

  • Defined Repeatable Process.
  • User and Entity Behavior Analytics.
  • Network Zone Segmentation.
slide-34
SLIDE 34

Unified Access Security Shopping List

  • Asset Inventory.
  • User Management.
  • Device Management through uniform

security policy.

  • Defined Repeatable Process.
  • User and Entity Behavior Analytics.
  • Network Zone Segmentation.
slide-35
SLIDE 35

The Authentications Must Flow

slide-36
SLIDE 36

Supply Chain Security

slide-37
SLIDE 37

Partner Network, Meet The Pentest

slide-38
SLIDE 38

SSH

slide-39
SLIDE 39
slide-40
SLIDE 40

ZTN Summary

  • Build an asset inventory.
  • Get a solid hold on user

management.

  • What’s on your network?
  • Defined Repeatable Process
  • User and Entity Behavior Analytics.
  • Network Zone Segmentation.
slide-41
SLIDE 41
  • Build an asset inventory.
  • Get a solid hold on user

management.

  • What’s on your network?
  • Defined Repeatable Process
  • User and Entity Behavior Analytics.
  • Network Zone Segmentation.

Unified Access Security Summary

slide-42
SLIDE 42

The Sword Is Dissolving

slide-43
SLIDE 43

No Need For The Holy Hand Grenade

slide-44
SLIDE 44

Thanks!

gattaca@ duo.com @ gattaca www.duo.com