Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - Andre Durand

1,373 views

Published on

Published in: Technology

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - Andre Durand

  1. 1. WELCOME IDENTERATI
  2. 2. INTRODUCING SIERRA BORDER SECURITY V1.0
  3. 3. “WE DIDN’T FOCUS ON HOW YOU COULD WRECK THE SYSTEM INTENTIONALLY” Vinton G. Cerf
  4. 4. $100 BILLION Estimated loss in US per annum due to cybercrimeTHE INTERNET “THEY THOUGHT THEY WERE BUILDING A CLASSROOM AND IT TURNS OUT THEY BUILT A BANK.” Abbate
  5. 5. SECURITY WASN’T EVEN A GOAL
  6. 6. UNFORTUNATE TRUTH ATTACKS SECURITY Ubiquitous Internet New Vulnerabilities Market for Identity Success & Profits 30 Million Bots Insider Recruitment Organization
  7. 7. WHAT IF OUR PERIMETER NO LONGER DEFINES OUR PERIMETER?
  8. 8. THE PERIMETER IS EXPANDING 2007 2008 2009 2010 2011 2012 2013 2014 2015Timeline Software-as-a-Service ENTERPRISE (apps, users, network)
  9. 9. THE PERIMETER IS EXPANDING 2007 2008 2009 2010 2011 2012 2013 2014 2015Timeline Software-as-a-Service ENTERPRISE (apps, users, network) Smart Mobile Devices
  10. 10. Infrastructure-as-a-Service 2007 2008 2009 2010 2011 2012 2013 2014 2015Timeline Software-as-a-Service ENTERPRISE (apps, users, network) Smart Mobile Devices THE PERIMETER IS EXPANDING
  11. 11. “DON’T EVER TAKE DOWN YOUR FENCE UNTIL YOU KNOW THE REASON IT WAS PUT UP.” G.K. Chesterton
  12. 12. internet enterprise computer device app api Iot MANY BORDERS ONE BORDERLESS IDENTITY SYSTEM
  13. 13. WE’RE BUILDING A HAMSTER TRAIL SECURE TUNNELS TO TRANSMIT AUTHENTICATED USERS
  14. 14. REDEFINING SECURITY with IDENTITY CORE SECURITY IDENTITY DEFINED SECURITY IDENTITY
  15. 15. WE’RE ON A JOURNEY TO FULL IDENTITY VISIBILITY
  16. 16. ANONYMOUS BY DEFAULT IDENTIFIED BY DEFAULT FUTURE PAY EXTRA FOR ANONAMOUS TRANSACTIONS
  17. 17. BEWARE OUR ASSUMPTIONS
  18. 18. ONLY GOOD ACTORS COULD ACCESS THE NETWORK ASSUMPTION #1 1970
  19. 19. THE PERIMETER IS SECURE ASSUMPTION #2 1970–TODAY
  20. 20. IDENTITY IS MORE SECURE ASSUMPTION #3 2015
  21. 21. WHAT WOULD WE DO IF PERIMETER ALREADY BREACHED
  22. 22. WHAT IF THE RIGHT IDENTITY BECOMES A BAD ACTOR?
  23. 23. WHAT IF… IDENTITY IS TOO WEAK & TOO DISCONNECTED TO PROTECT US AT SCALE?
  24. 24. MOVING FORWARD
  25. 25. EVOLVE FROM SINGLE-FACTOR AUTHENTICATION
  26. 26. TO CONTINUOUS AND CONTEXTUAL MULTI-FACTOR
  27. 27. STANDARDS-BASED INTERACTIONS EVERYWHERE INCLUDING FIRST/LAST MILE INTEGRATION
  28. 28. micro trust trust a little > trust a little more login > trust a lot > trust a little more trust a little less and so on… TIME OUT / LOGOUTLOGIN > TRUST A LOT > BIG TRUST
  29. 29. NEED A NEW SYSTEM FOR IDENTITY PROOFING & RESOLUTION
  30. 30. move beyond STATIC ACCESS CONTROL
  31. 31. LEVERAGE BIG-DATA & INTELLIGENCE TO ENABLE DYNAMIC ACCESS CONTROL
  32. 32. KUDO’S OPENID CONNECT
  33. 33. THANK YOU
  34. 34. REGISTER EARLY!
  35. 35. INTRODUCING ALEX SIMONS

×