SlideShare a Scribd company logo
1 of 27
IT Security Seminar
Het Nieuwe Werken of Het Nieuwe Lekken? 24 nov. 2011, Meppel
Erik Remmelzwaal – Algemeen Directeur
HNW & IT Security

                      Welke technologie maakt HNW mogelijk?



IT Security Seminar
                                                              2
15-12-2011
Programma
 Vertrouwen, wat is dat?

 Management: Wie?

 Controleren of Segmenteren?

 Toegangscontrole

 Vervang perimeter beveiliging

 What about DATA?

IT Security Seminar
                                  3
15-12-2011
Marcel Spruit
                      HNW & IT Security   Lector Cyber Security & Safety HHS


                      Vertrouwen, wat is dat?


IT Security Seminar
                                                                        4
15-12-2011
“Vertrouwen”
 Vertrouwen is het geloof in iemands
  betrouwbaarheid (Van Dale), op basis waarvan
  men bereid is de daaraan verbonden risico’s te
  accepteren (Vosselman)


                             Computer    Comm.       Computer
                      Mens                                      Mens

   Organisatie                          Vertrouwen                     Organisatie



IT Security Seminar
                                                                                     5
15-12-2011
Vertrouwen en kennis

                                                                Schaalvergroting
                                                                Verzakelijking
                                                                Het Nieuwe Werken
                                    “Trust Me”
 Kennis over persoon
                       Vertrouwen




                                                 “Tell Me”

                                                             “Show Me”

                                                                      “Prove Me”


                                                 Regels en Controle

IT Security Seminar
                                                                                    6
15-12-2011
HNW & IT Security

                      Management: Wie?


IT Security Seminar
                                          7
15-12-2011
Scenario’s voor HNW




                         LAN/WAN




 Systemen van de Zaak                      “BYOD”

Beheer: IT Afdeling                   Beheer: Gebruiker
                        Vertrouwen?


 IT Security Seminar
                                                     8
 15-12-2011
Systemen van de Zaak: Uitdagingen


Laptops                            Smartphones & Tablets
1. Zorgen voor continue   1.   “Mobile Device
   connectiviteit              Management”
2. Vervang perimeter      2.   Variëteit aan OS-en
   beveiliging            3.   Universeel?
3. Ook Non-Windows        4.   Anti-Virus
   systemen               5.   Anti-Theft (remote
                               lock, wipe, etc.)
                          6.   Backup


IT Security Seminar
                                                       9
15-12-2011
BYOD: Uitdagingen

Laptops                             Smartphones & Tablets
Alles van vorige sheet +    Alles van vorige sheet +
1. Controle op Compliancy   1. Zakelijk vs Persoonlijk
2. Soorten en versies van   2. Encryptie?
    besturingssystemen      3. Versiebeheer
3. Backups                  4. Onbetrouwbare Apps




IT Security Seminar
                                                       10
15-12-2011
Helaas…


        De techniek is slechts ten dele klaar om de
         uitdagingen (van BYOD) op te lossen…

                      … maar we willen het toch...


                         Workaround!

IT Security Seminar
                                                      11
15-12-2011
HNW & IT Security

                      Controleren of Segmenteren


IT Security Seminar
                                                   12
15-12-2011
De setup incl .workaround
1. Centrale management omgeving
     Anytime, Anyplace, Anywhere

2. BYOD in aparte Zone

3. Dynamisch herkennen en toewijzen

4. Network Security tussen VLANs

5. Beeldscherm connectiviteit naar LAN
IT Security Seminar
                                         13
15-12-2011
ePolicy Orchestrator


1.       ePO Server
2.       MS SQL Database
3.       McAfee Agents
4.       Agent->Server Sec. Comm.
5.       Web Console
6.       McAfee Update Server
7.       Distributed Repositories
8.       Remote Agent Handlers
9.       Ticketing System
10.      Automatic Responses




IT Security Seminar
                                    14
15-12-2011
Mobile Device Management

 Mogelijkheden
  afhankelijk van OS:
       o   Android
       o   iOS
       o   RIM
       o   Windows Phone
       o   (en verder?)
 ECHTE universele
  security is er nog niet.
  Management wel.

IT Security Seminar
                             15
15-12-2011
Netwerk Apparatuur

 Let op 802.1x
  ondersteuning in:

       o Switches

       o Wireless Access Points

       o Remote Access Gateway




IT Security Seminar
                                  16
15-12-2011
Network Access Control

Aanvullend op 802.1x, tbv:

 Compliancy controles

 Alleen compliant
  systemen in het
  netwerk

 Pre-Admission

IT Security Seminar
                             17
15-12-2011
NextGen IPS

 Beveiliging tussen Zones
  / VLANs

 Scanning op
  Applicatielaag (OSI 7)

 BYOD / Guest VLAN =
  Onbetrouwbaar!



IT Security Seminar
                             18
15-12-2011
SSL VPN

 Remote Access via Web
  Browser

 Toegang tot RDP, Files,
  interne webservers,
  applicaties, etc.

 Junos Pulse



IT Security Seminar
                            19
15-12-2011
Schematisch
                               Data Center
                                             Security Management
                                             - ePO                           inter
                                             - EMM                            net


Network Security:
- 802.1x/NAC
- IPS / Firewall




                                                                                     Thuis


                          KA                 BYOD                  SSL VPN


                               WAN/LAN
    IT Security Seminar
                                                                                         20
    15-12-2011
HNW & IT Security

                      Vervang Perimeter Beveiliging


IT Security Seminar
                                                      21
15-12-2011
Typen Perimeter Beveiliging

Gateway                   Endpoint
1. Firewall               1. Host Intrusion Prevention

2. Intrusion Prevention   2. Idem
   (“virtual patching”)

3. URL Filtering          3. SiteAdvisor Enterprise

4. Etc.                   4. 0251-750250


IT Security Seminar
                                                         22
15-12-2011
HNW & IT Security

                      What about DATA?


IT Security Seminar
                                          23
15-12-2011
What about DATA
 “Data in motion”

 Stap 1: Classificatie

 Daarna: DLP - Policies
       o Host-Based
       o Network-Based



IT Security Seminar
                           24
15-12-2011
HNW & IT Security

                      Resumeren


IT Security Seminar
                                          25
15-12-2011
Resumeren
1. Overzicht dmv centraal management

2. Controle over remote / mobile devices

3. BYOD netwerk scheiden van KA & DataCenter

4. Bij BYOD geen “Native Apps” maar Beeldscherm
   connectiviteit

5. Data classificeren.
              “Confidentieel” mag NIET het netwerk verlaten
IT Security Seminar
                                                              26
15-12-2011
HNW & IT Security

                      Vragen?


IT Security Seminar
                                          27
15-12-2011

More Related Content

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

IT Security Seminar

  • 1. IT Security Seminar Het Nieuwe Werken of Het Nieuwe Lekken? 24 nov. 2011, Meppel Erik Remmelzwaal – Algemeen Directeur
  • 2. HNW & IT Security Welke technologie maakt HNW mogelijk? IT Security Seminar 2 15-12-2011
  • 3. Programma  Vertrouwen, wat is dat?  Management: Wie?  Controleren of Segmenteren?  Toegangscontrole  Vervang perimeter beveiliging  What about DATA? IT Security Seminar 3 15-12-2011
  • 4. Marcel Spruit HNW & IT Security Lector Cyber Security & Safety HHS Vertrouwen, wat is dat? IT Security Seminar 4 15-12-2011
  • 5. “Vertrouwen”  Vertrouwen is het geloof in iemands betrouwbaarheid (Van Dale), op basis waarvan men bereid is de daaraan verbonden risico’s te accepteren (Vosselman) Computer Comm. Computer Mens Mens Organisatie Vertrouwen Organisatie IT Security Seminar 5 15-12-2011
  • 6. Vertrouwen en kennis Schaalvergroting Verzakelijking Het Nieuwe Werken “Trust Me” Kennis over persoon Vertrouwen “Tell Me” “Show Me” “Prove Me” Regels en Controle IT Security Seminar 6 15-12-2011
  • 7. HNW & IT Security Management: Wie? IT Security Seminar 7 15-12-2011
  • 8. Scenario’s voor HNW LAN/WAN Systemen van de Zaak “BYOD” Beheer: IT Afdeling Beheer: Gebruiker Vertrouwen? IT Security Seminar 8 15-12-2011
  • 9. Systemen van de Zaak: Uitdagingen Laptops Smartphones & Tablets 1. Zorgen voor continue 1. “Mobile Device connectiviteit Management” 2. Vervang perimeter 2. Variëteit aan OS-en beveiliging 3. Universeel? 3. Ook Non-Windows 4. Anti-Virus systemen 5. Anti-Theft (remote lock, wipe, etc.) 6. Backup IT Security Seminar 9 15-12-2011
  • 10. BYOD: Uitdagingen Laptops Smartphones & Tablets Alles van vorige sheet + Alles van vorige sheet + 1. Controle op Compliancy 1. Zakelijk vs Persoonlijk 2. Soorten en versies van 2. Encryptie? besturingssystemen 3. Versiebeheer 3. Backups 4. Onbetrouwbare Apps IT Security Seminar 10 15-12-2011
  • 11. Helaas… De techniek is slechts ten dele klaar om de uitdagingen (van BYOD) op te lossen… … maar we willen het toch...  Workaround! IT Security Seminar 11 15-12-2011
  • 12. HNW & IT Security Controleren of Segmenteren IT Security Seminar 12 15-12-2011
  • 13. De setup incl .workaround 1. Centrale management omgeving Anytime, Anyplace, Anywhere 2. BYOD in aparte Zone 3. Dynamisch herkennen en toewijzen 4. Network Security tussen VLANs 5. Beeldscherm connectiviteit naar LAN IT Security Seminar 13 15-12-2011
  • 14. ePolicy Orchestrator 1. ePO Server 2. MS SQL Database 3. McAfee Agents 4. Agent->Server Sec. Comm. 5. Web Console 6. McAfee Update Server 7. Distributed Repositories 8. Remote Agent Handlers 9. Ticketing System 10. Automatic Responses IT Security Seminar 14 15-12-2011
  • 15. Mobile Device Management  Mogelijkheden afhankelijk van OS: o Android o iOS o RIM o Windows Phone o (en verder?)  ECHTE universele security is er nog niet. Management wel. IT Security Seminar 15 15-12-2011
  • 16. Netwerk Apparatuur  Let op 802.1x ondersteuning in: o Switches o Wireless Access Points o Remote Access Gateway IT Security Seminar 16 15-12-2011
  • 17. Network Access Control Aanvullend op 802.1x, tbv:  Compliancy controles  Alleen compliant systemen in het netwerk  Pre-Admission IT Security Seminar 17 15-12-2011
  • 18. NextGen IPS  Beveiliging tussen Zones / VLANs  Scanning op Applicatielaag (OSI 7)  BYOD / Guest VLAN = Onbetrouwbaar! IT Security Seminar 18 15-12-2011
  • 19. SSL VPN  Remote Access via Web Browser  Toegang tot RDP, Files, interne webservers, applicaties, etc.  Junos Pulse IT Security Seminar 19 15-12-2011
  • 20. Schematisch Data Center Security Management - ePO inter - EMM net Network Security: - 802.1x/NAC - IPS / Firewall Thuis KA BYOD SSL VPN WAN/LAN IT Security Seminar 20 15-12-2011
  • 21. HNW & IT Security Vervang Perimeter Beveiliging IT Security Seminar 21 15-12-2011
  • 22. Typen Perimeter Beveiliging Gateway Endpoint 1. Firewall 1. Host Intrusion Prevention 2. Intrusion Prevention 2. Idem (“virtual patching”) 3. URL Filtering 3. SiteAdvisor Enterprise 4. Etc. 4. 0251-750250 IT Security Seminar 22 15-12-2011
  • 23. HNW & IT Security What about DATA? IT Security Seminar 23 15-12-2011
  • 24. What about DATA  “Data in motion”  Stap 1: Classificatie  Daarna: DLP - Policies o Host-Based o Network-Based IT Security Seminar 24 15-12-2011
  • 25. HNW & IT Security Resumeren IT Security Seminar 25 15-12-2011
  • 26. Resumeren 1. Overzicht dmv centraal management 2. Controle over remote / mobile devices 3. BYOD netwerk scheiden van KA & DataCenter 4. Bij BYOD geen “Native Apps” maar Beeldscherm connectiviteit 5. Data classificeren. “Confidentieel” mag NIET het netwerk verlaten IT Security Seminar 26 15-12-2011
  • 27. HNW & IT Security Vragen? IT Security Seminar 27 15-12-2011