SlideShare a Scribd company logo
1 of 25
Download to read offline
Track A-2: Forcepoint Raised The Bar:
What's Next in the Cross Domain Community
Michelle Jordan,
Global Governments Cybersecurity
Principal Cybersecurity Manager,
Forcepoint
George Kamis,
CTO, Global Governments &
Critical Infrastructure,
Forcepoint
Data Protection | Web Security | CASB | NGFW | Advanced Malware Detection | Behavioral Analytics | Insider Threat | Email Security | Data Guard | Cross Domain
Forcepoint Raised The Bar: What’s next in the
Cross Domain Community
George Kamis
Chief Technology Officer, Forcepoint Global Governments and Critical Infrastructure
Michelle Jordan
Cyber Security, Business Development, Forcepoint Global Governments and Critical Infrastructure
Forcepoint Proprietary © 2019 Forcepoint | 4
What are Cross Domain Solutions
Cross Domain Solutions:
• Facilitate secure information sharing between entities (agencies, countries, networks) with different sensitivity levels
through a controlled interface
• Are built on top of a secure, trusted operating system to achieve a high assurance platform
Three types of cross domain solutions as defined by the NCDSMO:
• Provides users a path to data on different networks as allowed by policy
Access:
• Provides various mechanisms to securely move data between different networks, while mitigating against
viruses, malware and policy violations as allowed by policy
Transfer (Guards):
• Solutions that encompass both access and transfer capabilities
Hybrid:
© 2019 Forcepoint | 5
Cross Domain Advantages
To effectively yet securely share information across multiple classified & separate
networks/domains
Real time access to multiple
separate & sensitive
networks/clouds
Removal of risky manual processes
including portable media used for
file transfer during mission-critical
activities (“sneakernet”)
Reduction of network and
computer hardware costs
Ability to access and share
information at multiple security
levels
Forcepoint Proprietary © 2019 Forcepoint | 6
What is Raise The Bar?
Raise The Bar
• An NSA and NCDSMO led initiative to continually improve the status quo in the cross domain community
• Focuses primarily on Transfer (Guard) mechanisms as well as concepts for Access solutions and system integrations to
combat evolving threats – The bar raises every year!
NSA and NCDSMO provide community support around Raise The Bar concepts:
• Community outreach and information briefings to contractors, vendors, customers and security personnel
• Security Design Reviews with vendors to tailor RTB guidance to specific technologies and determine best paths forward
• Engagement with independent test labs around methods to recognize, test and verify RTB concepts
• **Documented in Cross Domain Solution (CDS) Design and Implementation Requirements, 2018 Raise the Bar (RTB)
Baseline Release, Revision 1.0, 21 December 2018, Doc ID: NCDSMO-R-00008-001_00, National Cross Domain Strategy
and Management Office and National Security Agency
Forcepoint Proprietary
Forcepoint Proprietary © 2019 Forcepoint | 7
What is in Raise The Bar?
Raise The Bar currently consists of guidance across a number of areas
• What technology to use – don’t build from scratch
• System architectures and integration models
• Design and connectivity guidance
• Internal software architecture
• Management, maintenance and monitoring mechanisms
Borrows several concepts from the cryptography and formal methods communities, particularly R.A.I.N.
• Redundant - Always Invoked – Independent Implementation - Non-by-passable
• Substantial CDS redesign
Notable attention is paid to improving the state of data filtering, inspection & transformation
• New threats found on a regular basis requiring more robust and adaptable filtering
• Attempting standardization more accurate & precise language than “Deep Content Inspection”
• Constantly evaluating the state-of-the-art sanitization tools
Forcepoint Proprietary
Forcepoint Proprietary © 2019 Forcepoint | 8
Forcepoint’s Raise The Bar Involvement
Forcepoint is heavily involved in Raise The Bar (RTB)
• Trusted Thin Client, SimShield, Trusted Gateway System & High Speed Guard have met Raise The Bar objectives
• SimShield = one of the first products across the community to complete independent testing with RTB objectives
• All products have had favorable SABI LBSA test results and SAOs reviews
The Secret And Below Interoperability (SABI) process has fully embraced RTB:
• Independent test labs performing Lab Based Security Assessments (LBSA) since 2016 include RTB objectives
• Others are closely watching, Monitored closely by the Five-Eyes CDS working group
Forcepoint Proprietary
© 2019 Forcepoint | 9
Trusted Thin Client
Trusted Thin Client Remote
High Speed Guard
High Speed Guard SP
SimShield WebShield
Trusted Gateway
System
Trusted Print Delivery Trusted Mail System
Cross Domain Solutions Suite
Facilitating your mission while maintaining the highest degree of network and data security
ACCESS TRANSFER
TRANSFER - ADAPTORTRANSFER - ADAPTORTRANSFER
TRANSFER TRANSFER
Forcepoint Proprietary © 2019 Forcepoint | 10
Better Yet – Let’s Raise The Bar!
Virginia ABC store
December ‘18
Forcepoint Proprietary © 2019 Forcepoint | 11
Risk Adaptive Protection
Concepts to Cross Domain
Transfer
A Thought Leadership Discussion –
Going Beyond the Bar
Forcepoint Proprietary © 2019 Forcepoint | 12Forcepoint Proprietary
The growth of structured versus unstructured data over the past decade shows that unstructured data accounts for more than 90% of all data
Source: Patrick Cheesman)
Data continues to expand exponentially
Data volume growth directly
correlates to increase information
sharing needs
at multiple classifications level
Forcepoint Proprietary © 2019 Forcepoint | 13
User & Data Centric
Risk Adaptive Policies for
Cross Domain
UsersAndDataMustBeAtTheCenterOfYourDesignThinking
User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases risk
DegreeofDigital
Transformation
ITComplexity&Risk
Pre-2000 2025Infrastructure-centric 2015 Behavioral-centric
perimeter
Stove-Pipe CDS
Static Policies
Enterprise CDS
Static Policies
Forcepoint Proprietary © 2019 Forcepoint | 14Forcepoint Proprietary
DIGITAL
ACTIVITY
“Can’t Share” Can Share
Threat-Centric Cybersecurity
Necessary but insufficient to
scale
Does not meet the warfighters
needs
A LACK
OF CONTEXT
for Policy based
Decisions
EASY TO CLASSIFY EASY TO CLASSIFYHARD TO CLASSIFY
Trusting static policies in a dynamic
environment
Decide what is good or bad at a
single point in time
Configure your defenses to stop the
bad from entering and only allow
the good to pass through
Traditional approach to cross domain transfers
Security Wants to limit
data to only this
Operators Need This
Forcepoint Proprietary © 2019 Forcepoint | 15
UsersandDataisthecenterofourdesignthinking
User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases business risk
User & Data Centric
Risk Adaptive policy
Policy Policy
High SideLow Side
Traditional CDS Security
(static policy)
One-to-many enforcement of static,
generic policies, producing high
false positive rates.
Forcepoint Proprietary © 2019 Forcepoint | 16
Human-Centriccybersecuritychangeseverything
One-to-one enforcement of different policies based
on the risk, enabling automation.
Human-Centric Security
User & Data Centric
Risk Adaptive policy
Forcepoint Proprietary © 2019 Forcepoint | 17
The best way to efficiently evaluate data
transfers it to look beyond the CDS
demarcation point.
(data types, formats, sanitization, etc)
Need to extend risk factors in cross domain
transfer decisions outside the CDS device
(dynamic risk based on user behaviors, data
flows, data sources, data types, DLP markings,
etc)
Forcepoint Proprietary © 2019 Forcepoint | 18Forcepoint Proprietary
Today: All decisions are made at the CDS
Forcepoint Proprietary © 2019 Forcepoint | 19Forcepoint Proprietary
TECHNOLOGY ARCHITECTURE
1 SENSE
2
CONTEXTUALIZE
& UNDERSTAND
SENSE
CONCEPTUALIZE &
UNDERSTAND
1
2
Tomorrow: Closed Loop, Risk-adaptive approach
3 ENFORCE
3 ENFORCE at CDS
Forcepoint Proprietary © 2019 Forcepoint | 20Forcepoint Proprietary
RisklevelassignmentwithDynamicDataProtection(DDP)
Risk Scored Against:
• Self
• Local Group
• Organization
Forcepoint Proprietary © 2019 Forcepoint | 21Forcepoint Proprietary
Systemactionassignmentbyrisklevel–automaticpolicy(DDP)
Forcepoint Proprietary © 2019 Forcepoint | 22
We need to start looking beyond the bar
Static policies do not scale
Need to look deeper into the source of data, not just the data to make an authorized
transfer (behaviors -who, where, when, how much)
Can leverage DLP technology to make better transfer decisions
Common static filtering across all CDSes
can be targeted and exploited
Need to look at human behaviors and
model normal vs compromised with
dynamic policy adjustment
Static policies do not scale and will limit
data and visibility to those that need the
data
Forcepoint Proprietary © 2019 Forcepoint | 23Forcepoint Proprietary
The Forcepoint Difference
Risk-adaptive protection powered by behavioral
intelligence research delivers automation is available
today with Forcepoint Dynamic Data Protection
Leader in Cross Domain (CDS), Data Loss Protection
(DLP), Data Analytics, Insider Threat, and Dynamic
Data Protection
We are the experts in human-centric security.
Understand the balance between security and
operational needs
Forcepoint Proprietary
Follow us!
Forcepoint LLC@Forcepoint Forcepoint @ForcepointSec
@ForcepointLabs
Forcepoint
Thank you
© 2019 Forcepoint | 25

More Related Content

What's hot

Data Center Security
Data Center SecurityData Center Security
Data Center SecurityCisco Canada
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust ModelYash
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise SecuritySplunk
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSLarry Austin
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideMaticmind
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations♟Sergej Epp
 
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...SWITCHPOINT NV/SA
 
CyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementCyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementPriyanka Aash
 
Using ATTACK to Create Cyber DBTS for Nuclear Power Plants
Using ATTACK to Create Cyber DBTS for Nuclear Power PlantsUsing ATTACK to Create Cyber DBTS for Nuclear Power Plants
Using ATTACK to Create Cyber DBTS for Nuclear Power PlantsMITRE - ATT&CKcon
 

What's hot (20)

Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise Security
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
 
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
 
CyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementCyberSecurity Portfolio Management
CyberSecurity Portfolio Management
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
Using ATTACK to Create Cyber DBTS for Nuclear Power Plants
Using ATTACK to Create Cyber DBTS for Nuclear Power PlantsUsing ATTACK to Create Cyber DBTS for Nuclear Power Plants
Using ATTACK to Create Cyber DBTS for Nuclear Power Plants
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 

Similar to Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george kamis and michelle jordan_cybersecurity leadership forum

Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Benoît H. Dicaire
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security StrategyCloudflare
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...Cohesive Networks
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools SolarWinds
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
 
Inteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceInteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceMarketingArrowECS_CZ
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Fidelis Cybersecurity
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Software Integrity Group
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App DeliveryMighty Guides, Inc.
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats Jim Kaplan CIA CFE
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the CloudOnRamp
 
Demystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceDemystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceMirantis
 

Similar to Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george kamis and michelle jordan_cybersecurity leadership forum (20)

Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security Strategy
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Inteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceInteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformace
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
Demystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceDemystifying Cloud Security Compliance
Demystifying Cloud Security Compliance
 

More from scoopnewsgroup

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMAscoopnewsgroup
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choicescoopnewsgroup
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernizationscoopnewsgroup
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecturescoopnewsgroup
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformationscoopnewsgroup
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?scoopnewsgroup
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problemsscoopnewsgroup
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trustscoopnewsgroup
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happyscoopnewsgroup
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linuxscoopnewsgroup
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Agescoopnewsgroup
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Governmentscoopnewsgroup
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factoryscoopnewsgroup
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Rangescoopnewsgroup
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurityscoopnewsgroup
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summitscoopnewsgroup
 

More from scoopnewsgroup (20)

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
 

Recently uploaded

YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfyalehistoricalreview
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Christina Parmionova
 
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOPEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOMAIRIEORGERUS
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...saminamagar
 
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26JSchaus & Associates
 
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Christina Parmionova
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urgesnarwatsonia7
 
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Stop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingStop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingSERUDS INDIA
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdfilocosnortegovph
 
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...Amil baba
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...narwatsonia7
 
Angels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxAngels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxLizelle Coombs
 
Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleSERUDS INDIA
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhellokittymaearciaga
 

Recently uploaded (20)

YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.
 
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOPEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
 
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
 
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Stop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingStop throwing your old clothes and start donating
Stop throwing your old clothes and start donating
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf
 
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
 
Angels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxAngels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptx
 
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
 
Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor People
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptx
 

Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george kamis and michelle jordan_cybersecurity leadership forum

  • 1.
  • 2. Track A-2: Forcepoint Raised The Bar: What's Next in the Cross Domain Community Michelle Jordan, Global Governments Cybersecurity Principal Cybersecurity Manager, Forcepoint George Kamis, CTO, Global Governments & Critical Infrastructure, Forcepoint
  • 3. Data Protection | Web Security | CASB | NGFW | Advanced Malware Detection | Behavioral Analytics | Insider Threat | Email Security | Data Guard | Cross Domain Forcepoint Raised The Bar: What’s next in the Cross Domain Community George Kamis Chief Technology Officer, Forcepoint Global Governments and Critical Infrastructure Michelle Jordan Cyber Security, Business Development, Forcepoint Global Governments and Critical Infrastructure
  • 4. Forcepoint Proprietary © 2019 Forcepoint | 4 What are Cross Domain Solutions Cross Domain Solutions: • Facilitate secure information sharing between entities (agencies, countries, networks) with different sensitivity levels through a controlled interface • Are built on top of a secure, trusted operating system to achieve a high assurance platform Three types of cross domain solutions as defined by the NCDSMO: • Provides users a path to data on different networks as allowed by policy Access: • Provides various mechanisms to securely move data between different networks, while mitigating against viruses, malware and policy violations as allowed by policy Transfer (Guards): • Solutions that encompass both access and transfer capabilities Hybrid:
  • 5. © 2019 Forcepoint | 5 Cross Domain Advantages To effectively yet securely share information across multiple classified & separate networks/domains Real time access to multiple separate & sensitive networks/clouds Removal of risky manual processes including portable media used for file transfer during mission-critical activities (“sneakernet”) Reduction of network and computer hardware costs Ability to access and share information at multiple security levels
  • 6. Forcepoint Proprietary © 2019 Forcepoint | 6 What is Raise The Bar? Raise The Bar • An NSA and NCDSMO led initiative to continually improve the status quo in the cross domain community • Focuses primarily on Transfer (Guard) mechanisms as well as concepts for Access solutions and system integrations to combat evolving threats – The bar raises every year! NSA and NCDSMO provide community support around Raise The Bar concepts: • Community outreach and information briefings to contractors, vendors, customers and security personnel • Security Design Reviews with vendors to tailor RTB guidance to specific technologies and determine best paths forward • Engagement with independent test labs around methods to recognize, test and verify RTB concepts • **Documented in Cross Domain Solution (CDS) Design and Implementation Requirements, 2018 Raise the Bar (RTB) Baseline Release, Revision 1.0, 21 December 2018, Doc ID: NCDSMO-R-00008-001_00, National Cross Domain Strategy and Management Office and National Security Agency Forcepoint Proprietary
  • 7. Forcepoint Proprietary © 2019 Forcepoint | 7 What is in Raise The Bar? Raise The Bar currently consists of guidance across a number of areas • What technology to use – don’t build from scratch • System architectures and integration models • Design and connectivity guidance • Internal software architecture • Management, maintenance and monitoring mechanisms Borrows several concepts from the cryptography and formal methods communities, particularly R.A.I.N. • Redundant - Always Invoked – Independent Implementation - Non-by-passable • Substantial CDS redesign Notable attention is paid to improving the state of data filtering, inspection & transformation • New threats found on a regular basis requiring more robust and adaptable filtering • Attempting standardization more accurate & precise language than “Deep Content Inspection” • Constantly evaluating the state-of-the-art sanitization tools Forcepoint Proprietary
  • 8. Forcepoint Proprietary © 2019 Forcepoint | 8 Forcepoint’s Raise The Bar Involvement Forcepoint is heavily involved in Raise The Bar (RTB) • Trusted Thin Client, SimShield, Trusted Gateway System & High Speed Guard have met Raise The Bar objectives • SimShield = one of the first products across the community to complete independent testing with RTB objectives • All products have had favorable SABI LBSA test results and SAOs reviews The Secret And Below Interoperability (SABI) process has fully embraced RTB: • Independent test labs performing Lab Based Security Assessments (LBSA) since 2016 include RTB objectives • Others are closely watching, Monitored closely by the Five-Eyes CDS working group Forcepoint Proprietary
  • 9. © 2019 Forcepoint | 9 Trusted Thin Client Trusted Thin Client Remote High Speed Guard High Speed Guard SP SimShield WebShield Trusted Gateway System Trusted Print Delivery Trusted Mail System Cross Domain Solutions Suite Facilitating your mission while maintaining the highest degree of network and data security ACCESS TRANSFER TRANSFER - ADAPTORTRANSFER - ADAPTORTRANSFER TRANSFER TRANSFER
  • 10. Forcepoint Proprietary © 2019 Forcepoint | 10 Better Yet – Let’s Raise The Bar! Virginia ABC store December ‘18
  • 11. Forcepoint Proprietary © 2019 Forcepoint | 11 Risk Adaptive Protection Concepts to Cross Domain Transfer A Thought Leadership Discussion – Going Beyond the Bar
  • 12. Forcepoint Proprietary © 2019 Forcepoint | 12Forcepoint Proprietary The growth of structured versus unstructured data over the past decade shows that unstructured data accounts for more than 90% of all data Source: Patrick Cheesman) Data continues to expand exponentially Data volume growth directly correlates to increase information sharing needs at multiple classifications level
  • 13. Forcepoint Proprietary © 2019 Forcepoint | 13 User & Data Centric Risk Adaptive Policies for Cross Domain UsersAndDataMustBeAtTheCenterOfYourDesignThinking User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases risk DegreeofDigital Transformation ITComplexity&Risk Pre-2000 2025Infrastructure-centric 2015 Behavioral-centric perimeter Stove-Pipe CDS Static Policies Enterprise CDS Static Policies
  • 14. Forcepoint Proprietary © 2019 Forcepoint | 14Forcepoint Proprietary DIGITAL ACTIVITY “Can’t Share” Can Share Threat-Centric Cybersecurity Necessary but insufficient to scale Does not meet the warfighters needs A LACK OF CONTEXT for Policy based Decisions EASY TO CLASSIFY EASY TO CLASSIFYHARD TO CLASSIFY Trusting static policies in a dynamic environment Decide what is good or bad at a single point in time Configure your defenses to stop the bad from entering and only allow the good to pass through Traditional approach to cross domain transfers Security Wants to limit data to only this Operators Need This
  • 15. Forcepoint Proprietary © 2019 Forcepoint | 15 UsersandDataisthecenterofourdesignthinking User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases business risk User & Data Centric Risk Adaptive policy Policy Policy High SideLow Side Traditional CDS Security (static policy) One-to-many enforcement of static, generic policies, producing high false positive rates.
  • 16. Forcepoint Proprietary © 2019 Forcepoint | 16 Human-Centriccybersecuritychangeseverything One-to-one enforcement of different policies based on the risk, enabling automation. Human-Centric Security User & Data Centric Risk Adaptive policy
  • 17. Forcepoint Proprietary © 2019 Forcepoint | 17 The best way to efficiently evaluate data transfers it to look beyond the CDS demarcation point. (data types, formats, sanitization, etc) Need to extend risk factors in cross domain transfer decisions outside the CDS device (dynamic risk based on user behaviors, data flows, data sources, data types, DLP markings, etc)
  • 18. Forcepoint Proprietary © 2019 Forcepoint | 18Forcepoint Proprietary Today: All decisions are made at the CDS
  • 19. Forcepoint Proprietary © 2019 Forcepoint | 19Forcepoint Proprietary TECHNOLOGY ARCHITECTURE 1 SENSE 2 CONTEXTUALIZE & UNDERSTAND SENSE CONCEPTUALIZE & UNDERSTAND 1 2 Tomorrow: Closed Loop, Risk-adaptive approach 3 ENFORCE 3 ENFORCE at CDS
  • 20. Forcepoint Proprietary © 2019 Forcepoint | 20Forcepoint Proprietary RisklevelassignmentwithDynamicDataProtection(DDP) Risk Scored Against: • Self • Local Group • Organization
  • 21. Forcepoint Proprietary © 2019 Forcepoint | 21Forcepoint Proprietary Systemactionassignmentbyrisklevel–automaticpolicy(DDP)
  • 22. Forcepoint Proprietary © 2019 Forcepoint | 22 We need to start looking beyond the bar Static policies do not scale Need to look deeper into the source of data, not just the data to make an authorized transfer (behaviors -who, where, when, how much) Can leverage DLP technology to make better transfer decisions Common static filtering across all CDSes can be targeted and exploited Need to look at human behaviors and model normal vs compromised with dynamic policy adjustment Static policies do not scale and will limit data and visibility to those that need the data
  • 23. Forcepoint Proprietary © 2019 Forcepoint | 23Forcepoint Proprietary The Forcepoint Difference Risk-adaptive protection powered by behavioral intelligence research delivers automation is available today with Forcepoint Dynamic Data Protection Leader in Cross Domain (CDS), Data Loss Protection (DLP), Data Analytics, Insider Threat, and Dynamic Data Protection We are the experts in human-centric security. Understand the balance between security and operational needs
  • 24. Forcepoint Proprietary Follow us! Forcepoint LLC@Forcepoint Forcepoint @ForcepointSec @ForcepointLabs Forcepoint
  • 25. Thank you © 2019 Forcepoint | 25