SlideShare a Scribd company logo
Beyond the Fortress
Network
David C. Broussard
Principal Consultant
@dbroussa
Blogs.catapultsystems.com/dbroussard
Who am I?


The Fortress Network





Security in the old mindset




What are we concerned about again?




Did it work?



−
−
Bad EXTERNAL actor

−
−
−
−
−

−
Story Time

−
−
−
−

−
−
Story Time 2

−
−
−
−
−

−
−
−
Malicious INTERNAL Actor

−
−
−
−

−
−
Story Time 3

−
−
−
−

−
Story Time 4

−
−
−
−
−

−
−
Core questions about security





DELIVERY
Employee A opens infected
email on workstation2
A
Malware
EXPLOITATION
Employee B opens infected
email using mobile device2
BMalware
Infected phone disables
Antivirus; and compromised
credentials used to access
Email service
3Control Evasion
Password/Hash Dumping
3
Threat Actor gather
credentials on
compromised machine
COMMAND AND
CONTROL
Credentials harvested after
Employee attempts login
to bogus site
2
4
Threat Actors move
laterally within network
using compromised
credentials
Compromised Credential
ACTIONS ON
OBJECTIVE
5
Threat Actors use compromised
devices/accounts to exfiltrate PII
48 Hours 200+ Days
PII
Leak/Exfiltrate Data
Threat Actor targets employees
via phishing campaign1
Phishing
3
Compromised credentials
used to access service
Mobile Device Management

−
−
−
−
Risk Based Access



Data Loss Prevention and Encryption



Threat Detection and Prevention

−
−
−
−
Tools that you didn’t know you had






http://get.catapultsystems.com/0365-business-registration
http://get.catapultsystems.com/0365-bootcamp-registration-it-track/
@CloudWhisperers
Learn More

More Related Content

What's hot

Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
Vishal Kumar
 
History & Future of Credentials Theft
History & Future of Credentials TheftHistory & Future of Credentials Theft
History & Future of Credentials Theft
Lavi Lazarovitz
 
Research Review - Cyberark Labs
Research Review - Cyberark LabsResearch Review - Cyberark Labs
Research Review - Cyberark Labs
Lavi Lazarovitz
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Vishesh Singhal
 
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...
Quinnipiac University
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
brn8brwn
 
Cyber security
Cyber securityCyber security
Cyber security
colebassett
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Mukul Agarwal
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
SecPod Technologies
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
MissStevenson1
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
EC-Council
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
Rishabha Garg
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
2011 training presentation
2011 training presentation2011 training presentation
2011 training presentationkaspersky-lab
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
Sanguine_Eva
 
Cyber security
Cyber securityCyber security
Cyber security
Sakib Sami
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
Jayanth Vinay
 

What's hot (20)

Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
History & Future of Credentials Theft
History & Future of Credentials TheftHistory & Future of Credentials Theft
History & Future of Credentials Theft
 
Research Review - Cyberark Labs
Research Review - Cyberark LabsResearch Review - Cyberark Labs
Research Review - Cyberark Labs
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
2011 training presentation
2011 training presentation2011 training presentation
2011 training presentation
 
Hacking
HackingHacking
Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
 

Similar to Beyond the Fortress Network

Select ONE of the following security incidents and provide the f.docx
Select ONE of the following security incidents and provide the f.docxSelect ONE of the following security incidents and provide the f.docx
Select ONE of the following security incidents and provide the f.docx
lvernon1
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
eiramespi07
 
Security & Compliance for Startups
Security & Compliance for StartupsSecurity & Compliance for Startups
Security & Compliance for Startups
Symosis Security (Previously C-Level Security)
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
Home
 
Refer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docxRefer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docx
lorent8
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackGavin Davey
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2
Ishaq Shinwari
 
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docxSheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
bjohn46
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
miltonnancy
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
Raj vardhan
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
ClearDATACloud
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
Kevin Chakre
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
lmelaine
 
455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx
DrVPadmavathiAssocia
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsCybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Samuel862293
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
Cmano Kar
 
IRJET- An Overview of Ethical Hacking
IRJET- An Overview of Ethical HackingIRJET- An Overview of Ethical Hacking
IRJET- An Overview of Ethical Hacking
IRJET Journal
 

Similar to Beyond the Fortress Network (20)

Select ONE of the following security incidents and provide the f.docx
Select ONE of the following security incidents and provide the f.docxSelect ONE of the following security incidents and provide the f.docx
Select ONE of the following security incidents and provide the f.docx
 
Security
Security Security
Security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Security & Compliance for Startups
Security & Compliance for StartupsSecurity & Compliance for Startups
Security & Compliance for Startups
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
Refer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docxRefer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docx
 
Network security
Network securityNetwork security
Network security
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin Attack
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2
 
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docxSheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
 
455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsCybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
IRJET- An Overview of Ethical Hacking
IRJET- An Overview of Ethical HackingIRJET- An Overview of Ethical Hacking
IRJET- An Overview of Ethical Hacking
 

More from David Broussard

SPSHOU18 Working on the Go With Microsoft
SPSHOU18   Working on the Go With MicrosoftSPSHOU18   Working on the Go With Microsoft
SPSHOU18 Working on the Go With Microsoft
David Broussard
 
SPSTC18 Working on the Go With Microsoft
SPSTC18   Working on the Go With MicrosoftSPSTC18   Working on the Go With Microsoft
SPSTC18 Working on the Go With Microsoft
David Broussard
 
SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365
David Broussard
 
HSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceHSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data Governance
David Broussard
 
SPSNE Sun Tzu and the Art of Digital Transformation
SPSNE   Sun Tzu and the Art of Digital TransformationSPSNE   Sun Tzu and the Art of Digital Transformation
SPSNE Sun Tzu and the Art of Digital Transformation
David Broussard
 
SPSCincy 2017 Hidden Gems in O365
SPSCincy 2017   Hidden Gems in O365SPSCincy 2017   Hidden Gems in O365
SPSCincy 2017 Hidden Gems in O365
David Broussard
 
Spshou Hidden Gems in O365
Spshou Hidden Gems in O365Spshou Hidden Gems in O365
Spshou Hidden Gems in O365
David Broussard
 
SPSAC - What do we Want? A New Intranet!
SPSAC - What do we Want?  A New Intranet!SPSAC - What do we Want?  A New Intranet!
SPSAC - What do we Want? A New Intranet!
David Broussard
 
SPSNYC - How to Sell Your Intranet
SPSNYC - How to Sell Your IntranetSPSNYC - How to Sell Your Intranet
SPSNYC - How to Sell Your Intranet
David Broussard
 
SPSDFW Bottom Up SharePoint Design
SPSDFW Bottom Up SharePoint DesignSPSDFW Bottom Up SharePoint Design
SPSDFW Bottom Up SharePoint Design
David Broussard
 
2014 SP Summit Vancouver Bottom Up SharePoint
2014 SP Summit Vancouver Bottom Up SharePoint2014 SP Summit Vancouver Bottom Up SharePoint
2014 SP Summit Vancouver Bottom Up SharePoint
David Broussard
 
SPSNYC Building Social Solutions
SPSNYC Building Social SolutionsSPSNYC Building Social Solutions
SPSNYC Building Social Solutions
David Broussard
 
SASUG April - Building Social Networks and the Social Journey
SASUG April - Building Social Networks and the Social JourneySASUG April - Building Social Networks and the Social Journey
SASUG April - Building Social Networks and the Social Journey
David Broussard
 
Catapult k2 partner event oct 12 2011
Catapult k2 partner event oct 12 2011Catapult k2 partner event oct 12 2011
Catapult k2 partner event oct 12 2011
David Broussard
 
Building the perfect share point farm
Building the perfect share point farmBuilding the perfect share point farm
Building the perfect share point farm
David Broussard
 
Spstc2011 share point for dotcom sites
Spstc2011   share point for dotcom sitesSpstc2011   share point for dotcom sites
Spstc2011 share point for dotcom sites
David Broussard
 

More from David Broussard (16)

SPSHOU18 Working on the Go With Microsoft
SPSHOU18   Working on the Go With MicrosoftSPSHOU18   Working on the Go With Microsoft
SPSHOU18 Working on the Go With Microsoft
 
SPSTC18 Working on the Go With Microsoft
SPSTC18   Working on the Go With MicrosoftSPSTC18   Working on the Go With Microsoft
SPSTC18 Working on the Go With Microsoft
 
SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365
 
HSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceHSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data Governance
 
SPSNE Sun Tzu and the Art of Digital Transformation
SPSNE   Sun Tzu and the Art of Digital TransformationSPSNE   Sun Tzu and the Art of Digital Transformation
SPSNE Sun Tzu and the Art of Digital Transformation
 
SPSCincy 2017 Hidden Gems in O365
SPSCincy 2017   Hidden Gems in O365SPSCincy 2017   Hidden Gems in O365
SPSCincy 2017 Hidden Gems in O365
 
Spshou Hidden Gems in O365
Spshou Hidden Gems in O365Spshou Hidden Gems in O365
Spshou Hidden Gems in O365
 
SPSAC - What do we Want? A New Intranet!
SPSAC - What do we Want?  A New Intranet!SPSAC - What do we Want?  A New Intranet!
SPSAC - What do we Want? A New Intranet!
 
SPSNYC - How to Sell Your Intranet
SPSNYC - How to Sell Your IntranetSPSNYC - How to Sell Your Intranet
SPSNYC - How to Sell Your Intranet
 
SPSDFW Bottom Up SharePoint Design
SPSDFW Bottom Up SharePoint DesignSPSDFW Bottom Up SharePoint Design
SPSDFW Bottom Up SharePoint Design
 
2014 SP Summit Vancouver Bottom Up SharePoint
2014 SP Summit Vancouver Bottom Up SharePoint2014 SP Summit Vancouver Bottom Up SharePoint
2014 SP Summit Vancouver Bottom Up SharePoint
 
SPSNYC Building Social Solutions
SPSNYC Building Social SolutionsSPSNYC Building Social Solutions
SPSNYC Building Social Solutions
 
SASUG April - Building Social Networks and the Social Journey
SASUG April - Building Social Networks and the Social JourneySASUG April - Building Social Networks and the Social Journey
SASUG April - Building Social Networks and the Social Journey
 
Catapult k2 partner event oct 12 2011
Catapult k2 partner event oct 12 2011Catapult k2 partner event oct 12 2011
Catapult k2 partner event oct 12 2011
 
Building the perfect share point farm
Building the perfect share point farmBuilding the perfect share point farm
Building the perfect share point farm
 
Spstc2011 share point for dotcom sites
Spstc2011   share point for dotcom sitesSpstc2011   share point for dotcom sites
Spstc2011 share point for dotcom sites
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Beyond the Fortress Network

Editor's Notes

  1. Focused on access to data as opposed to securing the data itself Deny malicious users from accessing data except from inside of our secure network The cloud is seen as insecure primarily because we (IT) no longer can restrict access to the information Or can we? However, even the Fortress Network didn’t work completely What about email? Didn’t we lose control of that document once we hit send?
  2. Build high walls around our data Firewalls Network segments VPNs NTFS permissions Build deep defense in depth DMZs Detonation Chambers Pre-scan incoming requests (honey traps, URL scans) Malware protection Malicious link detection Spam and virus software on desktops and servers Interior security was much less strenuous Virus scans Malware But assumption was if you had access you could do anything