#RSAC
Educate + Learn& Apply
Discover tips and
techniques I have used
and implemented
Decide if you have
applied any of the
items and fill the gaps
Implement the new
items and prefect the
in-place programs
#RSAC
Managed Devices
Network, Endpoint,IoT, and Servers devices without
attributed owner
!
Connected Devices
Unknown risk status derived from Device detection
systems ( scanners, switches, NGFW, etc. )
!
Unknown Systems
Devices connect without validation
Reduced to highest risk proposition for manageable
lists
!
Overwhelmed monitoring/tooling
Try new ways/models of training/ways to incentivize
!
How do
we solve
for
#RSAC
Botnets can compromiseIoT
devices, turning them into
malicious nodes for
coordinated attacks.
Mitigation: Regularly update
device firmware, change
default credentials, and
segment IoT networks.
Internet of Things (IoT/OT)
Organizations often struggle
to monitor and manage their
extensive IoT device fleets
effectively.
Mitigation: Invest in robust
device management
solutions to track device
health, apply patches, and
detect.
Many IoT devices lack proper
physical security measures.
Mitigation: Implement
physical safeguards such as
tamper-evident seals, secure
enclosures, and restricted
access
Weak encryption or
unencrypted data storage
can expose sensitive
information.
Mitigation: Use strong
encryption protocols for data
at rest and in transit.
Regularly update encryption
keys.
#RSAC
Benefactors Network Teams
ThreatIntelligence | Red/SOC/Intel
Inventory Management Teams
Security Operations Teams
Zero Trust Teams Program Leads
Asset Assurance Teams
#RSAC
Programs to Consider
◉Develop a security review system that
reports on risk
◉ Review and assess Compliance
◉ Define components that can be
automated or self attested
◉Assessment
PHASE
3
◉ Create a classification mechanism that
organizes discovery
◉ Identify & Rate Risk
◉ Classify items to Risky Groupings
◉ Use Identity Access mgt systems
◉Consulting
PHASE
2
◉ Develop a system that reports on the status
of connected devices
◉ New Deployments, Infrastructure Discovery
◉ Inventory Validation Process & Collection
of datapoints
◉Discovery
PHASE
1
◉Onboarding
PHASE
4
◉ Complete a system that remediates
◉ Manages and reports on risk status of
connected devices - Dashboard Flag
◉ Zero Trust Implementation – Isolate
and onboard devices
◉ Create Security tagging
◉ reference Policy and Threat Intel
14.
#RSAC
DB forunaccounted for devices
• Product identification
• Regional placement
Categorization of Devices
• Set classification
• Compliance Policies
Inventory Validation Process
• Match Against your existing inventory
• Use conditional Access systems to confirm
#RSAC
Consulting
Risk Alignment
•Check against known risks
Asset Identity
• Use Identity as a control
IoT Identification
• Device segmentation
• Use Identity Access to classify
AI Classification
• Use your AI to perform Cross analysis
#RSAC
Consulting Cont.
AIClassification:
AI can help improve inventory management by
analyzing large amounts of data, identifying
trends, and making accurate predictions.
Use your AI to perform Cross analysis
• Real-time tracking ( from Monitors, Switches,
Secure boundaries, etc.)
• Predicting variations through Identity
• Analyzing behavior patterns
• Automating fulfillment registration
• Optimizing accountability verticals
AI Classification:
19.
#RSAC
Assessment
DB forUnaccounted for Devices
• Product / Vendor identification
• Regional placement timeline
Categorization of Devices
• Set groups to scope classification
• Classification should match compliance policies
Inventory Validation Process
• Match against your existing inventory
• Use conditional access systems to confirm
#RSAC
Asset Management
Control systemsthat make a difference
Device ID and tagging Define secure
boundaries
Quantum agile
systems
Map your
infrastructure
#RSAC
Expected Outcome
Coordination withpartner teams to establish a device portal
– Facilitates categorization and security AI Assessment of devices
Program Capabilities
– Identifies unknown devices and assesses risk posture
– Prioritizes remediation or awareness campaigns
Assessment Accounts for
– Risk validation, alignment, and attestation
– Isolation alignment for Zero Trust infrastructure
– Leadership visibility for accountability
RISK Based Decisions
#RSAC
Recap: Start PlanningToday
Make decisions on what are the assets you MUST protect
Learn network behaviors
Compare snapshots
Trust nothing (Zero Trust) and validate all connections
– Develop an Isolation plan
– Manage your identities
– Register your devices
Create a system of record and response to the results
– Develop a team to review and remediate
– Develop standards that align
– Don’t work in a silo
32