SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Securing the new remote workforce
Introducing your speaker…
Gavin van Nierkerk
Practice Lead Modern Workplace
Lead Cybersecurity Team
LESS THAN
3%
GREATER THAN
98%
3%Your security designs
are all focused on this
being the assumption
98%98% - Your security
designs need to
shift focus
Media
THE COVID-19 PANDEMIC HAS UNLEASHED A WAVE OF
CYBER ATTACKS – HERE’S HOW TO PROTECT YOURSELF
On-premise/
private cloud
Approach
Zero Trust/Lean
Trust isn’t…
<what?>
“Strong identity + device
health + least privilege
user access and verified
with telemetry”
LITERAL
You can’t build a practical strategy around absolutes
AN ADJECTIVE
You aren’t going to ‘be’ Zero Trust
FOR SALE
There’s no such thing as ‘Zero Trust’ tech
INSTANT
You can’t boil the ocean
A REVOLUTION
Build on what you’ve got
Making Zero Trust a reality Do you know what <Zero Trust> is?
Have you established a v-team
with your stakeholders?
Do you know where you are at today
with your <Zero Trust> journey?
Do you have buy-in from C-level?
An approach to security which
assumes pervasive risk
How do we behave in an
environment of pervasive risk?
TRADITIONAL
OPTIMAL
ADVANCED
MATURITY MODELStrong Authentication!
Enrolled & Managed Devices
Risk based management –
Identity, Device, Session
Every company is at a different stage of their
journey to the cloud. Maybe identity and
device management are your top priorities,
or you are digging into multi-factor
authentication (MFA) or desktop virtualisation.
Every IT leader needs to define the priorities to
enable productivity from anywhere across their
organisation’s workforce.
We get that, and we want to help.
The Journey
Assumptions vs. Reality
Users are employees
Corporate managed devices
On-premises apps
Corp network and firewall
Local packet tracking and logs
Employees, contractors, partners & customers
Bring your own device
Explosion of cloud apps
Expanding perimeter
Overwhelming source of available signal
Customer Questions
Customer 1: How can Employees enrol their devices into device
management to gain access to company resources?
Risk Mitigation: Trusted devices (only). Potentially Intune
Scenario 2: How can Security Teams enforce device health checks per
application or service?
Risk Mitigation: Trusted devices + health (Intune + Defender ATP) +
secure app access (Cloud Application Security).
Scenario 3: How can Employees and business guests have a secure way to
access corporate resources when not using a managed device?
Risk Mitigation: Non-trusted devices (Conditional Access Application
Control e.g. secure email).
One of the biggest benefits of Zero Trust is a
change in mindset. An approach to security
which treats every access attempt as if it’s
originating from an untrusted network.
Plan
Major Phases
Verify identity
Verify device
Verify access
Verify services
All user accounts
set up for strong
identity
enforcement
Strong identity
enforced for
O365
Least privilege
user rights
Eliminate
passwords –
biometric based
model
Device health
required for
SharePoint,
Exchange, Teams
on iOS, Android,
Mac, and
Windows
Usage data for
Application and
Services
Device
Management
required to tiered
network access
Internet Only
for users
Establish solutions
for unmanaged
devices
Least privilege
access model
Device health
required for
wired/wireless
corporate network
Grow coverage
in Device health
requirement
Service health
concept
Device
management
not required
Single factor
authentication
to resources
Capability to
enforce strong
identity exists
Pre-Zero Trust
U S E R & A C C E S S T E L E M E T RY
1. Connect all apps for Single Sign On
2. Strong Authentication using Multi-Factor Auth and Risk Detection
3. Enforce Policy Based Access for breach containment
Identity teams – here is your to-do list:
1. Register devices with your Identity Provider
2. Implement MDM based security baselines and compliance reporting
3. Use endpoint threat detection to monitor device risk
Device teams – here is your to-do list:
Network & Infra Security Teams – here is your to-do list:
1. Enable a Cloud Workload Protection solution across your estate
2. Reduce attack surface by enabling just-in-time
3. Use cloud-native controls to create micro-perimeters with real-time threat protection
1. Agree on a label taxonomy and classify all documents and emails with the default label
2. Apply real-time protection to high risk scenarios: sensitive data and unmanaged access in apps
3. Perform Shadow IT discovery and a cloud control program
Apps & Data Security Teams – here is your to-do list:
Next Steps
We have run a number assessments for
customers to understand how their security
models and architecture may need to change
in our remote working world.
We are concerned at the decreased control
businesses have over their overall security
posture.
…and we want to help.
Next Steps…
Take the self assessment:
https://info.microsoft.com/ww-landing-Zero-Trust-
Assessment.html
Feel free to share the results if you want and we can
provide insights and guidance.
Next Steps…
Visit our page
https://www.empired.com/reimaginework
https://www.intergen.co.nz/reimaginework
Contact us
contact@empired.com
info@intergen.co.nz
Questions?
Sample Architecture
Corporate
Network
Geo-location
Microsoft
Cloud App SecurityMacOS
Android
iOS
Windows
Windows
Defender ATP
Client apps
Browser apps
Google ID
MSA
Azure AD
ADFS
Require
MFA
Allow/block
access
Block legacy
authentication
Force
password
reset******
Limited
access
Controls
Employee & Partner
Users and Roles
Trusted &
Compliant Devices
Physical &
Virtual Location
Client apps &
Auth Method
Conditions
Machine
learning
Policies
Real time
Evaluation
Engine
Session
Risk
3
40TB
Effective
policy
Azure AD Conditional Access
Thank you!
For more information please follow contact us here:
Linkedin.com/company/empired-ltd
Facebook.com/empiredltd
Twitter.com/empiredltd
Linkedin.com/company/intergen
Facebook.com/teamintergen
Twitter.com/teamintergen
Australia
Gavin van Nierkerk
Practice Lead
Gavin.vanNiekerk@empired.com
New Zealand
Victor Philp
Solutions Manager
victor.philp@intergen.co.nz

Weitere ähnliche Inhalte

Mehr von Empired

Empired Convergence 2017 - Why Convergence
Empired Convergence 2017 - Why ConvergenceEmpired Convergence 2017 - Why Convergence
Empired Convergence 2017 - Why ConvergenceEmpired
 
Empired Convergence 2017 - Unleashing the Power of the Platform
Empired Convergence 2017 - Unleashing the Power of the PlatformEmpired Convergence 2017 - Unleashing the Power of the Platform
Empired Convergence 2017 - Unleashing the Power of the PlatformEmpired
 
Empired Convergence 2017 - The Modern Digital Workplace
Empired Convergence 2017 - The Modern Digital WorkplaceEmpired Convergence 2017 - The Modern Digital Workplace
Empired Convergence 2017 - The Modern Digital WorkplaceEmpired
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Dynamics Day 2017 Adelaide - Customer Experience Design
Dynamics Day 2017 Adelaide - Customer Experience Design Dynamics Day 2017 Adelaide - Customer Experience Design
Dynamics Day 2017 Adelaide - Customer Experience Design Empired
 
Dynamics Day 2017 Adelaide - Dynamics 365 making it real
Dynamics Day 2017 Adelaide  - Dynamics 365 making it realDynamics Day 2017 Adelaide  - Dynamics 365 making it real
Dynamics Day 2017 Adelaide - Dynamics 365 making it realEmpired
 
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise OperationsDynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise OperationsEmpired
 
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...Empired
 
Disaster Recovery: the Main Roads story
Disaster Recovery: the Main Roads storyDisaster Recovery: the Main Roads story
Disaster Recovery: the Main Roads storyEmpired
 
Dynamics Day 2017 Melbourne - transform you decision making
Dynamics Day 2017 Melbourne - transform you decision makingDynamics Day 2017 Melbourne - transform you decision making
Dynamics Day 2017 Melbourne - transform you decision makingEmpired
 
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital TransformationDynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital TransformationEmpired
 
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operationsDynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operationsEmpired
 
Dynamics Day 2017 Melbourne: Becoming customer centric
Dynamics Day 2017 Melbourne: Becoming customer centricDynamics Day 2017 Melbourne: Becoming customer centric
Dynamics Day 2017 Melbourne: Becoming customer centricEmpired
 
Dynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynote
Dynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynoteDynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynote
Dynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynoteEmpired
 
Dynamics Day 2017 Brisbane: Data Insights
Dynamics Day 2017 Brisbane: Data InsightsDynamics Day 2017 Brisbane: Data Insights
Dynamics Day 2017 Brisbane: Data InsightsEmpired
 
Dynamics Day 2017 Brisbane: Dynamics 365 Field and Project Services
Dynamics Day 2017 Brisbane: Dynamics 365 Field and Project ServicesDynamics Day 2017 Brisbane: Dynamics 365 Field and Project Services
Dynamics Day 2017 Brisbane: Dynamics 365 Field and Project ServicesEmpired
 
Dynamics Day 2017 Brisbane: Dynamics 365 Enterprise Operations
Dynamics Day 2017 Brisbane: Dynamics 365 Enterprise OperationsDynamics Day 2017 Brisbane: Dynamics 365 Enterprise Operations
Dynamics Day 2017 Brisbane: Dynamics 365 Enterprise OperationsEmpired
 
Dynamics Day 2017 Brisbane: Dynamics 365 making it real
Dynamics Day 2017 Brisbane: Dynamics 365 making it realDynamics Day 2017 Brisbane: Dynamics 365 making it real
Dynamics Day 2017 Brisbane: Dynamics 365 making it realEmpired
 
Dynamics Day 2017 Perth: Bringing it All Together with Office 365
Dynamics Day 2017 Perth: Bringing it All Together with Office 365Dynamics Day 2017 Perth: Bringing it All Together with Office 365
Dynamics Day 2017 Perth: Bringing it All Together with Office 365Empired
 

Mehr von Empired (20)

Empired Convergence 2017 - Why Convergence
Empired Convergence 2017 - Why ConvergenceEmpired Convergence 2017 - Why Convergence
Empired Convergence 2017 - Why Convergence
 
Empired Convergence 2017 - Unleashing the Power of the Platform
Empired Convergence 2017 - Unleashing the Power of the PlatformEmpired Convergence 2017 - Unleashing the Power of the Platform
Empired Convergence 2017 - Unleashing the Power of the Platform
 
Empired Convergence 2017 - The Modern Digital Workplace
Empired Convergence 2017 - The Modern Digital WorkplaceEmpired Convergence 2017 - The Modern Digital Workplace
Empired Convergence 2017 - The Modern Digital Workplace
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Dynamics Day 2017 Adelaide - Customer Experience Design
Dynamics Day 2017 Adelaide - Customer Experience Design Dynamics Day 2017 Adelaide - Customer Experience Design
Dynamics Day 2017 Adelaide - Customer Experience Design
 
Dynamics Day 2017 Adelaide - Dynamics 365 making it real
Dynamics Day 2017 Adelaide  - Dynamics 365 making it realDynamics Day 2017 Adelaide  - Dynamics 365 making it real
Dynamics Day 2017 Adelaide - Dynamics 365 making it real
 
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise OperationsDynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
 
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
 
Disaster Recovery: the Main Roads story
Disaster Recovery: the Main Roads storyDisaster Recovery: the Main Roads story
Disaster Recovery: the Main Roads story
 
Dynamics Day 2017 Melbourne - transform you decision making
Dynamics Day 2017 Melbourne - transform you decision makingDynamics Day 2017 Melbourne - transform you decision making
Dynamics Day 2017 Melbourne - transform you decision making
 
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital TransformationDynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
 
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operationsDynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
 
Dynamics Day 2017 Melbourne: Becoming customer centric
Dynamics Day 2017 Melbourne: Becoming customer centricDynamics Day 2017 Melbourne: Becoming customer centric
Dynamics Day 2017 Melbourne: Becoming customer centric
 
Dynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynote
Dynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynoteDynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynote
Dynamics Day 2017 Melbourne: Digital Transformation with Dynamics 365 keynote
 
Dynamics Day 2017 Brisbane: Data Insights
Dynamics Day 2017 Brisbane: Data InsightsDynamics Day 2017 Brisbane: Data Insights
Dynamics Day 2017 Brisbane: Data Insights
 
Dynamics Day 2017 Brisbane: Dynamics 365 Field and Project Services
Dynamics Day 2017 Brisbane: Dynamics 365 Field and Project ServicesDynamics Day 2017 Brisbane: Dynamics 365 Field and Project Services
Dynamics Day 2017 Brisbane: Dynamics 365 Field and Project Services
 
Dynamics Day 2017 Brisbane: Dynamics 365 Enterprise Operations
Dynamics Day 2017 Brisbane: Dynamics 365 Enterprise OperationsDynamics Day 2017 Brisbane: Dynamics 365 Enterprise Operations
Dynamics Day 2017 Brisbane: Dynamics 365 Enterprise Operations
 
Dynamics Day 2017 Brisbane: Dynamics 365 making it real
Dynamics Day 2017 Brisbane: Dynamics 365 making it realDynamics Day 2017 Brisbane: Dynamics 365 making it real
Dynamics Day 2017 Brisbane: Dynamics 365 making it real
 
Dynamics Day 2017 Perth: Bringing it All Together with Office 365
Dynamics Day 2017 Perth: Bringing it All Together with Office 365Dynamics Day 2017 Perth: Bringing it All Together with Office 365
Dynamics Day 2017 Perth: Bringing it All Together with Office 365
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 

Kürzlich hochgeladen (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Securing the new remote workforce

  • 1. Securing the new remote workforce
  • 2. Introducing your speaker… Gavin van Nierkerk Practice Lead Modern Workplace Lead Cybersecurity Team
  • 5. 3%Your security designs are all focused on this being the assumption 98%98% - Your security designs need to shift focus
  • 7. THE COVID-19 PANDEMIC HAS UNLEASHED A WAVE OF CYBER ATTACKS – HERE’S HOW TO PROTECT YOURSELF
  • 10. Zero Trust/Lean Trust isn’t… <what?> “Strong identity + device health + least privilege user access and verified with telemetry” LITERAL You can’t build a practical strategy around absolutes AN ADJECTIVE You aren’t going to ‘be’ Zero Trust FOR SALE There’s no such thing as ‘Zero Trust’ tech INSTANT You can’t boil the ocean A REVOLUTION Build on what you’ve got
  • 11. Making Zero Trust a reality Do you know what <Zero Trust> is? Have you established a v-team with your stakeholders? Do you know where you are at today with your <Zero Trust> journey? Do you have buy-in from C-level? An approach to security which assumes pervasive risk How do we behave in an environment of pervasive risk? TRADITIONAL OPTIMAL ADVANCED MATURITY MODELStrong Authentication! Enrolled & Managed Devices Risk based management – Identity, Device, Session
  • 12. Every company is at a different stage of their journey to the cloud. Maybe identity and device management are your top priorities, or you are digging into multi-factor authentication (MFA) or desktop virtualisation. Every IT leader needs to define the priorities to enable productivity from anywhere across their organisation’s workforce. We get that, and we want to help. The Journey
  • 13. Assumptions vs. Reality Users are employees Corporate managed devices On-premises apps Corp network and firewall Local packet tracking and logs Employees, contractors, partners & customers Bring your own device Explosion of cloud apps Expanding perimeter Overwhelming source of available signal
  • 14. Customer Questions Customer 1: How can Employees enrol their devices into device management to gain access to company resources? Risk Mitigation: Trusted devices (only). Potentially Intune Scenario 2: How can Security Teams enforce device health checks per application or service? Risk Mitigation: Trusted devices + health (Intune + Defender ATP) + secure app access (Cloud Application Security). Scenario 3: How can Employees and business guests have a secure way to access corporate resources when not using a managed device? Risk Mitigation: Non-trusted devices (Conditional Access Application Control e.g. secure email). One of the biggest benefits of Zero Trust is a change in mindset. An approach to security which treats every access attempt as if it’s originating from an untrusted network.
  • 15. Plan
  • 16. Major Phases Verify identity Verify device Verify access Verify services All user accounts set up for strong identity enforcement Strong identity enforced for O365 Least privilege user rights Eliminate passwords – biometric based model Device health required for SharePoint, Exchange, Teams on iOS, Android, Mac, and Windows Usage data for Application and Services Device Management required to tiered network access Internet Only for users Establish solutions for unmanaged devices Least privilege access model Device health required for wired/wireless corporate network Grow coverage in Device health requirement Service health concept Device management not required Single factor authentication to resources Capability to enforce strong identity exists Pre-Zero Trust U S E R & A C C E S S T E L E M E T RY
  • 17. 1. Connect all apps for Single Sign On 2. Strong Authentication using Multi-Factor Auth and Risk Detection 3. Enforce Policy Based Access for breach containment Identity teams – here is your to-do list:
  • 18. 1. Register devices with your Identity Provider 2. Implement MDM based security baselines and compliance reporting 3. Use endpoint threat detection to monitor device risk Device teams – here is your to-do list:
  • 19. Network & Infra Security Teams – here is your to-do list: 1. Enable a Cloud Workload Protection solution across your estate 2. Reduce attack surface by enabling just-in-time 3. Use cloud-native controls to create micro-perimeters with real-time threat protection
  • 20. 1. Agree on a label taxonomy and classify all documents and emails with the default label 2. Apply real-time protection to high risk scenarios: sensitive data and unmanaged access in apps 3. Perform Shadow IT discovery and a cloud control program Apps & Data Security Teams – here is your to-do list:
  • 22. We have run a number assessments for customers to understand how their security models and architecture may need to change in our remote working world. We are concerned at the decreased control businesses have over their overall security posture. …and we want to help.
  • 23. Next Steps… Take the self assessment: https://info.microsoft.com/ww-landing-Zero-Trust- Assessment.html Feel free to share the results if you want and we can provide insights and guidance.
  • 24. Next Steps… Visit our page https://www.empired.com/reimaginework https://www.intergen.co.nz/reimaginework Contact us contact@empired.com info@intergen.co.nz
  • 26.
  • 28. Corporate Network Geo-location Microsoft Cloud App SecurityMacOS Android iOS Windows Windows Defender ATP Client apps Browser apps Google ID MSA Azure AD ADFS Require MFA Allow/block access Block legacy authentication Force password reset****** Limited access Controls Employee & Partner Users and Roles Trusted & Compliant Devices Physical & Virtual Location Client apps & Auth Method Conditions Machine learning Policies Real time Evaluation Engine Session Risk 3 40TB Effective policy Azure AD Conditional Access
  • 29. Thank you! For more information please follow contact us here: Linkedin.com/company/empired-ltd Facebook.com/empiredltd Twitter.com/empiredltd Linkedin.com/company/intergen Facebook.com/teamintergen Twitter.com/teamintergen Australia Gavin van Nierkerk Practice Lead Gavin.vanNiekerk@empired.com New Zealand Victor Philp Solutions Manager victor.philp@intergen.co.nz