SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Securing the new remote workforce
Introducing your speaker

Gavin van Nierkerk
Practice Lead Modern Workplace
Lead Cybersecurity Team
LESS THAN
3%
GREATER THAN
98%
3%Your security designs
are all focused on this
being the assumption
98%98% - Your security
designs need to
shift focus
Media
THE COVID-19 PANDEMIC HAS UNLEASHED A WAVE OF
CYBER ATTACKS – HERE’S HOW TO PROTECT YOURSELF
On-premise/
private cloud
Approach
Zero Trust/Lean
Trust isn’t

<what?>
“Strong identity + device
health + least privilege
user access and verified
with telemetry”
LITERAL
You can’t build a practical strategy around absolutes
AN ADJECTIVE
You aren’t going to ‘be’ Zero Trust
FOR SALE
There’s no such thing as ‘Zero Trust’ tech
INSTANT
You can’t boil the ocean
A REVOLUTION
Build on what you’ve got
Making Zero Trust a reality Do you know what <Zero Trust> is?
Have you established a v-team
with your stakeholders?
Do you know where you are at today
with your <Zero Trust> journey?
Do you have buy-in from C-level?
An approach to security which
assumes pervasive risk
How do we behave in an
environment of pervasive risk?
TRADITIONAL
OPTIMAL
ADVANCED
MATURITY MODELStrong Authentication!
Enrolled & Managed Devices
Risk based management –
Identity, Device, Session
Every company is at a different stage of their
journey to the cloud. Maybe identity and
device management are your top priorities,
or you are digging into multi-factor
authentication (MFA) or desktop virtualisation.
Every IT leader needs to define the priorities to
enable productivity from anywhere across their
organisation’s workforce.
We get that, and we want to help.
The Journey
Assumptions vs. Reality
Users are employees
Corporate managed devices
On-premises apps
Corp network and firewall
Local packet tracking and logs
Employees, contractors, partners & customers
Bring your own device
Explosion of cloud apps
Expanding perimeter
Overwhelming source of available signal
Customer Questions
Customer 1: How can Employees enrol their devices into device
management to gain access to company resources?
Risk Mitigation: Trusted devices (only). Potentially Intune
Scenario 2: How can Security Teams enforce device health checks per
application or service?
Risk Mitigation: Trusted devices + health (Intune + Defender ATP) +
secure app access (Cloud Application Security).
Scenario 3: How can Employees and business guests have a secure way to
access corporate resources when not using a managed device?
Risk Mitigation: Non-trusted devices (Conditional Access Application
Control e.g. secure email).
One of the biggest benefits of Zero Trust is a
change in mindset. An approach to security
which treats every access attempt as if it’s
originating from an untrusted network.
Plan
Major Phases
Verify identity
Verify device
Verify access
Verify services
All user accounts
set up for strong
identity
enforcement
Strong identity
enforced for
O365
Least privilege
user rights
Eliminate
passwords –
biometric based
model
Device health
required for
SharePoint,
Exchange, Teams
on iOS, Android,
Mac, and
Windows
Usage data for
Application and
Services
Device
Management
required to tiered
network access
Internet Only
for users
Establish solutions
for unmanaged
devices
Least privilege
access model
Device health
required for
wired/wireless
corporate network
Grow coverage
in Device health
requirement
Service health
concept
Device
management
not required
Single factor
authentication
to resources
Capability to
enforce strong
identity exists
Pre-Zero Trust
U S E R & A C C E S S T E L E M E T RY
1. Connect all apps for Single Sign On
2. Strong Authentication using Multi-Factor Auth and Risk Detection
3. Enforce Policy Based Access for breach containment
Identity teams – here is your to-do list:
1. Register devices with your Identity Provider
2. Implement MDM based security baselines and compliance reporting
3. Use endpoint threat detection to monitor device risk
Device teams – here is your to-do list:
Network & Infra Security Teams – here is your to-do list:
1. Enable a Cloud Workload Protection solution across your estate
2. Reduce attack surface by enabling just-in-time
3. Use cloud-native controls to create micro-perimeters with real-time threat protection
1. Agree on a label taxonomy and classify all documents and emails with the default label
2. Apply real-time protection to high risk scenarios: sensitive data and unmanaged access in apps
3. Perform Shadow IT discovery and a cloud control program
Apps & Data Security Teams – here is your to-do list:
Next Steps
We have run a number assessments for
customers to understand how their security
models and architecture may need to change
in our remote working world.
We are concerned at the decreased control
businesses have over their overall security
posture.

and we want to help.
Next Steps

Take the self assessment:
https://info.microsoft.com/ww-landing-Zero-Trust-
Assessment.html
Feel free to share the results if you want and we can
provide insights and guidance.
Next Steps

Visit our page
https://www.empired.com/reimaginework
https://www.intergen.co.nz/reimaginework
Contact us
contact@empired.com
info@intergen.co.nz
Questions?
Sample Architecture
Corporate
Network
Geo-location
Microsoft
Cloud App SecurityMacOS
Android
iOS
Windows
Windows
Defender ATP
Client apps
Browser apps
Google ID
MSA
Azure AD
ADFS
Require
MFA
Allow/block
access
Block legacy
authentication
Force
password
reset******
Limited
access
Controls
Employee & Partner
Users and Roles
Trusted &
Compliant Devices
Physical &
Virtual Location
Client apps &
Auth Method
Conditions
Machine
learning
Policies
Real time
Evaluation
Engine
Session
Risk
3
40TB
Effective
policy
Azure AD Conditional Access
Thank you!
For more information please follow contact us here:
Linkedin.com/company/empired-ltd
Facebook.com/empiredltd
Twitter.com/empiredltd
Linkedin.com/company/intergen
Facebook.com/teamintergen
Twitter.com/teamintergen
Australia
Gavin van Nierkerk
Practice Lead
Gavin.vanNiekerk@empired.com
New Zealand
Victor Philp
Solutions Manager
victor.philp@intergen.co.nz

Weitere Àhnliche Inhalte

Mehr von Intergen

Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...Intergen
 
Intergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journeyIntergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journeyIntergen
 
Intergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformationIntergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformationIntergen
 
Intergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterpriseIntergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterpriseIntergen
 
Intergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is hereIntergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is hereIntergen
 
Intergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safeIntergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safeIntergen
 
Intergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer EngagementIntergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer EngagementIntergen
 
Intergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important assetIntergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important assetIntergen
 
Intergen Interconnect
Intergen InterconnectIntergen Interconnect
Intergen InterconnectIntergen
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Dynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first lookDynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first lookIntergen
 
Dynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project ServiceDynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project ServiceIntergen
 
Dynamics Day 2016: looking to the future
Dynamics Day 2016: looking to the futureDynamics Day 2016: looking to the future
Dynamics Day 2016: looking to the futureIntergen
 
Dynamics Day 2016: NAV transformation of solutions to cloud
Dynamics Day 2016: NAV transformation of solutions to cloudDynamics Day 2016: NAV transformation of solutions to cloud
Dynamics Day 2016: NAV transformation of solutions to cloudIntergen
 
Dynamics Day 2016: service transformation through digital platforms
Dynamics Day 2016: service transformation through digital platformsDynamics Day 2016: service transformation through digital platforms
Dynamics Day 2016: service transformation through digital platformsIntergen
 
Dynamics Day 2016: getting real insight into your business with Power BI
Dynamics Day 2016: getting real insight into your business with Power BIDynamics Day 2016: getting real insight into your business with Power BI
Dynamics Day 2016: getting real insight into your business with Power BIIntergen
 
Dynamics Day 2016: enabling your cloud - principles and pitfalls
Dynamics Day 2016: enabling your cloud - principles and pitfallsDynamics Day 2016: enabling your cloud - principles and pitfalls
Dynamics Day 2016: enabling your cloud - principles and pitfallsIntergen
 
Dynamics Day 2016: digital transformation - getting personal
Dynamics Day 2016: digital transformation - getting personalDynamics Day 2016: digital transformation - getting personal
Dynamics Day 2016: digital transformation - getting personalIntergen
 
Dynamics Day 2016: driving results with Microsoft Dynamics using Agile
Dynamics Day 2016: driving results with Microsoft Dynamics using AgileDynamics Day 2016: driving results with Microsoft Dynamics using Agile
Dynamics Day 2016: driving results with Microsoft Dynamics using AgileIntergen
 
Dynamics Day 2016: connecting people and strategy
Dynamics Day 2016: connecting people and strategyDynamics Day 2016: connecting people and strategy
Dynamics Day 2016: connecting people and strategyIntergen
 

Mehr von Intergen (20)

Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
 
Intergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journeyIntergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journey
 
Intergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformationIntergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformation
 
Intergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterpriseIntergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterprise
 
Intergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is hereIntergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is here
 
Intergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safeIntergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safe
 
Intergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer EngagementIntergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer Engagement
 
Intergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important assetIntergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important asset
 
Intergen Interconnect
Intergen InterconnectIntergen Interconnect
Intergen Interconnect
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Dynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first lookDynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first look
 
Dynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project ServiceDynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project Service
 
Dynamics Day 2016: looking to the future
Dynamics Day 2016: looking to the futureDynamics Day 2016: looking to the future
Dynamics Day 2016: looking to the future
 
Dynamics Day 2016: NAV transformation of solutions to cloud
Dynamics Day 2016: NAV transformation of solutions to cloudDynamics Day 2016: NAV transformation of solutions to cloud
Dynamics Day 2016: NAV transformation of solutions to cloud
 
Dynamics Day 2016: service transformation through digital platforms
Dynamics Day 2016: service transformation through digital platformsDynamics Day 2016: service transformation through digital platforms
Dynamics Day 2016: service transformation through digital platforms
 
Dynamics Day 2016: getting real insight into your business with Power BI
Dynamics Day 2016: getting real insight into your business with Power BIDynamics Day 2016: getting real insight into your business with Power BI
Dynamics Day 2016: getting real insight into your business with Power BI
 
Dynamics Day 2016: enabling your cloud - principles and pitfalls
Dynamics Day 2016: enabling your cloud - principles and pitfallsDynamics Day 2016: enabling your cloud - principles and pitfalls
Dynamics Day 2016: enabling your cloud - principles and pitfalls
 
Dynamics Day 2016: digital transformation - getting personal
Dynamics Day 2016: digital transformation - getting personalDynamics Day 2016: digital transformation - getting personal
Dynamics Day 2016: digital transformation - getting personal
 
Dynamics Day 2016: driving results with Microsoft Dynamics using Agile
Dynamics Day 2016: driving results with Microsoft Dynamics using AgileDynamics Day 2016: driving results with Microsoft Dynamics using Agile
Dynamics Day 2016: driving results with Microsoft Dynamics using Agile
 
Dynamics Day 2016: connecting people and strategy
Dynamics Day 2016: connecting people and strategyDynamics Day 2016: connecting people and strategy
Dynamics Day 2016: connecting people and strategy
 

KĂŒrzlich hochgeladen

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

KĂŒrzlich hochgeladen (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Securing the new remote workforce

  • 1. Securing the new remote workforce
  • 2. Introducing your speaker
 Gavin van Nierkerk Practice Lead Modern Workplace Lead Cybersecurity Team
  • 5. 3%Your security designs are all focused on this being the assumption 98%98% - Your security designs need to shift focus
  • 7. THE COVID-19 PANDEMIC HAS UNLEASHED A WAVE OF CYBER ATTACKS – HERE’S HOW TO PROTECT YOURSELF
  • 10. Zero Trust/Lean Trust isn’t
 <what?> “Strong identity + device health + least privilege user access and verified with telemetry” LITERAL You can’t build a practical strategy around absolutes AN ADJECTIVE You aren’t going to ‘be’ Zero Trust FOR SALE There’s no such thing as ‘Zero Trust’ tech INSTANT You can’t boil the ocean A REVOLUTION Build on what you’ve got
  • 11. Making Zero Trust a reality Do you know what <Zero Trust> is? Have you established a v-team with your stakeholders? Do you know where you are at today with your <Zero Trust> journey? Do you have buy-in from C-level? An approach to security which assumes pervasive risk How do we behave in an environment of pervasive risk? TRADITIONAL OPTIMAL ADVANCED MATURITY MODELStrong Authentication! Enrolled & Managed Devices Risk based management – Identity, Device, Session
  • 12. Every company is at a different stage of their journey to the cloud. Maybe identity and device management are your top priorities, or you are digging into multi-factor authentication (MFA) or desktop virtualisation. Every IT leader needs to define the priorities to enable productivity from anywhere across their organisation’s workforce. We get that, and we want to help. The Journey
  • 13. Assumptions vs. Reality Users are employees Corporate managed devices On-premises apps Corp network and firewall Local packet tracking and logs Employees, contractors, partners & customers Bring your own device Explosion of cloud apps Expanding perimeter Overwhelming source of available signal
  • 14. Customer Questions Customer 1: How can Employees enrol their devices into device management to gain access to company resources? Risk Mitigation: Trusted devices (only). Potentially Intune Scenario 2: How can Security Teams enforce device health checks per application or service? Risk Mitigation: Trusted devices + health (Intune + Defender ATP) + secure app access (Cloud Application Security). Scenario 3: How can Employees and business guests have a secure way to access corporate resources when not using a managed device? Risk Mitigation: Non-trusted devices (Conditional Access Application Control e.g. secure email). One of the biggest benefits of Zero Trust is a change in mindset. An approach to security which treats every access attempt as if it’s originating from an untrusted network.
  • 15. Plan
  • 16. Major Phases Verify identity Verify device Verify access Verify services All user accounts set up for strong identity enforcement Strong identity enforced for O365 Least privilege user rights Eliminate passwords – biometric based model Device health required for SharePoint, Exchange, Teams on iOS, Android, Mac, and Windows Usage data for Application and Services Device Management required to tiered network access Internet Only for users Establish solutions for unmanaged devices Least privilege access model Device health required for wired/wireless corporate network Grow coverage in Device health requirement Service health concept Device management not required Single factor authentication to resources Capability to enforce strong identity exists Pre-Zero Trust U S E R & A C C E S S T E L E M E T RY
  • 17. 1. Connect all apps for Single Sign On 2. Strong Authentication using Multi-Factor Auth and Risk Detection 3. Enforce Policy Based Access for breach containment Identity teams – here is your to-do list:
  • 18. 1. Register devices with your Identity Provider 2. Implement MDM based security baselines and compliance reporting 3. Use endpoint threat detection to monitor device risk Device teams – here is your to-do list:
  • 19. Network & Infra Security Teams – here is your to-do list: 1. Enable a Cloud Workload Protection solution across your estate 2. Reduce attack surface by enabling just-in-time 3. Use cloud-native controls to create micro-perimeters with real-time threat protection
  • 20. 1. Agree on a label taxonomy and classify all documents and emails with the default label 2. Apply real-time protection to high risk scenarios: sensitive data and unmanaged access in apps 3. Perform Shadow IT discovery and a cloud control program Apps & Data Security Teams – here is your to-do list:
  • 22. We have run a number assessments for customers to understand how their security models and architecture may need to change in our remote working world. We are concerned at the decreased control businesses have over their overall security posture. 
and we want to help.
  • 23. Next Steps
 Take the self assessment: https://info.microsoft.com/ww-landing-Zero-Trust- Assessment.html Feel free to share the results if you want and we can provide insights and guidance.
  • 24. Next Steps
 Visit our page https://www.empired.com/reimaginework https://www.intergen.co.nz/reimaginework Contact us contact@empired.com info@intergen.co.nz
  • 26.
  • 28. Corporate Network Geo-location Microsoft Cloud App SecurityMacOS Android iOS Windows Windows Defender ATP Client apps Browser apps Google ID MSA Azure AD ADFS Require MFA Allow/block access Block legacy authentication Force password reset****** Limited access Controls Employee & Partner Users and Roles Trusted & Compliant Devices Physical & Virtual Location Client apps & Auth Method Conditions Machine learning Policies Real time Evaluation Engine Session Risk 3 40TB Effective policy Azure AD Conditional Access
  • 29. Thank you! For more information please follow contact us here: Linkedin.com/company/empired-ltd Facebook.com/empiredltd Twitter.com/empiredltd Linkedin.com/company/intergen Facebook.com/teamintergen Twitter.com/teamintergen Australia Gavin van Nierkerk Practice Lead Gavin.vanNiekerk@empired.com New Zealand Victor Philp Solutions Manager victor.philp@intergen.co.nz