Stop the attackers –Inbound attacks –Outbound attacks
Many different platforms –Mobile, desktop
Protection is multi-faceted –Defense in depth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Edge vs. access control
A
Control at the edge –Your Internet link –Managed primarily through firewall rules –Firewall rules rarely change
Access control –Control from wherever you are –Inside or outside –Access can be based on many rules –By user, group, location, application, etc. –Access can be easily revoked or changed –Change your security posture at any time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Posture assessment
A
You can’t trust everyone’s computer –BYOD (Bring Your Own Device) –Malware infections / missing anti-malware –Unauthorized applications
Before connecting to the network, perform a health check –Is it a trusted device? –Is it running anti-virus? Which one? Is it updated? –Are the corporate applications installed? –Is it a mobile device? Is the disk encrypted? –The type of device doesn’t matter - Windows, Mac, Linux, iOS, Android
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Health checks/posture assessment
A
Persistent agents –Permanently installed onto a system –Periodic updates may be required
Dissolvable agents –No installation is required –Runs during the posture assessment –Terminates when no longer required
Agentless NAC –Integrated with Active Directory –Checks are made during login and logoff –Can’t be scheduled
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Failing your assessment
A
What happens when a posture assessment fails? –Too dangerous to allow access
Quarantine network, notify administrators –Just enough network access to fix the issue
Once resolved, try again –May require additional fixes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Endpoint detection and response (EDR)
A
A different method of threat protection –Scale to meet the increasing number of threats
Detect a threat –Signatures aren’t the only detection tool –Behavioral analysis, machine learning, process monitoring –Lightweight agent on the endpoint
Investigate the threat –Root cause analysis
Respond to the threat –Isolate the system, quarantine the threat, rollback to a previous config –API driven, no user or technician intervention required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Extended Detection and Response (XDR)
A
An evolution of EDR– Improve missed detections, false positives, and long investigation times– Attacks involve more than just the endpoint
Add network-based detection– Investigate and respond to network anomalies