SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Track A-2: Forcepoint Raised The Bar:
What's Next in the Cross Domain Community
Michelle Jordan,
Global Governments Cybersecurity
Principal Cybersecurity Manager,
Forcepoint
George Kamis,
CTO, Global Governments &
Critical Infrastructure,
Forcepoint
Data Protection | Web Security | CASB | NGFW | Advanced Malware Detection | Behavioral Analytics | Insider Threat | Email Security | Data Guard | Cross Domain
Forcepoint Raised The Bar: What’s next in the
Cross Domain Community
George Kamis
Chief Technology Officer, Forcepoint Global Governments and Critical Infrastructure
Michelle Jordan
Cyber Security, Business Development, Forcepoint Global Governments and Critical Infrastructure
Forcepoint Proprietary © 2019 Forcepoint | 4
What are Cross Domain Solutions
Cross Domain Solutions:
• Facilitate secure information sharing between entities (agencies, countries, networks) with different sensitivity levels
through a controlled interface
• Are built on top of a secure, trusted operating system to achieve a high assurance platform
Three types of cross domain solutions as defined by the NCDSMO:
• Provides users a path to data on different networks as allowed by policy
Access:
• Provides various mechanisms to securely move data between different networks, while mitigating against
viruses, malware and policy violations as allowed by policy
Transfer (Guards):
• Solutions that encompass both access and transfer capabilities
Hybrid:
© 2019 Forcepoint | 5
Cross Domain Advantages
To effectively yet securely share information across multiple classified & separate
networks/domains
Real time access to multiple
separate & sensitive
networks/clouds
Removal of risky manual processes
including portable media used for
file transfer during mission-critical
activities (“sneakernet”)
Reduction of network and
computer hardware costs
Ability to access and share
information at multiple security
levels
Forcepoint Proprietary © 2019 Forcepoint | 6
What is Raise The Bar?
Raise The Bar
• An NSA and NCDSMO led initiative to continually improve the status quo in the cross domain community
• Focuses primarily on Transfer (Guard) mechanisms as well as concepts for Access solutions and system integrations to
combat evolving threats – The bar raises every year!
NSA and NCDSMO provide community support around Raise The Bar concepts:
• Community outreach and information briefings to contractors, vendors, customers and security personnel
• Security Design Reviews with vendors to tailor RTB guidance to specific technologies and determine best paths forward
• Engagement with independent test labs around methods to recognize, test and verify RTB concepts
• **Documented in Cross Domain Solution (CDS) Design and Implementation Requirements, 2018 Raise the Bar (RTB)
Baseline Release, Revision 1.0, 21 December 2018, Doc ID: NCDSMO-R-00008-001_00, National Cross Domain Strategy
and Management Office and National Security Agency
Forcepoint Proprietary
Forcepoint Proprietary © 2019 Forcepoint | 7
What is in Raise The Bar?
Raise The Bar currently consists of guidance across a number of areas
• What technology to use – don’t build from scratch
• System architectures and integration models
• Design and connectivity guidance
• Internal software architecture
• Management, maintenance and monitoring mechanisms
Borrows several concepts from the cryptography and formal methods communities, particularly R.A.I.N.
• Redundant - Always Invoked – Independent Implementation - Non-by-passable
• Substantial CDS redesign
Notable attention is paid to improving the state of data filtering, inspection & transformation
• New threats found on a regular basis requiring more robust and adaptable filtering
• Attempting standardization more accurate & precise language than “Deep Content Inspection”
• Constantly evaluating the state-of-the-art sanitization tools
Forcepoint Proprietary
Forcepoint Proprietary © 2019 Forcepoint | 8
Forcepoint’s Raise The Bar Involvement
Forcepoint is heavily involved in Raise The Bar (RTB)
• Trusted Thin Client, SimShield, Trusted Gateway System & High Speed Guard have met Raise The Bar objectives
• SimShield = one of the first products across the community to complete independent testing with RTB objectives
• All products have had favorable SABI LBSA test results and SAOs reviews
The Secret And Below Interoperability (SABI) process has fully embraced RTB:
• Independent test labs performing Lab Based Security Assessments (LBSA) since 2016 include RTB objectives
• Others are closely watching, Monitored closely by the Five-Eyes CDS working group
Forcepoint Proprietary
© 2019 Forcepoint | 9
Trusted Thin Client
Trusted Thin Client Remote
High Speed Guard
High Speed Guard SP
SimShield WebShield
Trusted Gateway
System
Trusted Print Delivery Trusted Mail System
Cross Domain Solutions Suite
Facilitating your mission while maintaining the highest degree of network and data security
ACCESS TRANSFER
TRANSFER - ADAPTORTRANSFER - ADAPTORTRANSFER
TRANSFER TRANSFER
Forcepoint Proprietary © 2019 Forcepoint | 10
Better Yet – Let’s Raise The Bar!
Virginia ABC store
December ‘18
Forcepoint Proprietary © 2019 Forcepoint | 11
Risk Adaptive Protection
Concepts to Cross Domain
Transfer
A Thought Leadership Discussion –
Going Beyond the Bar
Forcepoint Proprietary © 2019 Forcepoint | 12Forcepoint Proprietary
The growth of structured versus unstructured data over the past decade shows that unstructured data accounts for more than 90% of all data
Source: Patrick Cheesman)
Data continues to expand exponentially
Data volume growth directly
correlates to increase information
sharing needs
at multiple classifications level
Forcepoint Proprietary © 2019 Forcepoint | 13
User & Data Centric
Risk Adaptive Policies for
Cross Domain
UsersAndDataMustBeAtTheCenterOfYourDesignThinking
User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases risk
DegreeofDigital
Transformation
ITComplexity&Risk
Pre-2000 2025Infrastructure-centric 2015 Behavioral-centric
perimeter
Stove-Pipe CDS
Static Policies
Enterprise CDS
Static Policies
Forcepoint Proprietary © 2019 Forcepoint | 14Forcepoint Proprietary
DIGITAL
ACTIVITY
“Can’t Share” Can Share
Threat-Centric Cybersecurity
Necessary but insufficient to
scale
Does not meet the warfighters
needs
A LACK
OF CONTEXT
for Policy based
Decisions
EASY TO CLASSIFY EASY TO CLASSIFYHARD TO CLASSIFY
Trusting static policies in a dynamic
environment
Decide what is good or bad at a
single point in time
Configure your defenses to stop the
bad from entering and only allow
the good to pass through
Traditional approach to cross domain transfers
Security Wants to limit
data to only this
Operators Need This
Forcepoint Proprietary © 2019 Forcepoint | 15
UsersandDataisthecenterofourdesignthinking
User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases business risk
User & Data Centric
Risk Adaptive policy
Policy Policy
High SideLow Side
Traditional CDS Security
(static policy)
One-to-many enforcement of static,
generic policies, producing high
false positive rates.
Forcepoint Proprietary © 2019 Forcepoint | 16
Human-Centriccybersecuritychangeseverything
One-to-one enforcement of different policies based
on the risk, enabling automation.
Human-Centric Security
User & Data Centric
Risk Adaptive policy
Forcepoint Proprietary © 2019 Forcepoint | 17
The best way to efficiently evaluate data
transfers it to look beyond the CDS
demarcation point.
(data types, formats, sanitization, etc)
Need to extend risk factors in cross domain
transfer decisions outside the CDS device
(dynamic risk based on user behaviors, data
flows, data sources, data types, DLP markings,
etc)
Forcepoint Proprietary © 2019 Forcepoint | 18Forcepoint Proprietary
Today: All decisions are made at the CDS
Forcepoint Proprietary © 2019 Forcepoint | 19Forcepoint Proprietary
TECHNOLOGY ARCHITECTURE
1 SENSE
2
CONTEXTUALIZE
& UNDERSTAND
SENSE
CONCEPTUALIZE &
UNDERSTAND
1
2
Tomorrow: Closed Loop, Risk-adaptive approach
3 ENFORCE
3 ENFORCE at CDS
Forcepoint Proprietary © 2019 Forcepoint | 20Forcepoint Proprietary
RisklevelassignmentwithDynamicDataProtection(DDP)
Risk Scored Against:
• Self
• Local Group
• Organization
Forcepoint Proprietary © 2019 Forcepoint | 21Forcepoint Proprietary
Systemactionassignmentbyrisklevel–automaticpolicy(DDP)
Forcepoint Proprietary © 2019 Forcepoint | 22
We need to start looking beyond the bar
Static policies do not scale
Need to look deeper into the source of data, not just the data to make an authorized
transfer (behaviors -who, where, when, how much)
Can leverage DLP technology to make better transfer decisions
Common static filtering across all CDSes
can be targeted and exploited
Need to look at human behaviors and
model normal vs compromised with
dynamic policy adjustment
Static policies do not scale and will limit
data and visibility to those that need the
data
Forcepoint Proprietary © 2019 Forcepoint | 23Forcepoint Proprietary
The Forcepoint Difference
Risk-adaptive protection powered by behavioral
intelligence research delivers automation is available
today with Forcepoint Dynamic Data Protection
Leader in Cross Domain (CDS), Data Loss Protection
(DLP), Data Analytics, Insider Threat, and Dynamic
Data Protection
We are the experts in human-centric security.
Understand the balance between security and
operational needs
Forcepoint Proprietary
Follow us!
Forcepoint LLC@Forcepoint Forcepoint @ForcepointSec
@ForcepointLabs
Forcepoint
Thank you
© 2019 Forcepoint | 25

Contenu connexe

Tendances

India Software Developer | Talent Pool Reports
India Software Developer | Talent Pool ReportsIndia Software Developer | Talent Pool Reports
India Software Developer | Talent Pool ReportsLinkedIn Talent Solutions
 
Brkdcn 2035 multi-x
Brkdcn 2035 multi-xBrkdcn 2035 multi-x
Brkdcn 2035 multi-xMason Mei
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpiMohammed Abdallah
 
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...MyNOG
 
Cisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW ClusteringCisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW Clusteringib_cims
 
Técnicas de Mineração de Dados Aplicadas a Sistemas de Recomendação
Técnicas de Mineração de Dados Aplicadas a Sistemas de RecomendaçãoTécnicas de Mineração de Dados Aplicadas a Sistemas de Recomendação
Técnicas de Mineração de Dados Aplicadas a Sistemas de Recomendaçãosaspi2
 
BaiCells Introduction & Product Introduction-EN-vf-updated
BaiCells Introduction & Product Introduction-EN-vf-updatedBaiCells Introduction & Product Introduction-EN-vf-updated
BaiCells Introduction & Product Introduction-EN-vf-updatedJi Hun (Jay) Ko
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISERobb Boyd
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Challenges with Data Center Synchronization and Options for Precise Synchroni...
Challenges with Data Center Synchronization and Options for Precise Synchroni...Challenges with Data Center Synchronization and Options for Precise Synchroni...
Challenges with Data Center Synchronization and Options for Precise Synchroni...Equinix
 
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersBruno Teixeira
 
Juanjo Hierro - Integrating Trust and IAM with trading in Data Space Connect...
Juanjo Hierro -  Integrating Trust and IAM with trading in Data Space Connect...Juanjo Hierro -  Integrating Trust and IAM with trading in Data Space Connect...
Juanjo Hierro - Integrating Trust and IAM with trading in Data Space Connect...FIWARE
 
AI & IoT in the development of smart cities
AI & IoT in the development of smart citiesAI & IoT in the development of smart cities
AI & IoT in the development of smart citiesRaunak Mundada
 
Data Center Checklist for Infrastructure Best Practices (SlideShare)
Data Center Checklist for Infrastructure Best Practices (SlideShare)Data Center Checklist for Infrastructure Best Practices (SlideShare)
Data Center Checklist for Infrastructure Best Practices (SlideShare)SP Home Run Inc.
 
GRE (generic routing encapsulation)
GRE (generic routing encapsulation)GRE (generic routing encapsulation)
GRE (generic routing encapsulation)Netwax Lab
 
apidays Paris 2022 - Sustainable API Green Score, Yannick Tremblais (Groupe R...
apidays Paris 2022 - Sustainable API Green Score, Yannick Tremblais (Groupe R...apidays Paris 2022 - Sustainable API Green Score, Yannick Tremblais (Groupe R...
apidays Paris 2022 - Sustainable API Green Score, Yannick Tremblais (Groupe R...apidays
 
A10 Capabilities Overview(2015-05-29)
A10 Capabilities Overview(2015-05-29)A10 Capabilities Overview(2015-05-29)
A10 Capabilities Overview(2015-05-29)David Ayoub
 
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfAryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfKlausSchwegler
 

Tendances (20)

India Software Developer | Talent Pool Reports
India Software Developer | Talent Pool ReportsIndia Software Developer | Talent Pool Reports
India Software Developer | Talent Pool Reports
 
Brkdcn 2035 multi-x
Brkdcn 2035 multi-xBrkdcn 2035 multi-x
Brkdcn 2035 multi-x
 
HGConcept-ITAM-Design
HGConcept-ITAM-DesignHGConcept-ITAM-Design
HGConcept-ITAM-Design
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpi
 
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
 
Cisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW ClusteringCisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW Clustering
 
Técnicas de Mineração de Dados Aplicadas a Sistemas de Recomendação
Técnicas de Mineração de Dados Aplicadas a Sistemas de RecomendaçãoTécnicas de Mineração de Dados Aplicadas a Sistemas de Recomendação
Técnicas de Mineração de Dados Aplicadas a Sistemas de Recomendação
 
BaiCells Introduction & Product Introduction-EN-vf-updated
BaiCells Introduction & Product Introduction-EN-vf-updatedBaiCells Introduction & Product Introduction-EN-vf-updated
BaiCells Introduction & Product Introduction-EN-vf-updated
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISE
 
Apigee Edge Product Demo
Apigee Edge Product DemoApigee Edge Product Demo
Apigee Edge Product Demo
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Challenges with Data Center Synchronization and Options for Precise Synchroni...
Challenges with Data Center Synchronization and Options for Precise Synchroni...Challenges with Data Center Synchronization and Options for Precise Synchroni...
Challenges with Data Center Synchronization and Options for Precise Synchroni...
 
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
 
Juanjo Hierro - Integrating Trust and IAM with trading in Data Space Connect...
Juanjo Hierro -  Integrating Trust and IAM with trading in Data Space Connect...Juanjo Hierro -  Integrating Trust and IAM with trading in Data Space Connect...
Juanjo Hierro - Integrating Trust and IAM with trading in Data Space Connect...
 
AI & IoT in the development of smart cities
AI & IoT in the development of smart citiesAI & IoT in the development of smart cities
AI & IoT in the development of smart cities
 
Data Center Checklist for Infrastructure Best Practices (SlideShare)
Data Center Checklist for Infrastructure Best Practices (SlideShare)Data Center Checklist for Infrastructure Best Practices (SlideShare)
Data Center Checklist for Infrastructure Best Practices (SlideShare)
 
GRE (generic routing encapsulation)
GRE (generic routing encapsulation)GRE (generic routing encapsulation)
GRE (generic routing encapsulation)
 
apidays Paris 2022 - Sustainable API Green Score, Yannick Tremblais (Groupe R...
apidays Paris 2022 - Sustainable API Green Score, Yannick Tremblais (Groupe R...apidays Paris 2022 - Sustainable API Green Score, Yannick Tremblais (Groupe R...
apidays Paris 2022 - Sustainable API Green Score, Yannick Tremblais (Groupe R...
 
A10 Capabilities Overview(2015-05-29)
A10 Capabilities Overview(2015-05-29)A10 Capabilities Overview(2015-05-29)
A10 Capabilities Overview(2015-05-29)
 
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfAryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
 

Similaire à Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george kamis and michelle jordan_cybersecurity leadership forum

Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Benoît H. Dicaire
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security StrategyCloudflare
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...Cohesive Networks
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools SolarWinds
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
 
Inteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceInteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceMarketingArrowECS_CZ
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Fidelis Cybersecurity
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Software Integrity Group
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App DeliveryMighty Guides, Inc.
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats Jim Kaplan CIA CFE
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the CloudOnRamp
 
Demystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceDemystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceMirantis
 

Similaire à Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george kamis and michelle jordan_cybersecurity leadership forum (20)

Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security Strategy
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Inteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceInteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformace
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
Demystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceDemystifying Cloud Security Compliance
Demystifying Cloud Security Compliance
 

Plus de scoopnewsgroup

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMAscoopnewsgroup
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choicescoopnewsgroup
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernizationscoopnewsgroup
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecturescoopnewsgroup
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformationscoopnewsgroup
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?scoopnewsgroup
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problemsscoopnewsgroup
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trustscoopnewsgroup
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happyscoopnewsgroup
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linuxscoopnewsgroup
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Agescoopnewsgroup
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Governmentscoopnewsgroup
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factoryscoopnewsgroup
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Rangescoopnewsgroup
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurityscoopnewsgroup
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summitscoopnewsgroup
 

Plus de scoopnewsgroup (20)

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
 

Dernier

(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...Hemant Purohit
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28JSchaus & Associates
 
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...Christina Parmionova
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxaaryamanorathofficia
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...ResolutionFoundation
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfahcitycouncil
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersCongressional Budget Office
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up NumberMs Riya
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024Energy for One World
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.Christina Parmionova
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos WebinarLinda Reinstein
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 

Dernier (20)

(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28
 
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptx
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdf
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists Lawmakers
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
 
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
 
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
 

Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george kamis and michelle jordan_cybersecurity leadership forum

  • 1.
  • 2. Track A-2: Forcepoint Raised The Bar: What's Next in the Cross Domain Community Michelle Jordan, Global Governments Cybersecurity Principal Cybersecurity Manager, Forcepoint George Kamis, CTO, Global Governments & Critical Infrastructure, Forcepoint
  • 3. Data Protection | Web Security | CASB | NGFW | Advanced Malware Detection | Behavioral Analytics | Insider Threat | Email Security | Data Guard | Cross Domain Forcepoint Raised The Bar: What’s next in the Cross Domain Community George Kamis Chief Technology Officer, Forcepoint Global Governments and Critical Infrastructure Michelle Jordan Cyber Security, Business Development, Forcepoint Global Governments and Critical Infrastructure
  • 4. Forcepoint Proprietary © 2019 Forcepoint | 4 What are Cross Domain Solutions Cross Domain Solutions: • Facilitate secure information sharing between entities (agencies, countries, networks) with different sensitivity levels through a controlled interface • Are built on top of a secure, trusted operating system to achieve a high assurance platform Three types of cross domain solutions as defined by the NCDSMO: • Provides users a path to data on different networks as allowed by policy Access: • Provides various mechanisms to securely move data between different networks, while mitigating against viruses, malware and policy violations as allowed by policy Transfer (Guards): • Solutions that encompass both access and transfer capabilities Hybrid:
  • 5. © 2019 Forcepoint | 5 Cross Domain Advantages To effectively yet securely share information across multiple classified & separate networks/domains Real time access to multiple separate & sensitive networks/clouds Removal of risky manual processes including portable media used for file transfer during mission-critical activities (“sneakernet”) Reduction of network and computer hardware costs Ability to access and share information at multiple security levels
  • 6. Forcepoint Proprietary © 2019 Forcepoint | 6 What is Raise The Bar? Raise The Bar • An NSA and NCDSMO led initiative to continually improve the status quo in the cross domain community • Focuses primarily on Transfer (Guard) mechanisms as well as concepts for Access solutions and system integrations to combat evolving threats – The bar raises every year! NSA and NCDSMO provide community support around Raise The Bar concepts: • Community outreach and information briefings to contractors, vendors, customers and security personnel • Security Design Reviews with vendors to tailor RTB guidance to specific technologies and determine best paths forward • Engagement with independent test labs around methods to recognize, test and verify RTB concepts • **Documented in Cross Domain Solution (CDS) Design and Implementation Requirements, 2018 Raise the Bar (RTB) Baseline Release, Revision 1.0, 21 December 2018, Doc ID: NCDSMO-R-00008-001_00, National Cross Domain Strategy and Management Office and National Security Agency Forcepoint Proprietary
  • 7. Forcepoint Proprietary © 2019 Forcepoint | 7 What is in Raise The Bar? Raise The Bar currently consists of guidance across a number of areas • What technology to use – don’t build from scratch • System architectures and integration models • Design and connectivity guidance • Internal software architecture • Management, maintenance and monitoring mechanisms Borrows several concepts from the cryptography and formal methods communities, particularly R.A.I.N. • Redundant - Always Invoked – Independent Implementation - Non-by-passable • Substantial CDS redesign Notable attention is paid to improving the state of data filtering, inspection & transformation • New threats found on a regular basis requiring more robust and adaptable filtering • Attempting standardization more accurate & precise language than “Deep Content Inspection” • Constantly evaluating the state-of-the-art sanitization tools Forcepoint Proprietary
  • 8. Forcepoint Proprietary © 2019 Forcepoint | 8 Forcepoint’s Raise The Bar Involvement Forcepoint is heavily involved in Raise The Bar (RTB) • Trusted Thin Client, SimShield, Trusted Gateway System & High Speed Guard have met Raise The Bar objectives • SimShield = one of the first products across the community to complete independent testing with RTB objectives • All products have had favorable SABI LBSA test results and SAOs reviews The Secret And Below Interoperability (SABI) process has fully embraced RTB: • Independent test labs performing Lab Based Security Assessments (LBSA) since 2016 include RTB objectives • Others are closely watching, Monitored closely by the Five-Eyes CDS working group Forcepoint Proprietary
  • 9. © 2019 Forcepoint | 9 Trusted Thin Client Trusted Thin Client Remote High Speed Guard High Speed Guard SP SimShield WebShield Trusted Gateway System Trusted Print Delivery Trusted Mail System Cross Domain Solutions Suite Facilitating your mission while maintaining the highest degree of network and data security ACCESS TRANSFER TRANSFER - ADAPTORTRANSFER - ADAPTORTRANSFER TRANSFER TRANSFER
  • 10. Forcepoint Proprietary © 2019 Forcepoint | 10 Better Yet – Let’s Raise The Bar! Virginia ABC store December ‘18
  • 11. Forcepoint Proprietary © 2019 Forcepoint | 11 Risk Adaptive Protection Concepts to Cross Domain Transfer A Thought Leadership Discussion – Going Beyond the Bar
  • 12. Forcepoint Proprietary © 2019 Forcepoint | 12Forcepoint Proprietary The growth of structured versus unstructured data over the past decade shows that unstructured data accounts for more than 90% of all data Source: Patrick Cheesman) Data continues to expand exponentially Data volume growth directly correlates to increase information sharing needs at multiple classifications level
  • 13. Forcepoint Proprietary © 2019 Forcepoint | 13 User & Data Centric Risk Adaptive Policies for Cross Domain UsersAndDataMustBeAtTheCenterOfYourDesignThinking User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases risk DegreeofDigital Transformation ITComplexity&Risk Pre-2000 2025Infrastructure-centric 2015 Behavioral-centric perimeter Stove-Pipe CDS Static Policies Enterprise CDS Static Policies
  • 14. Forcepoint Proprietary © 2019 Forcepoint | 14Forcepoint Proprietary DIGITAL ACTIVITY “Can’t Share” Can Share Threat-Centric Cybersecurity Necessary but insufficient to scale Does not meet the warfighters needs A LACK OF CONTEXT for Policy based Decisions EASY TO CLASSIFY EASY TO CLASSIFYHARD TO CLASSIFY Trusting static policies in a dynamic environment Decide what is good or bad at a single point in time Configure your defenses to stop the bad from entering and only allow the good to pass through Traditional approach to cross domain transfers Security Wants to limit data to only this Operators Need This
  • 15. Forcepoint Proprietary © 2019 Forcepoint | 15 UsersandDataisthecenterofourdesignthinking User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases business risk User & Data Centric Risk Adaptive policy Policy Policy High SideLow Side Traditional CDS Security (static policy) One-to-many enforcement of static, generic policies, producing high false positive rates.
  • 16. Forcepoint Proprietary © 2019 Forcepoint | 16 Human-Centriccybersecuritychangeseverything One-to-one enforcement of different policies based on the risk, enabling automation. Human-Centric Security User & Data Centric Risk Adaptive policy
  • 17. Forcepoint Proprietary © 2019 Forcepoint | 17 The best way to efficiently evaluate data transfers it to look beyond the CDS demarcation point. (data types, formats, sanitization, etc) Need to extend risk factors in cross domain transfer decisions outside the CDS device (dynamic risk based on user behaviors, data flows, data sources, data types, DLP markings, etc)
  • 18. Forcepoint Proprietary © 2019 Forcepoint | 18Forcepoint Proprietary Today: All decisions are made at the CDS
  • 19. Forcepoint Proprietary © 2019 Forcepoint | 19Forcepoint Proprietary TECHNOLOGY ARCHITECTURE 1 SENSE 2 CONTEXTUALIZE & UNDERSTAND SENSE CONCEPTUALIZE & UNDERSTAND 1 2 Tomorrow: Closed Loop, Risk-adaptive approach 3 ENFORCE 3 ENFORCE at CDS
  • 20. Forcepoint Proprietary © 2019 Forcepoint | 20Forcepoint Proprietary RisklevelassignmentwithDynamicDataProtection(DDP) Risk Scored Against: • Self • Local Group • Organization
  • 21. Forcepoint Proprietary © 2019 Forcepoint | 21Forcepoint Proprietary Systemactionassignmentbyrisklevel–automaticpolicy(DDP)
  • 22. Forcepoint Proprietary © 2019 Forcepoint | 22 We need to start looking beyond the bar Static policies do not scale Need to look deeper into the source of data, not just the data to make an authorized transfer (behaviors -who, where, when, how much) Can leverage DLP technology to make better transfer decisions Common static filtering across all CDSes can be targeted and exploited Need to look at human behaviors and model normal vs compromised with dynamic policy adjustment Static policies do not scale and will limit data and visibility to those that need the data
  • 23. Forcepoint Proprietary © 2019 Forcepoint | 23Forcepoint Proprietary The Forcepoint Difference Risk-adaptive protection powered by behavioral intelligence research delivers automation is available today with Forcepoint Dynamic Data Protection Leader in Cross Domain (CDS), Data Loss Protection (DLP), Data Analytics, Insider Threat, and Dynamic Data Protection We are the experts in human-centric security. Understand the balance between security and operational needs
  • 24. Forcepoint Proprietary Follow us! Forcepoint LLC@Forcepoint Forcepoint @ForcepointSec @ForcepointLabs Forcepoint
  • 25. Thank you © 2019 Forcepoint | 25