SlideShare una empresa de Scribd logo
1 de 29
Securing the new remote workforce
Introducing your speaker…
Gavin van Nierkerk
Practice Lead Modern Workplace
Lead Cybersecurity Team
LESS THAN
3%
GREATER THAN
98%
3%Your security designs
are all focused on this
being the assumption
98%98% - Your security
designs need to
shift focus
Media
THE COVID-19 PANDEMIC HAS UNLEASHED A WAVE OF
CYBER ATTACKS – HERE’S HOW TO PROTECT YOURSELF
On-premise/
private cloud
Approach
Zero Trust/Lean
Trust isn’t…
<what?>
“Strong identity + device
health + least privilege
user access and verified
with telemetry”
LITERAL
You can’t build a practical strategy around absolutes
AN ADJECTIVE
You aren’t going to ‘be’ Zero Trust
FOR SALE
There’s no such thing as ‘Zero Trust’ tech
INSTANT
You can’t boil the ocean
A REVOLUTION
Build on what you’ve got
Making Zero Trust a reality Do you know what <Zero Trust> is?
Have you established a v-team
with your stakeholders?
Do you know where you are at today
with your <Zero Trust> journey?
Do you have buy-in from C-level?
An approach to security which
assumes pervasive risk
How do we behave in an
environment of pervasive risk?
TRADITIONAL
OPTIMAL
ADVANCED
MATURITY MODELStrong Authentication!
Enrolled & Managed Devices
Risk based management –
Identity, Device, Session
Every company is at a different stage of their
journey to the cloud. Maybe identity and
device management are your top priorities,
or you are digging into multi-factor
authentication (MFA) or desktop virtualisation.
Every IT leader needs to define the priorities to
enable productivity from anywhere across their
organisation’s workforce.
We get that, and we want to help.
The Journey
Assumptions vs. Reality
Users are employees
Corporate managed devices
On-premises apps
Corp network and firewall
Local packet tracking and logs
Employees, contractors, partners & customers
Bring your own device
Explosion of cloud apps
Expanding perimeter
Overwhelming source of available signal
Customer Questions
Customer 1: How can Employees enrol their devices into device
management to gain access to company resources?
Risk Mitigation: Trusted devices (only). Potentially Intune
Scenario 2: How can Security Teams enforce device health checks per
application or service?
Risk Mitigation: Trusted devices + health (Intune + Defender ATP) +
secure app access (Cloud Application Security).
Scenario 3: How can Employees and business guests have a secure way to
access corporate resources when not using a managed device?
Risk Mitigation: Non-trusted devices (Conditional Access Application
Control e.g. secure email).
One of the biggest benefits of Zero Trust is a
change in mindset. An approach to security
which treats every access attempt as if it’s
originating from an untrusted network.
Plan
Major Phases
Verify identity
Verify device
Verify access
Verify services
All user accounts
set up for strong
identity
enforcement
Strong identity
enforced for
O365
Least privilege
user rights
Eliminate
passwords –
biometric based
model
Device health
required for
SharePoint,
Exchange, Teams
on iOS, Android,
Mac, and
Windows
Usage data for
Application and
Services
Device
Management
required to tiered
network access
Internet Only
for users
Establish solutions
for unmanaged
devices
Least privilege
access model
Device health
required for
wired/wireless
corporate network
Grow coverage
in Device health
requirement
Service health
concept
Device
management
not required
Single factor
authentication
to resources
Capability to
enforce strong
identity exists
Pre-Zero Trust
U S E R & A C C E S S T E L E M E T RY
1. Connect all apps for Single Sign On
2. Strong Authentication using Multi-Factor Auth and Risk Detection
3. Enforce Policy Based Access for breach containment
Identity teams – here is your to-do list:
1. Register devices with your Identity Provider
2. Implement MDM based security baselines and compliance reporting
3. Use endpoint threat detection to monitor device risk
Device teams – here is your to-do list:
Network & Infra Security Teams – here is your to-do list:
1. Enable a Cloud Workload Protection solution across your estate
2. Reduce attack surface by enabling just-in-time
3. Use cloud-native controls to create micro-perimeters with real-time threat protection
1. Agree on a label taxonomy and classify all documents and emails with the default label
2. Apply real-time protection to high risk scenarios: sensitive data and unmanaged access in apps
3. Perform Shadow IT discovery and a cloud control program
Apps & Data Security Teams – here is your to-do list:
Next Steps
We have run a number assessments for
customers to understand how their security
models and architecture may need to change
in our remote working world.
We are concerned at the decreased control
businesses have over their overall security
posture.
…and we want to help.
Next Steps…
Take the self assessment:
https://info.microsoft.com/ww-landing-Zero-Trust-
Assessment.html
Feel free to share the results if you want and we can
provide insights and guidance.
Next Steps…
Visit our page
https://www.empired.com/reimaginework
https://www.intergen.co.nz/reimaginework
Contact us
contact@empired.com
info@intergen.co.nz
Questions?
Sample Architecture
Corporate
Network
Geo-location
Microsoft
Cloud App SecurityMacOS
Android
iOS
Windows
Windows
Defender ATP
Client apps
Browser apps
Google ID
MSA
Azure AD
ADFS
Require
MFA
Allow/block
access
Block legacy
authentication
Force
password
reset******
Limited
access
Controls
Employee & Partner
Users and Roles
Trusted &
Compliant Devices
Physical &
Virtual Location
Client apps &
Auth Method
Conditions
Machine
learning
Policies
Real time
Evaluation
Engine
Session
Risk
3
40TB
Effective
policy
Azure AD Conditional Access
Thank you!
For more information please follow contact us here:
Linkedin.com/company/empired-ltd
Facebook.com/empiredltd
Twitter.com/empiredltd
Linkedin.com/company/intergen
Facebook.com/teamintergen
Twitter.com/teamintergen
Australia
Gavin van Nierkerk
Practice Lead
Gavin.vanNiekerk@empired.com
New Zealand
Victor Philp
Solutions Manager
victor.philp@intergen.co.nz

Más contenido relacionado

Más de Intergen

Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...Intergen
 
Intergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journeyIntergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journeyIntergen
 
Intergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformationIntergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformationIntergen
 
Intergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterpriseIntergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterpriseIntergen
 
Intergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is hereIntergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is hereIntergen
 
Intergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safeIntergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safeIntergen
 
Intergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer EngagementIntergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer EngagementIntergen
 
Intergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important assetIntergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important assetIntergen
 
Intergen Interconnect
Intergen InterconnectIntergen Interconnect
Intergen InterconnectIntergen
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Dynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first lookDynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first lookIntergen
 
Dynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project ServiceDynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project ServiceIntergen
 
Dynamics Day 2016: looking to the future
Dynamics Day 2016: looking to the futureDynamics Day 2016: looking to the future
Dynamics Day 2016: looking to the futureIntergen
 
Dynamics Day 2016: NAV transformation of solutions to cloud
Dynamics Day 2016: NAV transformation of solutions to cloudDynamics Day 2016: NAV transformation of solutions to cloud
Dynamics Day 2016: NAV transformation of solutions to cloudIntergen
 
Dynamics Day 2016: service transformation through digital platforms
Dynamics Day 2016: service transformation through digital platformsDynamics Day 2016: service transformation through digital platforms
Dynamics Day 2016: service transformation through digital platformsIntergen
 
Dynamics Day 2016: getting real insight into your business with Power BI
Dynamics Day 2016: getting real insight into your business with Power BIDynamics Day 2016: getting real insight into your business with Power BI
Dynamics Day 2016: getting real insight into your business with Power BIIntergen
 
Dynamics Day 2016: enabling your cloud - principles and pitfalls
Dynamics Day 2016: enabling your cloud - principles and pitfallsDynamics Day 2016: enabling your cloud - principles and pitfalls
Dynamics Day 2016: enabling your cloud - principles and pitfallsIntergen
 
Dynamics Day 2016: digital transformation - getting personal
Dynamics Day 2016: digital transformation - getting personalDynamics Day 2016: digital transformation - getting personal
Dynamics Day 2016: digital transformation - getting personalIntergen
 
Dynamics Day 2016: driving results with Microsoft Dynamics using Agile
Dynamics Day 2016: driving results with Microsoft Dynamics using AgileDynamics Day 2016: driving results with Microsoft Dynamics using Agile
Dynamics Day 2016: driving results with Microsoft Dynamics using AgileIntergen
 
Dynamics Day 2016: connecting people and strategy
Dynamics Day 2016: connecting people and strategyDynamics Day 2016: connecting people and strategy
Dynamics Day 2016: connecting people and strategyIntergen
 

Más de Intergen (20)

Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
 
Intergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journeyIntergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journey
 
Intergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformationIntergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformation
 
Intergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterpriseIntergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterprise
 
Intergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is hereIntergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is here
 
Intergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safeIntergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safe
 
Intergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer EngagementIntergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer Engagement
 
Intergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important assetIntergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important asset
 
Intergen Interconnect
Intergen InterconnectIntergen Interconnect
Intergen Interconnect
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Dynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first lookDynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first look
 
Dynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project ServiceDynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project Service
 
Dynamics Day 2016: looking to the future
Dynamics Day 2016: looking to the futureDynamics Day 2016: looking to the future
Dynamics Day 2016: looking to the future
 
Dynamics Day 2016: NAV transformation of solutions to cloud
Dynamics Day 2016: NAV transformation of solutions to cloudDynamics Day 2016: NAV transformation of solutions to cloud
Dynamics Day 2016: NAV transformation of solutions to cloud
 
Dynamics Day 2016: service transformation through digital platforms
Dynamics Day 2016: service transformation through digital platformsDynamics Day 2016: service transformation through digital platforms
Dynamics Day 2016: service transformation through digital platforms
 
Dynamics Day 2016: getting real insight into your business with Power BI
Dynamics Day 2016: getting real insight into your business with Power BIDynamics Day 2016: getting real insight into your business with Power BI
Dynamics Day 2016: getting real insight into your business with Power BI
 
Dynamics Day 2016: enabling your cloud - principles and pitfalls
Dynamics Day 2016: enabling your cloud - principles and pitfallsDynamics Day 2016: enabling your cloud - principles and pitfalls
Dynamics Day 2016: enabling your cloud - principles and pitfalls
 
Dynamics Day 2016: digital transformation - getting personal
Dynamics Day 2016: digital transformation - getting personalDynamics Day 2016: digital transformation - getting personal
Dynamics Day 2016: digital transformation - getting personal
 
Dynamics Day 2016: driving results with Microsoft Dynamics using Agile
Dynamics Day 2016: driving results with Microsoft Dynamics using AgileDynamics Day 2016: driving results with Microsoft Dynamics using Agile
Dynamics Day 2016: driving results with Microsoft Dynamics using Agile
 
Dynamics Day 2016: connecting people and strategy
Dynamics Day 2016: connecting people and strategyDynamics Day 2016: connecting people and strategy
Dynamics Day 2016: connecting people and strategy
 

Último

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Último (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Securing the new remote workforce

  • 1. Securing the new remote workforce
  • 2. Introducing your speaker… Gavin van Nierkerk Practice Lead Modern Workplace Lead Cybersecurity Team
  • 5. 3%Your security designs are all focused on this being the assumption 98%98% - Your security designs need to shift focus
  • 7. THE COVID-19 PANDEMIC HAS UNLEASHED A WAVE OF CYBER ATTACKS – HERE’S HOW TO PROTECT YOURSELF
  • 10. Zero Trust/Lean Trust isn’t… <what?> “Strong identity + device health + least privilege user access and verified with telemetry” LITERAL You can’t build a practical strategy around absolutes AN ADJECTIVE You aren’t going to ‘be’ Zero Trust FOR SALE There’s no such thing as ‘Zero Trust’ tech INSTANT You can’t boil the ocean A REVOLUTION Build on what you’ve got
  • 11. Making Zero Trust a reality Do you know what <Zero Trust> is? Have you established a v-team with your stakeholders? Do you know where you are at today with your <Zero Trust> journey? Do you have buy-in from C-level? An approach to security which assumes pervasive risk How do we behave in an environment of pervasive risk? TRADITIONAL OPTIMAL ADVANCED MATURITY MODELStrong Authentication! Enrolled & Managed Devices Risk based management – Identity, Device, Session
  • 12. Every company is at a different stage of their journey to the cloud. Maybe identity and device management are your top priorities, or you are digging into multi-factor authentication (MFA) or desktop virtualisation. Every IT leader needs to define the priorities to enable productivity from anywhere across their organisation’s workforce. We get that, and we want to help. The Journey
  • 13. Assumptions vs. Reality Users are employees Corporate managed devices On-premises apps Corp network and firewall Local packet tracking and logs Employees, contractors, partners & customers Bring your own device Explosion of cloud apps Expanding perimeter Overwhelming source of available signal
  • 14. Customer Questions Customer 1: How can Employees enrol their devices into device management to gain access to company resources? Risk Mitigation: Trusted devices (only). Potentially Intune Scenario 2: How can Security Teams enforce device health checks per application or service? Risk Mitigation: Trusted devices + health (Intune + Defender ATP) + secure app access (Cloud Application Security). Scenario 3: How can Employees and business guests have a secure way to access corporate resources when not using a managed device? Risk Mitigation: Non-trusted devices (Conditional Access Application Control e.g. secure email). One of the biggest benefits of Zero Trust is a change in mindset. An approach to security which treats every access attempt as if it’s originating from an untrusted network.
  • 15. Plan
  • 16. Major Phases Verify identity Verify device Verify access Verify services All user accounts set up for strong identity enforcement Strong identity enforced for O365 Least privilege user rights Eliminate passwords – biometric based model Device health required for SharePoint, Exchange, Teams on iOS, Android, Mac, and Windows Usage data for Application and Services Device Management required to tiered network access Internet Only for users Establish solutions for unmanaged devices Least privilege access model Device health required for wired/wireless corporate network Grow coverage in Device health requirement Service health concept Device management not required Single factor authentication to resources Capability to enforce strong identity exists Pre-Zero Trust U S E R & A C C E S S T E L E M E T RY
  • 17. 1. Connect all apps for Single Sign On 2. Strong Authentication using Multi-Factor Auth and Risk Detection 3. Enforce Policy Based Access for breach containment Identity teams – here is your to-do list:
  • 18. 1. Register devices with your Identity Provider 2. Implement MDM based security baselines and compliance reporting 3. Use endpoint threat detection to monitor device risk Device teams – here is your to-do list:
  • 19. Network & Infra Security Teams – here is your to-do list: 1. Enable a Cloud Workload Protection solution across your estate 2. Reduce attack surface by enabling just-in-time 3. Use cloud-native controls to create micro-perimeters with real-time threat protection
  • 20. 1. Agree on a label taxonomy and classify all documents and emails with the default label 2. Apply real-time protection to high risk scenarios: sensitive data and unmanaged access in apps 3. Perform Shadow IT discovery and a cloud control program Apps & Data Security Teams – here is your to-do list:
  • 22. We have run a number assessments for customers to understand how their security models and architecture may need to change in our remote working world. We are concerned at the decreased control businesses have over their overall security posture. …and we want to help.
  • 23. Next Steps… Take the self assessment: https://info.microsoft.com/ww-landing-Zero-Trust- Assessment.html Feel free to share the results if you want and we can provide insights and guidance.
  • 24. Next Steps… Visit our page https://www.empired.com/reimaginework https://www.intergen.co.nz/reimaginework Contact us contact@empired.com info@intergen.co.nz
  • 26.
  • 28. Corporate Network Geo-location Microsoft Cloud App SecurityMacOS Android iOS Windows Windows Defender ATP Client apps Browser apps Google ID MSA Azure AD ADFS Require MFA Allow/block access Block legacy authentication Force password reset****** Limited access Controls Employee & Partner Users and Roles Trusted & Compliant Devices Physical & Virtual Location Client apps & Auth Method Conditions Machine learning Policies Real time Evaluation Engine Session Risk 3 40TB Effective policy Azure AD Conditional Access
  • 29. Thank you! For more information please follow contact us here: Linkedin.com/company/empired-ltd Facebook.com/empiredltd Twitter.com/empiredltd Linkedin.com/company/intergen Facebook.com/teamintergen Twitter.com/teamintergen Australia Gavin van Nierkerk Practice Lead Gavin.vanNiekerk@empired.com New Zealand Victor Philp Solutions Manager victor.philp@intergen.co.nz