Top Banner
1 Jan-Lo van Ollefen Security Solutions Architect bij Axians Het security Planning Process Anno 2016 CYBER DEFENSE IN ARCHITECTUUR
25

CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

Jun 27, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

1

Jan-Lo van Ollefen

Security Solutions Architect

bij Axians

Het security Planning Process

Anno 2016

CYBER DEFENSE IN ARCHITECTUUR

Page 2: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

2

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur │ 17.11.2016 ● INN STYLE ● MAARSSEN

Page 3: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

3

HIER KOMT EEN FILMPJE

Cyber defense in architectuur │ 17.11.2016 ● INN STYLE ● MAARSSEN

Page 4: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

4

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur │ 17.11.2016 ● INN STYLE ● MAARSSEN

Page 5: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

5

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur │ 17.11.2016 ● INN STYLE ● MAARSSEN

Defense

Page 6: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

6

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Tools

Page 7: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

7

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Architectuur

Page 8: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

8

ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Page 9: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

9

ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Page 10: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

10

ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Page 11: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

11

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

De student

Page 12: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

12

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

De docent

Page 13: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

13

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Collegezaal

Page 14: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

14

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Page 15: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

15

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Page 16: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

16

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Page 17: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

17

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Silver Bullet

Page 18: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

18

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Point in Time

Solution

Fragmented

Complex

Requires additional management

Page 19: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

19

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Scope

Contain

Remediate

Continuous Solution

Discover

Enforce

Harden

Detect

Block

Defend

Page 20: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

20

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Advanced Malware Protection

Network Behavior Analysis

NGFW

UTM

NAC + Identity Services

VPN

FirewallNGIPS

Web Security

Email Security

Continuous Solution

Page 21: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

21

ANIMATION

Page 22: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

22

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Page 23: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

23

CYBER DEFENSE IN ARCHITECTUUR

Cyber defense in architectuur│ 17.11.2016 ● INN STYLE ● MAARSSEN

Jan-Lo van Ollefen Solution Architect

[email protected]

@jlvanollefen

Page 24: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

24

Page 25: CYBER DEFENSE IN ARCHITECTUUR - Axians...20 CYBER DEFENSE IN ARCHITECTUUR Cyber defense in architectuur 17.11.2016 INN STYLE MAARSSEN Advanced Malware Protection Network Behavior Analysis

25

BEDANKT VOORUW AANDACHT