Page 1
Location IndependentSecurity Approach(LISA)
Bryan ZimmerSenior Security Architect
Page 2
Your office network is a liability.
Page 4
LISA Principles
Trust identity and health
No trust in office network
Device isolation
Page 5
Trust identity and health, not location.
Page 6
Treat your network like a coffee shop.
Page 13
Implementation
Collect, Create, Configure
Page 14
Collect Use Cases
Page 15
Create Exception Networks
Page 17
Configure Infrastructure
VPN, Pilot, Cut
Page 18
Automated Deprovisioning
Match port to email address
Page 19
Benefits
Reduced risk and effort
Simplified network and cost savings
Page 20
Benefits
Easy implementation
Fits more companies
Page 21
Lessons Learned
Communicate and collaborate
Page 22
Lessons Learned
Be thorough
Page 23
Next StepsMeet, Gather, Communicate, Implement