Top Banner
Location Independent Security Approach (LISA) Bryan Zimmer Senior Security Architect
24

Location Independent Security Approach (LISA) Enigma 2018

Jan 22, 2018

Download

Technology

Bryan Zimmer
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Location Independent Security Approach (LISA) Enigma 2018

Location IndependentSecurity Approach(LISA)

Bryan ZimmerSenior Security Architect

Page 2: Location Independent Security Approach (LISA) Enigma 2018

Your office network is a liability.

Page 3: Location Independent Security Approach (LISA) Enigma 2018
Page 4: Location Independent Security Approach (LISA) Enigma 2018

LISA Principles

Trust identity and health

No trust in office network

Device isolation

Page 5: Location Independent Security Approach (LISA) Enigma 2018

Trust identity and health, not location.

Page 6: Location Independent Security Approach (LISA) Enigma 2018

Treat your network like a coffee shop.

Page 7: Location Independent Security Approach (LISA) Enigma 2018
Page 8: Location Independent Security Approach (LISA) Enigma 2018

Architecture

Page 9: Location Independent Security Approach (LISA) Enigma 2018
Page 10: Location Independent Security Approach (LISA) Enigma 2018
Page 11: Location Independent Security Approach (LISA) Enigma 2018
Page 12: Location Independent Security Approach (LISA) Enigma 2018

Endpoint Checks

Page 13: Location Independent Security Approach (LISA) Enigma 2018

Implementation

Collect, Create, Configure

Page 14: Location Independent Security Approach (LISA) Enigma 2018

Collect Use Cases

Page 15: Location Independent Security Approach (LISA) Enigma 2018

Create Exception Networks

Page 16: Location Independent Security Approach (LISA) Enigma 2018
Page 17: Location Independent Security Approach (LISA) Enigma 2018

Configure Infrastructure

VPN, Pilot, Cut

Page 18: Location Independent Security Approach (LISA) Enigma 2018

Automated Deprovisioning

Match port to email address

Page 19: Location Independent Security Approach (LISA) Enigma 2018

Benefits

Reduced risk and effort

Simplified network and cost savings

Page 20: Location Independent Security Approach (LISA) Enigma 2018

Benefits

Easy implementation

Fits more companies

Page 21: Location Independent Security Approach (LISA) Enigma 2018

Lessons Learned

Communicate and collaborate

Page 22: Location Independent Security Approach (LISA) Enigma 2018

Lessons Learned

Be thorough

Page 23: Location Independent Security Approach (LISA) Enigma 2018

Next StepsMeet, Gather, Communicate, Implement

Page 24: Location Independent Security Approach (LISA) Enigma 2018

Questions?