Presented at
RVAsec 2017,
June 8, 2017, 5 p.m.
(50 minutes).
The traditional 3-tier data center architecture model continues to challenge security professionals who are tasked with embracing a highly mobile workforce. I and many others were taught years ago that we must design an onion like perimeter that has a trusted user base and critical data living inside a well-protected perimeter. Forrester turned this model on its head when they coined the term “Zero Trust” in a report published in 2010. I prefer not to speak in absolutes, so I’ll proposed an alternate, more flexible approach to implementing the Zero Trust methodology. Instead of eating the elephant, I’ll show how implementing bite sized portions of the Zero Trust model will help future proof your organization against challenges such as BYOD, SaaS offerings, Cloud hosted resources, mobile workers, and the ever increasing compliance requirements on segmentation.
Presenters:
-
Jeremy Dorrough
- Optiv
Jeremy has built his career around protecting assets in the most critical IT sectors. He started his career working in a Network Operations Security Center for the US Army. He then went on to work as a Network Security Engineer defending Dominion’s North Anna Nuclear Power Station. He also had the privilege to serve as a Senior Network Security Engineer/Architect at Genworth Financial. Currently Jeremy works as a Client Solutions Architect for Optiv focusing on named accounts in the mid-Atlantic region. He has presented at DefCon, UNC, JMU, ECPI, FBI Infragard and holds or has held CISSP, CISM, CEH, GIAC GPPA, CCSK, CCNA. Jeremy has spent over 10 years researching and implementing new ways to defend against the latest attacks. He is happily married and a father to two soon to be hackers.
Links:
Similar Presentations: