1 Network Security Stripped from layered technologies to bare essentials Jennifer Jabbusch, CISSP, HP MASE, JNCIA AC Carolina Advanced Digital, Trends for 2009
2 This presentation contains technical information not included in the slide presentation. If you did not hear the presentation live you re missing all the good stuff. Sorry.
3 About Us For over 25 years, Carolina Advanced Digital, Inc. has offered the highest level of engineering expertise in support of all enterprise sectors. Serving government, education and commercial customers, CAD focuses on IT infrastructure, security and management. Thecompanyhelps customers guard their core network, ensuring network security and availability of critical data. Find us at
4 About Us
5 About Us Jennifer has over 15 years experience working in various areas of the technology industry. Most recently, Ms. Jabbusch has focused in specialized areas of infrastructure security, including network access control, 802.1X and wireless security technologies. Jennifer has consulted for a variety of government agencies, educational institutions and Fortune 100 and 500 corporations. In addition to her regular duties, Jennifer participates in a variety of courseware and exam writings and reviews, including the official (ISC)2 CISSP courseware.
6 What We re Doing What am I telling you?
7 What I m telling you How to leverage security features you have and start down a holistic security path.
8 What We re Doing Why am I telling you this?
9 Why I m telling you You have goals. You have bosses. We want to help.
10 What We re Doing Why hasn t someone else told you this?
11 Why they haven t told you They want to sell you stuff. If you don t buy more stuff, their bosses get mad.
12 Why they haven t told you But, we don t care about their bosses.
13 What we ll be covering The Business of Security understanding goals and options Back to Bare Essentials working towards holistic security Tapping into Technologies ways to leverage what you have Getting Started ideas to get you going
15 The Business of Security
16 The quest for goals, smart use of resources and ways to keep your bosses boss happy.
17 Moving toward a goal Agency IT Department Your Team Your Projects Regulations Security Compliance Customer Serving Public Inter agency
18 Moving toward a goal Agency IT Department Your Team Your Projects
19 Focus on resources Bigger focus on Budget using resources wisely Assets Agency Staff Time
20 Focus on resources Adapt for the Budget resources available Assets Agency Staff Time
21 Focus on resources Balance what s Budget missing with what s abundant Assets Agency Staff Time
22 Current projects What are you working on now and in the next 12 months?
23 Ways to meet goals Options Buy some more stuff Use what you have Get someone else to do it
24 For your projects Which one are you planning to do? And why?
25 What we re buying There are plenty of manufacturers and vendors that would like your money.
26 NAC Endpoint Security Enhanced AV Guest Solutions Wireless Security Firewalls/IDS Data Leakage ID Management SIEM Encryption They want us to buy all this
27 Side effects of new stuff Training Budget Services Resources For staff and end users To buy new products For install, configure & support Manage and maintain
28 Side effects of new stuff What s the real TCO involved with new products?
29 Balancing the real TCO TCO + TCO
30 The question Is buying new stuff the solution?
31 The answer Probably NOT
32 For your projects Would you use what you have if that were an option?
34 Back to Bare Essentials
35 The quest for holistic network security and the realization of ignorance.
36 Using what you have Leveraging Leveraging built in features Retooling Retooling the infrastructure Designing Designing for security from the start
37 Leveraging what you have Use features and tools built in to the products you have.
38 Retooling the infrastructure Reengineer the network for security and availability.
39 Design for security early Architect security into solutions at the start.
40 Holistic security snippets Access Control 0 Day User Control Management Using switches instead of NAC Using sflow instead of IDS Using directories instead of overlays Using effective logging and reporting
41 A simple concept It seems so simple, so why aren t more people doing it?
42 Holistic holdbacks There are several common factors that prevent IT departments from effectively using what they have.
43 Holistic holdbacks Under staffing and high turnover are problems Staff Skill May not have necessary skills in house Redesign and training is time consuming Time
44 Holistic holdbacks Awareness of current environment Documentation Complexity Complicated vendor specific features Pulling pieces together for an integrated solution Integration
45 Holistic holdbacks Not knowing what products and solutions you have Ignorance Understanding The overall goals and objectives Getting buy in from management Management
47 Tap Into Technologies
48 The quest for finding added functionality in your current stuff so we don t have to buy new stuff.
49 Tapping what you have Switch Firewall Encryption Management Coming Soon
50 Here are slide references to the cool stuff you missed, including the new 802.1X REV overview
51 Switches and wireless VLANs (Virtual LANs) Switch Not new Protects by segregating network traffic Lets you logically segment and secure instead of physically separating
52 Switches and wireless 802.1X Port Security Switch Also not new Protects unauthorized users from connecting to a port or wireless SSID Uses standard communication to lock ports until the user is authenticated
53 Switches and wireless MAC Lockdown (Port Security) Switch Protects unauthorized devices from connecting Statically set or dynamically learns allowed MACs
54 Switches and wireless Switch Dynamic IP Lockdown (IP Source Guard) Protects from statically set IP addresses Tracks DHCP results to match IP to MAC port VLAN
55 Switches and wireless Switch Source Port Filtering (Protected Ports) Protects devices from communicating directly Similar to wireless communication segregation for endpoints
56 Switches and wireless DHCP Snooping Switch Protects from rogue DHCP servers Maps known servers with its MAC address to an assigned port
57 Switches and wireless Dynamic ARP Protection/Inspection Switch Protects from ARP cache poisoning ARP matches MAC to IP Sees spoofed MAC addresses and ARP flood attacks
58 Switches and wireless Dynamic Port Mirroring Switch Not direct security feature Lets you offload traffic for security inspection with low overhead
59 Switches and wireless Other monitors Monitor for port scanning by watching for packets sent to closed TCP/UDP ports Monitor for DoS attacks from IP flooding by watching for a volume of new learned Ips Monitor for viruses by watching for sudden increase in ARP requests Monitor for other DoS attacks by monitoring system resources
60 Switches and wireless Other monitors Monitor for management intrusion by watching for failed logins Monitor for other attacks by watching for excessive or unexpected events new or moving MAC addresses and IP addresses, system resources
61 Switches and wireless Switch VLANs 802.1X MAC Lockdown Dynamic IP Lockdown Source Port Filtering DHCP Snooping Dynamic ARP Protection Dynamic Port Mirroring Other Monitoring
62 Tapping what you have Switch Firewall Encryption Management Coming Soon
63 Firewall, UTM and IDS Firewall
64 Firewall, UTM and IDS Gateway Security and UTM Firewall Use built in anti virus and anti spyware for an added layer of protection without a separate appliance Use integrated IDS/IPS instead of purchasing an additional solution
65 Firewall, UTM and IDS Application Security Firewall Use a firewall to apply application access control up to layer 7 Add security by using encrypted VPN connections on the LAN to access sensitive data
66 Firewall, UTM and IDS Network Segregation Firewall Use firewall logical zones and routes for segregation of LAN traffic
67 Firewall, UTM and IDS Inspection Firewall Offload or mirror internal network traffic to your firewall or IDS for further inspection to supplement NBAD
68 We re really gettin crazy now!
69 Tapping what you have Switch Firewall Encryption Management Coming Soon
70 Encryption Encryption
71 Encryption Data Protection Encryption Use encryption to secure sensitive data on endpoints and storage
72 Encryption Key Management Encryption Used your encryption product for centralized key management Map to your user directory for added security and reduced management Use single product for FDE, removable media, mail and other applications
73 Tapping what you have Switch Firewall Encryption Management Coming Soon
74 Management Management
75 Management 0 Day Protection Management Use integrated tools for NBAD (network behavior anomaly detection) Collect sflow/netflow from switches and wireless to see real time problems
76 Management Inventory Management Use current management systems such as patching and anti virus servers for asset inventory Use inventory reports to identify unpatched and unhealthy devices
77 Management Event Correlation Management Use built in management, search tools or syslogs for event correlation Data can be used for compliance reporting and change management
78 Management Log Management & Reporting Management Use a central log server or search tool for all your network devices, instead of manufacturer specific products
79 Tapping what you have Switch Firewall Encryption Management Coming Soon
80 Coming Soon Coming Soon
81 Coming Soon 802.1X REV Coming Soon Revision of 802.1X to incorporate 802.1AE, 802.1af and other security features Look for the standard release in Q1 2009
82 Coming Soon 802.1AR Coming Soon Device identity Look for the standard release in Q1 2009
83 Coming Soon TNC IF MAP Coming Soon Framework for sending endpoint health status to a centralized server Offers NAC like integrity functions without a specific vendor solution Look for more adoption in 2009
85 Getting Started
86 Embarking on the quest for integrated security
87 Learning to leverage Strategies for getting started with what you have.
88 Training for staff Classroom Lab Webcasts Online Conference sessions
89 Vendor assistance From manufacturer Pre or Post sales SE Pro services Bundle with product
90 Consultant or integrator Your choice Integrated assistance Objective 3 rd party Flexible
91 Staff and contractors Staff may have expertise on a topic Find self motivators with interests in the solutions you need
92 User groups Product user groups Peer user groups Industry associations Conferences
93 Bang for your buck ROI Training Vendor Consultant COST Staff User groups
94 The final frontier. Getting the buy in from management.
95 Selling a holistic approach Devices, software, licenses, contracts and personnel Survey See what s been purchased and rate effectiveness
96 Selling a holistic approach Needs, goals and projects See where you can leverage what you have Identify
97 Selling a holistic approach Find the ROI for leveraging technologies instead of products Factor in TCO of product vs longterm investments in staff Monetize Put it in terms of dollars ¢s
98 Selling a holistic approach The key is to understand the bottom line
99 Selling a holistic approach What is the bottom line?
100 A dollar saved is a dollar you can spend on some other super cool geeky toy.
103 A super quick review of the last 100 slides.
104 Seven steps to remember Understand Survey Identify Strategize Supplement Sell It Succeed
105 This is where I took a bunch of crap out
106 Seven steps to remember If you follow these steps, you will reach a state of security Zen
107 Disclaimer *The preceding statements have not been approved by IEEE, TNC, IETF, the FDA, the FAA or the FBI. Please consult your doctor before attempting these, or any other regimens to reach security Zen. Neither CAD, the conference management, or the presenter will assume responsibility, explicit or implied, for the use of this material in reaching security Zen. Please proceed at your own risk.
End Point Security & Network Access Control Presented by: Jennifer Jabbusch - Carolina Advanced Digital, Inc. Alan Shimel - StillSecure Darwin Socco - Bracewell & Giuliani LLP Let s Talk About What NAC
Perspective on secure network for control systems in SPring-8 Toru Ohata, M. Ishii, T. Fukui* and R. Tanaka JASRI/SPring-8, Japan *RIKEN/SPring-8, Japan Contents Network architecture Requirement and design
Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects
Campus LAN at NKN Member Institutions RS MANI firstname.lastname@example.org 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Survey of IPv6 Support in Commercial Firewalls David Piscitello Fellow to the ICANN SSAC 1 Purpose and Scope of Study Determine IPv6 transport support and security service availability among commercial
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP email@example.com Security Security is recognized as essential to protect vital processes and the systems that provide those
All You Wanted to Know About WiFi Rogue Access Points A quick reference to Rogue AP security threat, Rogue AP detection and mitigation Gopinath K. N. Hemant Chaskar AirTight Networks www.airtightnetworks.com
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: firstname.lastname@example.org email: email@example.com Avenda
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use
Voice over IP VoIP (In) Security Presented by Darren Bilby NZISF 14 July 2005 Security-Assessment.com Who We Are NZ s only pure-play security firm Largest team of security professionals in NZ Offices in
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 firstname.lastname@example.org www.trustedcomputinggroup.org
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Network Security IPv4 + IPv6 by Managing Director SuperInternet Overview Confidentiality? Integrity? Availability! IPv6 Issues (Compared with IPv4) Physical Security of the Network Assumptions: Generally
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.
Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Sophos Certified Architect Course overview UTM This course provides an in-depth study of UTM, designed for experienced technical professionals who will be planning, installing, configuring and supporting
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:
(d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
PCI within the IU Enterprise Cheryl L. Shifflett, AAP, CTP Associate Director Treasury Operations Daniel Tony Brazzell, Security+, GCUX Lead Network Systems Engineer University Information Technology Services
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Introduction The CCNA Security IINS exam topics have been refreshed from version 2.0 to version 3.0. This document will highlight exam topic changes between the current 640-554 IINS exam and the new 210-260
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
Nomadix Service Engine Enterprise Guest Access Application Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012 30851 Agoura Road Suite 102 Agoura Hills, CA 91301 USA www.nomadix.com
GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and
SECURITY The Future Of The Firewall Jeff Wilson Jeff Wilson is principal analyst, VPNs and security with Infonetics Research (www.infonetics.com), specializing in firewalls, IDS/IPS, VPNs, integrated security
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Cisco IDENTITY. SERVICES. ENGINE GORAN PETEH ENTERPRISE SYSTEMS ENGINEER GOPETEH@CISCO.COM the challenge 67,000+ and Counting As of June 1 st 2013, that's how many BYOD devices employees are using @ Cisco
1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
UTM (Unified Threat Management) in a multi-ssid multi-vlan network with traffic separation This document describes the steps to undertake in configuring a UTM 10 (Firmware version 1.0.16-0) and a WNDAP330
Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Security Considerations in IP Telephony Network Configuration Abstract This Technical Report deals with fundamental security settings in networks to provide secure VoIP services. Example configurations
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
Is your WLAN secure? George Bailey Ivy Tech Community College Information Security Topics Overview Availability WLAN standards Best Practices Home/SOHO user Access Control Monitoring Privacy Enterprise
WHITEPAPER An Adaptive Approach to Network Security Evolve your network security strategy to meet new threats and simplify IT security operations Frank Andrus CTO, Bradford Networks Executive Summary...
HIPAA Compliance Print4 Solutions fully comply with all HIPAA regulations Print4 solutions do not access, store, process, monitor, or manage any patient information. Print4 manages and optimize printer
Intrusion Detection Systems Darren R. Davis Student Computing Labs Overview Intrusion Detection What is it? Why do I need it? How do I do it? Intrusion Detection Software Network based Host based Intrusion
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and
HP ProCurve Networking Network Access Control ProCurve and Microsoft NAP Integration Abstract...2 Foundation...3 Network Access Control basics...4 ProCurve Identity Driven Manager overview...5 Microsoft
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that
Joshua Beeman University Information Security Officer October 17, 2011 1 June, 2011- NPTF Security Presentation on FY 12 InfoSec goals: Two Factor Authentication Levels of Assurance Shibboleth InCommon
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
The following document provides details about the operation and configuration parameters for Penn State Wireless 2.0 and Visitor Wireless. It is intended for Penn State network administrators who are considering
How to build a security assessment program Dan Boucaut Agenda 1 Problem statement 2 Business case 3 How to avoid creating more problems Problem statement Security assessments are hard, costly and may take
What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their