13
Pete Heles Trends, Anomalies & Prevention

Securing Your Data... Wherever It Is slides from NSI's Pete Heles

Embed Size (px)

Citation preview

Page 1: Securing Your Data... Wherever It Is slides from NSI's Pete Heles

Pete HelesTrends, Anomalies & Prevention

Page 2: Securing Your Data... Wherever It Is slides from NSI's Pete Heles

It Can and Does Happen

Page 3: Securing Your Data... Wherever It Is slides from NSI's Pete Heles

What are the Boundaries of the Data Center

• Core Switch(es)?• Storage and Controller?• Server?• N-S Firewall?• E-W Firewall?• End User Device?• Wherever the data resides?

Page 4: Securing Your Data... Wherever It Is slides from NSI's Pete Heles

Architecture or Component?

Page 5: Securing Your Data... Wherever It Is slides from NSI's Pete Heles

It’s About The Architecture!

Page 6: Securing Your Data... Wherever It Is slides from NSI's Pete Heles

Non-Traditional Tools

Page 7: Securing Your Data... Wherever It Is slides from NSI's Pete Heles

What are the Villains?

• Management Data use and ownership agreement• You• Users/you• Refrigerators/you• Friends and 3 party helpers• The bad guys• Disasters

Page 8: Securing Your Data... Wherever It Is slides from NSI's Pete Heles

Secure Places and secure domains

Page 9: Securing Your Data... Wherever It Is slides from NSI's Pete Heles

Got 'em! Researchers steal crypto keys from Amazon cloud

Page 10: Securing Your Data... Wherever It Is slides from NSI's Pete Heles

Attacks are EXPENSIVE!

Page 11: Securing Your Data... Wherever It Is slides from NSI's Pete Heles

Must Have?

Page 12: Securing Your Data... Wherever It Is slides from NSI's Pete Heles

Next Steps?

Page 13: Securing Your Data... Wherever It Is slides from NSI's Pete Heles

Thank You!