Upload
aptera-inc
View
376
Download
0
Embed Size (px)
Citation preview
Pete HelesTrends, Anomalies & Prevention
It Can and Does Happen
What are the Boundaries of the Data Center
• Core Switch(es)?• Storage and Controller?• Server?• N-S Firewall?• E-W Firewall?• End User Device?• Wherever the data resides?
Architecture or Component?
It’s About The Architecture!
Non-Traditional Tools
What are the Villains?
• Management Data use and ownership agreement• You• Users/you• Refrigerators/you• Friends and 3 party helpers• The bad guys• Disasters
Secure Places and secure domains
Got 'em! Researchers steal crypto keys from Amazon cloud
Attacks are EXPENSIVE!
Must Have?
Next Steps?
Thank You!