SlideShare a Scribd company logo
The Zero Trust Model
of Information Security
John Kindervag
Forrester Research
Cindy Valladares
Tripwire, Inc.
Today’s Speakers



                   Senior Analyst
No More Chewy Centers: The Zero-Trust
Model Of Information Security
John Kindervag, Senior Analyst




4   © 2010 Forrester Research, Inc. Reproduction Prohibited
      2009
Agenda


New threat landscape

Something’s broken

New trust models

Summary




5   © 2010 Forrester Research, Inc. Reproduction Prohibited
Agenda


New threat landscape

Something’s broken

New trust models

Summary




6   © 2010 Forrester Research, Inc. Reproduction Prohibited
What do they have in common?




7   © 2010 Forrester Research, Inc. Reproduction Prohibited
New threat landscape

                                                               Question: “Why do you rob banks?”
                                                               Answer: “Because that’s where the
                                                                money is.”




8   © 2010 Forrester Research, Inc. Reproduction Prohibited
Where the money is . . .

                                                               Credit card theft
                                                               Identity theft/fraud

                                                               SPAM/botnets
                                                               Web 2.0 (user-generated content)




9   © 2010 Forrester Research, Inc. Reproduction Prohibited
The “Philip Cummings” problem

                                   Philip Cummings was a help desk staffer at TeleData
                                    Communication, Inc. (TCI), 1999 to 2000.
                                   TCI is a software provider for credit bureaus such as
                                    Experian and Equifax.

                                   Cummings had access to client passwords and subscription
                                    codes.




10   © 2010 Forrester Research, Inc. Reproduction Prohibited
The “Philip Cummings” problem (cont.)

                                   Cummings was offered $60 per credit report by Nigerian
                                    nationals (organized crime).
                                   Cummings provided a laptop preprogrammed to download
                                    credit reports from Experian, Equifax, and TransUnion.

                                   The crimes took place between 2000 and 2003 (Cummings
                                    left his job in 2000).




11   © 2010 Forrester Research, Inc. Reproduction Prohibited
The “Philip Cummings” problem (cont.)

                                   Discovered by Ford Motor Credit Company in 2003
                                   30,000 identities stolen

                                   At least $2.7 million loss (FBI data)
                                   Cummings sentenced to 14 years in prison and $1 million
                                    fine
                                   Biggest identity theft in US history




12   © 2010 Forrester Research, Inc. Reproduction Prohibited
13   © 2010 Forrester Research, Inc. Reproduction Prohibited
14   © 2010 Forrester Research, Inc. Reproduction Prohibited
Agenda


 New threat landscape

 Something’s broken

 New trust models

 Summary

 Other item




15   © 2010 Forrester Research, Inc. Reproduction Prohibited
Plenty of controls

                                             Home Users                                    Internet

                                                                                                                                            Business Parters



                                              Remote
                                              Wireless
                                               Users               IDS Tap
                                                                                                                                  Router




                                                                                                                           Firewall

                                            IPSEC VPN

                                                          SSL VPN
                                                                       Two-Factor                               Switch         IDS Tap Web Application
                                                                      Authentication                                                      Firewall
                                                                                                                                                                        Web Server Farm




                                                                                                                                         IDS Tap
                                                      Patch
     RNA Console
                                                      Management                       IDS Tap                                        IDS Tap
                                                                                                               Content
                                                                                                               Filtering

                                                                                                                                                    FTP Server                     Email Server
        Intrusion                                    Security
                                                                                                      Switch
       Detection                                     Information                                                                                                    Server DMZ
         Console                                     Manager
                              Switch

                                                                                                                                                    Wireless Gateway
                                                      Wireless
       Anti-Virus
                                                      Management
       Console                                                                                                                 IDS Tap
                                                      Console

                                                                                   Internal Users
                       Management Segment


                                                                                                                                                   Corporate Wireless
                                                                                                                                                       Network
                                               Internal Server Farm




16         © 2010 Forrester Research, Inc. Reproduction Prohibited
What’s broken?




 17   © 2010 Forrester Research, Inc. Reproduction Prohibited
Which one goes to the Internet?




                     UNTRUSTED                                 TRUSTED




18   © 2010 Forrester Research, Inc. Reproduction Prohibited
“Trust but verify?”


19     © 2010 Forrester Research, Inc. Reproduction Prohibited
What’s broken?




                                                                Trust model

 20   © 2010 Forrester Research, Inc. Reproduction Prohibited
2010 breaches — malicious insider




21   © 2010 Forrester Research, Inc. Reproduction Prohibited
The cost of a breach




     Source: April 10, 2007, “Calculating The Cost Of A Security Breach” Forrester report
22   © 2010 Forrester Research, Inc. Reproduction Prohibited
TJX accrued expenses (10k) — 2008




     Source: January 11, 2010, “PCI Unleashed” Forrester report
23   © 2010 Forrester Research, Inc. Reproduction Prohibited
How do we fix it?




 24   © 2010 Forrester Research, Inc. Reproduction Prohibited
Agenda


 New threat landscape

 Something’s broken

 New trust models

 Summary




25   © 2010 Forrester Research, Inc. Reproduction Prohibited
Zero trust




                     UNTRUSTED                                 UNTRUSTED




26   © 2010 Forrester Research, Inc. Reproduction Prohibited
Concepts of zero trust

  All resources are accessed in a secure manner, regardless of location.
  Access control is on a “need-to-know” basis and is strictly enforced.

  Verify and never trust.
  Inspect and log all traffic.
  The network is designed from the inside out.




27   © 2010 Forrester Research, Inc. Reproduction Prohibited
Inspect and log everything

                                                                     IPS



                                                               WAF         IPS
                                        Web                          IPS         Server
                                        farm                                      farm

                           WLAN
                            GW
                                                           IPS             DAM
                                                                                 DB farm
                                                                     IPS


                      SIM NAV                         MGMT
                        DAN                           server
                                                                     WAN
28   © 2010 Forrester Research, Inc. Reproduction Prohibited
29   © 2010 Forrester Research, Inc. Reproduction Prohibited
30   © 2010 Forrester Research, Inc. Reproduction Prohibited
Agenda


 New threat landscape

 Something’s broken

 New trust models

 Summary




31   © 2010 Forrester Research, Inc. Reproduction Prohibited
Strong perimeters = new threat vectors

 The threat landscape is changing — beyond the perimeter.
 Organized crime is bribing insiders.

 Security must become ubiquitous throughout your infrastructure.




32   © 2010 Forrester Research, Inc. Reproduction Prohibited
Recommendations

  New paradigm — data-centric security
  Zero trust — “Verify, but don’t trust!”

  Inspect and log all traffic.
  Design with compliance in mind.




33   © 2010 Forrester Research, Inc. Reproduction Prohibited
A blueprint for making it real


                The next 90 days


                 • Eliminate the word “trust” from your vocabulary.
                 • Find your critical data, and map your data flows.
                 • Tell people you will be watching their data access
                   activity.
                 • Review who should be allowed specific data access.



34 34 contents © 2010 Forrester Research,Reproduction Prohibited
   Entire © 2010 Forrester Research, Inc. Inc. All rights reserved.
A blueprint for making it real


             Longer term


             • Create a data acquisition network (DAN).
             • Segment your network to ease your security and
               compliance burden.
             • Begin rebuilding your network to reflect the zero-trust
               concepts.




35 35 contents © 2010 Forrester Research,Reproduction Prohibited
   Entire © 2010 Forrester Research, Inc. Inc. All rights reserved.
Thank you

John Kindervag
+1 469.221.5372
jkindervag@forrester.com
Twitter: @Kindervag


www.forrester.com




  © 2009 Forrester Research, Inc. Reproduction Prohibited
John Kindervag
www.tripwire.com
                                   Forrester Research
                   E-mail : jkindervag@forrester.com

More Related Content

PDF
Zero Trust Model Presentation
PPTX
Zero Trust Model
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PPTX
What is zero trust model (ztm)
PDF
NIST Zero Trust Explained
PDF
Microsoft Zero Trust
PPTX
Zero trust deck 2020
PPTX
Zero Trust Framework for Network Security​
Zero Trust Model Presentation
Zero Trust Model
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
What is zero trust model (ztm)
NIST Zero Trust Explained
Microsoft Zero Trust
Zero trust deck 2020
Zero Trust Framework for Network Security​

What's hot (20)

PPTX
Zero Trust
DOCX
What is zero trust model of information security?
PDF
Introduction to Cybersecurity
PPTX
Zero Trust Network Access
PPTX
Security Operation Center Fundamental
PDF
Introduction to MITRE ATT&CK
PPTX
Zero trust Architecture
PPTX
Endpoint Protection
PDF
Zero trust in a hybrid architecture
PPTX
What is Zero Trust
PDF
Vulnerability Management
PDF
MITRE ATT&CK Framework
PPTX
4_Session 1- Universal ZTNA.pptx
PPTX
Cybersecurity 1. intro to cybersecurity
PDF
Building a Next-Generation Security Operations Center (SOC)
PPTX
An introduction to SOC (Security Operation Center)
PPTX
SOC Architecture Workshop - Part 1
PDF
SOC Architecture - Building the NextGen SOC
PPTX
5 Steps to a Zero Trust Network - From Theory to Practice
PDF
Cyber Security Maturity Assessment
Zero Trust
What is zero trust model of information security?
Introduction to Cybersecurity
Zero Trust Network Access
Security Operation Center Fundamental
Introduction to MITRE ATT&CK
Zero trust Architecture
Endpoint Protection
Zero trust in a hybrid architecture
What is Zero Trust
Vulnerability Management
MITRE ATT&CK Framework
4_Session 1- Universal ZTNA.pptx
Cybersecurity 1. intro to cybersecurity
Building a Next-Generation Security Operations Center (SOC)
An introduction to SOC (Security Operation Center)
SOC Architecture Workshop - Part 1
SOC Architecture - Building the NextGen SOC
5 Steps to a Zero Trust Network - From Theory to Practice
Cyber Security Maturity Assessment
Ad

Viewers also liked (20)

PPTX
The Software-Defined Network Story: Automation, Agility and Security
PDF
Business Model For Information Security
DOCX
PEST Analysis for Security
PDF
DWS16 - Smart city forum - Niels De Schutter, Atos
PPTX
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
PPTX
Web application security: how to start?
PDF
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
PDF
IoT And Inevitable Decentralization of The Internet
PDF
Patterns and Antipatterns in Enterprise Security
PDF
The End of the Fortress: The new Approach to Cybersecurity
PDF
SABSA: Key features, advantages & benefits summary
PPTX
Understand How Machine Learning Defends Against Zero-Day Threats
PPTX
Modelling Security Architecture
PPTX
Improving web application security, part ii
PPT
Information security policy_2011
PDF
Simplifying the secure data center
PDF
Blockchain_ver0.5_MIT_security_and Privacy_am_final_upload
PDF
From Business Architecture to Security Architecture
PPTX
Application Security Architecture and Threat Modelling
PDF
Application Security: Last Line of Defense
The Software-Defined Network Story: Automation, Agility and Security
Business Model For Information Security
PEST Analysis for Security
DWS16 - Smart city forum - Niels De Schutter, Atos
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Web application security: how to start?
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
IoT And Inevitable Decentralization of The Internet
Patterns and Antipatterns in Enterprise Security
The End of the Fortress: The new Approach to Cybersecurity
SABSA: Key features, advantages & benefits summary
Understand How Machine Learning Defends Against Zero-Day Threats
Modelling Security Architecture
Improving web application security, part ii
Information security policy_2011
Simplifying the secure data center
Blockchain_ver0.5_MIT_security_and Privacy_am_final_upload
From Business Architecture to Security Architecture
Application Security Architecture and Threat Modelling
Application Security: Last Line of Defense
Ad

Similar to The Zero Trust Model of Information Security (20)

PDF
Cat6500 Praesentation
PDF
S series presentation
PDF
IBM Infosphere Guardium - Database Security
PPT
PDF
Identity systems
PPTX
Juniper Provision - 13martie2012
PDF
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
PPTX
Data Breach from the Inside Out
PDF
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
PDF
SmartCard Forum 2011 - Evolution of authentication market
PPTX
Sådan undgår du misbrug af kundedata og fortrolig information
PDF
Securing UC Borders with Acme Packet
PDF
Bapinger Network Security
PPTX
F5's IP Intelligence Service
PPTX
Track 2, session 5, aligning security with business kartik shahani
PDF
Cisco tec chris young - security intelligence operations
PDF
Telesemana ce nominum:mef
PDF
Bulding Soc In Changing Threat Landscapefinal
PPT
Information Security
PDF
F5 Networks: architecture and risk management
Cat6500 Praesentation
S series presentation
IBM Infosphere Guardium - Database Security
Identity systems
Juniper Provision - 13martie2012
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Data Breach from the Inside Out
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
SmartCard Forum 2011 - Evolution of authentication market
Sådan undgår du misbrug af kundedata og fortrolig information
Securing UC Borders with Acme Packet
Bapinger Network Security
F5's IP Intelligence Service
Track 2, session 5, aligning security with business kartik shahani
Cisco tec chris young - security intelligence operations
Telesemana ce nominum:mef
Bulding Soc In Changing Threat Landscapefinal
Information Security
F5 Networks: architecture and risk management

More from Tripwire (20)

PDF
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
PDF
Data Privacy Day 2022: Tips to Ensure Data Privacy
PDF
Key Challenges Facing IT/OT: Hear From The Experts
PPTX
Tripwire Energy Working Group: TIV Demo
PPTX
Tripwire Energy Working Group Session w/Dale Peterson
PPTX
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
PPTX
Tripwire Energy Working Group: Customer Session with Chase Cole
PPTX
Tripwire Energy Working Group: Keynote w/Patrick Miller
PDF
World Book Day: Cybersecurity’s Quietest Celebration
PDF
Tripwire Retail Security 2020 Survey: Key Findings
PDF
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
PDF
The Adventures of Captain Tripwire: Coloring Book!
PDF
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
PDF
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
PDF
Tripwire 2019 Skills Gap Survey: Key Findings
PDF
A Look Back at 2018: The Most Memorable Cyber Moments
PPTX
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
PDF
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
PPTX
Defend Your Data Now with the MITRE ATT&CK Framework
PPTX
Defending Critical Infrastructure Against Cyber Attacks
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Data Privacy Day 2022: Tips to Ensure Data Privacy
Key Challenges Facing IT/OT: Hear From The Experts
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Keynote w/Patrick Miller
World Book Day: Cybersecurity’s Quietest Celebration
Tripwire Retail Security 2020 Survey: Key Findings
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
The Adventures of Captain Tripwire: Coloring Book!
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
Tripwire 2019 Skills Gap Survey: Key Findings
A Look Back at 2018: The Most Memorable Cyber Moments
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Defend Your Data Now with the MITRE ATT&CK Framework
Defending Critical Infrastructure Against Cyber Attacks

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
Advanced Soft Computing BINUS July 2025.pdf
Electronic commerce courselecture one. Pdf
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
NewMind AI Weekly Chronicles - August'25 Week I
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Understanding_Digital_Forensics_Presentation.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Chapter 3 Spatial Domain Image Processing.pdf
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Big Data Technologies - Introduction.pptx
MYSQL Presentation for SQL database connectivity
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Network Security Unit 5.pdf for BCA BBA.

The Zero Trust Model of Information Security

  • 1. The Zero Trust Model of Information Security
  • 2. John Kindervag Forrester Research Cindy Valladares Tripwire, Inc.
  • 3. Today’s Speakers Senior Analyst
  • 4. No More Chewy Centers: The Zero-Trust Model Of Information Security John Kindervag, Senior Analyst 4 © 2010 Forrester Research, Inc. Reproduction Prohibited 2009
  • 5. Agenda New threat landscape Something’s broken New trust models Summary 5 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 6. Agenda New threat landscape Something’s broken New trust models Summary 6 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 7. What do they have in common? 7 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 8. New threat landscape  Question: “Why do you rob banks?”  Answer: “Because that’s where the money is.” 8 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 9. Where the money is . . .  Credit card theft  Identity theft/fraud  SPAM/botnets  Web 2.0 (user-generated content) 9 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 10. The “Philip Cummings” problem  Philip Cummings was a help desk staffer at TeleData Communication, Inc. (TCI), 1999 to 2000.  TCI is a software provider for credit bureaus such as Experian and Equifax.  Cummings had access to client passwords and subscription codes. 10 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 11. The “Philip Cummings” problem (cont.)  Cummings was offered $60 per credit report by Nigerian nationals (organized crime).  Cummings provided a laptop preprogrammed to download credit reports from Experian, Equifax, and TransUnion.  The crimes took place between 2000 and 2003 (Cummings left his job in 2000). 11 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 12. The “Philip Cummings” problem (cont.)  Discovered by Ford Motor Credit Company in 2003  30,000 identities stolen  At least $2.7 million loss (FBI data)  Cummings sentenced to 14 years in prison and $1 million fine  Biggest identity theft in US history 12 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 13. 13 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 14. 14 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 15. Agenda New threat landscape Something’s broken New trust models Summary Other item 15 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 16. Plenty of controls Home Users Internet Business Parters Remote Wireless Users IDS Tap Router Firewall IPSEC VPN SSL VPN Two-Factor Switch IDS Tap Web Application Authentication Firewall Web Server Farm IDS Tap Patch RNA Console Management IDS Tap IDS Tap Content Filtering FTP Server Email Server Intrusion Security Switch Detection Information Server DMZ Console Manager Switch Wireless Gateway Wireless Anti-Virus Management Console IDS Tap Console Internal Users Management Segment Corporate Wireless Network Internal Server Farm 16 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 17. What’s broken? 17 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 18. Which one goes to the Internet? UNTRUSTED TRUSTED 18 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 19. “Trust but verify?” 19 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 20. What’s broken? Trust model 20 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 21. 2010 breaches — malicious insider 21 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 22. The cost of a breach Source: April 10, 2007, “Calculating The Cost Of A Security Breach” Forrester report 22 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 23. TJX accrued expenses (10k) — 2008 Source: January 11, 2010, “PCI Unleashed” Forrester report 23 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 24. How do we fix it? 24 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 25. Agenda New threat landscape Something’s broken New trust models Summary 25 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 26. Zero trust UNTRUSTED UNTRUSTED 26 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 27. Concepts of zero trust  All resources are accessed in a secure manner, regardless of location.  Access control is on a “need-to-know” basis and is strictly enforced.  Verify and never trust.  Inspect and log all traffic.  The network is designed from the inside out. 27 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 28. Inspect and log everything IPS WAF IPS Web IPS Server farm farm WLAN GW IPS DAM DB farm IPS SIM NAV MGMT DAN server WAN 28 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 29. 29 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 30. 30 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 31. Agenda New threat landscape Something’s broken New trust models Summary 31 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 32. Strong perimeters = new threat vectors  The threat landscape is changing — beyond the perimeter.  Organized crime is bribing insiders.  Security must become ubiquitous throughout your infrastructure. 32 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 33. Recommendations  New paradigm — data-centric security  Zero trust — “Verify, but don’t trust!”  Inspect and log all traffic.  Design with compliance in mind. 33 © 2010 Forrester Research, Inc. Reproduction Prohibited
  • 34. A blueprint for making it real The next 90 days • Eliminate the word “trust” from your vocabulary. • Find your critical data, and map your data flows. • Tell people you will be watching their data access activity. • Review who should be allowed specific data access. 34 34 contents © 2010 Forrester Research,Reproduction Prohibited Entire © 2010 Forrester Research, Inc. Inc. All rights reserved.
  • 35. A blueprint for making it real Longer term • Create a data acquisition network (DAN). • Segment your network to ease your security and compliance burden. • Begin rebuilding your network to reflect the zero-trust concepts. 35 35 contents © 2010 Forrester Research,Reproduction Prohibited Entire © 2010 Forrester Research, Inc. Inc. All rights reserved.
  • 36. Thank you John Kindervag +1 469.221.5372 jkindervag@forrester.com Twitter: @Kindervag www.forrester.com © 2009 Forrester Research, Inc. Reproduction Prohibited
  • 37. John Kindervag www.tripwire.com Forrester Research E-mail : jkindervag@forrester.com

Editor's Notes

  • #14: Source: Justice.gov (http://www.usdoj.gov/usao/gan/press/2009/09-16-09c.pdf)
  • #15: Source: Justice.gov (http://www.usdoj.gov/usao/gan/press/2009/09-16-09c.pdf)
  • #22: Source: Data Loss (www.datalossdb.org)