SlideShare a Scribd company logo
3
Most read
5
Most read
6
Most read
Juanita Koilpillai
Chief Technology Advisor
Digital Risk Management
Institute
Mark Rasch
Chief Legal Council
Digital Risk Management
Institute
David Morris
Early Pioneer in
Cybersecurity
Managing Partner
Morris Cybersecurity
What is a Secure Enterprise Architecture Roadmap?
Cybersecurity: The No Spin Zone
Ulf Mattsson
Head of Innovation at
TokenEx
Enterprise Architecture
- Based on Operations
- Cyber Security permeates every layer
Source – Cloud Security Alliance & United Health
Security Enterprise Architecture
Source – NIST
- Technology & Policy Focused
Security
Enterprise
Architecture
Source – ISO 27001
- Audit Focused
Security Reference Architecture
- Dev/Ops Focused
Source – AWS
Example - Security Design
- Zero visibility for Critical Applications & infrastructures
Clients
Don’t allow
anything to
connect to them
Authen cate to
the servers(eg.
using Mutual TLS)
Servers
Mutual TLS
Use Authoriza on
to Elevate Trust
(eg. single packet
authen ca on
Single Packet
Mi gate the the
of keys (eg.
hardware
fin
g
erprin ng)
1
2
3
4
Hardware
Fingerprin ng
Require authoriza on to
ini ate communica on
Deny all
connec ons
5
6
Use independent
communica on port for
admins (MFA, Specific IPs)
Admins
7
Applica on Whitelis ng
Secure Hardware
Eg. Hardware Root of Trust
Pin comms to the Root
Secure Boot
Hardened OS
File Integrity Monitoring
8
Elements of a protec on mechanism
- So ware Defined Perimeter
Op onal
Users
MFA
Does Blockchain, GDPR, Cloud, and IoT
conflict with compliance regulations
complicating your SEA?
GDPR is not blockchain-compatible the way it is written today. Blockchain
data can't be deleted. So will its applications be illegal?
• There are ways for Blockchain applications to be compliant - data
could be stored off-chain in distributed or cloud-based servers.
Cloud considerations
• From a storage and compliance perspective, they accumulate
information about humans and our interaction with IoT devices.
• One of the key questions asked how we make sure this is done in a
correct and secure way; as well as how we make sure it is done in
compliance with the new EU GDPR, because it’s going to be very
hard to track everything.
For more information about
this presentation, contact:
David Morris at:
David.Morris@Morriscybersecurity.com
Cybersecurity: The No Spin Zone

More Related Content

PDF
Solution Architecture And Solution Security
PPT
Cyber Security-Foundation.ppt
PPTX
Introduction to Enterprise Architecture
PDF
Boot process: BIOS vs UEFI
PPTX
Operating Systems Chapter 6 silberschatz
PPTX
Security architecture frameworks
PDF
cobit 2019 presentation.pdf
PDF
Cyber Security Governance
Solution Architecture And Solution Security
Cyber Security-Foundation.ppt
Introduction to Enterprise Architecture
Boot process: BIOS vs UEFI
Operating Systems Chapter 6 silberschatz
Security architecture frameworks
cobit 2019 presentation.pdf
Cyber Security Governance

What's hot (20)

PDF
Enterprise Security Architecture
PDF
Microsoft Defender and Azure Sentinel
PPTX
SABSA Implementation(Part III)_ver1-0
PPTX
Security models for security architecture
PPTX
Enterprise Security Architecture Design
PPTX
Modelling Security Architecture
PDF
Security-by-Design in Enterprise Architecture
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PPSX
2 Security Architecture+Design
PDF
Enterprise Security Architecture
PPTX
Azure Sentinel.pptx
PDF
Cybersecurity Roadmap Development for Executives
PPTX
SABSA overview
PDF
Cybersecurity roadmap : Global healthcare security architecture
PPTX
SOC Architecture Workshop - Part 1
PDF
Enterprise Security Architecture for Cyber Security
PPTX
Cloud Security Architecture.pptx
PPTX
SEIM-Microsoft Sentinel.pptx
PPTX
Microsoft Defender for Endpoint Overview.pptx
PDF
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Enterprise Security Architecture
Microsoft Defender and Azure Sentinel
SABSA Implementation(Part III)_ver1-0
Security models for security architecture
Enterprise Security Architecture Design
Modelling Security Architecture
Security-by-Design in Enterprise Architecture
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
2 Security Architecture+Design
Enterprise Security Architecture
Azure Sentinel.pptx
Cybersecurity Roadmap Development for Executives
SABSA overview
Cybersecurity roadmap : Global healthcare security architecture
SOC Architecture Workshop - Part 1
Enterprise Security Architecture for Cyber Security
Cloud Security Architecture.pptx
SEIM-Microsoft Sentinel.pptx
Microsoft Defender for Endpoint Overview.pptx
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Ad

Similar to What is a secure enterprise architecture roadmap? (20)

PPTX
Zero Trust 20211105
PDF
What I learned from RSAC 2019
PDF
Cloud computing security issues and challenges
PDF
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
PPTX
Cyber security event
PDF
Where Data Security and Value of Data Meet in the Cloud
PDF
Exploring the Defender's Advantage
PDF
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
PDF
Industrial IOT Data Connectivity Standard
PPTX
A_Review_on_Security_Challenges_in_Internet_of.pptx
PPTX
Jun 15 privacy in the cloud at financial institutions at the object managemen...
PDF
Exploring Cybersecurity Services: Types, Relevance, and Becoming a Pro
PDF
Iot Security and Privacy at Scale
PDF
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
PDF
Cybersecurity Interview Questions and Answers
DOC
Network security
PDF
Io t security defense in depth charles li v1 20180425c
PDF
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
PDF
Crypto Mechanism to Provide Secure to the IOT Data
PDF
Top reasons why Endpoint Security should move to Cloud | Sysfore
Zero Trust 20211105
What I learned from RSAC 2019
Cloud computing security issues and challenges
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Cyber security event
Where Data Security and Value of Data Meet in the Cloud
Exploring the Defender's Advantage
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
Industrial IOT Data Connectivity Standard
A_Review_on_Security_Challenges_in_Internet_of.pptx
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Exploring Cybersecurity Services: Types, Relevance, and Becoming a Pro
Iot Security and Privacy at Scale
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
Cybersecurity Interview Questions and Answers
Network security
Io t security defense in depth charles li v1 20180425c
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
Crypto Mechanism to Provide Secure to the IOT Data
Top reasons why Endpoint Security should move to Cloud | Sysfore
Ad

More from Ulf Mattsson (20)

PPTX
Jun 29 new privacy technologies for unicode and international data standards ...
PPTX
PPTX
May 6 evolving international privacy regulations and cross border data tran...
PPTX
Qubit conference-new-york-2021
PDF
Secure analytics and machine learning in cloud use cases
PPTX
Evolving international privacy regulations and cross border data transfer - g...
PDF
Data encryption and tokenization for international unicode
PPTX
The future of data security and blockchain
PPTX
New technologies for data protection
PPTX
GDPR and evolving international privacy regulations
PPTX
Privacy preserving computing and secure multi-party computation ISACA Atlanta
PPTX
Safeguarding customer and financial data in analytics and machine learning
PPTX
Protecting data privacy in analytics and machine learning ISACA London UK
PPTX
New opportunities and business risks with evolving privacy regulations
PPTX
What is tokenization in blockchain - BCS London
PPTX
Protecting data privacy in analytics and machine learning - ISACA
PPTX
What is tokenization in blockchain?
PPTX
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
PPTX
Unlock the potential of data security 2020
PPTX
What is tokenization in blockchain?
Jun 29 new privacy technologies for unicode and international data standards ...
May 6 evolving international privacy regulations and cross border data tran...
Qubit conference-new-york-2021
Secure analytics and machine learning in cloud use cases
Evolving international privacy regulations and cross border data transfer - g...
Data encryption and tokenization for international unicode
The future of data security and blockchain
New technologies for data protection
GDPR and evolving international privacy regulations
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Safeguarding customer and financial data in analytics and machine learning
Protecting data privacy in analytics and machine learning ISACA London UK
New opportunities and business risks with evolving privacy regulations
What is tokenization in blockchain - BCS London
Protecting data privacy in analytics and machine learning - ISACA
What is tokenization in blockchain?
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Unlock the potential of data security 2020
What is tokenization in blockchain?

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Electronic commerce courselecture one. Pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
MYSQL Presentation for SQL database connectivity
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Spectral efficient network and resource selection model in 5G networks
Electronic commerce courselecture one. Pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.
The Rise and Fall of 3GPP – Time for a Sabbatical?
Diabetes mellitus diagnosis method based random forest with bat algorithm
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf
Big Data Technologies - Introduction.pptx
Advanced Soft Computing BINUS July 2025.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
MYSQL Presentation for SQL database connectivity
The AUB Centre for AI in Media Proposal.docx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

What is a secure enterprise architecture roadmap?

  • 1. Juanita Koilpillai Chief Technology Advisor Digital Risk Management Institute Mark Rasch Chief Legal Council Digital Risk Management Institute David Morris Early Pioneer in Cybersecurity Managing Partner Morris Cybersecurity What is a Secure Enterprise Architecture Roadmap? Cybersecurity: The No Spin Zone Ulf Mattsson Head of Innovation at TokenEx
  • 2. Enterprise Architecture - Based on Operations - Cyber Security permeates every layer Source – Cloud Security Alliance & United Health
  • 3. Security Enterprise Architecture Source – NIST - Technology & Policy Focused
  • 5. Security Reference Architecture - Dev/Ops Focused Source – AWS
  • 6. Example - Security Design - Zero visibility for Critical Applications & infrastructures Clients Don’t allow anything to connect to them Authen cate to the servers(eg. using Mutual TLS) Servers Mutual TLS Use Authoriza on to Elevate Trust (eg. single packet authen ca on Single Packet Mi gate the the of keys (eg. hardware fin g erprin ng) 1 2 3 4 Hardware Fingerprin ng Require authoriza on to ini ate communica on Deny all connec ons 5 6 Use independent communica on port for admins (MFA, Specific IPs) Admins 7 Applica on Whitelis ng Secure Hardware Eg. Hardware Root of Trust Pin comms to the Root Secure Boot Hardened OS File Integrity Monitoring 8 Elements of a protec on mechanism - So ware Defined Perimeter Op onal Users MFA
  • 7. Does Blockchain, GDPR, Cloud, and IoT conflict with compliance regulations complicating your SEA? GDPR is not blockchain-compatible the way it is written today. Blockchain data can't be deleted. So will its applications be illegal? • There are ways for Blockchain applications to be compliant - data could be stored off-chain in distributed or cloud-based servers. Cloud considerations • From a storage and compliance perspective, they accumulate information about humans and our interaction with IoT devices. • One of the key questions asked how we make sure this is done in a correct and secure way; as well as how we make sure it is done in compliance with the new EU GDPR, because it’s going to be very hard to track everything.
  • 8. For more information about this presentation, contact: David Morris at: David.Morris@Morriscybersecurity.com Cybersecurity: The No Spin Zone