Cyber and Technology Risk Management Forum, Park City, UT

Hyperscale Cloud Security

Assume breach identifies & addresses significant gaps: f Detect attack & penetration f Respond to attack & penetration f Recover from data leakage or tampering Scope ongoing live site testing of security response plans to drastically improve mean time to detection & recovery Reduce exposure to internal attack (once inside, attackers have broad access) Periodic environment post breach assessment & clean state

Prevent Breach Vulnerability and Update Management Isolation (Data, Network, Trust) Security development lifecycle (SDL) Least Privileged/JIT Access

Assume Breach

Red vs Blue Live Site Penetration Testing

Centralized security logging & monitoring Breach Hunt

25

TRADITIONAL SECURITY

CLOUD SECURITY

Made with FlippingBook - Online Brochure Maker