securing your data... wherever it is slides from nsi's pete heles
TRANSCRIPT
![Page 1: Securing Your Data... Wherever It Is slides from NSI's Pete Heles](https://reader035.vdocuments.us/reader035/viewer/2022062902/58f03f411a28ab64298b4573/html5/thumbnails/1.jpg)
Pete HelesTrends, Anomalies & Prevention
![Page 2: Securing Your Data... Wherever It Is slides from NSI's Pete Heles](https://reader035.vdocuments.us/reader035/viewer/2022062902/58f03f411a28ab64298b4573/html5/thumbnails/2.jpg)
It Can and Does Happen
![Page 3: Securing Your Data... Wherever It Is slides from NSI's Pete Heles](https://reader035.vdocuments.us/reader035/viewer/2022062902/58f03f411a28ab64298b4573/html5/thumbnails/3.jpg)
What are the Boundaries of the Data Center
• Core Switch(es)?• Storage and Controller?• Server?• N-S Firewall?• E-W Firewall?• End User Device?• Wherever the data resides?
![Page 4: Securing Your Data... Wherever It Is slides from NSI's Pete Heles](https://reader035.vdocuments.us/reader035/viewer/2022062902/58f03f411a28ab64298b4573/html5/thumbnails/4.jpg)
Architecture or Component?
![Page 5: Securing Your Data... Wherever It Is slides from NSI's Pete Heles](https://reader035.vdocuments.us/reader035/viewer/2022062902/58f03f411a28ab64298b4573/html5/thumbnails/5.jpg)
It’s About The Architecture!
![Page 6: Securing Your Data... Wherever It Is slides from NSI's Pete Heles](https://reader035.vdocuments.us/reader035/viewer/2022062902/58f03f411a28ab64298b4573/html5/thumbnails/6.jpg)
Non-Traditional Tools
![Page 7: Securing Your Data... Wherever It Is slides from NSI's Pete Heles](https://reader035.vdocuments.us/reader035/viewer/2022062902/58f03f411a28ab64298b4573/html5/thumbnails/7.jpg)
What are the Villains?
• Management Data use and ownership agreement• You• Users/you• Refrigerators/you• Friends and 3 party helpers• The bad guys• Disasters
![Page 8: Securing Your Data... Wherever It Is slides from NSI's Pete Heles](https://reader035.vdocuments.us/reader035/viewer/2022062902/58f03f411a28ab64298b4573/html5/thumbnails/8.jpg)
Secure Places and secure domains
![Page 9: Securing Your Data... Wherever It Is slides from NSI's Pete Heles](https://reader035.vdocuments.us/reader035/viewer/2022062902/58f03f411a28ab64298b4573/html5/thumbnails/9.jpg)
Got 'em! Researchers steal crypto keys from Amazon cloud
![Page 10: Securing Your Data... Wherever It Is slides from NSI's Pete Heles](https://reader035.vdocuments.us/reader035/viewer/2022062902/58f03f411a28ab64298b4573/html5/thumbnails/10.jpg)
Attacks are EXPENSIVE!
![Page 11: Securing Your Data... Wherever It Is slides from NSI's Pete Heles](https://reader035.vdocuments.us/reader035/viewer/2022062902/58f03f411a28ab64298b4573/html5/thumbnails/11.jpg)
Must Have?
![Page 12: Securing Your Data... Wherever It Is slides from NSI's Pete Heles](https://reader035.vdocuments.us/reader035/viewer/2022062902/58f03f411a28ab64298b4573/html5/thumbnails/12.jpg)
Next Steps?
![Page 13: Securing Your Data... Wherever It Is slides from NSI's Pete Heles](https://reader035.vdocuments.us/reader035/viewer/2022062902/58f03f411a28ab64298b4573/html5/thumbnails/13.jpg)
Thank You!