Keynote for our Federal Zero Trust Summit in DC, February 2020 - opening for US CIO Suzette Kent :-)
View Slide
How Zero TrustMakes the MissionSimpler & SecureDug Song, Duo Security
© 2020 Cisco and/or its affiliates. All rights reserved.2010A Decade of Data Breaches
CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.2010
© 2020 Cisco and/or its affiliates. All rights reserved.RSA Breach & Impact2011
© 2020 Cisco and/or its affiliates. All rights reserved.2014If an adversary has the credentials ofa user on the network, then they canaccess data even if it's encrypted, justas the users on the network have toaccess data, and that did occur in thiscase.So encryption in this instance wouldnot have protected this data.
© 2020 Cisco and/or its affiliates. All rights reserved.2015In the next 30 days we know thereis a set of things we can do thatwill fairly dramatically improve oursecurity profile... like two-factorauthentication, patching,minimizing the number ofsystem administrators that youhave and so on.Tony Scott’s 30-day Cyber Sprint
© 2020 Cisco and/or its affiliates. All rights reserved.Google on Nation’s Cybersecurity Priorities✓ Strong Authentication✓ Up-to-Date Devices✓ End-to-End Encryption
© 2020 Cisco and/or its affiliates. All rights reserved.✓ Strong Authentication✓ Up-to-Date Devices✘ Encryption?THANKS OBAMA2016
© 2020 Cisco and/or its affiliates. All rights reserved.People TechnologySecurity
© 2020 Cisco and/or its affiliates. All rights reserved.
© 2020 Cisco and/or its affiliates. All rights reserved.2013
© 2020 Cisco and/or its affiliates. All rights reserved.2016
© 2020 Cisco and/or its affiliates. All rights reserved.BeyondCorp (2014) 800-207: Zero Trust Architecture (2019) Zero Trust Architecture (2019)Connecting from aparticular network mustnot determine whichservices you can accessAll communication is secure regardless of network location Don’t trust the network, including the local networkAccess to services isgranted based on what weknow about you and yourdeviceAccess to resources is determined by policy, including theobservable state of user identity and the requesting system, andmay include other behavioral attributesCreate a single strong user identityCreate a strong device identityKnow the health of your devices and servicesSet policies according to value of the service or dataAll access to servicesmust be authenticated,authorized, and encryptedAll data sources and computing services are consideredresourcesKnow your architecture including users, devices, andservicesAccess to individual enterprise resources is granted on aper-connection basisControl access to your services and dataChoose services designed for zero trustUser authentication is dynamic and strictly enforced beforeaccess is allowedAuthenticate everywhereThe enterprise ensures all owned and associated systems are inthe most secure state possible and monitors systems to ensurethat they remain in the most secure state possibleFocus your monitoring on devices and services
© 2020 Cisco and/or its affiliates. All rights reserved.Securing the enterpriseUser and device access Application and workload access Network accessWorkforce Workload WorkplaceSaaS &Public cloudAccess happens everywhere – how do you get visibilityand ensure secure, trusted access?
© 2020 Cisco and/or its affiliates. All rights reserved.User and device accessZero Trust for the WorkforceWhat to do: How to do it:Verify users’ identities Multifactor AuthenticationEnforce access policiesfor every appAdaptive & role-based access controlGain device visibilityand establish trustEndpoint health & security posture
© 2020 Cisco and/or its affiliates. All rights reserved.Application and workload accessZero Trust for the WorkloadWhat to do: How to do it:Gain visibility into what’srunning and what’s criticalIdentify workload dependenciesContain breaches andminimize lateral movement Application segmentationAlert or block communicationif policy is violatedContinuous monitoring & response
© 2020 Cisco and/or its affiliates. All rights reserved.Zero Trust for the Workplace Network accessWhat to do: How to do it:Discover and classify users, devicesand apps on your networkNetwork authentication,profiling authorizationGrant the right level of networkaccess based on user anddevice contextNetwork segmentationContain infected endpoints andrestrict network accessContinuous monitoringand responding to threats
© 2020 Cisco and/or its affiliates. All rights reserved.WorkforceDuoWorkloadTetrationWorkplaceSD-AccessSecurityensuredtoday and forthe future withZero Trust
© 2020 Cisco and/or its affiliates. All rights reserved.Cisco isa leaderin Zero TrustThe Forrester Wave™: Zero Trust eXtended EcosystemPlatform Providers, Q4 2019Tools And Technology: The Zero Trust Security PlaybookOctober 29, 2019The Forrester Wave™ is copyrighted by Forrester Research, Inc.Forrester and Forrester Wave are trademarks of Forrester Research, Inc.The Forrester Wave is a graphical representation of Forrester's call on amarket and is plotted using a detailed spreadsheet with exposed scores,weightings, and comments. Forrester does not endorse any vendor,product, or service depicted in the Forrester Wave. Information is basedon best available resources. Opinions reflect judgment at the time and aresubject to change.
© 2020 Cisco and/or its affiliates. All rights reserved.Compliance as a by-product of Zero TrustCompliance CJIS FFIEC GBLA GDPR HIPAANIST800-53NIST800-171NERC PCI DSSDetails CriminalJusticeInformationServicesv5.6FederalFinancialInstitutionsExaminationCouncilVersion Sept2016Gramm-Leach-Bliley ActFIL-22-2001EU GeneralData ProtectionRegulationRegulation (EU)2016/679HealthInsurancePortability andAccountabilityActCFR 45revised Oct 1,2007NationalInstitute ofStandards andTechnology800-53 r4NationalInstitute ofStandards andTechnology800-171June 2015includesupdates as of01-14-2016North AmericanElectricReliabilityCorporationv5 CriticalInfrastructureProtectionReliability StdsPayment CardIndustry DataSecurityStandardv3.2Where DuoCan HelpSection:5.5.2.35.5.6.15.5.6.25.6.2.15.6.2.1.35.6.2.25.6.3.25.10.4.15.10.4.45.13.7.15.13.7.2Title:II.C.5II.C.II.C.7(a)II.C.7(e)II.C.10(d)II.C.13(e)II.C.15(b)II.C.15(c)II.C.15(d)II.DIII.CTitle:V Subtitle ASection 501(3)Article 5 Section1(f), 2Article 24Section 1Article 32Section 1(b), 2Standard:164.308(a)(1)164.308.(a)(4)164.312(d)Control:IA-2IA-3IA-5IA-6SC-7SC-11Control:3.1.1, 3.1.1,3.1.3, 3.1.7,3.1.11, 3.1.12,3.1.14, 3.1.15,3.1.18, 3.1.20,3.3.1, 3.3.2,3.3.8, 3.4.1,3.4.2, 3.5.2,3.5.3, 3.7.5CIP-005Table R2 Part2.3CIP-007-6Table R5 5.1CIP-010-2Table R2 2.1Requirements:6.27.1-7.28.3.18.3.2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential28 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential28Measuring thebenefitsStrategic User Trust (Survey) C Quarterly survey + trendRisk Overall Risk level E Based upon organisation risk calculation;mitigation impactRisk Register issuemitigationE Impact on specific itemsAudit and compliance E/D Impact on specific itemsImpact on application risk E Based upon application risk profile andassessmentManagement FTE usage A/B NumericImplementation efficiencyA/B Project Time and cost vs projectedOperational Coverage % A NumericIncident Reduction E NumericInactive Accounts D Number of users that are not longeractive employeesInactive Devices D Number of devices that are no longer ininventoryInventory Clarification D Device numeric - unknown devicesDevice status- O/S D Percentage against status- Browser D Percentage against statusPhishing response levels E Report back from phishing tool - trendedApplication coverage A/B Percentage vs all applicationsA. Ease of ImplementationB. Ease of UseC. Ease of IntegrationD. Enhanced VisibilityE. Risk ReductionF. Organisational Security Culture