Speaker0 Session9570 1
Speaker0 Session9570 1
Speaker0 Session9570 1
Bill Becker
Chief Technology Officer
thalestct.com
Thales Trusted Cyber Technologies: Who We Are
12 May 2021
DoD, NSA, NIST, White House releases
OMB, CISA release executive order on 16 Sep 2021
cybersecurity and Cybersecurity – CISA gets $862
Zero Trust guidance 14028 million in budget
”
if two of them are dead
Benjamin Franklin
All transactions within the enterprises are untrusted (default deny) and
access/transactions are based on…
What resource
you’re accessing
Identity
Device
Network / Environment
Application Workload
Data
Identity
Device
Network / Environment
Application Workload
Data
Data Access
CDM System
Control Plane
Data Plane
Intelligence
Subject System
Policy Enterprise SIEM System
Activity Logs
Enforcement Point Resource
NIST Identity-Centric Zero Trust Architecture
(OMB ZT Strategy Memo, NIST Special Publication 800-207)
16 Trusted Cyber Technologies
Foundational Pillars of Zero Trust
Identity
Device
Network / Environment
Application Workload
Data
• All hardware that • Ensure visibility into device • Deploy monitoring tools
connects to network
• Establish security baselines • Real-time risk assessments
• Agency-owned or BYOD
• Enforce compliance
Identity
Device
Network / Environment
Application Workload
Data
▌ Micro-Segmentation
Align to application workflow needs
Move applications and services closer
to users and branch offices
▌ Micro-Segmentation
Align to application workflow needs
Move applications and services closer
to users and branch offices
IDC predicts the data 75% respondents cited HIPAA, SOX, PCI DSS,
created and shared data-in-motion security FISMA and others include
every year will reach 175 solutions are most standards for how to
zettabytes in 2025 effective at thwarting handle data in motion
breaches
–2018 Thales Data Threat Report
Encryption – the last line of defense – is vital for protecting data as it crosses networks
Identity
Device
Network / Environment
Application Workload
Data
Identity
Device
Network / Environment
Application Workload
Data
56% 25%
In 2022, only 56% of respondents Only 25% of all respondents said
were very confident or had they could classify all their data
complete knowledge of where and 53% said they could classify
their data was being stored, down at least half of their data in 2022
from 64% in 2021
59% 50%
Encryption as top tool to >40% of sensitive data
secure data in the cloud in cloud encrypted
Awareness
• Discover and classify data
• Find structured as well as unstructured data
Alert
• Built-in templates for privacy, PCI, health, etc.
• Find and rank the data at risk with detailed
reports and categorization
Action
• Automatic remediation based on data
visibility, risks, and policies
• Integrated remediation for reduced risks
Enforce encryption or Apply granular, least-privileged Identify and stop threats faster
tokenization to protect against user access policies that protect with detailed data access audit
unauthorized access by users data from external attacks and logs that satisfy compliance
and processes misuse by privileged users requirements and enables
security analytics
(Structured & Unstructured Data)
29 Trusted Cyber Technologies
Optimal Maturity Stage