Internal security Strategie für die „Goldenen Zwanziger ... · Tumblr Lhked/n Facebook /ns.wwn ....
Transcript of Internal security Strategie für die „Goldenen Zwanziger ... · Tumblr Lhked/n Facebook /ns.wwn ....
ZERO TRUST FUTURE CHALLENGES
THOMAS TSCHERSICHCHIEF SECURITY OFFICER DEUTSCHE TELEKOM
JUST ANOTHER…
THIS IS HOW OUR WORLD LOOKED LIKE FOR DECADES…
EVERYTHING WAS PROTECTED BY (FIRE-)WALLS
THIS IS OUR TODAY’S WORLD
Cloud services
No trust relation
Global supply chain
Everything is IP
Data outside corporate network
THE CASTLE WALLS HAVE ALREADY FALLEN…
WHAT IT’S ABOUT: PAST VS. TODAY
Everything is in the cloud
Workloads
Devices
Data
PeopleDevices
Data
Networks
Datacenter
People
ALL ABOUT MULTI-FACTOR AUTHENTICATION
Multi-Factor Authentication
Everything is in the cloud
Workloads
Devices
Data
People
WHAT ARE THE ADVANTAGES AND DISADVANTAGES?
Independent frominternal network
Single APPauthentication
Moved accessmanagement
More specific access controls
Greateffort
Must be implemented
on “green Field”
Identify weakcomponents
Explicit verification of users &
devices needed
BUT ZERO TRUST IS NOT ENOUGH
Improve reactionarycapabilities
PreventionMonitoring
WHAT DOES THIS MEAN FOR FUTURE REGULATIONS?
DON’T FOCUS JUST
ON INFRASTRUCTURE
BUT
1. FOCUS ON AUTHENTICATION
2. FOCUS ON VERIFICATION
THANK YOU.QUESTIONS?
THOMAS TSCHERSICH@TTSCHERSICH