SlideShare uma empresa Scribd logo
Track A-2: Forcepoint Raised The Bar:
What's Next in the Cross Domain Community
Michelle Jordan,
Global Governments Cybersecurity
Principal Cybersecurity Manager,
Forcepoint
George Kamis,
CTO, Global Governments &
Critical Infrastructure,
Forcepoint
Data Protection | Web Security | CASB | NGFW | Advanced Malware Detection | Behavioral Analytics | Insider Threat | Email Security | Data Guard | Cross Domain
Forcepoint Raised The Bar: What’s next in the
Cross Domain Community
George Kamis
Chief Technology Officer, Forcepoint Global Governments and Critical Infrastructure
Michelle Jordan
Cyber Security, Business Development, Forcepoint Global Governments and Critical Infrastructure
Forcepoint Proprietary © 2019 Forcepoint | 4
What are Cross Domain Solutions
Cross Domain Solutions:
• Facilitate secure information sharing between entities (agencies, countries, networks) with different sensitivity levels
through a controlled interface
• Are built on top of a secure, trusted operating system to achieve a high assurance platform
Three types of cross domain solutions as defined by the NCDSMO:
• Provides users a path to data on different networks as allowed by policy
Access:
• Provides various mechanisms to securely move data between different networks, while mitigating against
viruses, malware and policy violations as allowed by policy
Transfer (Guards):
• Solutions that encompass both access and transfer capabilities
Hybrid:
© 2019 Forcepoint | 5
Cross Domain Advantages
To effectively yet securely share information across multiple classified & separate
networks/domains
Real time access to multiple
separate & sensitive
networks/clouds
Removal of risky manual processes
including portable media used for
file transfer during mission-critical
activities (“sneakernet”)
Reduction of network and
computer hardware costs
Ability to access and share
information at multiple security
levels
Forcepoint Proprietary © 2019 Forcepoint | 6
What is Raise The Bar?
Raise The Bar
• An NSA and NCDSMO led initiative to continually improve the status quo in the cross domain community
• Focuses primarily on Transfer (Guard) mechanisms as well as concepts for Access solutions and system integrations to
combat evolving threats – The bar raises every year!
NSA and NCDSMO provide community support around Raise The Bar concepts:
• Community outreach and information briefings to contractors, vendors, customers and security personnel
• Security Design Reviews with vendors to tailor RTB guidance to specific technologies and determine best paths forward
• Engagement with independent test labs around methods to recognize, test and verify RTB concepts
• **Documented in Cross Domain Solution (CDS) Design and Implementation Requirements, 2018 Raise the Bar (RTB)
Baseline Release, Revision 1.0, 21 December 2018, Doc ID: NCDSMO-R-00008-001_00, National Cross Domain Strategy
and Management Office and National Security Agency
Forcepoint Proprietary
Forcepoint Proprietary © 2019 Forcepoint | 7
What is in Raise The Bar?
Raise The Bar currently consists of guidance across a number of areas
• What technology to use – don’t build from scratch
• System architectures and integration models
• Design and connectivity guidance
• Internal software architecture
• Management, maintenance and monitoring mechanisms
Borrows several concepts from the cryptography and formal methods communities, particularly R.A.I.N.
• Redundant - Always Invoked – Independent Implementation - Non-by-passable
• Substantial CDS redesign
Notable attention is paid to improving the state of data filtering, inspection & transformation
• New threats found on a regular basis requiring more robust and adaptable filtering
• Attempting standardization more accurate & precise language than “Deep Content Inspection”
• Constantly evaluating the state-of-the-art sanitization tools
Forcepoint Proprietary
Forcepoint Proprietary © 2019 Forcepoint | 8
Forcepoint’s Raise The Bar Involvement
Forcepoint is heavily involved in Raise The Bar (RTB)
• Trusted Thin Client, SimShield, Trusted Gateway System & High Speed Guard have met Raise The Bar objectives
• SimShield = one of the first products across the community to complete independent testing with RTB objectives
• All products have had favorable SABI LBSA test results and SAOs reviews
The Secret And Below Interoperability (SABI) process has fully embraced RTB:
• Independent test labs performing Lab Based Security Assessments (LBSA) since 2016 include RTB objectives
• Others are closely watching, Monitored closely by the Five-Eyes CDS working group
Forcepoint Proprietary
© 2019 Forcepoint | 9
Trusted Thin Client
Trusted Thin Client Remote
High Speed Guard
High Speed Guard SP
SimShield WebShield
Trusted Gateway
System
Trusted Print Delivery Trusted Mail System
Cross Domain Solutions Suite
Facilitating your mission while maintaining the highest degree of network and data security
ACCESS TRANSFER
TRANSFER - ADAPTORTRANSFER - ADAPTORTRANSFER
TRANSFER TRANSFER
Forcepoint Proprietary © 2019 Forcepoint | 10
Better Yet – Let’s Raise The Bar!
Virginia ABC store
December ‘18
Forcepoint Proprietary © 2019 Forcepoint | 11
Risk Adaptive Protection
Concepts to Cross Domain
Transfer
A Thought Leadership Discussion –
Going Beyond the Bar
Forcepoint Proprietary © 2019 Forcepoint | 12Forcepoint Proprietary
The growth of structured versus unstructured data over the past decade shows that unstructured data accounts for more than 90% of all data
Source: Patrick Cheesman)
Data continues to expand exponentially
Data volume growth directly
correlates to increase information
sharing needs
at multiple classifications level
Forcepoint Proprietary © 2019 Forcepoint | 13
User & Data Centric
Risk Adaptive Policies for
Cross Domain
UsersAndDataMustBeAtTheCenterOfYourDesignThinking
User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases risk
DegreeofDigital
Transformation
ITComplexity&Risk
Pre-2000 2025Infrastructure-centric 2015 Behavioral-centric
perimeter
Stove-Pipe CDS
Static Policies
Enterprise CDS
Static Policies
Forcepoint Proprietary © 2019 Forcepoint | 14Forcepoint Proprietary
DIGITAL
ACTIVITY
“Can’t Share” Can Share
Threat-Centric Cybersecurity
Necessary but insufficient to
scale
Does not meet the warfighters
needs
A LACK
OF CONTEXT
for Policy based
Decisions
EASY TO CLASSIFY EASY TO CLASSIFYHARD TO CLASSIFY
Trusting static policies in a dynamic
environment
Decide what is good or bad at a
single point in time
Configure your defenses to stop the
bad from entering and only allow
the good to pass through
Traditional approach to cross domain transfers
Security Wants to limit
data to only this
Operators Need This
Forcepoint Proprietary © 2019 Forcepoint | 15
UsersandDataisthecenterofourdesignthinking
User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases business risk
User & Data Centric
Risk Adaptive policy
Policy Policy
High SideLow Side
Traditional CDS Security
(static policy)
One-to-many enforcement of static,
generic policies, producing high
false positive rates.
Forcepoint Proprietary © 2019 Forcepoint | 16
Human-Centriccybersecuritychangeseverything
One-to-one enforcement of different policies based
on the risk, enabling automation.
Human-Centric Security
User & Data Centric
Risk Adaptive policy
Forcepoint Proprietary © 2019 Forcepoint | 17
The best way to efficiently evaluate data
transfers it to look beyond the CDS
demarcation point.
(data types, formats, sanitization, etc)
Need to extend risk factors in cross domain
transfer decisions outside the CDS device
(dynamic risk based on user behaviors, data
flows, data sources, data types, DLP markings,
etc)
Forcepoint Proprietary © 2019 Forcepoint | 18Forcepoint Proprietary
Today: All decisions are made at the CDS
Forcepoint Proprietary © 2019 Forcepoint | 19Forcepoint Proprietary
TECHNOLOGY ARCHITECTURE
1 SENSE
2
CONTEXTUALIZE
& UNDERSTAND
SENSE
CONCEPTUALIZE &
UNDERSTAND
1
2
Tomorrow: Closed Loop, Risk-adaptive approach
3 ENFORCE
3 ENFORCE at CDS
Forcepoint Proprietary © 2019 Forcepoint | 20Forcepoint Proprietary
RisklevelassignmentwithDynamicDataProtection(DDP)
Risk Scored Against:
• Self
• Local Group
• Organization
Forcepoint Proprietary © 2019 Forcepoint | 21Forcepoint Proprietary
Systemactionassignmentbyrisklevel–automaticpolicy(DDP)
Forcepoint Proprietary © 2019 Forcepoint | 22
We need to start looking beyond the bar
Static policies do not scale
Need to look deeper into the source of data, not just the data to make an authorized
transfer (behaviors -who, where, when, how much)
Can leverage DLP technology to make better transfer decisions
Common static filtering across all CDSes
can be targeted and exploited
Need to look at human behaviors and
model normal vs compromised with
dynamic policy adjustment
Static policies do not scale and will limit
data and visibility to those that need the
data
Forcepoint Proprietary © 2019 Forcepoint | 23Forcepoint Proprietary
The Forcepoint Difference
Risk-adaptive protection powered by behavioral
intelligence research delivers automation is available
today with Forcepoint Dynamic Data Protection
Leader in Cross Domain (CDS), Data Loss Protection
(DLP), Data Analytics, Insider Threat, and Dynamic
Data Protection
We are the experts in human-centric security.
Understand the balance between security and
operational needs
Forcepoint Proprietary
Follow us!
Forcepoint LLC@Forcepoint Forcepoint @ForcepointSec
@ForcepointLabs
Forcepoint
Thank you
© 2019 Forcepoint | 25

Mais conteúdo relacionado

Mais procurados

Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 

Mais procurados (20)

Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Cloud security
Cloud security Cloud security
Cloud security
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Cloud Services & Solutions | Mindtree
Cloud Services & Solutions | MindtreeCloud Services & Solutions | Mindtree
Cloud Services & Solutions | Mindtree
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Enterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WAN
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud security
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Free Sample : Le RGPD-GDPR les fondamentaux
Free Sample : Le RGPD-GDPR les fondamentauxFree Sample : Le RGPD-GDPR les fondamentaux
Free Sample : Le RGPD-GDPR les fondamentaux
 
Business Pulse - Dual perspectives on the top 10 risks and opportunities 2013...
Business Pulse - Dual perspectives on the top 10 risks and opportunities 2013...Business Pulse - Dual perspectives on the top 10 risks and opportunities 2013...
Business Pulse - Dual perspectives on the top 10 risks and opportunities 2013...
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 

Semelhante a Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george kamis and michelle jordan_cybersecurity leadership forum

Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 

Semelhante a Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george kamis and michelle jordan_cybersecurity leadership forum (20)

Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security Strategy
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Inteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceInteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformace
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
Demystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceDemystifying Cloud Security Compliance
Demystifying Cloud Security Compliance
 

Mais de scoopnewsgroup

Mais de scoopnewsgroup (20)

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
 

Último

researching client.pptxffffffffffffffffffffffffff
researching client.pptxffffffffffffffffffffffffffresearching client.pptxffffffffffffffffffffffffff
researching client.pptxffffffffffffffffffffffffff
lolsDocherty
 
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our OrganizationUp the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
uptheratios
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
enbam
 
Advancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App HouseAdvancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App House
TechSoup
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
enbam
 

Último (20)

PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
 
Counting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptxCounting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptx
 
researching client.pptxffffffffffffffffffffffffff
researching client.pptxffffffffffffffffffffffffffresearching client.pptxffffffffffffffffffffffffff
researching client.pptxffffffffffffffffffffffffff
 
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our OrganizationUp the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
 
#Bepartoftheplan on International Day For Biological Diversity 2024
#Bepartoftheplan on International Day For Biological Diversity 2024#Bepartoftheplan on International Day For Biological Diversity 2024
#Bepartoftheplan on International Day For Biological Diversity 2024
 
Item # 6 - 7001 Broadway Significance Review
Item # 6 - 7001 Broadway Significance ReviewItem # 6 - 7001 Broadway Significance Review
Item # 6 - 7001 Broadway Significance Review
 
Advancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App HouseAdvancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App House
 
Inflation scarring: How has the cost-of-living crisis changed Britain?
Inflation scarring: How has the cost-of-living crisis changed Britain?Inflation scarring: How has the cost-of-living crisis changed Britain?
Inflation scarring: How has the cost-of-living crisis changed Britain?
 
Minority economic forum Executive Summary
Minority economic forum Executive SummaryMinority economic forum Executive Summary
Minority economic forum Executive Summary
 
30052024_FI_Ministry of Agriculture final.pptx
30052024_FI_Ministry of Agriculture final.pptx30052024_FI_Ministry of Agriculture final.pptx
30052024_FI_Ministry of Agriculture final.pptx
 
07/03/2024 Publiekdomeindag - voormiddag
07/03/2024 Publiekdomeindag - voormiddag07/03/2024 Publiekdomeindag - voormiddag
07/03/2024 Publiekdomeindag - voormiddag
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
 
Elderly Persons Midday Meal Program kurnool
Elderly Persons Midday Meal Program kurnoolElderly Persons Midday Meal Program kurnool
Elderly Persons Midday Meal Program kurnool
 
The MEL Toolkit Launch Webinar Presentation
The MEL Toolkit Launch Webinar PresentationThe MEL Toolkit Launch Webinar Presentation
The MEL Toolkit Launch Webinar Presentation
 
Writing Sample-Title: Pioneering Urban Transformation: The Collective Power o...
Writing Sample-Title: Pioneering Urban Transformation: The Collective Power o...Writing Sample-Title: Pioneering Urban Transformation: The Collective Power o...
Writing Sample-Title: Pioneering Urban Transformation: The Collective Power o...
 
Who are the Sherden Yale Historical Review
Who are the Sherden Yale Historical ReviewWho are the Sherden Yale Historical Review
Who are the Sherden Yale Historical Review
 
Ghana High Commission on list of diplomats including US & China who owe £143m...
Ghana High Commission on list of diplomats including US & China who owe £143m...Ghana High Commission on list of diplomats including US & China who owe £143m...
Ghana High Commission on list of diplomats including US & China who owe £143m...
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 
07/03/2024 Publiekdomeindag - namiddag
07/03/2024 Publiekdomeindag - namiddag07/03/2024 Publiekdomeindag - namiddag
07/03/2024 Publiekdomeindag - namiddag
 

Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george kamis and michelle jordan_cybersecurity leadership forum

  • 1.
  • 2. Track A-2: Forcepoint Raised The Bar: What's Next in the Cross Domain Community Michelle Jordan, Global Governments Cybersecurity Principal Cybersecurity Manager, Forcepoint George Kamis, CTO, Global Governments & Critical Infrastructure, Forcepoint
  • 3. Data Protection | Web Security | CASB | NGFW | Advanced Malware Detection | Behavioral Analytics | Insider Threat | Email Security | Data Guard | Cross Domain Forcepoint Raised The Bar: What’s next in the Cross Domain Community George Kamis Chief Technology Officer, Forcepoint Global Governments and Critical Infrastructure Michelle Jordan Cyber Security, Business Development, Forcepoint Global Governments and Critical Infrastructure
  • 4. Forcepoint Proprietary © 2019 Forcepoint | 4 What are Cross Domain Solutions Cross Domain Solutions: • Facilitate secure information sharing between entities (agencies, countries, networks) with different sensitivity levels through a controlled interface • Are built on top of a secure, trusted operating system to achieve a high assurance platform Three types of cross domain solutions as defined by the NCDSMO: • Provides users a path to data on different networks as allowed by policy Access: • Provides various mechanisms to securely move data between different networks, while mitigating against viruses, malware and policy violations as allowed by policy Transfer (Guards): • Solutions that encompass both access and transfer capabilities Hybrid:
  • 5. © 2019 Forcepoint | 5 Cross Domain Advantages To effectively yet securely share information across multiple classified & separate networks/domains Real time access to multiple separate & sensitive networks/clouds Removal of risky manual processes including portable media used for file transfer during mission-critical activities (“sneakernet”) Reduction of network and computer hardware costs Ability to access and share information at multiple security levels
  • 6. Forcepoint Proprietary © 2019 Forcepoint | 6 What is Raise The Bar? Raise The Bar • An NSA and NCDSMO led initiative to continually improve the status quo in the cross domain community • Focuses primarily on Transfer (Guard) mechanisms as well as concepts for Access solutions and system integrations to combat evolving threats – The bar raises every year! NSA and NCDSMO provide community support around Raise The Bar concepts: • Community outreach and information briefings to contractors, vendors, customers and security personnel • Security Design Reviews with vendors to tailor RTB guidance to specific technologies and determine best paths forward • Engagement with independent test labs around methods to recognize, test and verify RTB concepts • **Documented in Cross Domain Solution (CDS) Design and Implementation Requirements, 2018 Raise the Bar (RTB) Baseline Release, Revision 1.0, 21 December 2018, Doc ID: NCDSMO-R-00008-001_00, National Cross Domain Strategy and Management Office and National Security Agency Forcepoint Proprietary
  • 7. Forcepoint Proprietary © 2019 Forcepoint | 7 What is in Raise The Bar? Raise The Bar currently consists of guidance across a number of areas • What technology to use – don’t build from scratch • System architectures and integration models • Design and connectivity guidance • Internal software architecture • Management, maintenance and monitoring mechanisms Borrows several concepts from the cryptography and formal methods communities, particularly R.A.I.N. • Redundant - Always Invoked – Independent Implementation - Non-by-passable • Substantial CDS redesign Notable attention is paid to improving the state of data filtering, inspection & transformation • New threats found on a regular basis requiring more robust and adaptable filtering • Attempting standardization more accurate & precise language than “Deep Content Inspection” • Constantly evaluating the state-of-the-art sanitization tools Forcepoint Proprietary
  • 8. Forcepoint Proprietary © 2019 Forcepoint | 8 Forcepoint’s Raise The Bar Involvement Forcepoint is heavily involved in Raise The Bar (RTB) • Trusted Thin Client, SimShield, Trusted Gateway System & High Speed Guard have met Raise The Bar objectives • SimShield = one of the first products across the community to complete independent testing with RTB objectives • All products have had favorable SABI LBSA test results and SAOs reviews The Secret And Below Interoperability (SABI) process has fully embraced RTB: • Independent test labs performing Lab Based Security Assessments (LBSA) since 2016 include RTB objectives • Others are closely watching, Monitored closely by the Five-Eyes CDS working group Forcepoint Proprietary
  • 9. © 2019 Forcepoint | 9 Trusted Thin Client Trusted Thin Client Remote High Speed Guard High Speed Guard SP SimShield WebShield Trusted Gateway System Trusted Print Delivery Trusted Mail System Cross Domain Solutions Suite Facilitating your mission while maintaining the highest degree of network and data security ACCESS TRANSFER TRANSFER - ADAPTORTRANSFER - ADAPTORTRANSFER TRANSFER TRANSFER
  • 10. Forcepoint Proprietary © 2019 Forcepoint | 10 Better Yet – Let’s Raise The Bar! Virginia ABC store December ‘18
  • 11. Forcepoint Proprietary © 2019 Forcepoint | 11 Risk Adaptive Protection Concepts to Cross Domain Transfer A Thought Leadership Discussion – Going Beyond the Bar
  • 12. Forcepoint Proprietary © 2019 Forcepoint | 12Forcepoint Proprietary The growth of structured versus unstructured data over the past decade shows that unstructured data accounts for more than 90% of all data Source: Patrick Cheesman) Data continues to expand exponentially Data volume growth directly correlates to increase information sharing needs at multiple classifications level
  • 13. Forcepoint Proprietary © 2019 Forcepoint | 13 User & Data Centric Risk Adaptive Policies for Cross Domain UsersAndDataMustBeAtTheCenterOfYourDesignThinking User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases risk DegreeofDigital Transformation ITComplexity&Risk Pre-2000 2025Infrastructure-centric 2015 Behavioral-centric perimeter Stove-Pipe CDS Static Policies Enterprise CDS Static Policies
  • 14. Forcepoint Proprietary © 2019 Forcepoint | 14Forcepoint Proprietary DIGITAL ACTIVITY “Can’t Share” Can Share Threat-Centric Cybersecurity Necessary but insufficient to scale Does not meet the warfighters needs A LACK OF CONTEXT for Policy based Decisions EASY TO CLASSIFY EASY TO CLASSIFYHARD TO CLASSIFY Trusting static policies in a dynamic environment Decide what is good or bad at a single point in time Configure your defenses to stop the bad from entering and only allow the good to pass through Traditional approach to cross domain transfers Security Wants to limit data to only this Operators Need This
  • 15. Forcepoint Proprietary © 2019 Forcepoint | 15 UsersandDataisthecenterofourdesignthinking User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases business risk User & Data Centric Risk Adaptive policy Policy Policy High SideLow Side Traditional CDS Security (static policy) One-to-many enforcement of static, generic policies, producing high false positive rates.
  • 16. Forcepoint Proprietary © 2019 Forcepoint | 16 Human-Centriccybersecuritychangeseverything One-to-one enforcement of different policies based on the risk, enabling automation. Human-Centric Security User & Data Centric Risk Adaptive policy
  • 17. Forcepoint Proprietary © 2019 Forcepoint | 17 The best way to efficiently evaluate data transfers it to look beyond the CDS demarcation point. (data types, formats, sanitization, etc) Need to extend risk factors in cross domain transfer decisions outside the CDS device (dynamic risk based on user behaviors, data flows, data sources, data types, DLP markings, etc)
  • 18. Forcepoint Proprietary © 2019 Forcepoint | 18Forcepoint Proprietary Today: All decisions are made at the CDS
  • 19. Forcepoint Proprietary © 2019 Forcepoint | 19Forcepoint Proprietary TECHNOLOGY ARCHITECTURE 1 SENSE 2 CONTEXTUALIZE & UNDERSTAND SENSE CONCEPTUALIZE & UNDERSTAND 1 2 Tomorrow: Closed Loop, Risk-adaptive approach 3 ENFORCE 3 ENFORCE at CDS
  • 20. Forcepoint Proprietary © 2019 Forcepoint | 20Forcepoint Proprietary RisklevelassignmentwithDynamicDataProtection(DDP) Risk Scored Against: • Self • Local Group • Organization
  • 21. Forcepoint Proprietary © 2019 Forcepoint | 21Forcepoint Proprietary Systemactionassignmentbyrisklevel–automaticpolicy(DDP)
  • 22. Forcepoint Proprietary © 2019 Forcepoint | 22 We need to start looking beyond the bar Static policies do not scale Need to look deeper into the source of data, not just the data to make an authorized transfer (behaviors -who, where, when, how much) Can leverage DLP technology to make better transfer decisions Common static filtering across all CDSes can be targeted and exploited Need to look at human behaviors and model normal vs compromised with dynamic policy adjustment Static policies do not scale and will limit data and visibility to those that need the data
  • 23. Forcepoint Proprietary © 2019 Forcepoint | 23Forcepoint Proprietary The Forcepoint Difference Risk-adaptive protection powered by behavioral intelligence research delivers automation is available today with Forcepoint Dynamic Data Protection Leader in Cross Domain (CDS), Data Loss Protection (DLP), Data Analytics, Insider Threat, and Dynamic Data Protection We are the experts in human-centric security. Understand the balance between security and operational needs
  • 24. Forcepoint Proprietary Follow us! Forcepoint LLC@Forcepoint Forcepoint @ForcepointSec @ForcepointLabs Forcepoint
  • 25. Thank you © 2019 Forcepoint | 25