Traditional security models where users and endpoints within the organisation's perimeter were automatically trusted are outdated. Cloud applications, home working and mobile workers have not only vastly expanded the security perimeter but have made it dynamic.
Every device and person, both inside and outside an organisation's network, must be monitored, checked and verified before accessing systems, applications or data. Some call this the Zero Trust security model and this ideology has become an increasingly popular form of cyber security by way of necessity.
80% of modern cyber-attacks are based on credential/identity theft. Hence, identity is not only the most crucial element in a modern organisation’s security but identity is arguably the new perimeter. However, unfortunately it is still often the weakest link in the cyber defence of many organisations.
Today the adversary no longer needs to steal an organisation’s keys or credentials, they just buy them from the dark web. This creates a game changer as it enables them to simply login for access without having to break-in. They can then exercise lateral movement to get their desired impact - ransomware, ransomware data extortion, cyber sabotage and cyber spying. Add this to the fact that access broker credential sales have increased by more than 250% since February 2022, identity protection is certainly a burning issue.
But how do you set up such an identity security model? What are the challenges that come with it? Is a step-by-step approach possible or should you make tabula rasa of your legacy security systems? These and other questions will be discussed with seasoned CISOs and other security experts.
Zero trust versus legacy security systems? Can they live together?
Does an identity security zero-trust implementation require drastic changes in your architecture, hardware and software?
Is zero-trust possible with one out-of-the-box product?
Does modern identity security require special maintenance or additional investment?
During this CIONET round table, we discuss how do we set up an identity model? and what are the challenges that comes with it? These and other questions will be tackled with seasoned CISOs and other security experts.
Next to the beautiful and lovingly renovated barn owned by the Peeters family for generations runs the old railway line 52/2. In the current car park there is a signal box, popularly called the "route house", its occupants ensured the safe crossing of trains and passers-by. With honest and seasonal products, he serves a delicious menu with varied fish and meat dishes.