One afternoon. Nine pitches. Who will get your 'investment'?
Enter the CyberDen and take your place in the dragon's seat. We're sending in eight leading cyber security vendors who will pitch their solutions to try and pique your interest.
We've rounded up some of the biggest names in the industry and exciting new players to provide you with an informative and relaxed afternoon. The RSA Vaults act as the perfect setting to make you feel like you're stepping in the den. You can then vote to 'invest' in the pitches that impress you or excite your interest.
8. Decline in Email Security Efficiency
Criminals continue to exploit gaps in your security
YoY rise in BEC victim losses88%
Victims lost 92x more
in BEC scams than
ransomware &
malware combined
22% of employees
will click on a
phishing campaign
14. Impostor Authentic
Spoof Look-alike Domain Display Name Deception Account OwnerAccount Takeover
Sender
Phishing Threat Landscape
Business Email Compromise Traditional Phishing EmployeeVEC ScarewareProblem
Customer Importance
Problem Example
VEC From: “Rama <rsekhar@nvp.com>”
Subject:Can you please send me your 2020 financial plan?
BEC From: “Pat Peterson <ceo123@gmail.com>”
Subject: Raymond, please pay this invoice
Employee From: “Pat Peterson <ppeterson@agari.com>”
Subject: Raymond, please pay this invoice
Traditional Phish From: “MS File Share <susie.q@example.com>”
Subject:Open this file shared from Microsoft Onedrive
Scareware From: “Aʼnonymer Hʌcker <heidemarie-236@misleads.stonecast.top>”
Send me bitcoin or I’ll post your naked pictures on social media
18. Email Authentication and Identity-based Detection:
Digital ID for Your Brand that Improves Customer Experience
IMPROVED DELIVERABILTY
BETTER ENGAGEMENTMORE CONFIDENCE
TOTAL VISIBILITY
Blocks unauthorized
emails attempting to
use your domain
22. • About Blueliv
• The Evolution of Threat Intelligence
• Adding value to your business
• CTI delivered by Blueliv
• Use case
• Blueliv product
• Threat landscape trends in 2020
SECON CYBERDEN
AGENDA
22
23. 23
ABOUT BLUELIV
SECON CYBERDEN
Blueliv is Europe’s leading cyberthreat intelligence
provider, headquartered in Barcelona, Spain.
We look beyond your perimeter, scouring the open,
deep and dark web to deliver fresh, automated and
actionable threat intelligence to protect the
enterprise and manage your digital risk.
Intelligence modules are scalable, easy to deploy and
easy to use, maximizing security resource while
accelerating threat detection, incident response
performance and forensic investigations.
24. THE EVOLUTION OF THREAT INTELLIGENCE
SECON CYBERDEN
Threat Intelligence 1.0
Generic, report driven
intelligence about malicious
activity, usually historical
10-15yrs ago
Threat Intelligence 1.5
Vertical-based threat
intelligence, largely report
driven, built manually by
analysts and delivered as a
single, feature-rich platform
5-10yrs ago
Threat Intelligence 2.0
Targeted threat intelligence,
delivered automatically and
continuously in near real-
time. Limited human
intervention allows for scale
and speed. Modular to
enable customers to
prioritise tasks
Past 5yrs
24
25. 25
HOW DO WE ADD VALUE
TO YOUR BUSINESS
SECON CYBERDEN
• Increase Security maturity for external
threats and help plug gaps by tracking
where the breach originated
• Loss of Intellectual Property, Fines and
Reputational Damage, Potential to
reduce GDPR fines by demonstrating
you have a proactive approach to
external threats
• Despite massive investments in Endpoint
Protection, Data Loss Prevention,
Firewalls etc breaches and leaks still
happen. Blueliv help understand the
blind spots
• Automated solution – so you don’t have
continuously search, rest assured that we
are looking out for your digital assets
online – focus on remediation and
reduce potential harm and losses
26. THREAT INTELLIGENCE DELIVERED BY BLUELIV
26 Big Data Algorithms
Proprietary
intelligence
Blueliv
Community
Third Parties
Internet Deep Web Dark Web
Partners
Public
sources
Experts
Organization
s
Malware
sharing
Malware
sharing
Web
Crawlers
Sinkholing Honeypots
Malware
Reversal
2. PROCESSING1. INFORMATION GATHERING 3. INFORMATION DELIVERY + REMEDIATION
Enriched data
Threat Compass
Threat Exchange
Network
MRTI Data Feed
SECON CYBERDEN
27. THREAT INTELLIGENCE DELIVERED BY BLUELIV
27
Retrieve in
compromised
credentials in real
time
Track illegitimate
entities and domains
Recover stolen card
information in real-
time
Track malicious
activities in the
underground
Discover your
sensitive data leaked
in the wild
Be armed with
continuously updated,
intuitive threat
intelligence
Detect malware &
analyze suspicious
executable files
Detect and monitor
false, infected,
modified or copied
apps
Monitor your
organization’s digital
footprint
Monitor global social-
borne hacktivism
operations
CREDENTIALS DOMAIN PROTECTION CREDIT CARD THEFT DARK WEB DATA LEAKAGE
HACKTIVISM SOCIAL MEDIA ROGUE MOBILE APPS MALWARE THREAT CONTEXT
SECON CYBERDEN
28. USE CASE: PROACTIVE EXTERNAL THREAT INTEL
28
• Gain visibility on external cyber-threats that can affect your assets, brand,
employees and even customers.
• Discover compromised devices and credentials, leaked information and
rogue mobile applications.
• Empower your response and investigation activities with access to
contextualized information.
• Enjoy these benefits in a frictionless and automated way, reducing you FTE
needs to cover much more ground.
• CISO
• IT Security Manager
• Threat Intelligence
Manager
• SOC Team
• Fraud Manager
• GRC/IP/Brand Manager
• MRTI
• Botnets and C&C
• Targeted Malware
• Credit Card Theft
• Rogue Mobile App
• Media Tracker
• Hacktivism
• Data Leakage
• Phishing & Cybersquatting
• Brand Abuse
• Dark Web
• Threat Actors
Role
Blueliv Technology that can be used
Use Case
SECON CYBERDEN
32. • Cyberthreats becoming increasingly diverse, sophisticated and malicious
• More mirroring the Commercial world – dark web black Friday sale – reduced price, 24x7
support, crowd funding, gamification, customer satisfaction scores, Uptime for Dark Web
Markets
• Skills shortage – products being simpler to use so employees are more productive
• Account checking Armageddon – password hygiene
• Remote Access Trojans (RATS) – increased sophisticated – man in the middle,
uninstalling AV
• Increased usage in Monero Cryptocurrency
• Increase in Ransomware and mobile attacks – companies are still paying up
WHAT ARE WE SEEING IN 2020
32
SECON CYBERDEN
33. We would welcome your investment and
as next steps are happy to provide
follow up meeting and a demonstration
Thank You
34.
35. Mark Draper
EMEA Channel Director
35
Top WAN Transformation
Challenges For The Global
Enterprise
37. Market Opportunity
37Network at the Speed of NOW
• SD-WAN solutions help organizations in simplifying the WAN and branch networks,
significantly improves WAN performance, reduces Capex and Opex, and provides
higher agility of WAN management
• Software-defined wide-area network market is expected to grow significantly in the next
3 to 4 years
• Market size anticipated to be $12.11 billion by 2023
• The market is expected to grow at a compound annual growth rate (CAGR) of 56.1%
from 2018-2023.
39. The WAN is Incompatible with Today’s Business Needs
39
Cloud, Mobility and Globalization drastically changing traffic patterns
Network at the Speed of NOW
Security
Appliances
Legacy
WAN
41. 41Network at the Speed of NOW
Digital Transformation
The Most Impactful IT Trend on Business
42. 42Network at the Speed of NOW
• The rise of cloud applications and mobile workforces is changing the shape of
business. Today, applications are hosted in on-premise data centers, private
& public clouds, or consumed as a subscription-based Software-as-a-
service (SaaS) offering. (Salesforce.com, Workday, Office365, Box and
Dropbox)
• The Wide Area Network (WAN) and network security appliances were built to
connect and secure static and physical locations - not today’s mobile-first and
cloud-centric networks.
• Legacy WAN and Network Security Appliances are Incompatible with the
Modern Enterprise.
The WAN is Incompatible with Today’s Business Needs
Cloud, Mobility and Globalization drastically changing traffic patterns
43. Mobile
Users
Point solutions? You can’t patch your way to a better network
DC
Cloud
Global
Branch
Legacy Network
Branch
| 43
MPLS
Mobile
VPN/SDP
Network
Security
44. Cloud-Native Convergence Drives WAN Transformation
| 44
MPLS
Network
Security
Mobile
VPN/SDP
ALL-IN-1
Faster Innovation
Better Service
Lower Costs
45. Cato Keeps it Simple
Connect. Secure. Run
| 45
Secure.
Protect all traffic with built-in
security as a service
Connect.
End-to-end optimized connectivity for all
locations, clouds, and users
Run.
One console for all network and
security policies and analytics
BranchHQ/DC Cloud Mobile
47. One Network
47
Global SD-WAN
Network at the Speed of NOW
CatoCloud
Routing Reliability Optimization Encryption
• Global, SLA-backed backbone
of Points of Presence (PoPs)
• Network Optimization – Last
Mile, Middle Mile, Cloud
Optimization
• Secure Tunnels Overlay
connects all resources to the
backbone
• MPLS Augmentation with core
SD-WAN capabilities
• MPLS Replacement
with SLA-backed backbone
• Connects Cloud Data Center
and Mobile Users to the WAN
• Managed service by Cato:
Intelligent Last-Mile
Management (ILMM)
(2) MPLS Replacement
SLA-backed Backbone
Last-Mile Management
Branch
Cato
Socket
HQ
Cato
Client
Mobile Users
Agentless
Cloud Data Center
Network
Security
SD-WAN
(1) MPLS Augmentation or
Enhanced Internet WAN
Policy Based Routing,
Active/Active, Packet Loss
Mitigation
MPLS
PoPs Map Cato SocketILMM
48. Next Generation
Firewall VPN
Secure Web
Gateway
Secure Cloud and
Mobile Access
Advanced Threat
Prevention
Network
Forensics
• Enterprise grade security
available everywhere
(local secure Internet exit)
• Elastic and agile: scale up,
seamlessly updated
• Cloud traffic visibility
accelerates defense
adaptation
• Appliance elimination in
remote locations and
datacenters
• Managed Threat Detection
and Response (MDR)
Service by Cato
One Security
48
Built-in Network Security
Network at the Speed of NOW
CatoCloud
Routing Reliability Optimization Encryption
Branch
Cato
Socket
HQ
Cato
Client
Mobile Users
Agentless
Cloud Data Center
Network
Security
SD-WAN
MPLS
Network and Security ManagementManaged Detection and Response
50. NG Firewall
Secure Web Gateway
Advanced Threat Prevention
Cloud and Mobile Security
Cloud Optimization
WAN Optimization
Global Route Optimization
Self-healing Architecture
Cato Cloud: The Network for the Digital Business
| 50
Branch Datacenter
Edge SD-WAN
• Active / Active / Active
• Dynamic Path Selection
• Application- and User Aware QoS
• Packet Loss Mitigation
IPSec
Internet
MPLS
Hybrid/Multi Cloud
Agentless
Mobile
Client/Clientless
SDP
Flexible Management
• Self-service
• Co-managed
• Fully managed
PoP
Converged
Network &
Security
55. 3Things to
remember
THE PITCH
Software Security for Devops and beyond
• Trends in Software Development – Shortening Delivery Cycle and
Machine Learning in Testing
• Maslow Hierarchy of Needs – Software Version
• Addressing these requirements
57. Advances in development always precede
advancesinAppSec
ApplicationDevelopment ApplicationSecurity
Starting point
Peak of inflated expectations
58. Advances in development always precede
advancesinAppSec
1996
Advances in dev
Web Apps
1999
Sec protection
WAFs
2003
Security from the source
SAST
59. Advances in development always precede
advancesinAppSec
1996
Advances in dev
Web Apps
1999
Sec protection
WAFs
2003
Security from the source
SAST
2004
Advances in dev
Open source by enterprises
2011
Sec protection
Sec by risk
2015
Security from the source
Sec by dev
60. we need to
understand
current Dev
trends
To predict future Sec
trends
Proprietary & Confidential | All Rights Reserved
61. 2007
Advances in dev
Infrastructure as code
2010
Sec protection
Cloud infrastructure protection
???
Security from the source
???
Network
Servers
services
= DevITTrend 1 :
Infrastructure
as code
Trend 2:
Trend 3:
Trend 4:
Proprietary & Confidential | All Rights Reserved
62. 2013
Advances in dev
Containers dockers
2015
Sec protection
Containers dockers security
???
Security from the source
???
Apps >> ContainersDirectly on OSTrend 1 :
Infrastructure
as code
Trend 2:
Containers
dockers
Trend 3:
Trend 4:
Proprietary & Confidential | All Rights Reserved
63. 2013
Advances in dev
Microservices
2017
Sec protection
API security protection
???
Security from the source
???
Microservices >> APIMonolithTrend 1 :
Infrastructure
as code
Trend 2:
Containers
dockers
Trend 3:
APIs
Trend 4:
Proprietary & Confidential | All Rights Reserved
64. Trend 1 :
Infrastructure
as code
Trend 2:
Containers
dockers
Trend 3:
APIs
Trend 4:
git is the
new
norm
Ops through git
is the new norm >> using git for sec scans
Build Test Deploy
Build Test Deploy
Proprietary & Confidential | All Rights Reserved
68. / Maslow Hierarchy of needs – For Software Security
Proprietary & Confidential | All Rights Reserved | 68
Project Management - Know your Software Exposure KPIs
Remediation
Prioritization
Correlations
Policy
CI/CD Automation
User & Project Management
69. / Maslow Hierarchy of needs – For Software Security
Proprietary & Confidential | All Rights Reserved | 69
Project Management - Know your Software Exposure KPIs
CI plugins
IDE plugins
Mass onboarding (Github /
Gitlab / Bitbucket)
Defect management (JIRA)
CI/CD Automation
SDLC Integration
Remediation
Prioritization
Correlations
Policy
CI/CD Automation
User & Project Management
70. / Maslow Hierarchy of needs – For Software Security
Proprietary & Confidential | All Rights Reserved | 70
Project Management - Know your Software Exposure KPIs
CI/CD Automation
SDLC Integration
Self-Service AST
Automation with Zero Configuration
Commit
Or
Pull request
Issues
Remediation
Prioritization
Correlations
Policy
CI/CD Automation
User & Project Management
71. / Maslow Hierarchy of needs – For Software Security
Proprietary & Confidential | All Rights Reserved | 71
Project Management - Know your Software Exposure KPIs
CI/CD Automation
SDLC Integration
Self-Service AST
Automation with Zero Configuration
Unified Policy Management
Remediation
Prioritization
Correlations
Policy
CI/CD Automation
User & Project Management
72. / Maslow Hierarchy of needs – For Software Security
Proprietary & Confidential | All Rights Reserved | 72
Project Management - Know your Software Exposure KPIs
CI/CD Automation
SDLC Integration
Self-Service AST
Automation with Zero Configuration
Unified Policy Management
Vulnerability Detection and Correlation
SAST SCA IAST Training
Remediation
Prioritization
Correlations
Policy
CI/CD Automation
User & Project Management
73. / Maslow Hierarchy of needs – For Software Security
Proprietary & Confidential | All Rights Reserved | 73
Project Management - Know your Software Exposure KPIs
CI/CD Automation
SDLC Integration
Self-Service AST
Automation with Zero Configuration
Unified Policy Management
Vulnerability Detection and Correlation
Automatic Prioritization
Remediation
Prioritization
Correlations
Policy
CI/CD Automation
User & Project Management
74. / Maslow Hierarchy of needs – For Software Security
Proprietary & Confidential | All Rights Reserved | 74
Project Management - Know your Software Exposure KPIs
CI/CD Automation
SDLC Integration
Self-Service AST
Automation with Zero Configuration
Unified Policy Management
Vulnerability Detection and Correlation
Automatic Prioritization
Remediate - What And How To Fix
Best Fix & Codebashing – How To Fix Remediation
Prioritization
Correlations
Policy
CI/CD Automation
User & Project Management
76. /
Proprietary & Confidential | All Rights Reserved | 76
About Checkmarx
The world's top organizations choose Checkmarx
to manage their software exposure
Gartner Magic Quadrant
Leader 2019 for Application
Security Testing
700 employees
60% year-over-year growth
deployed in 70+ countries
Trusted by 1,400+
of the world’s largest
organizations
78. / Security in a SDLC & DevOps Environment
Proprietary & Confidential | All Rights Reserved | 78
IDEs
Source Code
Management Solutions
Build/CI Solutions
Defect Tracking
Dashboarding
Dev
OpsCLI, Web Services API
Data Export API
81. / Come and have a chat
To hear more about how we
translate our philosophy and
upcoming trends into actionable
security
Proprietary & Confidential | All Rights Reserved | 81
99. "Protecting your business does not stop at these four walls"
•Traditional protection perimeters are expanding and sometimes dissolving
completely.
•How do you provide protection beyond the perimeter for your business brand.
•How do you provide protection beyond the perimeter for your customers.
134. • Defining your Digital "Perimeter" & Risks
• Leverage the ZeroFOX Platform for real-time
Digital Visibility, Intelligence & Protection
• Defend and Remediate your Digital Risks with
ZeroFOX Takedown as a Service™
AGENDA
135. 137
Our Mission
ZeroFOX exists to protect people and organisations in
the quickly expanding digital world.
Our Reach
Presence in United States, United Kingdom, Canada,
Chile and India, with customers in over 25 countries,
providing best in class SaaS platform, support and
services to organizations of all verticals and sizes.
About ZeroFOX
It’s a Digital World. Engage Securely.
137. 139
Impersonations
Social Accounts
Fake Domains
Fake Websites
Fraudulent Email
Securing Your Everchanging “Perimeter”
Public Platforms
Virtualization
The Good Ole Days
Cloud Computing
Forums, Blogs, News
& Reviews
Code Sharing
Web Marketplaces
Social Media
Email & Slack
Deep & Dark Web
Domain Registries
Mobile App
Stores
138. 140
Securing Your Everchanging “Perimeter”
Impersonations
Social Accounts
Fake Domains
Fake Websites
Fraudulent Email
Partners
Customers
Employees
139. 141
360°
Visibility into risks on
social and digital channels
outside your firewall
15 seconds
Average time to alert, saving
internal teams valuable time
spent searching for
risks manually
6+ hours
Saved per week on manual
identification of
impersonations on
average
Phishing/SMiShing
and Malware
Account
Hacking
Domain Spoofing
Piracy and Counterfeit
Goods
Customer
Scams
Trademark Infringements
Brand & Executive
Impersonators
Reputation Damage
Information Leakage
Offensive Content
Compliance Violations
Physical Violence
TM
Risks Beyond Your “Perimeter”
141. 143SLIDE
/
Identify
Risks on digital platforms
Protect & Monitor
What matters to
your organization
Gain Intelligence &
Remediate
Threats to your brand,
customers, execs, employees
and business
Identify Digital Channel Exposure
Define Your Digital Assets
Brands | Domains | Executives | Data | Employees | Locations
Machine-Driven Monitoring & Analysis
AI-Based| Alerts | Reporting
Human-Driven Analysis
ZeroFOX OnWatch™
Threat Intelligence &
Remediation
ZeroFOX Alpha Team
Takedown-as-a-Service™
Complete Digital Visibility, Intelligence & Protection
Digital Protection
Strategy
143. Remediate all threats to your brand and org.
Hide, block, delete and remove offending profiles and posts
Identify and remove threats
Mitigate threats to your brand, business, people and
locations across social media, mobile, web, email,
marketplaces, domains and more
Save time and resources
Reduce time spent identifying, investigating and
mitigating threats manually — rely on ZeroFOX to act on
your behalf
Increase reach and effectiveness
Strengthen your digital visibility and protection by not only
identifying threats, but taking action against those threats
145
147. Sophos Security for the Public
Cloud
David Okeyode – Public Cloud Security Architect
3xMCSE | MCT | VCP | CCNP | AWS SA-Pro
@asegunlolu asegunlolu
Is YOUR head in the
Clouds?
Jon Hope -
Senior Sales Engineer
@JonHope_Sophos
152. Responsibility IaaS
Data classification &
accountability
Client & end-point
protection
Identity & access
management
Application level
controls
Network controls
Host infrastructure
Physical security
SaaSPaaSOn-prem
Division of Responsibility
Source: Microsoft TechNet – Shared Responsibilities for Cloud Computing
Platform provider is
responsible for the
security ‘of’ the Cloud
The Customer is
responsible for
security ‘in’ the Cloud
Customer Cloud provider
Who’s Problem is it Anyway?
YOU are
156. Sophos Server Protection
• Prevents attacks by:
o Reducing the attack surface
o Identifying malware before it
runs
• Detects malicious activity:
o Hacking and exploit attempts
o Ransomware and malware
• Responds by:
o Allowing for automated or
manual removal
o Providing Root Cause Analysis
Responsibility IaaS
Data classification &
accountability
Client & end-point
protection
Identity & access
management
Application level
controls
Network controls
Host infrastructure
Physical security
SaaSPaaSOn-prem
Source: Microsoft TechNet – Shared Responsibilities for Cloud Computing
Customer Cloud provider
158. Ransomware Behavior Protection
CryptoGuard – File Protection
• Takes just in time file cache
• Identifies malicious file encryption behavior
• Isolates malicious process
• Automatically rolls back affected files
WipeGuard – Disk & Boot Protection
• Prevents malicious tampering with
system areas of disk
• Stops malicious processes
• Proven effective during NotPetya
DATA PARTITION
WIPEGUARD
CRYPTOGUARD
MBR
SYSTEM
INFORMATION
.DOC .JPG .XLSX
DISK LAYOUT
160
165. Security Heartbeat™
Synchronized Security in The Public Cloud
Security Heartbeat™
Servers
XG Firewall Sophos Central
Internet
XG Firewall Servers
Availability Zone
Availability Zone
167
167. Sophos Central-Single Pane of Glass Management
169
Allows partners to manage
multiple customer installations
Endpoint Protection
Email Security
Web Gateway
Server Protection
Encryption
Mobile Protection
Wireless Allows users to access email,
mobile, and encryption features
Reseller Dashboard Customer Admin User Self Service
Firewall Management
168. Sophos Intercept X for Server and Endpoint
Manage all your Firewalls, Servers and Endpoints from a single interface
Hybridenvironment CorporateDatacentre
170
169. Sophos Central Cloud Workload Discovery
172
Auto-Scaling
Versioning
Encryption
AWSS3 permissions
IdentifyAWS S3 configurations
violating company policy
171. Public Cloud Security Breaches
of cloud security failures will
be the customer’s fault
95%
SIX MILLION PII RECORDS
20 THOUSAND CUSTOMER RECORDS
200K CUSTOMER CALL RECORDINGS EXPOSED
175
Source: There's a Hole in 1,951 Amazon S3 Buckets, Rapid 7
LARGE DISCOUNT BROKERAGE FIRM
TELETEXT HOLIDAYS
TELECOMMUNICATIONS COMPANY
By 2020
172. Built for The Cloud
Cloud Optix
• You can’t secure what you can’t see
• Automatic workload discovery, security vulnerability
scanning and response
AI Powered Security
Analytics and Monitoring
Governance, Risk
and Compliance
DevSecOps
176
173. 177
END-TO-END
VISIBILITY
177
• Full asset inventory
(AWS, Azure, and GCP)
• Network topology
visualisation
• View traffic flow
(ingress/egress/
internal)
• Security Group
analyses how traffic
may flow
• Analyse Host traffic for
hidden vulnerability
i.e. open databases
174. 178
CONTINUOUS
COMPLIANCE
178
• Continuous monitoring
• Custom policies
• Out of the box
templates
• GDPR, CIS, SOC2,
HIPAA, ISO 27001
and PCI DSS
• Guardrails prevent
changes to critical
systems
• Jira and ServiceNow
integration
175. 179
AI-POWERED
ALERTS AND
RESPONSE
179
• Identify suspicious
logins and API calls
• Detect suspicious
traffic patterns
• Close open storage
buckets (S3) and ports
• Detect configuration
drift
• Scan IaC templates in
Github, Bitbucket and
Jenkins Pipeline
177. You NEED Protection
181
Sophos Cloud Optix
Intercept X for Server
UTM
Sophos Cloud Optix
Intercept X for Server
Sophos Cloud Optix
Intercept X for Server
XG Firewall
178. • Your Servers :
o Blocking Malware
o Ransomware Prevention
• Your Virtual Networks:
o Firewall, A/V Scanning
o IPS and WAF
o Sandboxing Unknown Content
o Automated Isolation of
Compromised
o Servers
• Your Dynamic Estate:
o Single Management Platform
o Automated Workload Discovery
o Cloud Optix
Responsibility IaaS
Data classification &
accountability
Client & end-point
protection
Identity & access
management
Application level
controls
Network controls
Host infrastructure
Physical security
On-prem
Source: Microsoft TechNet – Shared Responsibilities for Cloud Computing
Customer Cloud provider
Sophos Protects
SaaSPaaS
179.
180.
181. Exhibition &
Networking
Get into the thick of it and network for the rest of
the evening with these wonderful speakers. Who will
pique your interest?