02.03.2019 Views

Cyber Defense Magazine - Annual RSA Conference 2019 - Print Edition

Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition

Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

To understand how this can work,<br />

think of how water delivery works.<br />

Everyone in the community<br />

shares the same water main.<br />

If there’s a crack, everyone<br />

downstream gets dirty water. But<br />

what if we replaced that shared<br />

main with a dedicated pipe for<br />

each customer? Then a single<br />

pipe means a single person gets<br />

dirty water while everyone else is<br />

unaffected. It’s a nuisance, not a<br />

community-wide crisis.<br />

Now apply that model to the way<br />

we deliver IT services like apps,<br />

networking, and cloud. By giving<br />

each user their own dedicated,<br />

secure session—or pipe—we<br />

can limit the impact of a breach to<br />

that specific session and prevent<br />

it from spreading across the IT<br />

environment and organization.<br />

It’s a simple concept: we define<br />

user identity by role, not device<br />

or location. That individual<br />

identity determines the set of<br />

services each user receives.<br />

Because identities and services<br />

are assigned individually, one<br />

user’s compromised session<br />

can be terminated without<br />

affecting other users. It’s a bad<br />

experience for one person—not<br />

the whole business. Two people,<br />

actually; the hacker will be pretty<br />

frustrated as well.<br />

Keeping it simple<br />

Remember, part of our goal is<br />

to make security both simpler<br />

and more effective. Shifting<br />

focus from apps to infrastructure<br />

does both. Instead of worrying<br />

about thousands of unique<br />

and diverse points of entry—<br />

your apps—you can focus on<br />

creating the best pipe possible,<br />

test it thoroughly, and then roll<br />

it out across your organization.<br />

As patches become available, a<br />

standardized pipe makes them<br />

easier to test before deployment;<br />

meanwhile, your individualized<br />

delivery infrastructure acts as a<br />

buffer to keep any breaches from<br />

infecting the whole network.<br />

That holistic approach means<br />

you’re dealing with one delivery<br />

infrastructure, not a constantlygrowing,<br />

ever-changing set of<br />

apps and services. And you don’t<br />

have to worry about buying,<br />

configuring, and managing an<br />

endless stream of security point<br />

solutions.<br />

It’s not hard to make the change<br />

from app-centric security to a<br />

secure delivery infrastructure.<br />

First, make sure you have<br />

consistent visibility across your<br />

infrastructure, and take an<br />

inventory of the way services are<br />

delivered in your business. Then<br />

use this knowledge to figure out<br />

the best way to ensure end-toend<br />

protection from services to<br />

user.<br />

For too long, hackers have held<br />

structural advantages that make<br />

cybersecurity tenuous at best,<br />

as well as costly, labor-intensive,<br />

and frustrating for users and IT<br />

alike. It’s time to stop playing this<br />

losing game of cat-and-mouse.<br />

By focusing on a secure delivery<br />

infrastructure, you can make<br />

breaches harder to accomplish,<br />

less rewarding for hackers, and<br />

less damaging for users and your<br />

business.<br />

Stan Black, Citrix SVP, chief security and information officer<br />

Stan Black, CISSP, is the SVP and Chief Security and Information Officer<br />

at Citrix where he is in charge of the secure delivery of applications and<br />

data. A key component of that is creating a security strategy to deliver<br />

experience, security and choice to customers and employees. That<br />

flexibility enables workers to be secure and productive from anywhere,<br />

anytime.<br />

Black and his global technology and security team, a combination of<br />

security and IT teams, stop 54 billion attacks per quarter. His organization<br />

also monitors the global threat landscape and manages incident<br />

response and physical security to protect the safety of Citrix employees.<br />

Black is a seasoned security veteran with more than twenty five years of<br />

experience in cyber security, reducing business risk, threat intelligence,<br />

corporate data protection, infrastructure simplification and crisis<br />

management. His experience has provided him the opportunity to<br />

deliver durable security and risk solutions to global 1000’s, countries<br />

and public agencies around the world.<br />

Follow Stan on Twitter: @StanBlack19 or visit the Citrix website!<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>Magazine</strong> - <strong>Annual</strong> <strong>Print</strong> <strong>Edition</strong> <strong>2019</strong> 51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!