The Fortress has fallen: the new approach to
Cybersecurity
Marc Nader
@mourcous
Date | November-2016
2
Leaders in Information &
Communication Technology
Leaders in
Virtualization & Cloud
Computing
Leaders in IT
Outsourcing & Cloud
Solutions
The fortress approach
Breaking through the walls: Digitization, IoT & Cloud
The Zero-Trust network
Redefining the rules of the game
The new approach & the promise of the cloud
Agenda
3
The Industrialisation of hacking
4
The Players
5
Nation States Hacktivists Cybercriminals
A market place
6
The Fortress Approach
Security zones
8
Security zones
9
INSIDE
Demilitarized Zone
(DMZ)
OUTSIDE
Published
Data
Private
Data
Sophisticated Perimeter
10
Firewall IPS Sandbox
Access
Restrictions
Network
Attacks
Malware Web
Application
Firewall
We built a strong fortress
11
The perimeter was the
last thing that
connected us to the
internet.
Digitization, IOT & Cloud
Your people are working
from different places
Your people are working
from many devices
15
In a digital world, everything is connected
16
The perimeter is broken by every digital service.
The Zero-Trust Network
You are as secure as your weakest link
18
Stuxnet. Natanz, Iran
19
Gauss. Beirut, Lebanon
20
Infections of Stuxnet, Duqu, Flame & Ghost
21
Everyone becomes untrusted
22
Untrusted
Everyone becomes untrusted
22
Untrusted Trusted
Everyone becomes untrusted
22
Untrusted
Everyone becomes untrusted
22
Untrusted Untrusted
The zero Trust Network
• Secure the data and not the perimeter
• Everybody is untrusted
• All resources are accessed securely
• Design the network from the inside out
• Security Analytics
23
Redefining the rules of the game
The new Security Framework
25
Authentication: endpoints should be
fingerprinted.
Authorization: establishing the cross
platform trust relationships.
Network Enforced Policy: all
elements that route and transport
endpoint traffic securely over the
infrastructure.
Analytics: Data, generated by the IoT
devices, is only valuable if the right
analytics algorithms or other
security intelligence processes are
defined to identify the threat.
Ref.:Cisco
BeyondCorp
Unprivileged Network in a
private space with limited
network services
Authenticating endpoints
Access-proxies
Access-control
Security Analytics
Ref.:Google
26
Software-Defined Perimeter
Micro-segmentation, wrapping of the critical data
27
28
The new approach & The promise of the cloud
Who is more focused on security?
30
You?
Can we catch up?
“[Google's] ability to build, organize, and operate
a huge network of servers and fiber-optic cables
with an efficiency and speed that rocks physics
on its heels.
This is what makes Google Google: its physical
network, its thousands of fiber miles, and those
many thousands of servers that, in aggregate,
add up to the mother of all clouds.”
- Wired
31
Data replication across clouds
32
Data Center
Data Center
Data Center
Data Center
Why is security so tough?
33
Data Problem: Users want to access their data anytime, from anywhere
of corporate data 

resides unprotected on PC
desktops and laptops
60%
laptop computers will 

be stolen within 12 months 

of purchase
1-out-of-10
of USB thumb drive owners report
losing them, over 60% with private
corporate data on them
66%
Takeways
34
Protect UsersProtect 

Information
Protect the 

Company
• Digitization has broken down the perimeter
• No one can be trusted
• Zero trust architecture moves the security efforts to each transaction
• Cloud architectures are the most ready to deliver on this promise
Zero-trust
35
Amazon, 107B$ Alibaba, 83B$
Zero-trust
35
Amazon, 107B$ Alibaba, 83B$
100% of their users reside in untrusted zones
Thank you!

The End of the Fortress: The new Approach to Cybersecurity