In this webinar Professor Bart Preneel (COSIC-imec-KUL) presents how D3-PT as foundation of contact tracing apps instills trust in users and allows for cross-border interoperability.
Assume breach, Microsoft’s approach and experience on Cloud Security – Webinar 15 June 2020
15 June 2020 – Cyber Security Coalition
In their third webinar, the Cyber Security Coalition Cloud Security Focus Group had Bart Asnot (Technical Solutions Professional – Security Microsoft) explain how Microsoft looks at cloud security.
Main focus of the presentation was on Microsoft’s ‘Prevent Breach’ and ‘Assume Breach’ philosophies, both preparing for cloud security. ‘Prevent Breach’ we’re all familiar with as its goal is to keep the bad guys out. It is being realized by e.g. code reviews, security testing and techniques alike. ‘Assume Breach’, however, focusses on the preparation of your environment, people, processes and technologies to detect actual attacks and penetrations. By identifying and addressing gaps in all of these you will be able to better detect, respond and recover from attacks and penetrations.
To secure their cloud journey Microsoft adapted the Zero Trust model. Depending on the information you want to access, a specific level of trust is required before access can be granted. By evaluating the user identity requesting access, the device used to do so and the information that is to be accessed, the organizational policy decides if access can be granted and which security policy is to be enforced.
To top things off a demo illustrated some of the use cases mentioned.
Other blog posts
Jeroen Vandeleur (NVISO) gives an overview on the Cloud logging capabilities and how they can be centralized. He also conveys some additional insights on security automation for Incident Response.
In this webinar, Esteban Hernández - Security Specialist at AWS - presents the Top 10 security focus points aimed at improving a customer’s overall security posture.
In this webinar Kati Verstrepen, President of the Ligue for Human Rights, assesses the current state of the human rights in general and the right to privacy in particular. Without the right to privacy, other human rights are being eroded.
In this webinar Mathias Claes, Information Security Officer at AXA Belgium, chronicled the process of introducing cloud services, as Azure and Amazon AWS, in the transformation of AXA’s IT solutions.