Assume Breach Strategy presentation – Jisc Security Conference 2021
Our Senior Network Engineer Duncan Ross recently presented on day 2 of the virtual Jisc Security Conference 2021, which ran 9th – 11th November 2021.
Duncan delivered an insightful presentation on the Assume Breach Strategy, and explained how IP Performance have helped their customers to implement this approach to Cyber Security.
Duncan discussed how the strategy has been incorporated into our SOCITM-approved Cyber Breach Workshop, our Swarm-SecOps security service and also specialised tools from our wider vendor portfolio such as Pentera’s Automated Security Validation platform. You can watch a recording of the presentation below:
So, what does Assume Breach mean?
It simply means that despite the confidence we have in our defensive protections, we assume adversaries and malicious actors can and will find a way to penetrate security defences, and then plan accordingly.
The strategy is comprised of 3 core pillars – War Games, Centralised Logging & Monitoring and Penetration Testing.
The Assume Breach Strategy enables security defences to be seen and evaluated from an attacker’s perspective, and includes penetration testing alongside other security tests to both discover and fix security vulnerabilities. By taking the ‘Assume Breach’ approach, organisations can proactively design and implement improved technical capabilities and also softer processes, enabling them to react quickly and efficiently during a (likely inevitable) cyber security or breach incident.
Please get in touch below, our friendly team of security experts will be pleased to explain how you and your organisation can also benefit from the assume breach methodology:
-
Ivanti Traffic Manager fitted effortlessly into our web infrastructure and we are already seeing the benefits. One key advantage is the GUI which provides instant visibility of any problems.
Mark Neilson – Infrastructure Manager,
Newport City Council