2018 AFCEA TechNet Asia-Pacific Conference & Expo

Trusted Systems TechTalk: "Network Physical Security Shortcomings at the Endpoint" (Room Iolani 3 & 4)

14 Nov 18
9:15 AM - 10:15 AM

Tracks: Continuing Education, TechTalks

Approved for 1 CompTIA CEU for A+, Network+, Security+, CASP, CySA+ and Cloud+; 1 GIAC CPE; 1  Logical Operations CEC

There exists a major loophole at the network endpoint from the wall to the desktop that cybersecurity does not address. Physical security of network and terminal hardware and its user interface has been ignored in policy and practice enabling catastrophic breaches from insider threats, most notably Manning and Snowden.

This session focuses on the need for convergence between physical security and cybersecurity to thwart emerging insider threats. It reviews the background of information technology, existing policies, or lack thereof, and the shortcomings of traditional physical security countermeasures as it relates to both host and endpoint security, and everything in between. Discussions shall analyze various aspects of the problem, risk factors, vulnerabilities and threat vectors affected by network architectures, applications, ergonomics and human interaction, inadequate policies, and facility/environmental issues. Solution discussions will focus on security in depth with an emphasis on physical security integration offering alternative countermeasures to give the IT security professional the knowledge and tools to address the insider threat from an “outside in” perspective to complement that of cybersecurity’s “inside out” approach.

To facilitate the review request for CompTIA Security+ CEU accreditation, following is a breakdown of the exam objectives detailing the topics for discussion concentrating on physical security issues at the network endpoint.
1.0 Network Security
1.3 Defense in Depth integrating endpoint solutions for device and user access control
2.0 Compliance and Operational Security
2.1 Physical security considerations for risk assessment, avoidance, management & mitigation
Importance of expanding security policy to the desktop
2.2 Physical security solutions with modularity applicable to government and 3rd parties alike
Understanding policy differences with 3rd parties, what’s covered and what’s not
2.6 How enhanced physical security constraints increase security awareness and controls user habits
2.7 In-depth analysis of physical security & environmental controls and latest innovations to the endpoint
3.0 Threats and Vulnerabilities
3.2 Address attack vectors from a hardware perspective that impacts the endpoint
3.6 Expand to include intrusion prevention techniques, continuous monitoring and hardening solutions
4.0 Application, Data and Host Security
4.3 Enhance hardware security to protect network and terminal devices & automate patch management
5.0 Access Control and Identity Management
5.2 Explore authentication & access control innovations to protect network access and terminal devices

To summarize, attendees shall receive an in-depth discussion of policies, practices and solutions pertaining to the need to better incorporate physical security into the cybersecurity framework, particularly to protect network and terminal devices from unauthorized access at the endpoint, whether the threat is accidental or intentional.