Assume Breach – Jisc Security Conference
Our Senior Network Engineer Duncan Ross will be presenting at the Jisc Security Conference which runs from the 9th to 11th of November.
Duncan will be giving a presentation on the Assume Breach Strategy and how IP Performance have helped their customers’ with this approach to Cyber Security. Duncan will discuss how the strategy has been implemented with our Cyber Breach Workshop, our Swarm-SecOps security service and tools like Pentera’s Automated Security Validation platform.
So what does Assume Breach mean?
It doesn’t mean we stop trying to prevent breaches but simply means that despite the confidence we have in our defensive protections, we assume adversaries can and will find a way to penetrate security defences.
The strategy is made up of 3 core pillars War Games, Centralised logging and Monitoring and Penetration Testing.
This strategy allows defences to be seen from an attacker’s point of view and includes tests to discover and fix vulnerabilities. By taking the ‘Assume Breach’ approach, organisations are proactively putting in place technical capabilities and softer processes to ensure they can react quickly and efficiently during a cyber incident.
https://www.jisc.ac.uk/security-conference
-
‘We are really happy with the Juniper Mist solution provided by IP Performance and in fact when you look at the number of daily connections I would say it’s exceeded our expectations, for example in our Coatbridge campus the feedback from all staff and students for a number of years has been really negative regarding the Wifi but right now we currently have 600 users connected. The ability to look at the monitor and see what the trends are in terms of time-to-connect and successful connections also gives us the ability to see a problem before it impacts on a number of users. Therefore this reduces the amount of Wifi issues that are submitted to our helpdesk, so this again shows that the solution works.’
Joe Livingstone ICT Manager (Network),
New College Lanarkshire