Enabling Access - Identifying enabling technology for disabled learners.
Enabling the Secure Network Integration of LTSB and HBOS
-
Upload
rien-van-den-bosch -
Category
Technology
-
view
1.520 -
download
2
description
Transcript of Enabling the Secure Network Integration of LTSB and HBOS
![Page 1: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/1.jpg)
Enabling the Secure Network Integration of LTSB and HBOS
An Interview with Glyn Finan, Security Solution Architect
of Lloyds Banking Group
04/08/2023 1
![Page 2: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/2.jpg)
2
Introductions
Mr. Glyn Finan Lloyds Banking Group 2009 merger of Lloyds TSB
and HBOS Largest retail bank in UK 140,000 staff 30 countries 3000 branches
![Page 3: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/3.jpg)
3
The 2009 Merger
![Page 4: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/4.jpg)
Merge two massive network infrastructures Keep the environment secure from attack Maintain business as usual Enable €2.3B savings!
Mission Impossible?
![Page 5: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/5.jpg)
5
The Network Audit Project
Time sensitive 6 months
Converge safely
Enable integration to save€2.3B
Examine the heritage networks Determine current risk profile Determine merger effect on risk Model the converged network
![Page 6: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/6.jpg)
6
Project Methodology
Network Perimeter Discovery Vulnerability Assessment
Rogue Device Detection Risk Exposure Analysis
![Page 7: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/7.jpg)
7
For Network Audit Project
![Page 8: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/8.jpg)
8
Risk Exposure Analysis
●●●
●
●●
●
●
●
●
●
● ●●●
●
●
●
●
●
● ●●●
●
●
●●
●
![Page 9: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/9.jpg)
9
Common Concerns
Perimeter-focused security Limited internal zoning based on
system/ data classification Need to develop network security 3-
5 year architecture blueprint Need to be able to visualise the
entire network Build knowledge of network
topology, services, security controls, potential risks
![Page 10: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/10.jpg)
10
Defining a New Model
![Page 11: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/11.jpg)
11
Results: Visibility
Assessed 250,000 endpoint devices
Extracted configurations of 450 firewalls and 9,000 routers
Network perimeter map of LTSB and HBOS networks
Detailed all ingress/ egress points
![Page 12: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/12.jpg)
12
Results: Security and Control
Identified and removed unauthorised devices
Critical vulnerabilities addressed Identified a more efficient
approach to remediation Missing patches Excessive services Missing services
![Page 13: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/13.jpg)
13
Lessons Learned
Value of proactive technologies Repository for threat, vulnerability
and remediation information Accurate view of CMDB Aggregate view of vulnerabilities
and risk profile Quantifiable information to
prioritise resources
![Page 14: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/14.jpg)
14
Enable New Services
Removed boundaries (de-perimeterisation)
Supports ‘consumerisation’ B2B connectivity “Defence in Depth” strategy Future-proofing the Network
![Page 15: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/15.jpg)
15
… and on time
![Page 16: Enabling the Secure Network Integration of LTSB and HBOS](https://reader033.fdocuments.net/reader033/viewer/2022061113/545d3cfeaf7959cd098b4a4c/html5/thumbnails/16.jpg)
16
Thank you!