Enabling the Secure Network Integration of LTSB and HBOS

16
Enabling the Secure Network Integration of LTSB and HBOS An Interview with Glyn Finan, Security Solution Architect of Lloyds Banking Group 06/06/2022 1

description

An interview with Glyn Finan, security solution architect of Lloyds Banking Group

Transcript of Enabling the Secure Network Integration of LTSB and HBOS

Page 1: Enabling the Secure Network Integration of LTSB and HBOS

Enabling the Secure Network Integration of LTSB and HBOS

An Interview with Glyn Finan, Security Solution Architect

of Lloyds Banking Group

04/08/2023 1

Page 2: Enabling the Secure Network Integration of LTSB and HBOS

2

Introductions

Mr. Glyn Finan Lloyds Banking Group 2009 merger of Lloyds TSB

and HBOS Largest retail bank in UK 140,000 staff 30 countries 3000 branches

Page 3: Enabling the Secure Network Integration of LTSB and HBOS

3

The 2009 Merger

Page 4: Enabling the Secure Network Integration of LTSB and HBOS

Merge two massive network infrastructures Keep the environment secure from attack Maintain business as usual Enable €2.3B savings!

Mission Impossible?

Page 5: Enabling the Secure Network Integration of LTSB and HBOS

5

The Network Audit Project

Time sensitive 6 months

Converge safely

Enable integration to save€2.3B

Examine the heritage networks Determine current risk profile Determine merger effect on risk Model the converged network

Page 6: Enabling the Secure Network Integration of LTSB and HBOS

6

Project Methodology

Network Perimeter Discovery Vulnerability Assessment

Rogue Device Detection Risk Exposure Analysis

Page 7: Enabling the Secure Network Integration of LTSB and HBOS

7

For Network Audit Project

Page 8: Enabling the Secure Network Integration of LTSB and HBOS

8

Risk Exposure Analysis

●●●

●●

● ●●●

● ●●●

●●

Page 9: Enabling the Secure Network Integration of LTSB and HBOS

9

Common Concerns

Perimeter-focused security Limited internal zoning based on

system/ data classification Need to develop network security 3-

5 year architecture blueprint Need to be able to visualise the

entire network Build knowledge of network

topology, services, security controls, potential risks

Page 10: Enabling the Secure Network Integration of LTSB and HBOS

10

Defining a New Model

Page 11: Enabling the Secure Network Integration of LTSB and HBOS

11

Results: Visibility

Assessed 250,000 endpoint devices

Extracted configurations of 450 firewalls and 9,000 routers

Network perimeter map of LTSB and HBOS networks

Detailed all ingress/ egress points

Page 12: Enabling the Secure Network Integration of LTSB and HBOS

12

Results: Security and Control

Identified and removed unauthorised devices

Critical vulnerabilities addressed Identified a more efficient

approach to remediation Missing patches Excessive services Missing services

Page 13: Enabling the Secure Network Integration of LTSB and HBOS

13

Lessons Learned

Value of proactive technologies Repository for threat, vulnerability

and remediation information Accurate view of CMDB Aggregate view of vulnerabilities

and risk profile Quantifiable information to

prioritise resources

Page 14: Enabling the Secure Network Integration of LTSB and HBOS

14

Enable New Services

Removed boundaries (de-perimeterisation)

Supports ‘consumerisation’ B2B connectivity “Defence in Depth” strategy Future-proofing the Network

Page 15: Enabling the Secure Network Integration of LTSB and HBOS

15

… and on time

Page 16: Enabling the Secure Network Integration of LTSB and HBOS

16

Thank you!