Intelligent Fin.tech Issue 01 | Page 64

EXPERT FORECAST : BANKING AND FINANCE
running peer-to-peer protocols . A vital part of any attacker ’ s kill chain is the ability to pivot from one host to another , but if you limit their ability to move easily , then you neutralise entire classes of attack . Think about how 5G architectures cut out peer-to-peer connections , forcing every call to go through a central gateway – this model should be your aim .
Hila Meller , BT Vice President Security , Americas , EMEA and APAC
3 . Focus on removing peer-topeer protocols
Segmentation is your key defence in a Zero Trust environment , but you won ’ t be able to segment your network if you ’ re
4 . Control access to core assets
Leverage your security investments to secure your cloud and data centre servers , using Zero Trust segmentation to coordinate traffic authorisations across your estate . This needs to be universal so it ’ s as watertight as possible and servers only accept traffic sent by authorised users . Consider investing in red teaming
64 www . intelligentfin . tech