Art of Stepping on the Same Rake, Volume 2

Slides:



Advertisements
Similar presentations
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Advertisements

SPEAKER BLITZ ERIC BROWN Senior Systems Engineer NICK JAVANOVIC DoD Regional Sales Manager.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Brandon Traffanstedt Systems Engineer - Southeast
Computer Security By Duncan Hall.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
E Safety & Security Tools 13 th March 2009 Martin Quinn - The Westfield Centre.
Is Endpoint security dead?
Securing Information Systems
Protect your Digital Enterprise
Barracuda NG Firewall ™
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Securing Information Systems
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Ilija Jovičić Sophos Consultant.
Today’s cyber security landscape
Cyber Security Policy Analysts
Do you know who your employees are sharing their credentials with
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
Journey to Microsoft Secure Cloud
Real-time protection for web sites and web apps against ATTACKS
Cyber Security: State of the Nation
Compliance with hardening standards
How to build a good reputation online
What is Computer Security
Cyber Security By: Pratik Gandhi.
Complete Cloud Security
Securing Information Systems
Forensics Week 11.
Tool Server Workstation Router Universal
Virtualization & Security real solutions
Matt G change over point ?
DATA PRIVACY EMERGING TECHNOLOGIES by Virginia Mushkatblat
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
CSI Survey 2007 Tiffany Gorman
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Office 365 Security Assessment Workshop
Richard Purcell Corporate Privacy Officer Microsoft Corporation
Cyber Security Why You Should Care.
Varonis Overview.
Privacy Through Anonymous Connection and Browsing
DATA PRIVACY EMERGING TECHNOLOGIES by Virginia Mushkatblat
cyberopsalliance.com |
Intrusion Detection & Prevention
Network and Internet Security and Privacy
E-Commerce Security and Fraud Issues and Protections
National Cyber Security
Intrusion detection Lewis Knight.
David J. Carter, CISO Commonwealth Office of Technology
Brandon Traffanstedt Systems Engineer - Southeast
INFORMATION SYSTEMS SECURITY and CONTROL
NORTON.COM/SETUP – NORTON SECURITY INSTALLATION
Faculty of Science IT Department By Raz Dara MA.
Security Hardening through Awareness August 2018
Protect Your Ecommerce Site From Hacking and Fraud
Considerations for Cybersecurity and Data Security in Today’s World
Forensic and Investigative Accounting
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
Mohammad Alauthman Computer Security Mohammad Alauthman
6. Application Software Security
Cybersecurity Simplified: Phishing
SECURITY DREAMS AND NIGHTMARES
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Art of Stepping on the Same Rake, Volume 2 Hold Security, LLC Alex Holden, CISSP Chief Information Security Officer @HoldSecurity

WHO AM I AND WHY AM I HERE? Hold Security Threat Intelligence Program 5,000,000,000 stolen credentials recovered 2,000,000 site breaches identified Thousands of breaches prevented Adobe System Breach 2013 Target Brands Breach 2013 JP Morgan Chase breach 2014 Yahoo! Breach insights Insights into 60% of major security breaches since 2009

ABOUT ME 10 years CISO in a major brokerage firm Security researcher and bug hunter Pen tester and auditor Hacker Hunter

CURRENT DEFENSES Policies / Regulations End-User Protection Anti-Virus Server Defenses Spam Control Network Perimeter Firewalls IDS/IPS DLP Logging and Monitoring Awareness

WITH ALL THESE DEFENSES ARE YOU PROTECTED FROM THEM?

Defamation and Reputation Loss Stolen Secrets Stolen Data Availability WHAT IS A THREAT TO YOU? Defamation and Reputation Loss Stolen Secrets Stolen Data Availability

PERIMETER – WHO KEEPS MOVING THE CHALK OUTLINE? Brick and Mortar Cloud Vendors/Partners Employees Customers

INSIDE THE HACKER’S MIND Exploit Infect Explore Abuse Profit

EXTORTION

WHAT ABOUT ANTI VIRUS? (This screenshot has been altered for viewing purposes)

Virtual Carding Basics LEARN TO BE A HACKER Carding University Virtual Carding Basics Hacker University Job After Graduation Professor’s Insight

BLACK MARKETS ECONOMICS Supply and Demand Respect and order amongst the thieves Destroying the competition

IDENTIFYING VIABLE THREATS What is a Cyber Threat to You? Who Decides Which Threat is Viable? Do I Need to Have a Breach to React? Threats Hiding in Plain Sight

POSITIVE AND NEGATIVE BEHAVIOR MODELS Stopping Malicious Attempts Fitting Detection Model Heuristics Model Lists of Bad Things

POSITIVE BEHAVIOR REWARDED All Sins Forgiven Stolen Credentials Symbionts

ANONYMITY Hiding = blending in Sophistication and ease of use

WHAT DO HACKERS THINK ABOUT OUR DEFENSES? Don’t Read Your Disclaimers, Security Statements, or Your Audit Reports Don’t Care That You Can’t Patch Your Mission Critical System Today Don’t Get Discouraged If Your Firewall Rejected Their First Access Attempt

CREDENTIALS Topic of the day – Mega Breaches Infinite keys to a plethora of keyholes End-user re-education Authentication - Something you know - Something you have - Something you are

DEFENSE Learn about your enemy Tune your defenses toward the threat - Fantasy Football Tune your defenses toward the threat Fortify against hackers NOT auditors Make yourself an unattractive target

Viruses 0days Credentials DEFENSE 101 Viruses 0days Credentials Misconfigurations

CONCLUSIONS Hackers are winning We are improving Information stolen today may be abused today and in 2025 Defense is easy

aholden@HoldSecurity.com - www.holdsecurity.com THANK YOU Hold Security, LLC Alex Holden, CISSP aholden@HoldSecurity.com - www.holdsecurity.com