Or how to learn to love the bomb

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Red Team “You keep using that word, I do not think it means what you think it means” – Inigo Montoya.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Computer Security: Principles and Practice
Controls for Information Security
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Network security policy: best practices
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Introduction to Network Defense
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
Information Security Issues at Casinos and eGaming
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
EEye Digital Security    On the Frontline of the Threat Landscape: Simple configuration goes a long way.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
IT Security – Scanning / Vulnerability Assessment David Geick State of Connecticut IT Security.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security tools for records managers Frank Rankin.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Defining your requirements for a successful security (and compliance
Proactive Incident Response
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Information Security Program
Cybersecurity - What’s Next? June 2017
Team 1 – Incident Response
Security OPS for large and small companies
Security Standard: “reasonable security”
Associate Degree in Cyber security
Compliance with hardening standards
Leverage What’s Out There
Cyber Protections: First Step, Risk Assessment
Joe, Larry, Josh, Susan, Mary, & Ken
NYBA 2017 Technology, Compliance &
Forensics Week 11.
Training the Future Cyber Security Specialist: A Novel Approach
CIS 333Competitive Success/tutorialrank.com
I have many checklists: how do I get started with cyber security?
Determined Human Adversaries: Mitigations
Making Information Security Manageable with GRC
Combining the best of Audit and Penetration Testing
Reporting personal data breaches to the ICO
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Validating Your Information Security Program (ISP 3 of 3)
Navigating Security Seas in a Small Ship with a Limited Crew
National Cyber Security
Chapter 1: Information Security Fundamentals
Cybersecurity Threat Assessment
Strategic threat assessment
Determined Human Adversaries: Mitigations
Presentation transcript:

Or how to learn to love the bomb Blue Team Or how to learn to love the bomb

About Me Long term geek 20 years law enforcement B.S. in Physics from RPI M.S. in Economic Crime Management from Utica College 4+ years Defense Industry 1.5 years with GE Avid computer gamer 6 years adjunct faculty at Utica College (Cyber Security)

Blue Team vs Red Team - Military Different sides of an exercise Often have similar attack and defend abilities & tools Old school would try to have red team simulate likely opponents tools and abilities while blue team used organizations current tools, policies, and procedures Victory was measured by capturing flags (position on a map) This is where capture the flag (CTF) comes from Sometimes victory was a single flag, other times it was score based with multiple flags possible with different values

Corporate Blue Teams Vary by business Grow organically Typically based on using internal knowledge to test defenses Primary areas: Hardening Systems Evaluating Systems Testing Systems Championing Change

System Hardening Cyber Patriot Check lists https://www.uscyberpatriot.org/ Check lists http://lmgtfy.com/?q=system+hardening+checklists Goal is to have a build method that is Quick Repeatable Explainable

Evaluating Systems Focused Attack on Services Processes Work with internal knowledge of current defenses Policies Procedures Defensive devices Response plan

Testing Systems Systems Vulnerability Announcements Hardware Software Cloud Services Mobile Services Processes Vulnerability Announcements Quickly test systems Determine ways to alert Determine ways to defend

Champions for Change Subject Matter Experts (SMEs) Identify areas where change can have greatest impact Identify areas where lack of change can cause great pain Ability to demonstrate the issue with technical testing Ability to communicate the issue to leadership Ability to accept blue team doesn’t make the business decisions

Business Value Blue team is overhead They don’t make the company money They are expense to maintain What they recommend is expensive to impliment Must market themselves to business for value Just like another company might try to entice a customer to purchase a blue team evaluation Need to demonstrate not having the function will cost more than having it Similar to insurance

Value SMEs on staff to help with incidents Identify systems that need improvements Cost of doing nothing is more expensive than finding + fixing Cost of not knowing sometimes even higher, since ignorance of something you should be aware can make your business more liable Ignorance is not a defense when it is something you should being looking at Cheapest way to reach compliance Mandated by industry or government standards Champion cultural change Champion real change

Compliance Many industries have: Finance Defense Commerce Reasonable Due Dilligence Best Practices Regulations Finance Defense Commerce Compliance is south of secure, but protects against a lot of lawsuits Often being breached creates an out of compliance condition

Blue Team Goals Be the coolest team on the map Identify areas of weakness Identify ways they can be exploited Articulate the consequences of exploitation Demonstrate the consequences of exploitation Participate in remediating risk associated with explotation Patching Monitoring Responding

Reconnaissance/Research Blue team focuses on studying their targets Research what systems are used by a business Research methods for exploiting the systems Don’t stop with just one, the goal is to identify all possible vulnerable points in a system

Penetration Blue team tactics can be Scan Targets Active/Passive Social Engineer processes Stage Exploits Internal/External Malware Carbon Low Security Hygiene

Actions on Objectives Escalate Privileges Pivot Pillage Paralyze Persistence Avoid detection Interfere with responders

Value^2 Reporting out Yes, writing report is a highly valued blue team skill No matter how good at penetrating or exploiting, the results must be conveyed to: Leadership Detection team Response team Infrastructure/network team Personnel (HR) for training opportunities

Summary Blue team is full of the smartest of the smart Experience at detection and response are good base Experience at network/system administration help They do a lot of reading They do a lot of failing They add value by preventing damage in excess to their cost They protect a company’s: Intellectual property Real property Image Biggest difference, Blue team starts with knowledge to find weaknesses

Careers on Blue Team Skills learned in Military CTF challenges DFIR challenges (Home lab?) Network admin System admin Security (Physical || Digital) Liars & cheats Programming Did I mention that GE is hiring?

Appendix: Tools Kali Linux Metasploit Nessus Nmap Webshells Malware Credential crackers/scrapers Phone (never forget the social engineering portion of testing)