Honeypots and Automation

Slides:



Advertisements
Similar presentations
1 © Copyright, Risk Masters, Inc All rights reserved.Draft for Discussion Purposes Only RMI Risk Masters, Inc. Emerging Trends in Cyber-Security.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
1© Copyright 2011 EMC Corporation. All rights reserved. Advanced Persistent Threat Sachin Deshmanya & Srinivas Matta.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 1 Computer Networks and the Internet. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 1-2.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Leveraging Information to Detect and Prevent Insider Attacks Phoram Mehta Senior.
VMware NSX and Micro-Segmentation
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
The Changing World of Endpoint Protection
IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,
CHALLENGES OF MANAGING STATE DATA SYSTEMS. 70CONTRIBUTINGORGANIZATIONS 79,790 SECURITY INCIDENTS 2,122 CONFIRMED DATA BREACHES 61 COUNTRIES REPRESENTED.
Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc.
Scott Teeters, Jr. MicroSolved, Inc. in partnership with Sogeti USA How to Fail A Penetration Test Concepts in Securing a Network.
“When combining the results from all four AV engines, less than 40% of the binaries were detected.” Source: CAMP: Content-Agnostic Malware Protection.
Sky Advanced Threat Prevention
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
MIS323 – Business Telecommunications Chapter 10 Security.
How to Make Cyber Threat Intelligence Actionable
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
By: Surapheal Belay ITEC 6322 / Spring ABSTRACT NIST , guide to intrusion detection and prevention systems (IDPS), discusses four types of.
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Today’s cyber security landscape
Design for Security Pepper.
The next frontier in Endpoint security
Faizel Lakhani | President & COO
How Seculert Discovered the Shamoon Malware
VMware NSX and Micro-Segmentation
Cyber attacks on Democratic processes
How to build a defense-in-depth
Intrusion Detection Systems (IDS)
Four Generations of Security Devices Putting IDS in Context
Chapter 9 E-Commerce Security and Fraud Protection
The Next Generation Cyber Security in the 4th Industrial Revolution
Intrusion Prevention Systems
Security Use Case Description Public charter schools serving grades K-12. Operates 40 schools and serves over 16,000 students and over 2,000 teachers.
Cyber Security Challenges
Cyber Security - Protecting Information
Copyright © 2012, Elsevier Inc. All rights Reserved.
The University of Adelaide, School of Computer Science
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
The University of Adelaide, School of Computer Science
Copyright © 2014, 2000, 1992 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
Information Protection
The University of Adelaide, School of Computer Science
Honeypots Visit for more Learning Resources 1.
Section 10.5 The Dot Product
Modeling Functionality with Use Cases
Copyright © 2012, Elsevier Inc. All rights Reserved.
The University of Adelaide, School of Computer Science
The Zero-Trust Model Redefining InfoSec.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Security intelligence: solving the puzzle for actionable insight
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 78 Vaccination and Screening in Cervical Cancer
Information Protection
Toward Distributed and Virtualized Enterprise Security
Presentation transcript:

Honeypots and Automation Adam Luck Copyright 2015, all rights reserved

Who am I? Adam Luck Senior Engineer - MicroSolved, Inc. Graduated from Ohio University

Why use Honeypots and Automation? “Set it and forget it” No reliance on signatures Everything alert is actionable

What can I discover? Insider Threats Uncategorized Malware 0-Day Exploits Phishing Campaigns

Prevention vs Detection Traditional methods are failing Redefined network perimeter “Un-hackable” systems and networks Often takes orgs months to discover attacks Still easy to hack a human

Low Interaction vs. High Interaction Do you just want to detect an attack? Are you more interested in learning about the attacker’s methods?

Honeypot Placement and Design Services Applications Critical network segments Internet exposure?

Example: DNS Sinkhole

Example: Retail POS

Example: M&A

Example: Automated Egress Log Review

More Information & Questions Email: aluck@microsolved.com Twitter: @AdamJLuck More information: stateofsecurity.com & microsolved.com Copyright MicroSolved, Inc. 2015, all rights reserved