Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle.

Slides:



Advertisements
Similar presentations
Security Life Cycle for Advanced Threats
Advertisements

© 2011 Infoblox Inc. All Rights Reserved. Infoblox – control, secure & automate Mike Carroll.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Akamai DNS Offerings RSA © Conference ©2013 AKAMAI | FASTER FORWARD TM Akamai DNS Solutions Enhanced DNS (eDNS) Scalable, outsourced, DNS solution.
Protecting Commercial and Government Web Sites: The Role of Content Delivery Networks Bruce Maggs VP for Research, Akamai Technologies.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
1www.skyboxsecurity.com Skybox Cyber Security Best Practices Three steps to reduce the risk of Advanced Persistent Threats With continuing news coverage.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point DDoS Protector June 2012.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
The Way to Protect The Smartest Way to Protect Websites and Web Apps from Attacks.
Microsoft Ignite /16/2017 4:54 PM
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Registrars and Security Greg Rattray Chief Internet Security Advisor.
Jak zwiększyć bezpieczeństwo i wysoką dostępność aplikacji wg
© 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Confidential1 Doug Smith, Region Sales Mgr
SiteLock Internet Security: Big Threats for Small Business.
Adversaries in Clouds: Protecting Data in Cloud-Based Applications Nick Feamster Georgia Tech.
Beyond DDoS: Case Studies on Attack Mitigation for Financial Services Mike Kun and Patrick Laverty, Akamai CSIRT.
The Role of Content Delivery Networks in Protecting Web Sites from Attacks Bruce Maggs VP for Research, Akamai Technologies.
Norman SecureSurf Protect your users when surfing the Internet.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
SafeZone® patent pending 1 Detect. Inform. Prevent. Metcalf Attack #2 August 27, 2014 SafeZone® Detect. Inform. Prevent.
Web Application Firewall (WAF) RSA ® Conference 2013.
It’s Not Just You! Your Site Looks Down From Here Santo Hartono, ANZ Country Manager March 2014 Latest Trends in Cyber Security.
Akamai Technologies - Overview RSA ® Conference 2013.
APRICOT 2015 Security Day Cooperation between Security Teams and Network Operators: Actionable Intelligence on ShellShock Arnold S. Yoon Information Security.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
The benefits of externalizing Web DMZ-as-a-Service in the Cloud James Smith, Sr. Security Sentrix
DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor Craig Shue
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
DDOS. Methods – Syn flood – Icmp flood – udp Common amplification vectors – NTP 557 – CharGen 359 – DNS 179 – QOTD 140 – Quake 64 – SSDP 31 – Portmap28.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Internet Security Trends LACNOG 2011 Julio Arruda LATAM Engineering Manager.
1 | © 2013 Infoblox Inc. All Rights Reserved. 1 | © 2015 Infoblox Inc. All Rights Reserved. CONFIDENTIAL DNS Security with AntiDDoS and AntiMalware for.
Marin Frankovic Datacenter TSP
Evolution Director, CTO Office. Avoid data theft and downtime by extending the security perimeter outside the data-center and protect.
1 ForeScout Technologies Inc. Frontline Defense against Network Attack Tim Riley, Forescout.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Overlay Networks : An Akamai Perspective
Kona Security Solutions - Overview
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
FROM CONTINUOUS INTEGRATION TO VIRTUAL PATCHING BUILDING APPSEC ALL ALONG THE WEB APPLICATION LIFECYCLE.
Spike DDoS Toolkit A Multiplatform Botnet Threat.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Critical Security Controls
Real-time protection for web sites and web apps against ATTACKS
Cyber Security: State of the Nation
State of the Internet Security – Q2 2017
Jon Peppler, Menlo Security Channels
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Company Overview & Strategy
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
AKAMAI INTELLIGENT PLATFORM™
Managing Chaos: Data Movement in 2014 Steve Jordan
Skybox Cyber Security Best Practices
Managing IT Risk in a digital Transformation AGE
Securing web applications Externally
Presentation transcript:

Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

©2014 AKAMAI | FASTER FORWARD TM THREAT LANDSCAPE

©2014 AKAMAI | FASTER FORWARD TM Daily Attack Size 150 Gbps Source: Akamai

©2014 AKAMAI | FASTER FORWARD TM 2014e Attacks Are Growing in Size Modern attacks harness the scale of growing botnets Gbps Mpps

©2014 AKAMAI | FASTER FORWARD TM Attack Types – Last 30 Days Source: Akamai

©2014 AKAMAI | FASTER FORWARD TM Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Targeting Applications for Data Theft Increasing number of attacks focused on data and financial theft SQL injection is the primary culprit in 30% of data breaches Source: Veracode 3 out of 4 will be targeted by Web application exploits Web applications are responsible for 54% of hacking-based data breaches

©2014 AKAMAI | FASTER FORWARD TM Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Cost of Data Breach Cost per Record Breached ~$ Brand and Loyalty Impact is Significant Breaches Impact Business Operations Remediation Activity is Costly Top Executives have been Replaced Data Breach Risk Can’t be Transferred Ponemon Institute: ABCNews: Cost per Record * Number of Records = Cost of Breach

©2014 AKAMAI | FASTER FORWARD TM Attackers Using Old and New Techniques Recent Techniques Application Attack, Reconnaissance - Prolific Vulnerability Scanning Application Attack - Skipfish RFI/LFI to Compromise Host Application Attack - Injection Attacks Capacity Attack – Targeting DNS Capacity Attack - DNS Reflection & Amplification Capacity Attack – Request Floods (DirtJumper) Capacity Attack - NTP Amplification (366x amplification factor) Capacity Attack - Resource Intensive Requests (Search, Login, etc.) Extortion – DDoS Pay and Stop, for a while Fraud - Account Checkers and Harvesters Defense MUST Adapt to Evolving Landscape

©2014 AKAMAI | FASTER FORWARD TM MULTI PERIMETER

©2014 AKAMAI | FASTER FORWARD TM Application Defense

©2014 AKAMAI | FASTER FORWARD TM Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Multiple Perimeters for Internet-facing Applications Internet Web Retrieving content and data Origin Supporting infrastructure and other applications User DNS Finding the application

©2014 AKAMAI | FASTER FORWARD TM Layered Defense

©2014 AKAMAI | FASTER FORWARD TM Nine Layers of Cloud Security 1. Cloud security platform with massive scale 2. Reverse proxy automatically drops network-layer attacks 3. Geo-based blocking 4. Validating attackers against known lists 5. Adaptive rate controls provide rapid and automated response 6. Web application firewall with an Evolving Rule Set 7. Natural resiliency through caching 8. Leverage visibility of evolving attack vectors 9. Require cloud service providers to meet FedRAMP requirements

©2014 AKAMAI | FASTER FORWARD TM There are no rules of architecture for castles in the clouds. -Gilbert K. Chesterton-Gilbert K. Chesterton