Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
{ Best Practice Why reinvent the wheel?.   Domain controllers   Member servers   Client computers   User accounts   Group accounts   OUs 
The State of Security Management By Jim Reavis January 2003.
System and Network Security Practices COEN 351 E-Commerce Security.
Chapter 7 HARDENING SERVERS.
Network Security Testing Techniques Presented By:- Sachin Vador.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Payment Card Industry (PCI) Data Security Standard
Building a Campus Dshield Randy Marchany IT Security Lab VA Tech Blacksburg, VA 24060
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Module 14: Configuring Server Security Compliance
GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Module 6: Designing Security for Network Hosts
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Frontline Enterprise Security
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Role Of Network IDS in Network Perimeter Defense.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
IS3220 Information Technology Infrastructure Security
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
A Quick Tour of Ceedo Safe Browsing and Remote Access Protection.
Critical Security Controls
Configuring Windows Firewall with Advanced Security
Your Computer Wants To Ruin Your Life
I have many checklists: how do I get started with cyber security?
Risks & Reality Cyber Security Risks & Reality
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Information Security Awareness
How to Mitigate the Consequences What are the Countermeasures?
Implementing Client Security on Windows 2000 and Windows XP Level 150
IS4680 Security Auditing for Compliance
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

Information Security In the Corporate World

About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005 Currently hold a CISSP, CEH and GPEN certifications Joined Lockheed Martin in October 2005 as an Computer System Security Analyst Supported multiple services/products such as Proxies, Firewalls, IDS/IPS, Full Disk Encryption, Log Monitoring but spent most of my career doing Vulnerability identification and management In addition to support those tools I have also acted as a Security Engineer helping to integrate security into programs and environments

Presentation Overview Understand the goal of an Information Security professional Get a baseline understanding of the phases attackers typically use Identify high level security concepts to try and reduce and eliminate attack vectors in your environment

Goals Overall our goal as an Information Security Professional is to: 1.Ensure the business is still functional 2.Eliminate risk where ever possible 3.When you cannot eliminate, mitigate it to an acceptable level 4.Document and accept known risks that cannot be eliminated

Understanding Attacks Reconnaissance Scanning and Enumerating Gain Access

Understanding Attacks Maintain Access Covering Tracks Loot and Profit

Defense in Depth Model

Unsecure System

System Hardening Patching (OS, App, DB) –Ensure all patches get applied quickly and efficiently –Setup standard outage windows for patches and other maintained –Be proactive, run vulnerability scans Anti-virus –Automate updates –Scheduled scans –Setup on access scanning

System Hardening (cont) Separation of duty –Distribute services to multiple devices –Isolate systems to different environments Simplify your systems –Disable unnecessary services –Remove unused components

System Hardening (cont) Least Privilege –Only grant accounts the privileges required to fulfill their roles. –Limit remote root or admin access Log Monitoring –Centralize and correlate your logs –Review logs daily or at least have alerts setup for specific events

System Hardening (cont) Firewalls –Place in-between trusted and untrusted environments –Configure to only allow required network traffic –Block by default (don’t send resets) IDS/IPS –Place in-between trusted and untrusted environments –Used hosted based solutions as well on high risk targets –Spend the time to configure properly, eliminate the white noise

System Hardening (cont) Proxy –Block non-business related and personal sites –Coach users when dealing with higher risk areas, like social networking sites. Full Disk Encryption –Can be coupled with auto wipe technology –Prevents data exfiltration through theft

User Hardening User awareness and training –Train users to identify social engineering and phishing attacks –Propagate cyber security awareness –Test users understanding Policies and Procedures –Document processes for standard activities –Setup guidelines for security requirements

Secure Setup

Remember You will never be 100% secure. Your job is to make compromising your systems so hard that the attacker will either look for easier prey or be forced to run exploits that are so noisy that they are detected before any harm is done.

More information Read up Intelligence-Driven Computer Network Defense and Cyber Kill Chain®: do/information-technology/cyber-security/cyber- kill-chain.html do/information-technology/cyber-security/cyber- kill-chain.html

Questions? Contact Information: