Download presentation
Presentation is loading. Please wait.
1
Art of Stepping on the Same Rake, Volume 2
Hold Security, LLC Alex Holden, CISSP Chief Information Security Officer @HoldSecurity
2
WHO AM I AND WHY AM I HERE? Hold Security Threat Intelligence Program
5,000,000,000 stolen credentials recovered 2,000,000 site breaches identified Thousands of breaches prevented Adobe System Breach 2013 Target Brands Breach 2013 JP Morgan Chase breach 2014 Yahoo! Breach insights Insights into 60% of major security breaches since 2009
3
ABOUT ME 10 years CISO in a major brokerage firm
Security researcher and bug hunter Pen tester and auditor Hacker Hunter
4
CURRENT DEFENSES Policies / Regulations End-User Protection Anti-Virus
Server Defenses Spam Control Network Perimeter Firewalls IDS/IPS DLP Logging and Monitoring Awareness
5
WITH ALL THESE DEFENSES ARE YOU PROTECTED FROM THEM?
6
Defamation and Reputation Loss Stolen Secrets Stolen Data Availability
WHAT IS A THREAT TO YOU? Defamation and Reputation Loss Stolen Secrets Stolen Data Availability
7
PERIMETER – WHO KEEPS MOVING THE CHALK OUTLINE?
Brick and Mortar Cloud Vendors/Partners Employees Customers
8
INSIDE THE HACKER’S MIND
Exploit Infect Explore Abuse Profit
9
EXTORTION
10
WHAT ABOUT ANTI VIRUS? (This screenshot has been altered for viewing purposes)
11
Virtual Carding Basics
LEARN TO BE A HACKER Carding University Virtual Carding Basics Hacker University Job After Graduation Professor’s Insight
12
BLACK MARKETS ECONOMICS
Supply and Demand Respect and order amongst the thieves Destroying the competition
13
IDENTIFYING VIABLE THREATS
What is a Cyber Threat to You? Who Decides Which Threat is Viable? Do I Need to Have a Breach to React? Threats Hiding in Plain Sight
14
POSITIVE AND NEGATIVE BEHAVIOR MODELS
Stopping Malicious Attempts Fitting Detection Model Heuristics Model Lists of Bad Things
15
POSITIVE BEHAVIOR REWARDED
All Sins Forgiven Stolen Credentials Symbionts
16
ANONYMITY Hiding = blending in Sophistication and ease of use
17
WHAT DO HACKERS THINK ABOUT OUR DEFENSES?
Don’t Read Your Disclaimers, Security Statements, or Your Audit Reports Don’t Care That You Can’t Patch Your Mission Critical System Today Don’t Get Discouraged If Your Firewall Rejected Their First Access Attempt
18
CREDENTIALS Topic of the day – Mega Breaches
Infinite keys to a plethora of keyholes End-user re-education Authentication - Something you know - Something you have - Something you are
19
DEFENSE Learn about your enemy Tune your defenses toward the threat
- Fantasy Football Tune your defenses toward the threat Fortify against hackers NOT auditors Make yourself an unattractive target
20
Viruses 0days Credentials
DEFENSE 101 Viruses 0days Credentials Misconfigurations
21
CONCLUSIONS Hackers are winning We are improving
Information stolen today may be abused today and in 2025 Defense is easy
22
aholden@HoldSecurity.com - www.holdsecurity.com
THANK YOU Hold Security, LLC Alex Holden, CISSP -
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.