Download presentation
Presentation is loading. Please wait.
1
The Value of Defense in Depth
J. Peter Bruzzese Office Servers and Services MVP Conversational Geek Nick Cavalancia Technical Evangelist Conversational Geek
2
J. Peter Bruzzese Office Servers and Services MVP (Exchange/Office 365 MVP) Certifications: Microsoft Certified Trainer Triple-MCSE (MCSE for NT 4.0/2000/2003) MCITP: Messaging (2007, 2010 and 2013) Co-Founder of ClipTraining.com and ConversationalGeek.com Technical author with over a dozen books sold internationally Technical speaker for Techmentor, Connections, MEC and TechEd/Ignite Journalist for MSExchange.org, Redmond Magazine (and others) Journalist for InfoWorld (Enterprise Windows column) and Petri.com Instructor for Pluralsight on Exchange 2010/2013/2016/O365 courses Strategic Technical Consultant for Mimecast
3
Nick Cavalancia Technical Evangelist Certifications:
MCSE/MCT/MCNE/MCNI Co-Founder of ConversationalGeek.com Founder of Techvangelism Consultant/Trainer/Speaker/Author Technical author with over a dozen books Technical speaker for Techmentor, Connections Regular speaker for 1105 Media, Penton, Spiceworks Writes, Speaks, and Blogs for some of today’s best-known tech companies
4
What is Defense in Depth?
5
We Live In A Scary World
6
Which Would YOU Rob?
7
Entry, Authentication, Control, Persistence, Stealth
THE CYBER KILL CHAIN Intrusion Kill Chain Horizontal Kill Chain Entry, Authentication, Control, Persistence, Stealth Reconnaissance Installation Delivery Weaponization Command & Control Laterally Move
8
How Secure Should You Be?
There are points of diminishing returns with bolt on security solutions that overlap, however, the majority of organizations are typically UNDER secured Would you rather be over or under secure?
9
Defense Assessment (the GATEWAY)
Does your company utilize: MDM for mobile control and security? A secure gateway solution for ? EOP/ATP or a third-party solution? Protection at the DNS level?
10
Defense Assessment (the Human)
Do you seek to improve your human firewall through: Fake phishing assessments? End user security awareness training?
11
Defense Assessment (the ENDPOINT)
Do you regularly ensure: Up-to-date patching of OS, applications, and plug-ins? Do you have solutions on the endpoint: AV Application Whitelisting (Endpoint Protection)
12
Defense Assessment (the Infrastructure)
Do you regularly ensure: You manage privileged access within your network? You have an OS patch management system in place? You are prepared to recover from a ransomware attack? (with or without paying the ransom)
13
Defense Assessment (the PRIVILEGED)
Do you have a means to protect privileged accounts: Privileged Account Management? User Behavior Analytics? Logon Monitoring?
14
FBI Report 270% increase in spear phishing attacks, has cost organizations more than $2.3 billion over the past 3 years According to Wired Magazine, Verizon Data Breach Report, IBM 2016 Cyber Security Intelligence Index - Between % of all breaches that have taken place over the last year started from Between $1.8 - $4 million is the average cost of a breach due to a spear phishing attack
15
Low Hanging Fruit A free, 1 minute, MXToolbox scan
16
Q&A Let’s hit a few questions…
Contact info:
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.