Download presentation
Presentation is loading. Please wait.
Published bySeth Bywater Modified over 9 years ago
1
Ethical Hacking Services Find holes in your network before someone else does
2
The Threat 80% of network intrusions come from insiders or former insiders It doesn’t matter how strong your firewall or how complex your encryption if an intruder has been granted access There is more to network intrusion than just the defacement of your Website Is your network prepared to withstand intrusion from someone it thinks is a friend? If your System Administrator goes “Rogue” what will you do about it? “There is nothing so likely to produce peace as to be well prepared to meet the enemy.” - George Washington
3
The Solution Ethical Hacking/ White Hat Hacking from Big Kahuna Consulting LLC Find vulnerabilities a disgruntled employee might exploit Feel confident in both meeting public privacy expectations and protecting your data Be prepared “With foxes we must play the fox.” - Thomas Fuller
4
The Process Nondisclosure agreement and contract with Big Kahuna Consulting LLC in the event sensitive data is discovered through a vulnerability Set Consultant up with standard employee access Do not inform System Admins of the Ethical Hacking arrangement Consultant spends a work week becoming familiar with the system and business process Consultant “leaves” and prepares a vulnerability report on issues discovered over the next 48 hours “I don’t want to be right. I only want to know whether I am right.” - Albert Einstein
5
Contact Chris O’Kennon Big Kahuna Consulting LLC www.okennon.com chris@okennon.com
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.