2015-02-26 securing your network perimeter
TRANSCRIPT
Thrive. Grow. Achieve.
Securing Your IT Perimeter
Nate Solloway and Jeffrey Mullenix February 26 , 2015
WHAT’S ON TAP?
• What is my Perimeter?
• Common Vulnerabilities
• How do I protect myself?
• Routers and Firewalls
• Wireless and Guest Access
• Remote Access
• Q&A
2
WHAT IS MY PERIMETER?
3
OR DOES IT LOOK LIKE THIS?
4
COMMON VULNERABILITIES
5
OPEN PORTS
PEOPLE
LAZY SOFTWARE PATCHING
PEOPLE
OUT DATE AV/IDS
PEOPLE
LAZY PROCESSES FOR CRITICAL AUTHENTICATION (BANKS, TRANSFERS)
PEOPLE
HOW THE BAD GUYS EXPLOIT THEM
6
HOW DO I PROTECT MYSELF?
7
8
MINIMIZING OPEN PORTS
- FEWER SERVICES?
- MAYBE THE CLOUD
PEOPLE
- LET’S GET BACK TO THIS ONE
AGGRESSIVE SOFTWARE PATCHING
- SERVERS
- WORKSTATIONS
- APPS
AV VS IDS
AUTHENTICATION
PEOPLE
SELECTING A FIREWALL/ROUTER
9
10
CUSTOM ADDRESS OBJECTS
11
CUSTOM SERVICES
12
CUSTOM SERVICES
13
WIRELESS: STAFF VS GUESTS
14
REMOTE DESKTOP VS VPN
15
QUESTIONS?
1
Seth Zarny – Partner
Nate Solloway – Manager
Jeffrey Mullenix – Network Engineer