practical cyber defense

19
Practical CyberDefense By Paul Dutot

Upload: paul-dutot-ieng-miet-mbcs-citp-qstm-oscp

Post on 29-Nov-2014

137 views

Category:

Internet


2 download

DESCRIPTION

This presentation was given at the CIISF Conference - "Cyber threat to opportunity: protecting your business in a changing world" held in jersey on 30th May 2014

TRANSCRIPT

Page 1: Practical Cyber Defense

Practical CyberDefense

By Paul Dutot

Page 2: Practical Cyber Defense

About me

● Co Founder of the CIISF

Practical CyberDefense

● Employed as an Ethical Security Consultant @ Logicalis Jersey

● Practice Offensive & Defensive Security for businesses at all verticals

Page 3: Practical Cyber Defense

Agenda

● Concepts I and II

Practical CyberDefense

● Stages 1-5 of a practical Cyber Defense with more demo's

● Resources

Questions at the end please

● Reverse & Bind Shells Demo

Page 4: Practical Cyber Defense

Concepts I“Attackers have months to prepare, defenders have minutes to react”

Practical CyberDefense

“This is not a security control !!!!”

vs

Page 5: Practical Cyber Defense

Concepts II“Security is a journey”

Practical CyberDefense

“What are the bad guys trying to achieve?

Page 6: Practical Cyber Defense

Reverse & Bind Shells

Practical CyberDefense

Demo

Page 7: Practical Cyber Defense

Stage 1 – Buy In

● Appoint a 'Cyber' champion

● 'C' level Buy In

● Maintain a 'Cyber' risk register

Practical CyberDefense

● Do Security Awareness

Page 8: Practical Cyber Defense

Stage 2 - Reconnaisance

Some Forgotten Ones

Practical CyberDefense

Demo

Page 9: Practical Cyber Defense

Reconnaisance Aims

Practical CyberDefense

● To profile your organsiation

● In preparation for social enginering attacks and or email phishing

Page 10: Practical Cyber Defense

Reconnaisance - Mitigation

Practical CyberDefense

● Undertake reconnaisance to find public information

● Mitigate risk by takedown and creating contray information

● Test your defenses and train your users

Page 11: Practical Cyber Defense

Phishing is a big deal !!!

Practical CyberDefense

Page 12: Practical Cyber Defense

Stage 3 – Understanding AV

Is AV really protecting us - the case for and against

Practical CyberDefense

Page 13: Practical Cyber Defense

Stage 3 – AV Bypass

Demo - The case against

Practical CyberDefense

Page 14: Practical Cyber Defense

Stage 3 – The case for

We still need AV to protect us !

Practical CyberDefense

Page 15: Practical Cyber Defense

Stage 4 – Think outside the box

● Databases – They are the end game

Practical CyberDefense

● Web applications – Owasp Top 10

● UC Communications – TDos / Toll Fraud

● Data Encryption – Laptops / Desktops / Databases

Page 16: Practical Cyber Defense

Stage 5 – It's not if but whenSIEM – Security, Information& Event Monitoring

Practical CyberDefense

Page 17: Practical Cyber Defense

Stage 5 – SIEM

OSSIM SIEM – Free open Source SIEM Demo

Practical CyberDefense

Page 18: Practical Cyber Defense

Resources

Florida State● http://www.cs.fsu.edu/~redwood/OffensiveSecurity/

Practical CyberDefense

SANS Institute● http://www.sans.org/critical-security-controls/controls/

OWASP Top 10 - 2013● https://www.owasp.org/index.php/Top_10_2013-Top_10

Page 19: Practical Cyber Defense

Thank you – Any Questions?

Blog – http://cyberkryption.com

Practical CyberDefense

@cyberkryption

[email protected]