Your SlideShare is downloading. ×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.

391
views

Published on

It's no secret that cybercriminals and the dynamic methods they use to do their dirty work are evolving faster than companies, governments and individuals are able to deal with them. Dexterity, …

It's no secret that cybercriminals and the dynamic methods they use to do their dirty work are evolving faster than companies, governments and individuals are able to deal with them. Dexterity, unmatched domain expertise and the element of surprise creates advantages that grow each day. But what if IT security practitioners could use that power against their enemies, Jujitsu style?

Dr. Eric Cole says this is not only possible, but it’s time to go on the offensive against attackers by using their intelligence, desire for attention, financial motivations and attack tendencies against them to strengthen your own security posture. Dr. Cole, a celebrated author, cyber security consultant for governments and the Fortune 100, and a former CIA security analyst, highlights some of the biggest IT security threats and the critical weaknesses that unleash them on corporations and governments. Cole, president of enterprise and government cyber consultancy Secure Anchor Consulting, discusses:

Two of the most widely talked about threats in 2010, the ZeuS botnet and the Stuxnet worm.

How you can fortify your defenses using the principles of Jujitsu to quickly identify your foes and neutralize them.

How these principles can help you turn the motivations of your foes against them to achieve better security.

How an integrated security information and event management (SIEM) and file integrity monitoring (FIM) solution can detect threats faster, find an attacker's footprints before a breach and seal off discovered weaknesses in real time through on demand remediation.

Published in: Technology, News & Politics

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
391
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • The War on Stupid – Dr. Eric ColeTee up your You Can’t Stop Stupid…presentation
  • Call out some of the alarming data in that presentation that showed a growth in Malware, the misconception about Apple being impervious to attack, your Trends info + Cloud vulnerability/inevitabilityCommon mistakes and how to create a process for erasing them to achieve security (continuous configuration monitoring and remediation, Finding threats in log files, maintaining a militant patch management program, a layered security approach, etc.)
  • The Dumbing Down of Cyber crime – Speak to the common believe that attackers are of a superior mind, discipline and technical acumen than those seeking to stop them; and that they’re all part of a Russian crime syndicate.Shine some light on the percentages of truly sophisticated attackers vs. sophisticated attacks by less skilled attackers (script kiddies using Zeus, etc.). a rapidly evolving cyber crime landscape that has the same behavior as an Enterprise/SMBHow can I cut costs and find the quickest way to revenue with the least amount of effort?What can I reuse/repurpose to achieve that goal?What weaknesses can companies/organizations leverage in this new model that we can exploit against attackers?
  • CYBER JUJITSU 101 – What is it? A disciplined IT Security process and practice to defend yourself against and respond to cyber threats. (KNOW YOUR OPONENT>IDENTIFY WEAKNESSES>EXPLOIT THEM>NEUTRALIZE ATTACK>GROW REPUTATION AS A TOUGHER TARGET) Common attacker behavior, persona, motivationCyber Jujitsu 101 – Counter Moves to Even the Match UpCyber Jujitsu 101 – How to spot a precursor to an attack and an attack in progressCyber Jujitsu 101 – 5 Things Attackers are Doing that they don’t want you to know aboutCyber Jujitsu 101 – 5 Things you should do right after this webcast to be ready for a cyber criminal
  • Over the last several years many organizations have put collection systems in place to meet PCI requirements. They put in log management and FIM along with other security tools. And they have been collecting a ton of data ever since. So they have plenty of data to meet compliance requirements. But the problem is they have too much data for it to be useful. And it is almost impossible to quickly know if any of the data is indicating a security issue. It’s like trying to find a single land-mine in a massive land-fill before it goes off and causes damage.
  • This is really what you want to know. 5 failed logins on its own followed by a successful login is probably a medium to low alert. In fact, this is so common it’s contributing to SIEM overload. But, getting an unrelated alert for each one of these every step along the way won’t help. We think you need this context to see all of these happening in concert so you can quickly see these complicated patterns that impact security.