Defending Enterprise IT - beating assymetricality

Claus Cramon Houmann
Claus Cramon HoumannInformation Security Consultant
Defending Enterprise IT - beating assymetricality
World’s biggest Hack? 
• They’ve lost...everything 
• Was their security ”make believe”? 
• Can they survive?
Defending enterprise IT 
- Some best practices to mitigate 
cyber attacks 
Going Above 
and Beyond Compliance 
And staying away from Slide #1
About me 
• Father of 3, happily married. I live in Luxembourg 
• Head of IT for a Bank, and also independent IT/Infosec 
consultant. Any opinions presented here are my own 
and do not represent my employer. 
• Contributor to @TheAnalogies project (making IT and 
Infosec understandable to the masses) 
• Member of the I am the Cavalry movement – trying to 
make connected devices worthy of our trust 
• @ClausHoumann 
• Find my work on slideshare
Cyber Security: 
”State of the (European) Union” 
• Threats are abundant and on the rise 
• http://map.ipviking.com/ is a good way to illustrate/visualize this 
• Existing tools, and even Next-Generation APT tools dont work: 
– Examples: https://blog.mrg-effitas.com/wp-content/ 
uploads/2014/11/Crysys_MRG_APT_detection_test_2014.pdf 
– http://archive.hack.lu/2014/Bypasss_sandboxes_for_fun.pdf
Defending Enterprise IT - beating assymetricality
Cyber Security: 
”State of the (European) Union” 
• Threats are abundant and on the rise 
• http://map.ipviking.com/ is a good way to illustrate/visualize this 
• Existing tools, and even Next-Generation APT tools dont work: 
– Examples: https://blog.mrg-effitas.com/wp-content/ 
uploads/2014/11/Crysys_MRG_APT_detection_test_2014.pdf 
– http://archive.hack.lu/2014/Bypasss_sandboxes_for_fun.pdf 
• The job of Enterprise-Defender is as much sorting through vendor bullshit, trying 
to not purchase crappy products while trying to build some actual skills 
• Tools are not the solution 
• No silver bullets exist
Infosec Vendors
Cyber Security: 
”State of the (European) Union” 
• Threats are abundant and on the rise 
• http://map.ipviking.com/ is a good way to illustrate/visualize this 
• Existing tools, and even Next-Generation APT tools dont work: 
– Examples: https://blog.mrg-effitas.com/wp-content/ 
uploads/2014/11/Crysys_MRG_APT_detection_test_2014.pdf 
– http://archive.hack.lu/2014/Bypasss_sandboxes_for_fun.pdf 
• The job of Enterprise-Defender is as much sorting through vendor bullshit, trying 
to not purchase crappy products while trying to build some actual skills 
• Tools are not the solution 
• No silver bullets exist 
• It’s an assymetrical conflict
It’s an assymetrical conflict 
X-wing
Cyber Security: 
”State of the (European) Union” 
• Threats are abundant and on the rise 
• http://map.ipviking.com/ is a good way to illustrate/visualize this 
• Existing tools, and even Next-Generation APT tools dont work: 
– Examples: https://blog.mrg-effitas.com/wp-content/ 
uploads/2014/11/Crysys_MRG_APT_detection_test_2014.pdf 
– http://archive.hack.lu/2014/Bypasss_sandboxes_for_fun.pdf 
• The job of Enterprise-Defender is as much sorting through vendor bullshit, trying 
to not purchase crappy products while trying to build some actual skills 
• Tools are not the solution 
• No silver bullets exist 
• It’s an assymetrical conflict 
• A lot of companies fail to focus on the basics 
• Train your people!
Train Harder 
And smarter
Cyber Security: 
”State of the (European) Union” 
• Threats are abundant and on the rise 
• http://map.ipviking.com/ is a good way to illustrate/visualize this 
• Existing tools, and even Next-Generation APT tools dont work: 
– Examples: https://blog.mrg-effitas.com/wp-content/ 
uploads/2014/11/Crysys_MRG_APT_detection_test_2014.pdf 
– http://archive.hack.lu/2014/Bypasss_sandboxes_for_fun.pdf 
• The job of Enterprise-Defender is as much sorting through vendor bullshit, trying 
to not purchase crappy products while trying to build some actual skills 
• Tools are not the solution 
• No silver bullets exist 
• It’s an assymetrical conflict 
• A lot of companies fail to focus on the basics 
• Train your people! 
• Do not rely on compliance for security
Compliance 
• Is 
• NOT 
• Security 
• Which any of you who ever attended a 
Security conference will have already heard 
• Compliance is preparing to fight yesteryears 
war
Want to beat assymetricality? 
Here’s how: 
• A strategic approach to security leveraging 
methods that work
Pyramids 
- This one is Joshua Cormans. 
Could be best definition of Defense-in-Depth 
Counter-measures 
Situational 
Awareness 
Operational Excellence 
Defensible Infrastructure
The Foundation 
Defensible Infrastructure 
Software and Hardware built as 
”secure by default” is ideal 
here. Rugged DevOps. 
Your choices of tech impacts 
you ever after 
You must assemble carefully, 
like Lego 
Without backdoors or Golden Keys!
Mastery 
Master all aspects of your Development, 
Operations and Outsourcing. Train like the 
Ninjas! 
DevOps (Rugged DevOps) 
Change Management 
Patch Management 
Asset Management 
Information classification & localization 
Basically, all the cornerstones of ITIL 
You name it. Master it. 
Operational Excellence
Gain the ability to handle situations correctly – Floodlights ON 
Are we affected by Poodle? Shellshock? 
WinShock? Heartbleed? Should we patch now? 
Next week? Are we under attack? Do we have 
compromised endpoint? Are there anomalies 
in our LAN traffic? 
”People don’t write software anymore, they assemble it” Quote Joshua Corman. 
-> Know which lego blocks you have in your infrastructure 
-> Actionable threat intelligence 
-> Automate as much as you can, example: IOC’s automatically fed from sources 
into SIEM with alerting on matches 
Situational 
Awareness
Counter that which you profit from 
countering 
• Decrease attacker ROI below critical threshold 
by applying countermeasures 
• Most Security tools fall within this category 
• Limit spending until you’re laid the 
foundational levels of the pyramid 
Counter-measures 
Footnote: Cyber kill chain is patented by Lockheed Martin.
Mapping to other strategic approaches 
Counter-measures 
Situational 
Awareness 
Operational Excellence 
Defensible Infrastructure 
Nigel Wilson -> 
@nigesecurityguy 
Lockheed Martin patented
Defense-in-Depth
Defensible security posture via 
@Nigethesecurityguy
Kill chain actions 
Source: Nige the security guy = 
Nigel Wilson
Defensive hot zones 
• Basketball and 
other sports 
analysis -> 
• – FIND the 
HOT zones of 
your 
opponents. 
• Defend there.
Hot zones! 
• You need to secure: 
– The (Mobile) user/ 
endpoints 
– The networks 
– Data in transit 
– The Cloud 
– Internal systems 
Sample protections added only, not the 
complete picture of course
Best Practices – High level 
• Create awareness – Security awareness training 
• Increase the security budget 
– Justify investments BEFORE the breach. 
– It’s easier when you’re actually being attacked. But 
too late. 
• Use the Cyber Kill Chain model or Nigel Wilsons 
”Defensible Security Posture” to gain capability to 
thwart attackers 
• Training, skills and people!
Hot zone 1: Endpoints 
A safe dreamworld PC 
• Microsoft EMET 5.1 
• No Java 
• No Adobe Flash Player/Reader 
• No AV (that one is for you @matalaz) 
• Kill all executable files on the Proxy layer (.exe .msi 
etc.) 
• (Not even needed but works if something evades the 
above): 
– Adblocking extension in browser 
– Invincea FreeSpace/Bromium 
Vsentry/Malwarebytes/Crowdstrike Falcon
Hot zone 1: 
A real world PC 
• Microsoft EMET 5.1 
• Java 
• Adobe Flash Player/Reader 
• AV 
• Executable files kill you, so use: 
– Adblocking extension in browser 
– Invincea FreeSpace/Bromium 
Vsentry/Malwarebytes/Crowdstrike Falcon 
– Secure Web Gateway 
– White listing, black listing 
And then cross your fingers
Hot zone 1, more 
• PC defense should include: 
– Whitelisting 
– Blacklisting 
– Sandboxing 
– Registry defenses 
– Change roll-backs 
– HIPS 
– Domain policies 
– Log collection and review 
– MFA 
– ACL’s/Firewall rules 
– Heuristics detection/prevention 
– DNS audit and protection
Hot zone 2: 
The networks 
• Baselining everything 
• Spot anomalies 
• Monitor, observe, record 
• Advanced network level tools such as 
Netwitness, FireEye, CounterAct 
• Test your network resilience/security with fx 
Ixia BreakingPoint 
• Don’t forget the insider threat
Hot zone 3+4: 
Data in Transit/Cloud 
• Trust in encryption 
• Great new mobile collaboration tools exist 
• SaaS monitoring and DLP tools exist -> 
”CloudWalls” 
• Cloudcrypters 
• And this for home study: 
https://securosis.com/blog/security-best-practices- 
for-amazon-web-services
Hot Zone 5
Best practices 
• Use EMET 
• Use advanced endpoint mitigation tools like 
Bromium Vsentry, Invincea FreeSpace, 
Malwarebytes, Crowdstrike Falcon 
• Identify potential attackers and profile them
A safe(r) perimeter defense 
• Avoid expense in depth 
• Research and find the best counter measures 
• Open Source tools can be awesome for 
example Suricata 
• Full packet capture and Deep packet 
inspection/Proxies for visibility 
• Watch and learn from attack patterns
Best practices - Mitigate risks 
Source: Dave Sweigert
Automate Threat Intelligence IOC 
• Use multiple IOC feeds 
• Automate daily: 
– IOC feed retrival, 
– Insertion into SIEM, 
– Correlation against all-time logfiles, 
– Alerting on matches 
• Example: Splunk Splice can do parts of this
Future threat trends 
• 5G: The rise of the Android DDoS’er. 1 gbit/s 
connections from phones easily hacked. Obvious 
threat? 
• IPv6 – network reconnainsance surprisingly easily 
done: https://tools.ietf.org/html/draft-ietf-opsec-ipv6- 
host-scanning-04. Damn, no security 
through obscurity to get there 
• Countering Nation State Actors becomes a MUST
And the unexpected extra win 
• Real security will actually make you compliant 
in many areas of compliance
Q & A 
• Ask me question, or I’ll ask you questions
Sources used 
– http://www.itbusinessedge.com 
– Heartbleed.com 
– https://nigesecurityguy.wordpress.com/ 
– Lockheed Martins ”Cyber Kill Chain” 
– Joshua Corman and David Etue from RSAC 2014 
”Not Go Quietly: Surprising Strategies and 
Teammates to Adapt and Overcome” 
– Lego
1 of 41

Recommended

Presentation infra and_datacentrre_dialogue_v2 by
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Claus Cramon Houmann
439 views44 slides
Keynote Information Security days Luxembourg 2015 by
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Claus Cramon Houmann
666 views43 slides
Keynote at the Cyber Security Summit Prague 2015 by
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
752 views40 slides
Mickey pacsec2016_final by
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_finalPacSecJP
1.4K views33 slides
Threat Modeling Lessons from Star Wars by
Threat Modeling Lessons from Star WarsThreat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star WarsAdam Shostack
100 views39 slides
2019 FRecure CISSP Mentor Program: Session Two by
2019 FRecure CISSP Mentor Program: Session Two2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session TwoFRSecure
994 views91 slides

More Related Content

What's hot

2020 FRSecure CISSP Mentor Program - Class 10 by
2020 FRSecure CISSP Mentor Program - Class 102020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 10FRSecure
1.4K views120 slides
2019 FRSecure CISSP Mentor Program: Class Eleven by
2019 FRSecure CISSP Mentor Program: Class Eleven2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class ElevenFRSecure
2.3K views123 slides
2019 FRSecure CISSP Mentor Program: Class One by
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class OneFRSecure
1.2K views64 slides
2020 FRsecure CISSP Mentor Program - Class 1 by
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1FRSecure
1.4K views83 slides
2020 FRSecure CISSP Mentor Program - Class 2 by
2020 FRSecure CISSP Mentor Program - Class 22020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 2FRSecure
1.1K views96 slides
What's in a Jailbreak? - BSides 2019 keynote by
What's in a Jailbreak? - BSides 2019 keynoteWhat's in a Jailbreak? - BSides 2019 keynote
What's in a Jailbreak? - BSides 2019 keynoteMarkDowd13
243 views65 slides

What's hot(20)

2020 FRSecure CISSP Mentor Program - Class 10 by FRSecure
2020 FRSecure CISSP Mentor Program - Class 102020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 10
FRSecure1.4K views
2019 FRSecure CISSP Mentor Program: Class Eleven by FRSecure
2019 FRSecure CISSP Mentor Program: Class Eleven2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven
FRSecure2.3K views
2019 FRSecure CISSP Mentor Program: Class One by FRSecure
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
FRSecure1.2K views
2020 FRsecure CISSP Mentor Program - Class 1 by FRSecure
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1
FRSecure1.4K views
2020 FRSecure CISSP Mentor Program - Class 2 by FRSecure
2020 FRSecure CISSP Mentor Program - Class 22020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 2
FRSecure1.1K views
What's in a Jailbreak? - BSides 2019 keynote by MarkDowd13
What's in a Jailbreak? - BSides 2019 keynoteWhat's in a Jailbreak? - BSides 2019 keynote
What's in a Jailbreak? - BSides 2019 keynote
MarkDowd13243 views
2019 FRSecure CISSP Mentor Program: Class Three by FRSecure
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three
FRSecure989 views
2018 CISSP Mentor Program Session 1 by FRSecure
2018 CISSP Mentor Program Session 12018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 1
FRSecure646 views
2019 FRSecure CISSP Mentor Program: Class Ten by FRSecure
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten
FRSecure791 views
2020 FRSecure CISSP Mentor Program - Class 5 by FRSecure
2020 FRSecure CISSP Mentor Program - Class 52020 FRSecure CISSP Mentor Program - Class 5
2020 FRSecure CISSP Mentor Program - Class 5
FRSecure1.6K views
2020 FRSecure CISSP Mentor Program - Class 9 by FRSecure
2020 FRSecure CISSP Mentor Program - Class 92020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 9
FRSecure1K views
2020 FRSecure CISSP Mentor Program - Class 6 by FRSecure
2020 FRSecure CISSP Mentor Program - Class 62020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 6
FRSecure1.3K views
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017 by FRSecure
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
FRSecure1.3K views
2018 FRSecure CISSP Mentor Program Session 8 by FRSecure
2018 FRSecure CISSP Mentor Program Session 82018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 8
FRSecure408 views
2020 FRSecure CISSP Mentor Program - Class 8 by FRSecure
2020 FRSecure CISSP Mentor Program - Class 82020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 8
FRSecure1.1K views
2019 FRSecure CISSP Mentor Program: Class Nine by FRSecure
2019 FRSecure CISSP Mentor Program: Class Nine2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine
FRSecure656 views
2020 FRSecure CISSP Mentor Program - Class 4 by FRSecure
2020 FRSecure CISSP Mentor Program - Class 42020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 4
FRSecure1K views

Viewers also liked

APT - Project by
APT - Project APT - Project
APT - Project Dev Lavaniya
779 views12 slides
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo... by
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...Claus Cramon Houmann
612 views32 slides
Intelligence Driven Security by
Intelligence Driven SecurityIntelligence Driven Security
Intelligence Driven SecurityMarketingArrowECS_CZ
810 views14 slides
The cavalry is us i tdays-luxembourg 2014.11.20 v1.0 by
The cavalry is us  i tdays-luxembourg 2014.11.20 v1.0The cavalry is us  i tdays-luxembourg 2014.11.20 v1.0
The cavalry is us i tdays-luxembourg 2014.11.20 v1.0Claus Cramon Houmann
262 views25 slides
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015 by
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015Claus Cramon Houmann
447 views36 slides
Next Generation Advanced Malware Detection and Defense by
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseLuca Simonelli
1.8K views30 slides

Viewers also liked(11)

Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo... by Claus Cramon Houmann
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
The cavalry is us i tdays-luxembourg 2014.11.20 v1.0 by Claus Cramon Houmann
The cavalry is us  i tdays-luxembourg 2014.11.20 v1.0The cavalry is us  i tdays-luxembourg 2014.11.20 v1.0
The cavalry is us i tdays-luxembourg 2014.11.20 v1.0
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015 by Claus Cramon Houmann
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
Next Generation Advanced Malware Detection and Defense by Luca Simonelli
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and Defense
Luca Simonelli1.8K views
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline by Lastline, Inc.
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Lastline, Inc.1.1K views
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware by Lastline, Inc.
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareUsing Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Lastline, Inc.1.5K views
Malware in the Wild: Evolving to Evade Detection by Lastline, Inc.
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade Detection
Lastline, Inc.1.8K views
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna by Lastline, Inc.
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
Lastline, Inc.1.8K views
Threat Hunting with Splunk by Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
Splunk4.3K views

Similar to Defending Enterprise IT - beating assymetricality

ISACA Ethical Hacking Presentation 10/2011 by
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011Xavier Mertens
1.6K views41 slides
Intro to INFOSEC by
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
1.2K views44 slides
Yow connected developing secure i os applications by
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applicationsmgianarakis
4.4K views77 slides
Offensive malware usage and defense by
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defenseChristiaan Beek
5.1K views42 slides
From velvet to silk there is still a lot of sweat by
From velvet to silk  there is still a lot of sweatFrom velvet to silk  there is still a lot of sweat
From velvet to silk there is still a lot of sweatStefano Maccaglia
90 views39 slides
Keeping Secrets on the Internet of Things - Mobile Web Application Security by
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKelly Robertson
869 views51 slides

Similar to Defending Enterprise IT - beating assymetricality(20)

ISACA Ethical Hacking Presentation 10/2011 by Xavier Mertens
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens1.6K views
Intro to INFOSEC by Sean Whalen
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
Sean Whalen1.2K views
Yow connected developing secure i os applications by mgianarakis
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applications
mgianarakis4.4K views
Offensive malware usage and defense by Christiaan Beek
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defense
Christiaan Beek5.1K views
From velvet to silk there is still a lot of sweat by Stefano Maccaglia
From velvet to silk  there is still a lot of sweatFrom velvet to silk  there is still a lot of sweat
From velvet to silk there is still a lot of sweat
Keeping Secrets on the Internet of Things - Mobile Web Application Security by Kelly Robertson
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Kelly Robertson869 views
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ... by Sean Whalen
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Sean Whalen1.7K views
Advanced Persistent Threats by ESET
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent Threats
ESET2.2K views
Developing A Cyber Security Incident Response Program by BGA Cyber Security
Developing A Cyber Security Incident Response ProgramDeveloping A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response Program
BGA Cyber Security2.6K views
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek... by EC-Council
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
EC-Council565 views
An Introduction To IT Security And Privacy In Libraries by Blake Carver
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
Blake Carver459 views
The Joy of Proactive Security by Andy Hoernecke
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive Security
Andy Hoernecke3.6K views
Staying safe on the internet by Arthur Landry
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
Arthur Landry271 views
AusCERT - Developing Secure iOS Applications by eightbit
AusCERT - Developing Secure iOS ApplicationsAusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applications
eightbit452 views
Prevent Getting Hacked by Using a Network Vulnerability Scanner by GFI Software
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
GFI Software1K views

Recently uploaded

Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueShapeBlue
224 views7 slides
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue by
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlueShapeBlue
152 views23 slides
"Running students' code in isolation. The hard way", Yurii Holiuk by
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk Fwdays
36 views34 slides
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineShapeBlue
225 views19 slides
MVP and prioritization.pdf by
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdfrahuldharwal141
39 views8 slides
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...Jasper Oosterveld
35 views49 slides

Recently uploaded(20)

Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue224 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue by ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue152 views
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays36 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue225 views
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
The Role of Patterns in the Era of Large Language Models by Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li91 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue247 views
The Power of Generative AI in Accelerating No Code Adoption.pdf by Saeed Al Dhaheri
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdf
Saeed Al Dhaheri39 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10146 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc176 views
Business Analyst Series 2023 - Week 4 Session 8 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10145 views
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023 by BookNet Canada
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
BookNet Canada44 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue129 views
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software184 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue141 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu437 views
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue108 views

Defending Enterprise IT - beating assymetricality

  • 2. World’s biggest Hack? • They’ve lost...everything • Was their security ”make believe”? • Can they survive?
  • 3. Defending enterprise IT - Some best practices to mitigate cyber attacks Going Above and Beyond Compliance And staying away from Slide #1
  • 4. About me • Father of 3, happily married. I live in Luxembourg • Head of IT for a Bank, and also independent IT/Infosec consultant. Any opinions presented here are my own and do not represent my employer. • Contributor to @TheAnalogies project (making IT and Infosec understandable to the masses) • Member of the I am the Cavalry movement – trying to make connected devices worthy of our trust • @ClausHoumann • Find my work on slideshare
  • 5. Cyber Security: ”State of the (European) Union” • Threats are abundant and on the rise • http://map.ipviking.com/ is a good way to illustrate/visualize this • Existing tools, and even Next-Generation APT tools dont work: – Examples: https://blog.mrg-effitas.com/wp-content/ uploads/2014/11/Crysys_MRG_APT_detection_test_2014.pdf – http://archive.hack.lu/2014/Bypasss_sandboxes_for_fun.pdf
  • 7. Cyber Security: ”State of the (European) Union” • Threats are abundant and on the rise • http://map.ipviking.com/ is a good way to illustrate/visualize this • Existing tools, and even Next-Generation APT tools dont work: – Examples: https://blog.mrg-effitas.com/wp-content/ uploads/2014/11/Crysys_MRG_APT_detection_test_2014.pdf – http://archive.hack.lu/2014/Bypasss_sandboxes_for_fun.pdf • The job of Enterprise-Defender is as much sorting through vendor bullshit, trying to not purchase crappy products while trying to build some actual skills • Tools are not the solution • No silver bullets exist
  • 9. Cyber Security: ”State of the (European) Union” • Threats are abundant and on the rise • http://map.ipviking.com/ is a good way to illustrate/visualize this • Existing tools, and even Next-Generation APT tools dont work: – Examples: https://blog.mrg-effitas.com/wp-content/ uploads/2014/11/Crysys_MRG_APT_detection_test_2014.pdf – http://archive.hack.lu/2014/Bypasss_sandboxes_for_fun.pdf • The job of Enterprise-Defender is as much sorting through vendor bullshit, trying to not purchase crappy products while trying to build some actual skills • Tools are not the solution • No silver bullets exist • It’s an assymetrical conflict
  • 10. It’s an assymetrical conflict X-wing
  • 11. Cyber Security: ”State of the (European) Union” • Threats are abundant and on the rise • http://map.ipviking.com/ is a good way to illustrate/visualize this • Existing tools, and even Next-Generation APT tools dont work: – Examples: https://blog.mrg-effitas.com/wp-content/ uploads/2014/11/Crysys_MRG_APT_detection_test_2014.pdf – http://archive.hack.lu/2014/Bypasss_sandboxes_for_fun.pdf • The job of Enterprise-Defender is as much sorting through vendor bullshit, trying to not purchase crappy products while trying to build some actual skills • Tools are not the solution • No silver bullets exist • It’s an assymetrical conflict • A lot of companies fail to focus on the basics • Train your people!
  • 12. Train Harder And smarter
  • 13. Cyber Security: ”State of the (European) Union” • Threats are abundant and on the rise • http://map.ipviking.com/ is a good way to illustrate/visualize this • Existing tools, and even Next-Generation APT tools dont work: – Examples: https://blog.mrg-effitas.com/wp-content/ uploads/2014/11/Crysys_MRG_APT_detection_test_2014.pdf – http://archive.hack.lu/2014/Bypasss_sandboxes_for_fun.pdf • The job of Enterprise-Defender is as much sorting through vendor bullshit, trying to not purchase crappy products while trying to build some actual skills • Tools are not the solution • No silver bullets exist • It’s an assymetrical conflict • A lot of companies fail to focus on the basics • Train your people! • Do not rely on compliance for security
  • 14. Compliance • Is • NOT • Security • Which any of you who ever attended a Security conference will have already heard • Compliance is preparing to fight yesteryears war
  • 15. Want to beat assymetricality? Here’s how: • A strategic approach to security leveraging methods that work
  • 16. Pyramids - This one is Joshua Cormans. Could be best definition of Defense-in-Depth Counter-measures Situational Awareness Operational Excellence Defensible Infrastructure
  • 17. The Foundation Defensible Infrastructure Software and Hardware built as ”secure by default” is ideal here. Rugged DevOps. Your choices of tech impacts you ever after You must assemble carefully, like Lego Without backdoors or Golden Keys!
  • 18. Mastery Master all aspects of your Development, Operations and Outsourcing. Train like the Ninjas! DevOps (Rugged DevOps) Change Management Patch Management Asset Management Information classification & localization Basically, all the cornerstones of ITIL You name it. Master it. Operational Excellence
  • 19. Gain the ability to handle situations correctly – Floodlights ON Are we affected by Poodle? Shellshock? WinShock? Heartbleed? Should we patch now? Next week? Are we under attack? Do we have compromised endpoint? Are there anomalies in our LAN traffic? ”People don’t write software anymore, they assemble it” Quote Joshua Corman. -> Know which lego blocks you have in your infrastructure -> Actionable threat intelligence -> Automate as much as you can, example: IOC’s automatically fed from sources into SIEM with alerting on matches Situational Awareness
  • 20. Counter that which you profit from countering • Decrease attacker ROI below critical threshold by applying countermeasures • Most Security tools fall within this category • Limit spending until you’re laid the foundational levels of the pyramid Counter-measures Footnote: Cyber kill chain is patented by Lockheed Martin.
  • 21. Mapping to other strategic approaches Counter-measures Situational Awareness Operational Excellence Defensible Infrastructure Nigel Wilson -> @nigesecurityguy Lockheed Martin patented
  • 23. Defensible security posture via @Nigethesecurityguy
  • 24. Kill chain actions Source: Nige the security guy = Nigel Wilson
  • 25. Defensive hot zones • Basketball and other sports analysis -> • – FIND the HOT zones of your opponents. • Defend there.
  • 26. Hot zones! • You need to secure: – The (Mobile) user/ endpoints – The networks – Data in transit – The Cloud – Internal systems Sample protections added only, not the complete picture of course
  • 27. Best Practices – High level • Create awareness – Security awareness training • Increase the security budget – Justify investments BEFORE the breach. – It’s easier when you’re actually being attacked. But too late. • Use the Cyber Kill Chain model or Nigel Wilsons ”Defensible Security Posture” to gain capability to thwart attackers • Training, skills and people!
  • 28. Hot zone 1: Endpoints A safe dreamworld PC • Microsoft EMET 5.1 • No Java • No Adobe Flash Player/Reader • No AV (that one is for you @matalaz) • Kill all executable files on the Proxy layer (.exe .msi etc.) • (Not even needed but works if something evades the above): – Adblocking extension in browser – Invincea FreeSpace/Bromium Vsentry/Malwarebytes/Crowdstrike Falcon
  • 29. Hot zone 1: A real world PC • Microsoft EMET 5.1 • Java • Adobe Flash Player/Reader • AV • Executable files kill you, so use: – Adblocking extension in browser – Invincea FreeSpace/Bromium Vsentry/Malwarebytes/Crowdstrike Falcon – Secure Web Gateway – White listing, black listing And then cross your fingers
  • 30. Hot zone 1, more • PC defense should include: – Whitelisting – Blacklisting – Sandboxing – Registry defenses – Change roll-backs – HIPS – Domain policies – Log collection and review – MFA – ACL’s/Firewall rules – Heuristics detection/prevention – DNS audit and protection
  • 31. Hot zone 2: The networks • Baselining everything • Spot anomalies • Monitor, observe, record • Advanced network level tools such as Netwitness, FireEye, CounterAct • Test your network resilience/security with fx Ixia BreakingPoint • Don’t forget the insider threat
  • 32. Hot zone 3+4: Data in Transit/Cloud • Trust in encryption • Great new mobile collaboration tools exist • SaaS monitoring and DLP tools exist -> ”CloudWalls” • Cloudcrypters • And this for home study: https://securosis.com/blog/security-best-practices- for-amazon-web-services
  • 34. Best practices • Use EMET • Use advanced endpoint mitigation tools like Bromium Vsentry, Invincea FreeSpace, Malwarebytes, Crowdstrike Falcon • Identify potential attackers and profile them
  • 35. A safe(r) perimeter defense • Avoid expense in depth • Research and find the best counter measures • Open Source tools can be awesome for example Suricata • Full packet capture and Deep packet inspection/Proxies for visibility • Watch and learn from attack patterns
  • 36. Best practices - Mitigate risks Source: Dave Sweigert
  • 37. Automate Threat Intelligence IOC • Use multiple IOC feeds • Automate daily: – IOC feed retrival, – Insertion into SIEM, – Correlation against all-time logfiles, – Alerting on matches • Example: Splunk Splice can do parts of this
  • 38. Future threat trends • 5G: The rise of the Android DDoS’er. 1 gbit/s connections from phones easily hacked. Obvious threat? • IPv6 – network reconnainsance surprisingly easily done: https://tools.ietf.org/html/draft-ietf-opsec-ipv6- host-scanning-04. Damn, no security through obscurity to get there • Countering Nation State Actors becomes a MUST
  • 39. And the unexpected extra win • Real security will actually make you compliant in many areas of compliance
  • 40. Q & A • Ask me question, or I’ll ask you questions
  • 41. Sources used – http://www.itbusinessedge.com – Heartbleed.com – https://nigesecurityguy.wordpress.com/ – Lockheed Martins ”Cyber Kill Chain” – Joshua Corman and David Etue from RSAC 2014 ”Not Go Quietly: Surprising Strategies and Teammates to Adapt and Overcome” – Lego

Editor's Notes

  1. Or join these
  2. The Egyptians built their pyramids from the bottom up. Because, that’s how you build pyramids. Start there!
  3. Laying a secure foundation matters supremely. History proves this
  4. As with any art, practice makes master. So, Practice!
  5. Automation is key for threat intelligence, threat detection and threat remediation
  6. Dont start by blindly buying tools, do the basics, master it and work from there
  7. In reality, you will have AV, Java and others. And you probably cannot enforce killing all executables
  8. In reality, you will have AV, Java and others. And you probably cannot enforce killing all executables
  9. In reality, you will have AV, Java and others. And you probably cannot enforce killing all executables
  10. In reality, you will have AV, Java and others. And you probably cannot enforce killing all executables