SlideShare a Scribd company logo
1 of 44
Download to read offline
Improving your organisation’s security
24/04/2019
Red teaming: Going beyond pen testing
Kiwicon III Poster, kiwicon.org
Hackers don’t care
Never bring a knife to a gunfight
The Untouchables (1987), Paramount Pictures
The world ain't all sunshine and rainbows
Rocky (1976), Chartoff-Winkler Productions
Red teaming: Going beyond pen testing
5
Experience
• 6 years of Information Security experience.
• OP24’s Offensive Security team Ghost Labs.
• Specializes in Social Engineering and OSINT:
• Phishing
• Physical penetration testing
• Intelligence Gathering
• Masters of Science (MSc) - Information Studies.
• Bachelor of ICT (BICT) – IT Management.
• CISM & ISO27001 Foundation certified.
Hugo van den Toorn
Manager OffSec | Ethical Hacker | Red Teamer
“A bug is never just a mistake. It represents
something bigger. An error of thinking that makes
you who you are.”
- Elliot, Mr Robot
Reality of hacking
Security breaches last year
Red teaming: Going beyond pen testing
7
Patterns in used attack vectors leading up incidents
Verizon Data Breach Investigations Report 2018
Security breaches last year
Red teaming: Going beyond pen testing
8
Web applications involved in breaches per industry
Verizon Data Breach Investigations Report 2018
What is a hacker?
Red teaming: Going beyond pen testing
Definition by Bruce Schneier (Secrets and Lies, 2000)
A hacker is someone who thinks outside the box. It's
someone who discards conventional wisdom, and does
something else instead. It's someone who looks at the
edge and wonders what's beyond. It's someone who sees
a set of rules and wonders what happens if you don't
follow them. A hacker is someone who experiments with
the limitations of systems for intellectual curiosity.
Blackhat Grayhat Whitehat
Hacking is never ‘just’ cyber
Red teaming: Going beyond pen testing
Human
Physical Cyber
Hacking is never ‘just’ cyber
Red teaming: Going beyond pen testing
Human
Physical Cyber
Hackers
Ransomware
Malware
Espionage
Alarm systems
Access Controls
Camera systems
Domotics/smart systems
Phishing
Social engineering
Bribery/blackmail
Disgruntlement
Hacking is never ‘just’ cyber
Red teaming: Going beyond pen testing
Human
Physical Cyber
Red Teaming Objective based Attack scenarios
Hacking is never ‘just’ cyber
Red teaming: Going beyond pen testing
Human
Physical Cyber
Red Teaming Objective based Attack scenarios
Threat IntelligenceAdversarial TTPs Blue Team Defences
Understanding your adversary
Red teaming: Going beyond pen testing
Telling Showing Involving
Threat Intel SecOps Red vs Blue
Kiwicon III Poster, kiwicon.org
Hackers don’t care
The goal here isn't 100% perfect security, but rather
adequate security at a reasonable cost.
- Bruce Schneier (Secrets and Lies, 2000)
Reality of life
There are known knowns: there are things we know we know.
We also know there are known unknowns; that is to say we know there are some
things we do not know.
But there are also unknown unknowns – the ones we don't know we don't know.
- Donald Rumsfeld, United States Secretary of Defense
Reality of life
Reality of life
Unless you can predict the future…
Rear Admiral Harry E. Yarnell demonstrated in 1932 the effectiveness
of an attack on Pearl Harbor almost exactly showing how the tactics of
the Japanese would destroy the fleet in Harbor nine years later.
Reality of life
Rear Admiral Harry E. Yarnell demonstrated in 1932 the effectiveness
of an attack on Pearl Harbor almost exactly showing how the tactics of
the Japanese would destroy the fleet in Harbor nine years later.
Fleet Problem XIII
“It is doubtful if air attacks can be launched against Oahu in the face of
strong defensive aviation without subjecting the attacking carriers to
the danger of material damage and consequent great losses in the
attack air force.”
Reality of life
Reality of (Cyber) Security
Attacks are becoming
more sophisticated and
attack surfaces grow
Compliance is driving
security requirements as
breaches increase
‘Unknown unknowns’
are a concern, but
difficult to identify
Attackers will not limit
themselves to ‘cyber’
elements of the target
Reality of (Cyber) Security
Attacks are becoming
more sophisticated and
attack surfaces grow
Compliance is driving
security requirements as
breaches increase
‘Unknown unknowns’
are a concern, but
difficult to identify
Attackers will not limit
themselves to ‘cyber’
elements of the target
Vulnerability management & pen testing is just the beginning
Lets play a game!
Settlers of Catan game, Dailydot.com
Red teaming: Going beyond pen testing
Crown
Jewels
StaffData
Center
Branches
& Stores
Network Computers
Office
Building
Ext. Staff
PhoneWi-Fi
Web App
Peripherals‘The Cloud’
The world ain't all sunshine and rainbows
Rocky (1976), Chartoff-Winkler Productions
100% security?
Red teaming: Going beyond pen testing
27
• Secure development
• Web application testing
• Responsible disclosure
• Updates
• Vulnerability Scanning
• Preventing physical access
• Always the weakest link (no patches)
• Security awareness training
• Get missing knowledge
VulnerabilityManagement
RedTeaming
Testing assumptions
PentestConfigReviewAwareness
PatchingPatching
Policies
100% security?
Red teaming: Going beyond pen testing
28
• Secure development
• Web application testing
• Responsible disclosure
• Updates
• Vulnerability Scanning
• Preventing physical access
• Always the weakest link (no patches)
• Security awareness training
• Get missing knowledge
VulnerabilityManagement
RedTeaming
Testing assumptions
PentestConfigReviewAwareness
PatchingPatching
Policies
100% security?
Red teaming: Going beyond pen testing
29
• Secure development
• Web application testing
• Responsible disclosure
• Updates
• Vulnerability Scanning
• Preventing physical access
• Always the weakest link (no patches)
• Security awareness training
• Get missing knowledge
VulnerabilityManagement
RedTeaming
Testing assumptions
PentestConfigReviewAwareness
PatchingPatching
Policies
100% security?
Red teaming: Going beyond pen testing
30
• Secure development
• Web application testing
• Responsible disclosure
• Updates
• Vulnerability Scanning
• Preventing physical access
• Always the weakest link (no patches)
• Security awareness training
• Get missing knowledge
VulnerabilityManagement
RedTeaming
Testing assumptions
PentestConfigReviewAwareness
PatchingPatching
Policies
100% security?
Red teaming: Going beyond pen testing
31
• Secure development
• Web application testing
• Responsible disclosure
• Updates
• Vulnerability Scanning
• Preventing physical access
• Always the weakest link (no patches)
• Security awareness training
• Get missing knowledge
VulnerabilityManagement
RedTeaming
Testing assumptions
PentestConfigReviewAwareness
PatchingPatching
Policies
Red teaming: Going beyond pen testing
Crown
Jewels
StaffData
Center
Branches
& Stores
Network Computers
Office
Building
Ext. Staff
PhoneWi-Fi
Web App
Peripherals‘The Cloud’
Red teaming: Going beyond pen testing
Crown
Jewels
StaffData
Center
Branches
& Stores
Network Computers
Office
Building
Ext. Staff
PhoneWi-Fi
Web App
Peripherals‘The Cloud’
Physical
Pentest
Social
Engineer.
Phishing
Wi-Fi
Test
WebApp
Pentest
Vishing/
Smishing
Network
Exploit.
Cloud
Assess.
Config
Review
Vuln.
Mgmt
Red teaming: Going beyond pen testing
Crown
Jewels
StaffData
Center
Branches
& Stores
Network Computers
Office
Building
Ext. Staff
PhoneWi-Fi
Web App
Peripherals‘The Cloud’
Physical
Pentest
Social
Engineer.
Phishing
Wi-Fi
Test
WebApp
Pentest
Vishing/
Smishing
Network
Exploit.
Cloud
Assess.
Config
Review
Vuln.
Mgmt
Threat
hunting
Security
Awareness
Physical
Security
IDS
IPS
Secure
Develop.
Endpoint
Security
Threat
Intel
How do we become more secure?
Red teaming: Going beyond pen testing
35
• How to take security to the next level?
• Value of paper based compliance?
• Can we identify unknown unknowns?
• How secure are we really?
Red Teaming == Testing your assumptions
Initial
Established
Self-Assessed
Integrated
Vanguard
Security level Assumptions
Based on Community Cyber Security Maturity Model (CCSMM)
http://cias.utsa.edu/the-ccsmm.html
Organization’s security maturity level
Security Operations, Monitoring, IR, Red Teaming
Policies
Ad-hoc Security Awareness, Vulnerability Assessment
Security promotion, Business continuity, Penetration testing
Formal (security) processes, Continuous testing
Never bring a knife to a gunfight
The Untouchables (1987), Paramount Pictures
Legislation (to punish and/or aid us)
Red teaming: Going beyond pen testing
EU wide GDPR is a driver to perform more (in-depth)
testing.
37
In addition to the impact of a potential breach, GDPR also
means a fine can be sanctioned if insufficient security
measures are taken. Organizations in breach of GDPR can be
fined up to 4% of annual global turnover or €20 million
(whichever is greater). (EU GDPR)
Legislation (to punish and/or aid us)
Red teaming: Going beyond pen testing
EU wide GDPR is a driver to perform more (in-depth)
testing.
UK: CBEST (Bank of England)
NL: TIBER (Dutch National Bank)
EU: TIBER (European Central Bank)
38
Threat Intelligence-Based Ethical Red Teaming
“In collaboration with institutions comprising the Dutch financial
core payment infrastructure, DNB has prepared a guide for
further improvement of the sector's protection against
cyberattacks by means of red team testing.
(…)
Its purpose is to enhance our country's financial core
institutions' cyber resilience by learning from each other's best
practices.”
- Dnb.nl (16 November 2017)
How do we become more secure?
Red teaming: Going beyond pen testing
39
It is not necessarily about being secure or
compliant, but about:
• Being proactive;
• Being able to withstand and respond;
• Understanding your key risk areas;
• Risk appetite;
• Applying the right measures.
• “The goal here isn't 100% perfect security, but
rather adequate security at a reasonable cost.”
Secure yourself,
Protect your customers,
Be the best at what you do (securely),
Make the world a better place.
How do we become more secure?
Red teaming: Going beyond pen testing
40
It is not necessarily about being secure or
compliant, but about:
• Being proactive;
• Being able to withstand and respond;
• Understanding your key risk areas;
• Risk appetite;
• Applying the right measures.
• “The goal here isn't 100% perfect security, but
rather adequate security at a reasonable cost.”
Secure yourself,
Protect your customers,
Be the best at what you do (securely),
Make the world a better place.
How do we become more secure?
Red teaming: Going beyond pen testing
41
Accept that:
• You might not like the results.
• You hire experts to help your organization.
• With growth comes pain.
• A Red Team will see you at your worst.
Secure yourself,
Protect your customers,
Be the best at what you do (securely),
Make the world a better place.
Hackers never bring sunshine and rainbows
Outpost24 webinar - Improve your organizations security with red teaming

More Related Content

What's hot

Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?marketingunitrends
 
Outpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface managementOutpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface managementOutpost24
 
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
Outpost24 webinar - Enhance user security to stop the cyber-attack cycleOutpost24 webinar - Enhance user security to stop the cyber-attack cycle
Outpost24 webinar - Enhance user security to stop the cyber-attack cycleOutpost24
 
Outpost24 Webinar - Five steps to build a killer Application Security Program
Outpost24 Webinar - Five steps to build a killer Application Security ProgramOutpost24 Webinar - Five steps to build a killer Application Security Program
Outpost24 Webinar - Five steps to build a killer Application Security ProgramOutpost24
 
The state of endpoint defense in 2021
The state of endpoint defense in 2021The state of endpoint defense in 2021
The state of endpoint defense in 2021Adrian Sanabria
 
Cybersecurity on Business Resilience
Cybersecurity on Business ResilienceCybersecurity on Business Resilience
Cybersecurity on Business ResiliencePECB
 
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.marketingunitrends
 
Security Operations and Response
Security Operations and ResponseSecurity Operations and Response
Security Operations and Responsexband
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...James Anderson
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...SaraPia5
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...Outpost24
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Lancope, Inc.
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryQuest
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeMeet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeDragos, Inc.
 
Why does security matter for devops by Caroline Wong
Why does security matter for devops by Caroline WongWhy does security matter for devops by Caroline Wong
Why does security matter for devops by Caroline WongDevSecCon
 
Cyber Intelligence Operations Center
Cyber Intelligence Operations CenterCyber Intelligence Operations Center
Cyber Intelligence Operations CenterBill Ross
 

What's hot (20)

Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
 
Outpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface managementOutpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface management
 
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
Outpost24 webinar - Enhance user security to stop the cyber-attack cycleOutpost24 webinar - Enhance user security to stop the cyber-attack cycle
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
 
Outpost24 Webinar - Five steps to build a killer Application Security Program
Outpost24 Webinar - Five steps to build a killer Application Security ProgramOutpost24 Webinar - Five steps to build a killer Application Security Program
Outpost24 Webinar - Five steps to build a killer Application Security Program
 
The state of endpoint defense in 2021
The state of endpoint defense in 2021The state of endpoint defense in 2021
The state of endpoint defense in 2021
 
Cybersecurity on Business Resilience
Cybersecurity on Business ResilienceCybersecurity on Business Resilience
Cybersecurity on Business Resilience
 
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
Security Operations and Response
Security Operations and ResponseSecurity Operations and Response
Security Operations and Response
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeMeet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
 
Why does security matter for devops by Caroline Wong
Why does security matter for devops by Caroline WongWhy does security matter for devops by Caroline Wong
Why does security matter for devops by Caroline Wong
 
Cyber Intelligence Operations Center
Cyber Intelligence Operations CenterCyber Intelligence Operations Center
Cyber Intelligence Operations Center
 

Similar to Outpost24 webinar - Improve your organizations security with red teaming

CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziNCCOMMS
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018Panda Security
 
huntpedia.pdf
huntpedia.pdfhuntpedia.pdf
huntpedia.pdfCecilSu
 
Huntpedia
HuntpediaHuntpedia
HuntpediaJc Sv
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
 
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24
 
Cyber security Guide
Cyber security GuideCyber security Guide
Cyber security GuideIla Group
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial SectorLIFARS
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015Andreas Sfakianakis
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...North Texas Chapter of the ISSA
 
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxOlusegun Mosugu
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 

Similar to Outpost24 webinar - Improve your organizations security with red teaming (20)

CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
huntpedia.pdf
huntpedia.pdfhuntpedia.pdf
huntpedia.pdf
 
Huntpedia
HuntpediaHuntpedia
Huntpedia
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
 
Cyber security Guide
Cyber security GuideCyber security Guide
Cyber security Guide
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
 
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 

More from Outpost24

Outpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24 webinar - A fresh look into the underground card shop ecosystemOutpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24 webinar - A fresh look into the underground card shop ecosystemOutpost24
 
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24 webinar Why API security matters and how to get it right.pdfOutpost24 webinar Why API security matters and how to get it right.pdf
Outpost24 webinar Why API security matters and how to get it right.pdfOutpost24
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24
 
Outpost24 webinar - How to protect your organization from credential theft
Outpost24 webinar - How to protect your organization from credential theftOutpost24 webinar - How to protect your organization from credential theft
Outpost24 webinar - How to protect your organization from credential theftOutpost24
 
Outpost24 webinar : Beating hackers at their own game 2022 predictions
Outpost24 webinar :  Beating hackers at their own game   2022 predictionsOutpost24 webinar :  Beating hackers at their own game   2022 predictions
Outpost24 webinar : Beating hackers at their own game 2022 predictionsOutpost24
 
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK FrameworkOutpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK FrameworkOutpost24
 
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...Outpost24
 
Outpost24 webinar - Api security
Outpost24 webinar - Api securityOutpost24 webinar - Api security
Outpost24 webinar - Api securityOutpost24
 
Outpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24 Webinar - CISO conversation behind the cyber security technologyOutpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24 Webinar - CISO conversation behind the cyber security technologyOutpost24
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...Outpost24
 
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24 webinar - How to secure cloud services in the DevOps fast laneOutpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24 webinar - How to secure cloud services in the DevOps fast laneOutpost24
 
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...Outpost24
 
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...Outpost24
 
Outpost24 webinar mastering container security in modern day dev ops
Outpost24 webinar   mastering container security in modern day dev opsOutpost24 webinar   mastering container security in modern day dev ops
Outpost24 webinar mastering container security in modern day dev opsOutpost24
 
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...Outpost24
 
Outpost24 webinar - Understanding the 7 deadly web application attack vectors
Outpost24 webinar - Understanding the 7 deadly web application attack vectorsOutpost24 webinar - Understanding the 7 deadly web application attack vectors
Outpost24 webinar - Understanding the 7 deadly web application attack vectorsOutpost24
 
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 world
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 worldOutpost24 webinar - Cybersecurity readiness in the post Covid-19 world
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 worldOutpost24
 
Outpost24 webinar - Securing DevOps in Cloud Environments
Outpost24 webinar -  Securing DevOps in Cloud EnvironmentsOutpost24 webinar -  Securing DevOps in Cloud Environments
Outpost24 webinar - Securing DevOps in Cloud EnvironmentsOutpost24
 
Outpost24 webinar - Covid-19: Driving application security resilience in time...
Outpost24 webinar - Covid-19: Driving application security resilience in time...Outpost24 webinar - Covid-19: Driving application security resilience in time...
Outpost24 webinar - Covid-19: Driving application security resilience in time...Outpost24
 
Outpost24 webinar - preventing wireless attacks with device visibility and t...
Outpost24 webinar -  preventing wireless attacks with device visibility and t...Outpost24 webinar -  preventing wireless attacks with device visibility and t...
Outpost24 webinar - preventing wireless attacks with device visibility and t...Outpost24
 

More from Outpost24 (20)

Outpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24 webinar - A fresh look into the underground card shop ecosystemOutpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24 webinar - A fresh look into the underground card shop ecosystem
 
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24 webinar Why API security matters and how to get it right.pdfOutpost24 webinar Why API security matters and how to get it right.pdf
Outpost24 webinar Why API security matters and how to get it right.pdf
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
 
Outpost24 webinar - How to protect your organization from credential theft
Outpost24 webinar - How to protect your organization from credential theftOutpost24 webinar - How to protect your organization from credential theft
Outpost24 webinar - How to protect your organization from credential theft
 
Outpost24 webinar : Beating hackers at their own game 2022 predictions
Outpost24 webinar :  Beating hackers at their own game   2022 predictionsOutpost24 webinar :  Beating hackers at their own game   2022 predictions
Outpost24 webinar : Beating hackers at their own game 2022 predictions
 
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK FrameworkOutpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
 
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
 
Outpost24 webinar - Api security
Outpost24 webinar - Api securityOutpost24 webinar - Api security
Outpost24 webinar - Api security
 
Outpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24 Webinar - CISO conversation behind the cyber security technologyOutpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24 Webinar - CISO conversation behind the cyber security technology
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
 
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24 webinar - How to secure cloud services in the DevOps fast laneOutpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
 
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
 
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
 
Outpost24 webinar mastering container security in modern day dev ops
Outpost24 webinar   mastering container security in modern day dev opsOutpost24 webinar   mastering container security in modern day dev ops
Outpost24 webinar mastering container security in modern day dev ops
 
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
 
Outpost24 webinar - Understanding the 7 deadly web application attack vectors
Outpost24 webinar - Understanding the 7 deadly web application attack vectorsOutpost24 webinar - Understanding the 7 deadly web application attack vectors
Outpost24 webinar - Understanding the 7 deadly web application attack vectors
 
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 world
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 worldOutpost24 webinar - Cybersecurity readiness in the post Covid-19 world
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 world
 
Outpost24 webinar - Securing DevOps in Cloud Environments
Outpost24 webinar -  Securing DevOps in Cloud EnvironmentsOutpost24 webinar -  Securing DevOps in Cloud Environments
Outpost24 webinar - Securing DevOps in Cloud Environments
 
Outpost24 webinar - Covid-19: Driving application security resilience in time...
Outpost24 webinar - Covid-19: Driving application security resilience in time...Outpost24 webinar - Covid-19: Driving application security resilience in time...
Outpost24 webinar - Covid-19: Driving application security resilience in time...
 
Outpost24 webinar - preventing wireless attacks with device visibility and t...
Outpost24 webinar -  preventing wireless attacks with device visibility and t...Outpost24 webinar -  preventing wireless attacks with device visibility and t...
Outpost24 webinar - preventing wireless attacks with device visibility and t...
 

Recently uploaded

Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 

Recently uploaded (20)

Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 

Outpost24 webinar - Improve your organizations security with red teaming

  • 1. Improving your organisation’s security 24/04/2019 Red teaming: Going beyond pen testing
  • 2. Kiwicon III Poster, kiwicon.org Hackers don’t care
  • 3. Never bring a knife to a gunfight The Untouchables (1987), Paramount Pictures
  • 4. The world ain't all sunshine and rainbows Rocky (1976), Chartoff-Winkler Productions
  • 5. Red teaming: Going beyond pen testing 5 Experience • 6 years of Information Security experience. • OP24’s Offensive Security team Ghost Labs. • Specializes in Social Engineering and OSINT: • Phishing • Physical penetration testing • Intelligence Gathering • Masters of Science (MSc) - Information Studies. • Bachelor of ICT (BICT) – IT Management. • CISM & ISO27001 Foundation certified. Hugo van den Toorn Manager OffSec | Ethical Hacker | Red Teamer
  • 6. “A bug is never just a mistake. It represents something bigger. An error of thinking that makes you who you are.” - Elliot, Mr Robot Reality of hacking
  • 7. Security breaches last year Red teaming: Going beyond pen testing 7 Patterns in used attack vectors leading up incidents Verizon Data Breach Investigations Report 2018
  • 8. Security breaches last year Red teaming: Going beyond pen testing 8 Web applications involved in breaches per industry Verizon Data Breach Investigations Report 2018
  • 9. What is a hacker? Red teaming: Going beyond pen testing Definition by Bruce Schneier (Secrets and Lies, 2000) A hacker is someone who thinks outside the box. It's someone who discards conventional wisdom, and does something else instead. It's someone who looks at the edge and wonders what's beyond. It's someone who sees a set of rules and wonders what happens if you don't follow them. A hacker is someone who experiments with the limitations of systems for intellectual curiosity.
  • 11. Hacking is never ‘just’ cyber Red teaming: Going beyond pen testing Human Physical Cyber
  • 12. Hacking is never ‘just’ cyber Red teaming: Going beyond pen testing Human Physical Cyber Hackers Ransomware Malware Espionage Alarm systems Access Controls Camera systems Domotics/smart systems Phishing Social engineering Bribery/blackmail Disgruntlement
  • 13. Hacking is never ‘just’ cyber Red teaming: Going beyond pen testing Human Physical Cyber Red Teaming Objective based Attack scenarios
  • 14. Hacking is never ‘just’ cyber Red teaming: Going beyond pen testing Human Physical Cyber Red Teaming Objective based Attack scenarios Threat IntelligenceAdversarial TTPs Blue Team Defences
  • 15. Understanding your adversary Red teaming: Going beyond pen testing Telling Showing Involving Threat Intel SecOps Red vs Blue
  • 16. Kiwicon III Poster, kiwicon.org Hackers don’t care
  • 17. The goal here isn't 100% perfect security, but rather adequate security at a reasonable cost. - Bruce Schneier (Secrets and Lies, 2000) Reality of life
  • 18. There are known knowns: there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns – the ones we don't know we don't know. - Donald Rumsfeld, United States Secretary of Defense Reality of life
  • 19. Reality of life Unless you can predict the future…
  • 20. Rear Admiral Harry E. Yarnell demonstrated in 1932 the effectiveness of an attack on Pearl Harbor almost exactly showing how the tactics of the Japanese would destroy the fleet in Harbor nine years later. Reality of life
  • 21. Rear Admiral Harry E. Yarnell demonstrated in 1932 the effectiveness of an attack on Pearl Harbor almost exactly showing how the tactics of the Japanese would destroy the fleet in Harbor nine years later. Fleet Problem XIII “It is doubtful if air attacks can be launched against Oahu in the face of strong defensive aviation without subjecting the attacking carriers to the danger of material damage and consequent great losses in the attack air force.” Reality of life
  • 22. Reality of (Cyber) Security Attacks are becoming more sophisticated and attack surfaces grow Compliance is driving security requirements as breaches increase ‘Unknown unknowns’ are a concern, but difficult to identify Attackers will not limit themselves to ‘cyber’ elements of the target
  • 23. Reality of (Cyber) Security Attacks are becoming more sophisticated and attack surfaces grow Compliance is driving security requirements as breaches increase ‘Unknown unknowns’ are a concern, but difficult to identify Attackers will not limit themselves to ‘cyber’ elements of the target Vulnerability management & pen testing is just the beginning
  • 24. Lets play a game! Settlers of Catan game, Dailydot.com
  • 25. Red teaming: Going beyond pen testing Crown Jewels StaffData Center Branches & Stores Network Computers Office Building Ext. Staff PhoneWi-Fi Web App Peripherals‘The Cloud’
  • 26. The world ain't all sunshine and rainbows Rocky (1976), Chartoff-Winkler Productions
  • 27. 100% security? Red teaming: Going beyond pen testing 27 • Secure development • Web application testing • Responsible disclosure • Updates • Vulnerability Scanning • Preventing physical access • Always the weakest link (no patches) • Security awareness training • Get missing knowledge VulnerabilityManagement RedTeaming Testing assumptions PentestConfigReviewAwareness PatchingPatching Policies
  • 28. 100% security? Red teaming: Going beyond pen testing 28 • Secure development • Web application testing • Responsible disclosure • Updates • Vulnerability Scanning • Preventing physical access • Always the weakest link (no patches) • Security awareness training • Get missing knowledge VulnerabilityManagement RedTeaming Testing assumptions PentestConfigReviewAwareness PatchingPatching Policies
  • 29. 100% security? Red teaming: Going beyond pen testing 29 • Secure development • Web application testing • Responsible disclosure • Updates • Vulnerability Scanning • Preventing physical access • Always the weakest link (no patches) • Security awareness training • Get missing knowledge VulnerabilityManagement RedTeaming Testing assumptions PentestConfigReviewAwareness PatchingPatching Policies
  • 30. 100% security? Red teaming: Going beyond pen testing 30 • Secure development • Web application testing • Responsible disclosure • Updates • Vulnerability Scanning • Preventing physical access • Always the weakest link (no patches) • Security awareness training • Get missing knowledge VulnerabilityManagement RedTeaming Testing assumptions PentestConfigReviewAwareness PatchingPatching Policies
  • 31. 100% security? Red teaming: Going beyond pen testing 31 • Secure development • Web application testing • Responsible disclosure • Updates • Vulnerability Scanning • Preventing physical access • Always the weakest link (no patches) • Security awareness training • Get missing knowledge VulnerabilityManagement RedTeaming Testing assumptions PentestConfigReviewAwareness PatchingPatching Policies
  • 32. Red teaming: Going beyond pen testing Crown Jewels StaffData Center Branches & Stores Network Computers Office Building Ext. Staff PhoneWi-Fi Web App Peripherals‘The Cloud’
  • 33. Red teaming: Going beyond pen testing Crown Jewels StaffData Center Branches & Stores Network Computers Office Building Ext. Staff PhoneWi-Fi Web App Peripherals‘The Cloud’ Physical Pentest Social Engineer. Phishing Wi-Fi Test WebApp Pentest Vishing/ Smishing Network Exploit. Cloud Assess. Config Review Vuln. Mgmt
  • 34. Red teaming: Going beyond pen testing Crown Jewels StaffData Center Branches & Stores Network Computers Office Building Ext. Staff PhoneWi-Fi Web App Peripherals‘The Cloud’ Physical Pentest Social Engineer. Phishing Wi-Fi Test WebApp Pentest Vishing/ Smishing Network Exploit. Cloud Assess. Config Review Vuln. Mgmt Threat hunting Security Awareness Physical Security IDS IPS Secure Develop. Endpoint Security Threat Intel
  • 35. How do we become more secure? Red teaming: Going beyond pen testing 35 • How to take security to the next level? • Value of paper based compliance? • Can we identify unknown unknowns? • How secure are we really? Red Teaming == Testing your assumptions Initial Established Self-Assessed Integrated Vanguard Security level Assumptions Based on Community Cyber Security Maturity Model (CCSMM) http://cias.utsa.edu/the-ccsmm.html Organization’s security maturity level Security Operations, Monitoring, IR, Red Teaming Policies Ad-hoc Security Awareness, Vulnerability Assessment Security promotion, Business continuity, Penetration testing Formal (security) processes, Continuous testing
  • 36. Never bring a knife to a gunfight The Untouchables (1987), Paramount Pictures
  • 37. Legislation (to punish and/or aid us) Red teaming: Going beyond pen testing EU wide GDPR is a driver to perform more (in-depth) testing. 37 In addition to the impact of a potential breach, GDPR also means a fine can be sanctioned if insufficient security measures are taken. Organizations in breach of GDPR can be fined up to 4% of annual global turnover or €20 million (whichever is greater). (EU GDPR)
  • 38. Legislation (to punish and/or aid us) Red teaming: Going beyond pen testing EU wide GDPR is a driver to perform more (in-depth) testing. UK: CBEST (Bank of England) NL: TIBER (Dutch National Bank) EU: TIBER (European Central Bank) 38 Threat Intelligence-Based Ethical Red Teaming “In collaboration with institutions comprising the Dutch financial core payment infrastructure, DNB has prepared a guide for further improvement of the sector's protection against cyberattacks by means of red team testing. (…) Its purpose is to enhance our country's financial core institutions' cyber resilience by learning from each other's best practices.” - Dnb.nl (16 November 2017)
  • 39. How do we become more secure? Red teaming: Going beyond pen testing 39 It is not necessarily about being secure or compliant, but about: • Being proactive; • Being able to withstand and respond; • Understanding your key risk areas; • Risk appetite; • Applying the right measures. • “The goal here isn't 100% perfect security, but rather adequate security at a reasonable cost.” Secure yourself, Protect your customers, Be the best at what you do (securely), Make the world a better place.
  • 40. How do we become more secure? Red teaming: Going beyond pen testing 40 It is not necessarily about being secure or compliant, but about: • Being proactive; • Being able to withstand and respond; • Understanding your key risk areas; • Risk appetite; • Applying the right measures. • “The goal here isn't 100% perfect security, but rather adequate security at a reasonable cost.” Secure yourself, Protect your customers, Be the best at what you do (securely), Make the world a better place.
  • 41. How do we become more secure? Red teaming: Going beyond pen testing 41 Accept that: • You might not like the results. • You hire experts to help your organization. • With growth comes pain. • A Red Team will see you at your worst. Secure yourself, Protect your customers, Be the best at what you do (securely), Make the world a better place.
  • 42.
  • 43. Hackers never bring sunshine and rainbows