SlideShare a Scribd company logo
1 of 16
Copyright © 2016 Raytheon Company. All rights reserved.
Defense in Depth: Top 10 Critical Security Controls
Mary Y Wang
October 28, 2016
Non-Export controlled technical information
N o n - e x p o r t c o n t r o l l e d t e c h n i c a l i n f o r m a t i o n
Annual Women Engineers Conference 2016
Why Center for Internet Security (CIS) Critical Security Controls
Work?
Based on actual
attacks and
effective defenses
Based on priorities
Not one-size-fits-all
solutions
Non-Export controlled technical information
Non-Export controlled technical information
1. Inventory of Hardware
 Authorized and
Unauthorized Devices
– Attackers are
continuously scanning
the target organizations
– Attackers are waiting
for new and
unprotected systems to
be attached to network
Non-Export controlled technical information
Non-Export controlled technical information
2. Inventory of Software
 Authorized and
Unauthorized
Software
–Attackers are
continuously looking
for vulnerable
versions of software
that can be remotely
exploited
Non-Export controlled technical information
Non-Export controlled technical information
3. Secure Configurations of Hardware and Software
 Default configurations
are for ease-of-use
not security
 Open services, ports,
default account or
passwords
–Can be exploitable
Non-Export controlled technical information
Non-Export controlled technical information
4. Continuous Vulnerability Assessment and Remediation
 Scan for vulnerabilities and
address discovered flaws
 Understand and manage
vulnerabilities is a continuous
discovered activity
 Attackers have the same
information
– Race to deploy an attack
Non-Export controlled technical information
Non-Export controlled technical information
5. Controlled Use of Administrative Privileges
 Track and control the
use of administrative
privileges
 Attackers can take
advantage of
uncontrolled
administrative privileges
–Can crack the
password
Non-Export controlled technical information
Non-Export controlled technical information
6. Maintenance, Monitoring and Analysis of Audit Logs
 Collect, analyze audit logs
of events
– Detect an attack
– Recover from an attack
 Sometimes, logs are the
only evidence of an attack
 Attackers can also hide
their activities
Non-Export controlled technical information
Non-Export controlled technical information
7. Email and Web Browser Protections
 Minimize the attack surface
through web browsers
–Fully up to date and patched
–Default – not installing
plugins, ActiveX controls
–Block third-party cookies
 Attackers use phishing emails
as the entry point of attack
Non-Export controlled technical information
Non-Export controlled technical information
8. Malware Defenses
 Control the installation and
spread of malicious code
 Attackers can use
malware to attack target
organizations via number
of entry points like end-
user devices, email
attachments and web
pages
Non-Export controlled technical information
Non-Export controlled technical information
9. Limitation and Control of Network Ports and Services
Manage and track the use
of ports, protocols and
services
Attackers are continuously
searching for remotely
accessible network services
and open ports
Non-Export controlled technical information
Non-Export controlled technical information
10. Data Recovery Capability
 Backup critical information
 When attackers compromise
systems
– Make significant changes to
configurations of software
– Make alterations of data
 When discovered, need to
remove all data that have
been altered by attackers
Non-Export controlled technical information
Non-Export controlled technical information
Win the Cyber
War !!
Biography
Mary Y Wang
Information Systems Security Officer
Raytheon Space and Airborne Systems, California
Mary Wang joined Raytheon in August, 2015. Currently, she works in the Raytheon Space
and Airborne Systems Information Assurance organization. She has a strong passion in
cybersecurity especially in the penetration testing and application security areas. Prior to
joining Raytheon, she was a Senior Software Engineer and Project Lead at The Boeing
Company. She worked on a variety of software projects at Boeing. Mary holds a Bachelor
of Science degree in Computer Science and Masters degree in Master Business
Administration. She is currently attending SANS Technology Institute for a graduate degree
in Pen Testing & Ethical Hacking. Mary also has been a frequent speaker at Annual
Women Engineers Conferences.

More Related Content

What's hot

RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
Check point nerc cip compliance
Check point nerc cip complianceCheck point nerc cip compliance
Check point nerc cip complianceIvan Carmona
 
Jorge gil martínez presentation about security i.t.
Jorge gil martínez   presentation about security i.t.Jorge gil martínez   presentation about security i.t.
Jorge gil martínez presentation about security i.t.JorgeGilMartnez2
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02Sally's Special Services
 
Ethical Hacking Certification Course
Ethical Hacking Certification CourseEthical Hacking Certification Course
Ethical Hacking Certification CourseNovel Vista
 
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkMapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkDigital Shadows
 
CounterSnipe Network Security
CounterSnipe Network SecurityCounterSnipe Network Security
CounterSnipe Network Securityamarpsr
 
Payment Card Industry Compliance Requirements
Payment Card Industry Compliance Requirements Payment Card Industry Compliance Requirements
Payment Card Industry Compliance Requirements Jamal Soudi
 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...Edureka!
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksInformation Technology
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Security and Privacy in Visual Sensor Network
Security and Privacy in Visual Sensor NetworkSecurity and Privacy in Visual Sensor Network
Security and Privacy in Visual Sensor NetworkKhan Reaz
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityGreat Bay Software
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 

What's hot (20)

RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Check point nerc cip compliance
Check point nerc cip complianceCheck point nerc cip compliance
Check point nerc cip compliance
 
Jorge gil martínez presentation about security i.t.
Jorge gil martínez   presentation about security i.t.Jorge gil martínez   presentation about security i.t.
Jorge gil martínez presentation about security i.t.
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
 
Ethical Hacking Certification Course
Ethical Hacking Certification CourseEthical Hacking Certification Course
Ethical Hacking Certification Course
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkMapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
 
CounterSnipe Network Security
CounterSnipe Network SecurityCounterSnipe Network Security
CounterSnipe Network Security
 
Payment Card Industry Compliance Requirements
Payment Card Industry Compliance Requirements Payment Card Industry Compliance Requirements
Payment Card Industry Compliance Requirements
 
HACKERS ATTACK PROCESS
HACKERS ATTACK PROCESSHACKERS ATTACK PROCESS
HACKERS ATTACK PROCESS
 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Security and Privacy in Visual Sensor Network
Security and Privacy in Visual Sensor NetworkSecurity and Privacy in Visual Sensor Network
Security and Privacy in Visual Sensor Network
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
Network security
 Network security Network security
Network security
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 

Viewers also liked

WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...Society of Women Engineers
 
WE16 - Navigating the Seas of Open Source Projects
WE16 - Navigating the Seas of Open Source ProjectsWE16 - Navigating the Seas of Open Source Projects
WE16 - Navigating the Seas of Open Source ProjectsSociety of Women Engineers
 
WE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and InclusionWE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and InclusionSociety of Women Engineers
 
WE16 - Project Collaboration in a Changing World
WE16 - Project Collaboration in a Changing WorldWE16 - Project Collaboration in a Changing World
WE16 - Project Collaboration in a Changing WorldSociety of Women Engineers
 
WE16 - Women Engineers and Academics - The Nigerian Perspective
WE16 - Women Engineers and Academics - The Nigerian PerspectiveWE16 - Women Engineers and Academics - The Nigerian Perspective
WE16 - Women Engineers and Academics - The Nigerian PerspectiveSociety of Women Engineers
 
WE16 - Project Management As Your Next Career Move
WE16 - Project Management As Your Next Career MoveWE16 - Project Management As Your Next Career Move
WE16 - Project Management As Your Next Career MoveSociety of Women Engineers
 
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the FutureWE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the FutureSociety of Women Engineers
 
WE16 - Navigating the Corporate Maze Effectively
WE16 - Navigating the Corporate Maze EffectivelyWE16 - Navigating the Corporate Maze Effectively
WE16 - Navigating the Corporate Maze EffectivelySociety of Women Engineers
 
WE16 - How do Faculty Ensure Student Competency at Course Completion?
WE16 - How do Faculty Ensure Student Competency at Course Completion?WE16 - How do Faculty Ensure Student Competency at Course Completion?
WE16 - How do Faculty Ensure Student Competency at Course Completion?Society of Women Engineers
 
WE16 - They're People Not Data! The Human Side of Insider Cyberthreats
WE16 - They're People Not Data! The Human Side of Insider CyberthreatsWE16 - They're People Not Data! The Human Side of Insider Cyberthreats
WE16 - They're People Not Data! The Human Side of Insider CyberthreatsSociety of Women Engineers
 
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...Society of Women Engineers
 
WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...
WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...
WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...Society of Women Engineers
 

Viewers also liked (20)

WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
 
WE16 - Navigating the Seas of Open Source Projects
WE16 - Navigating the Seas of Open Source ProjectsWE16 - Navigating the Seas of Open Source Projects
WE16 - Navigating the Seas of Open Source Projects
 
WE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and InclusionWE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and Inclusion
 
WE16 - 4 Ways Improv Can Improve Your Career
WE16 - 4 Ways Improv Can Improve Your CareerWE16 - 4 Ways Improv Can Improve Your Career
WE16 - 4 Ways Improv Can Improve Your Career
 
WE16 - Disciplined Entrepreneurship
WE16 - Disciplined EntrepreneurshipWE16 - Disciplined Entrepreneurship
WE16 - Disciplined Entrepreneurship
 
WE16 - Shine Theory
WE16 - Shine TheoryWE16 - Shine Theory
WE16 - Shine Theory
 
WE16 - The State of Women in Engineering
WE16 - The State of Women in EngineeringWE16 - The State of Women in Engineering
WE16 - The State of Women in Engineering
 
WE16 - Diving into Entrepreneurship
WE16 - Diving into EntrepreneurshipWE16 - Diving into Entrepreneurship
WE16 - Diving into Entrepreneurship
 
WE16 - Project Collaboration in a Changing World
WE16 - Project Collaboration in a Changing WorldWE16 - Project Collaboration in a Changing World
WE16 - Project Collaboration in a Changing World
 
WE16 - Women Engineers and Academics - The Nigerian Perspective
WE16 - Women Engineers and Academics - The Nigerian PerspectiveWE16 - Women Engineers and Academics - The Nigerian Perspective
WE16 - Women Engineers and Academics - The Nigerian Perspective
 
WE16 - Project Management As Your Next Career Move
WE16 - Project Management As Your Next Career MoveWE16 - Project Management As Your Next Career Move
WE16 - Project Management As Your Next Career Move
 
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the FutureWE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
 
WE16 - Navigating the Corporate Maze Effectively
WE16 - Navigating the Corporate Maze EffectivelyWE16 - Navigating the Corporate Maze Effectively
WE16 - Navigating the Corporate Maze Effectively
 
WE16 - How do Faculty Ensure Student Competency at Course Completion?
WE16 - How do Faculty Ensure Student Competency at Course Completion?WE16 - How do Faculty Ensure Student Competency at Course Completion?
WE16 - How do Faculty Ensure Student Competency at Course Completion?
 
WE16 - They're People Not Data! The Human Side of Insider Cyberthreats
WE16 - They're People Not Data! The Human Side of Insider CyberthreatsWE16 - They're People Not Data! The Human Side of Insider Cyberthreats
WE16 - They're People Not Data! The Human Side of Insider Cyberthreats
 
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
 
WE16 - Confronting Workplace Sexism
WE16 - Confronting Workplace SexismWE16 - Confronting Workplace Sexism
WE16 - Confronting Workplace Sexism
 
WE16 - Increasing Equity in Faculty Searches
WE16 - Increasing Equity in Faculty SearchesWE16 - Increasing Equity in Faculty Searches
WE16 - Increasing Equity in Faculty Searches
 
WE16 - How to Lead a Double Life
WE16 - How to Lead a Double LifeWE16 - How to Lead a Double Life
WE16 - How to Lead a Double Life
 
WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...
WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...
WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...
 

Similar to WE16 - Defense in Depth: Top 10 Critical Security Controls

Enterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurityEnterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurityVenkat Alagarsamy
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Lancope, Inc.
 
PatrOwl - Security Operations Orchestration
PatrOwl  - Security Operations OrchestrationPatrOwl  - Security Operations Orchestration
PatrOwl - Security Operations OrchestrationMaKyOtOx
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfKerimBozkanli
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityIvanti
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxVinayPratap58
 
Presentation about security i.t.
Presentation about security i.t.Presentation about security i.t.
Presentation about security i.t.MarianaGilMartnez1
 
Cs Quick Pres
Cs Quick PresCs Quick Pres
Cs Quick Presbeckygill
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfAmeliaJonas2
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesSymantec
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackinghcls
 
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02technext1
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseRishu Mehra
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 

Similar to WE16 - Defense in Depth: Top 10 Critical Security Controls (20)

Enterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurityEnterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurity
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
 
PatrOwl - Security Operations Orchestration
PatrOwl  - Security Operations OrchestrationPatrOwl  - Security Operations Orchestration
PatrOwl - Security Operations Orchestration
 
FireEye
FireEyeFireEye
FireEye
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptx
 
Presentation about security I.T.
Presentation about security I.T.Presentation about security I.T.
Presentation about security I.T.
 
Presentation about security i.t.
Presentation about security i.t.Presentation about security i.t.
Presentation about security i.t.
 
Cs Quick Pres
Cs Quick PresCs Quick Pres
Cs Quick Pres
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber Defense
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 

More from Society of Women Engineers

Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2Society of Women Engineers
 
How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations Society of Women Engineers
 
How to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE LeaderHow to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE LeaderSociety of Women Engineers
 

More from Society of Women Engineers (20)

Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2
 
Opening keynote
Opening keynoteOpening keynote
Opening keynote
 
Moonshot rodriguez slides
Moonshot rodriguez slidesMoonshot rodriguez slides
Moonshot rodriguez slides
 
Moonshot fetch slides
Moonshot fetch slidesMoonshot fetch slides
Moonshot fetch slides
 
H ivs ai_wehr_slides
H ivs ai_wehr_slidesH ivs ai_wehr_slides
H ivs ai_wehr_slides
 
H ivs ai_faust_slides
H ivs ai_faust_slidesH ivs ai_faust_slides
H ivs ai_faust_slides
 
H ivs ai_bestelmeyer_slides
H ivs ai_bestelmeyer_slidesH ivs ai_bestelmeyer_slides
H ivs ai_bestelmeyer_slides
 
Closing keynote
Closing keynoteClosing keynote
Closing keynote
 
Ball d 8
Ball d 8Ball d 8
Ball d 8
 
Ball d 7
Ball d 7Ball d 7
Ball d 7
 
Ball d 6
Ball d 6Ball d 6
Ball d 6
 
Ball d 4
Ball d 4Ball d 4
Ball d 4
 
How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations
 
How to Find Your Section's Next Officer Team
How to Find Your Section's Next Officer Team How to Find Your Section's Next Officer Team
How to Find Your Section's Next Officer Team
 
Using SWE to Complement your Career
Using SWE to Complement your Career Using SWE to Complement your Career
Using SWE to Complement your Career
 
How to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE LeaderHow to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE Leader
 
18 cd 32
18 cd 3218 cd 32
18 cd 32
 
How to Get the Most out of your LCC Coach!
How to Get the Most out of your LCC Coach!How to Get the Most out of your LCC Coach!
How to Get the Most out of your LCC Coach!
 
The Mars Ice Challenge (RASC-AL)
The Mars Ice Challenge (RASC-AL)The Mars Ice Challenge (RASC-AL)
The Mars Ice Challenge (RASC-AL)
 
Beyond Disruption
Beyond Disruption Beyond Disruption
Beyond Disruption
 

Recently uploaded

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 

Recently uploaded (20)

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 

WE16 - Defense in Depth: Top 10 Critical Security Controls

  • 1. Copyright © 2016 Raytheon Company. All rights reserved. Defense in Depth: Top 10 Critical Security Controls Mary Y Wang October 28, 2016 Non-Export controlled technical information N o n - e x p o r t c o n t r o l l e d t e c h n i c a l i n f o r m a t i o n Annual Women Engineers Conference 2016
  • 2. Why Center for Internet Security (CIS) Critical Security Controls Work? Based on actual attacks and effective defenses Based on priorities Not one-size-fits-all solutions Non-Export controlled technical information Non-Export controlled technical information
  • 3. 1. Inventory of Hardware  Authorized and Unauthorized Devices – Attackers are continuously scanning the target organizations – Attackers are waiting for new and unprotected systems to be attached to network Non-Export controlled technical information Non-Export controlled technical information
  • 4. 2. Inventory of Software  Authorized and Unauthorized Software –Attackers are continuously looking for vulnerable versions of software that can be remotely exploited Non-Export controlled technical information Non-Export controlled technical information
  • 5. 3. Secure Configurations of Hardware and Software  Default configurations are for ease-of-use not security  Open services, ports, default account or passwords –Can be exploitable Non-Export controlled technical information Non-Export controlled technical information
  • 6. 4. Continuous Vulnerability Assessment and Remediation  Scan for vulnerabilities and address discovered flaws  Understand and manage vulnerabilities is a continuous discovered activity  Attackers have the same information – Race to deploy an attack Non-Export controlled technical information Non-Export controlled technical information
  • 7. 5. Controlled Use of Administrative Privileges  Track and control the use of administrative privileges  Attackers can take advantage of uncontrolled administrative privileges –Can crack the password Non-Export controlled technical information Non-Export controlled technical information
  • 8. 6. Maintenance, Monitoring and Analysis of Audit Logs  Collect, analyze audit logs of events – Detect an attack – Recover from an attack  Sometimes, logs are the only evidence of an attack  Attackers can also hide their activities Non-Export controlled technical information Non-Export controlled technical information
  • 9. 7. Email and Web Browser Protections  Minimize the attack surface through web browsers –Fully up to date and patched –Default – not installing plugins, ActiveX controls –Block third-party cookies  Attackers use phishing emails as the entry point of attack Non-Export controlled technical information Non-Export controlled technical information
  • 10. 8. Malware Defenses  Control the installation and spread of malicious code  Attackers can use malware to attack target organizations via number of entry points like end- user devices, email attachments and web pages Non-Export controlled technical information Non-Export controlled technical information
  • 11. 9. Limitation and Control of Network Ports and Services Manage and track the use of ports, protocols and services Attackers are continuously searching for remotely accessible network services and open ports Non-Export controlled technical information Non-Export controlled technical information
  • 12. 10. Data Recovery Capability  Backup critical information  When attackers compromise systems – Make significant changes to configurations of software – Make alterations of data  When discovered, need to remove all data that have been altered by attackers Non-Export controlled technical information Non-Export controlled technical information
  • 14.
  • 15.
  • 16. Biography Mary Y Wang Information Systems Security Officer Raytheon Space and Airborne Systems, California Mary Wang joined Raytheon in August, 2015. Currently, she works in the Raytheon Space and Airborne Systems Information Assurance organization. She has a strong passion in cybersecurity especially in the penetration testing and application security areas. Prior to joining Raytheon, she was a Senior Software Engineer and Project Lead at The Boeing Company. She worked on a variety of software projects at Boeing. Mary holds a Bachelor of Science degree in Computer Science and Masters degree in Master Business Administration. She is currently attending SANS Technology Institute for a graduate degree in Pen Testing & Ethical Hacking. Mary also has been a frequent speaker at Annual Women Engineers Conferences.

Editor's Notes

  1. <number>
  2. <number>
  3. <number>
  4. <number>