SENTRYGT.COM
BUILDING A
HACKER-RESISTANT
NETWORK
Protecting Your Confidential Information
and Your Business
SENTRYGT.COM
Agenda
• A real-world case study
• The impact
• Protecting yourself, your people and
your livelihood
SENTRYGT.COM
SENTRYGT.COM
Hackers Got…
Sony’s entire network:
• ALL users’ email accounts
• ALL data files: Salaries, SSNs
• ALL promotional materials
• ALL contracts and agreements
on their network
• ALL schedules and project
plans
SENTRYGT.COM
How did the
hacker(s) succeed?
SENTRYGT.COM
What damage has been done so far?
Release Cancelled Private communication
now public
Confidential
Information now public
Executive humiliation
SENTRYGT.COM
What did it cost?
$40 million to produce $35 million to promote
$$$$$ million for PR $$$$$ million for Network Security
At least
$100
million
SENTRYGT.COM
Could this happen to you?
SENTRYGT.COM
Is your technology platform:
•Monitored?
•Protected?
•Secure?
•Redundant?
•Backed up locally and
remotely?
SENTRYGT.COM
Threats
Viruses SPAM Worms
Keyloggers Trojan Horses DDoS attacks
SPAM bots
Man-in-the Middle
attacks Port Scans
Packet Sniffers Password Crackers And MORE!
SENTRYGT.COM
Solutions
The Foundation:
• Location(s)
• Connectivity
• Equipment
• Operating system(s)
• Applications
• Security policies
• Safeguards
SENTRYGT.COM
Location(s)
• On-premises
• Local data center
• Remote data center
• Cloud computing provider
• Hybrid environment
SENTRYGT.COM
Connectivity
• T1
• Business-class
cable/fiber
• DS3, OC3
• GigE, MetroE
• AirBand, AboveNet
SENTRYGT.COM
Equipment
• Server(s)
• Router(s)
• Switches
• Firewall/VPN appliances
• IDS/IPS devices
SENTRYGT.COM
Operating System(s)
• Windows Server
• Standard or Essentials
• Enterprise
• System Center, Data Center
• Linux
• Mac (OSX, OS 11)
• Unix/AIX
SENTRYGT.COM
Applications
• CRM, ERP, MRP, OE
• Accounting
• Office suites (Word, WordPerfect)
• AV-AS-AM software
• Back-up software
• Network management software
SENTRYGT.COM
Security Policies
• Administrator access
• User access settings
• Event and Error Log reviews
• Password policy
• Acceptable-use policy
• WSUS and automatic updates
• 24x7x365 monitoring
• Penetration testing,
vulnerability analyses
SENTRYGT.COM
Esssential
Safeguards
• Regular random test file
restores
• Staged attacks and drills
• Quarterly Technology
Reviews
• Ongoing new-threat
analyses
• Regular user training
sessions
SENTRYGT.COM
Network Access
• Do you have the administrator
password to your own network?
• When was the last time you
tested it?
• When was the last time you
changed it?
• Who else has it?
• Is it stored in a secure location?
SENTRYGT.COM
The cost of having a hacker-resistant
network will be far less than the cost
of not having one.
SENTRYGT.COM
One Final Thought:
SENTRYGT.COM
Questions?
SENTRYGT.COM
Thank you for your time!
Brad Wohlander, CEO
SENTRY GLOBAL TECHNOLOGIES, LLC
5700 Granite Parkway
Suite 200
Plano, Texas 75024
972.491.0300
bww@sentrygt.com

Building a Hacker Resistant Network

Editor's Notes

  • #4 In December 2014 a breach of Sony’s technology infrastructure made world-wide headlines. What happened?
  • #6 The hackers succeeded by capturing or using the administrator password or user name of a network administrator who had access to everything on the internal Sony network.
  • #7 Release of a major film has been all but cancelled Private and embarrassing intercompany communications have been made public Confidential company information has become public Executives’ personal comments and anecdotes have been taken out of context and created consternation and humiliation
  • #8 “The Interview” movie cost over $40 million to produce SONY spent another $35 million or so on promotion and materials for the film The public-relations and additional network security expenditures haven’t even been calculated yet, but are estimated to be at least $100 million
  • #11 Viruses Spam Worms Keyloggers Trojan horses DDoS attacks Spam bots Man-in-the-middle attacks Port scans Packet sniffers Password crackers . . . and more!
  • #12 You don’t build a house and start with the roof. You start with the foundation. These items are the foundation. I’ll address each one.