SlideShare a Scribd company logo
1
P R E S E N T E D B Y:
CODERO HOSTING
Cybersecurity:
Do You Have a Plan to Address Threats and Prevent Liability?
NTCA RTIME 2016 - Director Track
Feb 21st, 2016
2
Introductions
Codero is an Infrastructure-as-a-Service provider that offers dedicated,
cloud, managed and hybrid hosting services to over 3,400 domestic and
international customers from three datacenter locations
We are at an interesting vantage point where we see all sorts of interesting
things – this presentation will focus as a ‘report from the field’ related to
cybersecurity from our position
3
The Internet Maxims
The Internet is old.
The Internet is insecure.
The Internet is hostile.
4
Security used to be easy!
• Fewer hosts
• Knowledge over time
• Automated Hacking/Attacking Tools
5
Who’s doing the attacking?
• “Script kiddies”
• Pre-built tools
• Summer vacation / Boredom
• Corporations
• Intellectual property
• Competitor’s strategy
• Activists
• Looking for publicity
• Political/ideological
• Nations
• Utilities
• Espionage
• Defense technology
• Denial of Use at national scope
6
Weapons
• Phishing
• Social engineering
• Brute force
• Watering hole attacks
• Worms
• Viruses
• Trojan horses
• DoS/DDoS attacks
• Scareware
• Ransomware / Extortion
• MitM
• Etc…
• But are they easy to do?
7
The Arms Race
• One of many tools on the market – LOIC* with ~2K downloads per day
* LOIC – Low Orbit Ion Cannon
8
Targets
• People
• Processes
• Technology
9
Defense
• Not every attack is obvious
• Change defaults
• Stay patched
• Backup your data
• Avoid cross-pollination
• Defense in depth
• Policies / Framework / Plans
• Act like the world really is out to get you
10
DoS/DDoS Attacks
• Definition
• How they work
• Types
• Mitigation
11
How easy is it to launch a DoS?
12
How easy is it to launch a DoS? (cont.)
• 12.7Gbit/sec attack recently seen (very common range of attacks)
• Attack lasted exactly 10minutes – DDoS as a service style
• Showcases how much ‘spare’ capacity you need to have available at
all areas of the network.
13
Conclusion - Security is a process
• Use the NIST framework to determine
• Where you are
• What is at risk
• What you should do
• Patches
• Scans / Logs
• Who is knocking on the front door?
• Timing and Targets
• This happens thousands of times per day to all sizes of companies
• Proper Staffing
• Don’t wait for an incident to get resources focused
14
Thank you

More Related Content

What's hot

Introduction to CSIRTs
Introduction to CSIRTsIntroduction to CSIRTs
Introduction to CSIRTs
APNIC
 
Nvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 decNvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 dec
PhilSmith151163
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
Eric Kavanagh
 
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Jisc
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
Cristian Garcia G.
 
Our team _ ITG Holdings_Charles Lam
Our team _ ITG Holdings_Charles LamOur team _ ITG Holdings_Charles Lam
Our team _ ITG Holdings_Charles Lam
Charles Lam
 
Confessions of a CIO
Confessions of a CIOConfessions of a CIO
Confessions of a CIO
Delphix
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit Encryption
Ian Ray
 
IaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing BoardIaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing Board
K Logic Future Marketing
 
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfNVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
PhilSmith165
 
Discover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid CloudDiscover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid Cloud
LaurenWendler
 
Sect f43
Sect f43Sect f43
Slides for CC & IAAS
Slides for CC & IAASSlides for CC & IAAS
Slides for CC & IAAS
Mekhi Da ‘Quay Daniels
 
ARM 7: ICANN - Security, stability and resilience of the Internet
ARM 7: ICANN - Security, stability and resilience  of the InternetARM 7: ICANN - Security, stability and resilience  of the Internet
ARM 7: ICANN - Security, stability and resilience of the Internet
APNIC
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
NetworkCollaborators
 
Discover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid CloudDiscover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid Cloud
LaurenWendler
 
ION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLSION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLS
Deploy360 Programme (Internet Society)
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
Marc Vael
 
What Cloud is Right for My Business?
What Cloud is Right for My Business?What Cloud is Right for My Business?
What Cloud is Right for My Business?
CHIPS Technology Group
 
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
Nur Shiqim Chok
 

What's hot (20)

Introduction to CSIRTs
Introduction to CSIRTsIntroduction to CSIRTs
Introduction to CSIRTs
 
Nvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 decNvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 dec
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Our team _ ITG Holdings_Charles Lam
Our team _ ITG Holdings_Charles LamOur team _ ITG Holdings_Charles Lam
Our team _ ITG Holdings_Charles Lam
 
Confessions of a CIO
Confessions of a CIOConfessions of a CIO
Confessions of a CIO
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit Encryption
 
IaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing BoardIaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing Board
 
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfNVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
 
Discover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid CloudDiscover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid Cloud
 
Sect f43
Sect f43Sect f43
Sect f43
 
Slides for CC & IAAS
Slides for CC & IAASSlides for CC & IAAS
Slides for CC & IAAS
 
ARM 7: ICANN - Security, stability and resilience of the Internet
ARM 7: ICANN - Security, stability and resilience  of the InternetARM 7: ICANN - Security, stability and resilience  of the Internet
ARM 7: ICANN - Security, stability and resilience of the Internet
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
 
Discover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid CloudDiscover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid Cloud
 
ION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLSION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLS
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
What Cloud is Right for My Business?
What Cloud is Right for My Business?What Cloud is Right for My Business?
What Cloud is Right for My Business?
 
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
 

Viewers also liked

Kasiisi
KasiisiKasiisi
Kasiisi
Bonnie Lei
 
ATTLAS et l' approche territoriale des conditions de travail
ATTLAS et l' approche territoriale des conditions de travailATTLAS et l' approche territoriale des conditions de travail
ATTLAS et l' approche territoriale des conditions de travailVincentMandinaud
 
Presentation1
Presentation1Presentation1
Presentation1
William Boyle III
 
Grafica de barras
Grafica de barras Grafica de barras
Grafica de barras
XANTIX
 
Como conquistar um homem homem
Como conquistar um homem homemComo conquistar um homem homem
Como conquistar um homem homem
carinhoseducaocoomm
 
φύλλο εργασίας για ταινία αργύρη
φύλλο εργασίας για ταινία αργύρηφύλλο εργασίας για ταινία αργύρη
φύλλο εργασίας για ταινία αργύρη
distomo
 
Lecture 9 derivatives of trig functions - section 3.3
Lecture 9   derivatives of trig functions - section 3.3Lecture 9   derivatives of trig functions - section 3.3
Lecture 9 derivatives of trig functions - section 3.3
njit-ronbrown
 
Experiment floating or submerging?
Experiment floating or submerging?Experiment floating or submerging?
Experiment floating or submerging?
Vicky Milioti
 
ναος της αναστασεως
ναος της αναστασεωςναος της αναστασεως
ναος της αναστασεως
Ελενη Ζαχου
 

Viewers also liked (9)

Kasiisi
KasiisiKasiisi
Kasiisi
 
ATTLAS et l' approche territoriale des conditions de travail
ATTLAS et l' approche territoriale des conditions de travailATTLAS et l' approche territoriale des conditions de travail
ATTLAS et l' approche territoriale des conditions de travail
 
Presentation1
Presentation1Presentation1
Presentation1
 
Grafica de barras
Grafica de barras Grafica de barras
Grafica de barras
 
Como conquistar um homem homem
Como conquistar um homem homemComo conquistar um homem homem
Como conquistar um homem homem
 
φύλλο εργασίας για ταινία αργύρη
φύλλο εργασίας για ταινία αργύρηφύλλο εργασίας για ταινία αργύρη
φύλλο εργασίας για ταινία αργύρη
 
Lecture 9 derivatives of trig functions - section 3.3
Lecture 9   derivatives of trig functions - section 3.3Lecture 9   derivatives of trig functions - section 3.3
Lecture 9 derivatives of trig functions - section 3.3
 
Experiment floating or submerging?
Experiment floating or submerging?Experiment floating or submerging?
Experiment floating or submerging?
 
ναος της αναστασεως
ναος της αναστασεωςναος της αναστασεως
ναος της αναστασεως
 

Similar to Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?

Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
Andrew Hammond
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
Andrew Hammond
 
Why defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skillWhy defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skill
Ollie Whitehouse
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
Agora Group
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Resilient Systems
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
Tryzens
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
Nune SrinivasRao
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
APNIC
 
Insight live om It-sikkerhed- Peter Schjøtt
Insight live om It-sikkerhed- Peter SchjøttInsight live om It-sikkerhed- Peter Schjøtt
Insight live om It-sikkerhed- Peter Schjøtt
Mediehuset Ingeniøren Live
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
African Cyber Security Summit
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
Debra Baker, CISSP CSSP
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 
Security analytics
Security analyticsSecurity analytics
Security analytics
Simon Bennett
 
Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2
Spyglass Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
frcarlson
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
Simson Garfinkel
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception Defense
Fidelis Cybersecurity
 
Man in the Binder
Man in the BinderMan in the Binder
Man in the Binder
nitayart
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security Threats
JumpCloud
 

Similar to Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability? (20)

Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
 
Why defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skillWhy defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skill
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Insight live om It-sikkerhed- Peter Schjøtt
Insight live om It-sikkerhed- Peter SchjøttInsight live om It-sikkerhed- Peter Schjøtt
Insight live om It-sikkerhed- Peter Schjøtt
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Security analytics
Security analyticsSecurity analytics
Security analytics
 
Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception Defense
 
Man in the Binder
Man in the BinderMan in the Binder
Man in the Binder
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security Threats
 

More from Codero

The Science Behind Generating Big Data
The Science Behind Generating Big DataThe Science Behind Generating Big Data
The Science Behind Generating Big Data
Codero
 
Internet of Things = More Big Data: How Will Cloud Computing Evolve?
Internet of Things = More Big Data: How Will Cloud Computing Evolve?Internet of Things = More Big Data: How Will Cloud Computing Evolve?
Internet of Things = More Big Data: How Will Cloud Computing Evolve?
Codero
 
The Future of IT Infrastructure is Hybrid and on Demand
The Future of IT Infrastructure is Hybrid and on DemandThe Future of IT Infrastructure is Hybrid and on Demand
The Future of IT Infrastructure is Hybrid and on Demand
Codero
 
Codero Cloud Expo Presentation
Codero Cloud Expo Presentation Codero Cloud Expo Presentation
Codero Cloud Expo Presentation
Codero
 
Codero Hosting Smart Servers Presentation
Codero Hosting Smart Servers PresentationCodero Hosting Smart Servers Presentation
Codero Hosting Smart Servers Presentation
Codero
 
Remote Server Management
Remote Server ManagementRemote Server Management
Remote Server Management
Codero
 
Server monitor
Server monitorServer monitor
Server monitor
Codero
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Codero
 
Managed Firewall
Managed FirewallManaged Firewall
Managed Firewall
Codero
 
Business Mail
Business MailBusiness Mail
Business Mail
Codero
 
Load Balancing
Load BalancingLoad Balancing
Load Balancing
Codero
 
Managed select-hosting
Managed select-hostingManaged select-hosting
Managed select-hosting
Codero
 
Managed premium-hosting
Managed premium-hostingManaged premium-hosting
Managed premium-hosting
Codero
 
Managed basic-hosting
Managed basic-hostingManaged basic-hosting
Managed basic-hosting
Codero
 
Private LAN
Private LANPrivate LAN
Private LAN
Codero
 
KVM-Over-IP
KVM-Over-IPKVM-Over-IP
KVM-Over-IP
Codero
 
Codero scope-of-support
Codero scope-of-supportCodero scope-of-support
Codero scope-of-support
Codero
 
Codero Custom Configurations
Codero Custom ConfigurationsCodero Custom Configurations
Codero Custom Configurations
Codero
 
Codero Managed Hosting
Codero Managed HostingCodero Managed Hosting
Codero Managed Hosting
Codero
 
G33k Sp3ak Decoded
G33k Sp3ak DecodedG33k Sp3ak Decoded
G33k Sp3ak Decoded
Codero
 

More from Codero (20)

The Science Behind Generating Big Data
The Science Behind Generating Big DataThe Science Behind Generating Big Data
The Science Behind Generating Big Data
 
Internet of Things = More Big Data: How Will Cloud Computing Evolve?
Internet of Things = More Big Data: How Will Cloud Computing Evolve?Internet of Things = More Big Data: How Will Cloud Computing Evolve?
Internet of Things = More Big Data: How Will Cloud Computing Evolve?
 
The Future of IT Infrastructure is Hybrid and on Demand
The Future of IT Infrastructure is Hybrid and on DemandThe Future of IT Infrastructure is Hybrid and on Demand
The Future of IT Infrastructure is Hybrid and on Demand
 
Codero Cloud Expo Presentation
Codero Cloud Expo Presentation Codero Cloud Expo Presentation
Codero Cloud Expo Presentation
 
Codero Hosting Smart Servers Presentation
Codero Hosting Smart Servers PresentationCodero Hosting Smart Servers Presentation
Codero Hosting Smart Servers Presentation
 
Remote Server Management
Remote Server ManagementRemote Server Management
Remote Server Management
 
Server monitor
Server monitorServer monitor
Server monitor
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Managed Firewall
Managed FirewallManaged Firewall
Managed Firewall
 
Business Mail
Business MailBusiness Mail
Business Mail
 
Load Balancing
Load BalancingLoad Balancing
Load Balancing
 
Managed select-hosting
Managed select-hostingManaged select-hosting
Managed select-hosting
 
Managed premium-hosting
Managed premium-hostingManaged premium-hosting
Managed premium-hosting
 
Managed basic-hosting
Managed basic-hostingManaged basic-hosting
Managed basic-hosting
 
Private LAN
Private LANPrivate LAN
Private LAN
 
KVM-Over-IP
KVM-Over-IPKVM-Over-IP
KVM-Over-IP
 
Codero scope-of-support
Codero scope-of-supportCodero scope-of-support
Codero scope-of-support
 
Codero Custom Configurations
Codero Custom ConfigurationsCodero Custom Configurations
Codero Custom Configurations
 
Codero Managed Hosting
Codero Managed HostingCodero Managed Hosting
Codero Managed Hosting
 
G33k Sp3ak Decoded
G33k Sp3ak DecodedG33k Sp3ak Decoded
G33k Sp3ak Decoded
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?

  • 1. 1 P R E S E N T E D B Y: CODERO HOSTING Cybersecurity: Do You Have a Plan to Address Threats and Prevent Liability? NTCA RTIME 2016 - Director Track Feb 21st, 2016
  • 2. 2 Introductions Codero is an Infrastructure-as-a-Service provider that offers dedicated, cloud, managed and hybrid hosting services to over 3,400 domestic and international customers from three datacenter locations We are at an interesting vantage point where we see all sorts of interesting things – this presentation will focus as a ‘report from the field’ related to cybersecurity from our position
  • 3. 3 The Internet Maxims The Internet is old. The Internet is insecure. The Internet is hostile.
  • 4. 4 Security used to be easy! • Fewer hosts • Knowledge over time • Automated Hacking/Attacking Tools
  • 5. 5 Who’s doing the attacking? • “Script kiddies” • Pre-built tools • Summer vacation / Boredom • Corporations • Intellectual property • Competitor’s strategy • Activists • Looking for publicity • Political/ideological • Nations • Utilities • Espionage • Defense technology • Denial of Use at national scope
  • 6. 6 Weapons • Phishing • Social engineering • Brute force • Watering hole attacks • Worms • Viruses • Trojan horses • DoS/DDoS attacks • Scareware • Ransomware / Extortion • MitM • Etc… • But are they easy to do?
  • 7. 7 The Arms Race • One of many tools on the market – LOIC* with ~2K downloads per day * LOIC – Low Orbit Ion Cannon
  • 9. 9 Defense • Not every attack is obvious • Change defaults • Stay patched • Backup your data • Avoid cross-pollination • Defense in depth • Policies / Framework / Plans • Act like the world really is out to get you
  • 10. 10 DoS/DDoS Attacks • Definition • How they work • Types • Mitigation
  • 11. 11 How easy is it to launch a DoS?
  • 12. 12 How easy is it to launch a DoS? (cont.) • 12.7Gbit/sec attack recently seen (very common range of attacks) • Attack lasted exactly 10minutes – DDoS as a service style • Showcases how much ‘spare’ capacity you need to have available at all areas of the network.
  • 13. 13 Conclusion - Security is a process • Use the NIST framework to determine • Where you are • What is at risk • What you should do • Patches • Scans / Logs • Who is knocking on the front door? • Timing and Targets • This happens thousands of times per day to all sizes of companies • Proper Staffing • Don’t wait for an incident to get resources focused