SlideShare a Scribd company logo
Adjusting
Our
Defenses
For 2012
The following presentation reflects the opinions of the author




Paul A. Henry
MCP+I, MCSE, CCSA, CCSE, CISSP-ISSAP, CISM, CISA, CIFI, CCE, ACE, GCFA, VCP4/5, vExpert

Security & Forensic Analyst
Quick Review – Notable Issues In 2011

•Notable issues in 2011
    » DigiNotar
    » The Beast
    » Epsilon Breach
    » Sony Breach
    » RSA Breach
    » Android Malware Growth
    » BYOD Adoption




2
          PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
DigiNotar

• Hackers compromised DigiNotar and made off with 500
  Certificates
• They quickly generated numerous illegal certificates
  including one for Google.com which reportedly was used by
  the Iranian government to spy on 300,000 Iranians
• Apple, Google, Microsoft, Mozilla and Opera released
  updates to block users from sites using DigiNotar related
  certificates
    » Apple was slow in pushing out an update that actually worked
    » The issue highlighted a problem in updating mobile devices as users
      were dependent on the update from their carrier
• Fast responses from (some) vendors mitigated a HUGE risk
  but it was perhaps to little to late for dissidents in Iran

3
            PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
The Beast

• The Beast - Hackers found a weakness in version 1.0 and
  earlier versions of TLS that could allow an attacker to silently
  decrypt data that's passing between a webserver and an
  end-user browser
    » Plain text recovery attack
• Problem was that at the time of its discovery that was the
  predominate version of TLS used by most browsers
• Browser vendors responded quickly with updates to newer
  and unaffected versions of TLS in their browsers
    » What about all the VoIP phones in use today
    » We have not heard the last of the issue
• Fast responses from (some) vendors mitigated a HUGE
  risk
4
           PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Epsilon

• Epsilon – The company handled mailing lists for 2500 clients
  including 7 of the Fortune 10
    » …. Jonathan Zittrain, a professor of law at Harvard Law School and co-
      founder of the Berkman Center for Internet & Society, told Brian Krebs,
      Epsilon was lazy in its security. "Worse, customers who specifically asked to
      opt out of marketing emails were also affected. Opting out should mean
      genuine removal from the database, rather than retention in the database with
      a marker indicating that someone has opted out.”…. Source Computerworld
• Epsilon - a rolodex for hackers in Spear Phishing attacks
• The Epsilon hack highlights the danger of a large amount of
  data entrusted to a single vendor… and perhaps highlights
  the potential risks of large data-stores in the Cloud
• Don’t keep all the eggs in a one basket and validate the
  security of your provider

5
             PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Sony Breaches

• Sony – Perhaps targest theft of identity information on record
    » Un-patched Redhat server connected directly to the Internet
      without a firewall
       •   What did they really expect was going to happen….
• We can not confirm that Credit Card information was taken…
    » Yes when you don’t have a firewall in front of the server you will
      not have logs to determine what was removed from the
      server…
• The estimated costs to Sony as a result of the breach go as
  high as $5.6 BILLION
• Using good security to prevent a breach is cheaper then
  cleaning up the mess afterwards…

6
              PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
RSA (1)

• When a small to medium sized company has a breach they
  are punished for being irresponsible
    » When it happens to a behemoth it is unapologetically called
      APT
• So many questions remain…
    » Why was RSA not using their own products to protect their
      environment?
    » Why was Amazon not taken to task after it was revealed that
      the Amazon Cloud was used in cracking the internal passwords
      to facilitate the RSA breach?
    » Why has no one mentioned that the current issue with RSA
      Tokens seems eerily similar to the problem with the Pre-AES
      Tokens back in 2000 – See Cain & Able

7
           PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
RSA (2)

• With the RSA breach what did we learn?
    » Policies without technical safeguards are useless
    » Passwords still suck
    » Hard shell / soft center is not simply not an acceptable security
      posture in the current threat environment
    » Apparently if you’re a behemoth you can get away with
      having poor security and calling the attack an APT




8
           PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Android Malware (1)


  •Fastest growing mobile OS
  •Over 300,000 Android activations a day
  •Android overtook iOS as the dominant
   OS in US during 2H 2010
  •First phone launched HTC G1 in 2008
  •Currently an OS of choice for Motorola,
   HTC, Samsung, Sony Ericsson, among
   others
Android Malware (2)


  •With all of the news about malicious
   Droid Apps downloaded from the Droid
   Marketplace it is clearly apparent that
   testing apps is perhaps not a high priority
   before turning them loose on users
Android Malware (3)


  •A good example of Android security
   issues was highlighted with Angry Birds.
   Duo Security showed us that it was
   possible to install an app that allowed the
   unprompted installation of arbitrary
   applications with arbitrary permissions on
   a victim’s device
   http://blog.duosecurity.com
When Angry Birds Attack

  •Hmmm…
When Angry Birds Attack

  •Ouch…
The Droid Dream Fiasco

  •There are serious issues over at Google’s
   Android Market
Android – The Road Ahead In 2012

     • If you use an Android smartphone you are
      now 2.5 times more likely to encounter
      malware (malicious software) than you were
      six months ago.

     •In 2011, 30% of Android users were likely to
      encounter a Web-based threat such as
      phishing scams, "drive by downloads" and
      browser exploits.
      http://www.cnn.com/2011/TECH/mobile/08/04/lookout.threat.report.gahran/



15
            PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
BYOD – Blind Adoption

     • A recent survey
      of Companies
      with 2,000 or
      more employees
      indicated that
      70% permitted
      BYOD yet less
      then 30% had
      policies to
      address device
      security

16
         PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Considerations - Moving Forward in 2012

     •Java
     •QRCodes
     •BYOD
     •Injection Malware
     •VoIP Attacks
     •Virtualization




17
         PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Our Flaw Remediation Is Missing The Target

                            • Since 2009 the most hacked
                              software was 3rd party apps
                              and browser add-ons like
                              Adobe and Quicktime.
                            • In Q4 2011 the new leading
                              threat vector became Java
                            • Yet we focus our attention on
                              patching Microsoft
                              OS/Applications.
                The bad guys know it…
              and are taking full advantage



18
QR Codes

• QR codes are becoming the new SPAM
  » In the simplest of terms a QR Code (or Quick Response
    code) is a two dimensional barcode that can contain up
    to 4,296 alphanumeric characters.
  » Their popularity has of course exploded one recent study
    showed that in June of 2011 over 14 million Americans
    scanned QR Codes with their mobile phone.
Talk About Bad Timing

•Malicious URLs are at all time highs – from Q2
 2011 to Q4 2011 they are up an additional 89%
•QR scanning growth is exploding – the Mobile
 Barcode Trend Report provides interesting statics:
  » Active users of QR Codes is up 525%
  » Average number of scans per code is up 39%
Talk About Bad Timing (2)

 •Mobile Marketer reports QR code scanning is up
  4,549%
 • It’s easy for anyone to create a QR code with any
  kind of content
 • Mobile devices such as iPhones and Androids out
  of the box are poorly equipped to deal with filtering
  QR codes and their underlying URLs
Talk About Bad Timing (3)

 •Malicious QR codes are already making money for
  the bad guys. It is a certainty that the use of
  malicious QR codes will expand.
BYOD (1)

• Organizations are
  embracing BYOD without
  considering the security
  risks
• At the same time the
  landscape of mobile
  devices is changing
  dramatically
BYOD (2)

• The time to get serious
  about security in BYOD is
  long over due
BYOD (3)

• Long overdue
  Google Bouncer
Injection Malware (1)

• Inserting malware in to a running process is now common
Injection Malware (2)
Injection Malware (3)
Hactivism Continues To Grow

• Anonymous is getting even more aggressive
Hactivists Have Discovered VoIP
VoIP – The Song Remains The Same…
VoIP Is Becoming A More Popular Vehicle
What Took So Long?
Wireshark – VoIP Call Sniffing / Recording

                  2

        1




                          3         4
UCSniff – Automated VoIP VLAN Hopping
Virtualization – The Stars Are In Alignment (1)
Virtualization – The Stars Are In Alignment (2)
2012 Initiatives

 1. Adjust flaw remediation program immediately to
    include Java
 2. Establish policies for QRcodes and deploy
    technical safeguards – Mobile device URL
    filter?
 3. Establish policies for BYOD and deploy
    technical safeguards – many are free !
 4. No longer your grandfathers malware - Migrate
    to White Listing / Application Control
 5. Get control of VoIP before it controls you
 6. Virtualization is ripe for the picking, the party is
    over Host and Guest security must be a priority

More Related Content

What's hot

Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
Lookout
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
Symantec
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
SHOLOVE INTERNATIONAL LLC
 
Readying your IT Infrastructure for Cloud
Readying your IT Infrastructure for CloudReadying your IT Infrastructure for Cloud
Readying your IT Infrastructure for Cloud
RH
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
Mastel Indonesia
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient Truth
IBM Security
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
Fabio Pietrosanti
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
IBM Security
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoT
MONICA-Project
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
Denim Group
 
ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021
Doug Newdick
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Security
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
Denim Group
 
The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016
William Slater III
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
Don Gulling
 

What's hot (20)

Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
Mobile security
Mobile securityMobile security
Mobile security
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Readying your IT Infrastructure for Cloud
Readying your IT Infrastructure for CloudReadying your IT Infrastructure for Cloud
Readying your IT Infrastructure for Cloud
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient Truth
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoT
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
 
The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 

Viewers also liked

First EU Info-day
First EU Info-dayFirst EU Info-day
First EU Info-day
CES-EUC
 
Informe tns la influencia de internet en las decisiones de compra (1)
Informe tns la influencia de internet en las decisiones de compra (1)Informe tns la influencia de internet en las decisiones de compra (1)
Informe tns la influencia de internet en las decisiones de compra (1)Yolanda Ruiz Hervás
 
M O T I V A C IÓ N Final
M O T I V A C IÓ N  FinalM O T I V A C IÓ N  Final
M O T I V A C IÓ N FinalFemoglas
 
Lec 4 06_aug [compatibility mode]
Lec 4 06_aug [compatibility mode]Lec 4 06_aug [compatibility mode]
Lec 4 06_aug [compatibility mode]Palak Sanghani
 
Cartapastoral 2out2011
Cartapastoral 2out2011Cartapastoral 2out2011
Cartapastoral 2out2011
João Rufino de Sales
 
Guerra cibernetica fecomercio set 2010 1
Guerra cibernetica fecomercio set 2010 1Guerra cibernetica fecomercio set 2010 1
Guerra cibernetica fecomercio set 2010 1João Rufino de Sales
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Presentazione Double Take Remota
Presentazione Double Take RemotaPresentazione Double Take Remota
Presentazione Double Take Remota
modestini
 
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
HP Enterprise Italia
 
Faq How to print user manual
Faq How to print user manualFaq How to print user manual
Faq How to print user manual
cck008
 
Democrazia liquida slideshow-01
Democrazia liquida slideshow-01Democrazia liquida slideshow-01
Democrazia liquida slideshow-01
DemocraziaLiquida
 
Hashbot.com - Acquisizione e Validazione
Hashbot.com - Acquisizione e ValidazioneHashbot.com - Acquisizione e Validazione
Hashbot.com - Acquisizione e ValidazioneGianni Amato
 
Green Games
Green GamesGreen Games
Green Games
Delhi Jal Board
 
Nota aclaratoria
Nota aclaratoriaNota aclaratoria
Nota aclaratoriawebanexo
 
Ppt rawstream cips_webinar
Ppt rawstream cips_webinarPpt rawstream cips_webinar
Ppt rawstream cips_webinar
Maurizio Taglioretti
 
0002 ac 1139 fascicolo emendamenti 5 stelle
0002   ac 1139 fascicolo emendamenti 5 stelle0002   ac 1139 fascicolo emendamenti 5 stelle
0002 ac 1139 fascicolo emendamenti 5 stelleFrancesco Quarto
 

Viewers also liked (20)

First EU Info-day
First EU Info-dayFirst EU Info-day
First EU Info-day
 
Informe tns la influencia de internet en las decisiones de compra (1)
Informe tns la influencia de internet en las decisiones de compra (1)Informe tns la influencia de internet en las decisiones de compra (1)
Informe tns la influencia de internet en las decisiones de compra (1)
 
M O T I V A C IÓ N Final
M O T I V A C IÓ N  FinalM O T I V A C IÓ N  Final
M O T I V A C IÓ N Final
 
Lec 4 06_aug [compatibility mode]
Lec 4 06_aug [compatibility mode]Lec 4 06_aug [compatibility mode]
Lec 4 06_aug [compatibility mode]
 
Bases
BasesBases
Bases
 
Cartapastoral 2out2011
Cartapastoral 2out2011Cartapastoral 2out2011
Cartapastoral 2out2011
 
Guerra cibernetica fecomercio set 2010 1
Guerra cibernetica fecomercio set 2010 1Guerra cibernetica fecomercio set 2010 1
Guerra cibernetica fecomercio set 2010 1
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Presentazione Double Take Remota
Presentazione Double Take RemotaPresentazione Double Take Remota
Presentazione Double Take Remota
 
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
HP Software Performance Tour 2014 - Enterprise Agility in the age of Applicat...
 
Faq How to print user manual
Faq How to print user manualFaq How to print user manual
Faq How to print user manual
 
Democrazia liquida slideshow-01
Democrazia liquida slideshow-01Democrazia liquida slideshow-01
Democrazia liquida slideshow-01
 
Hashbot.com - Acquisizione e Validazione
Hashbot.com - Acquisizione e ValidazioneHashbot.com - Acquisizione e Validazione
Hashbot.com - Acquisizione e Validazione
 
Approaches To Professional Developmentv2
Approaches To Professional Developmentv2Approaches To Professional Developmentv2
Approaches To Professional Developmentv2
 
Guerradecomandoecontrole fean-2011
Guerradecomandoecontrole fean-2011Guerradecomandoecontrole fean-2011
Guerradecomandoecontrole fean-2011
 
Green Games
Green GamesGreen Games
Green Games
 
Nota aclaratoria
Nota aclaratoriaNota aclaratoria
Nota aclaratoria
 
Modulo 7
Modulo 7Modulo 7
Modulo 7
 
Ppt rawstream cips_webinar
Ppt rawstream cips_webinarPpt rawstream cips_webinar
Ppt rawstream cips_webinar
 
0002 ac 1139 fascicolo emendamenti 5 stelle
0002   ac 1139 fascicolo emendamenti 5 stelle0002   ac 1139 fascicolo emendamenti 5 stelle
0002 ac 1139 fascicolo emendamenti 5 stelle
 

Similar to Lumension Security - Adjusting our defenses for 2012

NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
Vince Verbeke
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
AVG Technologies AU
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Accellis Technology Group
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
AVG Technologies AU
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
Great Bay Software
 
Cyber Security Predictions 2016
Cyber Security Predictions 2016Cyber Security Predictions 2016
Cyber Security Predictions 2016
Quick Heal Technologies Ltd.
 
Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011
Source Conference
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
chauhananand17
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
tmbainjr131
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
EC-Council
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
Jay McLaughlin
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022
PECB
 
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsInvincea, Inc.
 
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher PerspectiveKaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network securityBev Robb
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
Rui Miguel Feio
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
Alert Logic
 

Similar to Lumension Security - Adjusting our defenses for 2012 (20)

NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Cyber Security Predictions 2016
Cyber Security Predictions 2016Cyber Security Predictions 2016
Cyber Security Predictions 2016
 
Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022
 
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
 
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher PerspectiveKaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 

More from Andris Soroka

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Andris Soroka
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Andris Soroka
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Andris Soroka
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Andris Soroka
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Andris Soroka
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Andris Soroka
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Andris Soroka
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Andris Soroka
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Andris Soroka
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Andris Soroka
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Andris Soroka
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Andris Soroka
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Andris Soroka
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Andris Soroka
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Andris Soroka
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Andris Soroka
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Andris Soroka
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Andris Soroka
 

More from Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Lumension Security - Adjusting our defenses for 2012

  • 1. Adjusting Our Defenses For 2012 The following presentation reflects the opinions of the author Paul A. Henry MCP+I, MCSE, CCSA, CCSE, CISSP-ISSAP, CISM, CISA, CIFI, CCE, ACE, GCFA, VCP4/5, vExpert Security & Forensic Analyst
  • 2. Quick Review – Notable Issues In 2011 •Notable issues in 2011 » DigiNotar » The Beast » Epsilon Breach » Sony Breach » RSA Breach » Android Malware Growth » BYOD Adoption 2 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 3. DigiNotar • Hackers compromised DigiNotar and made off with 500 Certificates • They quickly generated numerous illegal certificates including one for Google.com which reportedly was used by the Iranian government to spy on 300,000 Iranians • Apple, Google, Microsoft, Mozilla and Opera released updates to block users from sites using DigiNotar related certificates » Apple was slow in pushing out an update that actually worked » The issue highlighted a problem in updating mobile devices as users were dependent on the update from their carrier • Fast responses from (some) vendors mitigated a HUGE risk but it was perhaps to little to late for dissidents in Iran 3 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 4. The Beast • The Beast - Hackers found a weakness in version 1.0 and earlier versions of TLS that could allow an attacker to silently decrypt data that's passing between a webserver and an end-user browser » Plain text recovery attack • Problem was that at the time of its discovery that was the predominate version of TLS used by most browsers • Browser vendors responded quickly with updates to newer and unaffected versions of TLS in their browsers » What about all the VoIP phones in use today » We have not heard the last of the issue • Fast responses from (some) vendors mitigated a HUGE risk 4 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 5. Epsilon • Epsilon – The company handled mailing lists for 2500 clients including 7 of the Fortune 10 » …. Jonathan Zittrain, a professor of law at Harvard Law School and co- founder of the Berkman Center for Internet & Society, told Brian Krebs, Epsilon was lazy in its security. "Worse, customers who specifically asked to opt out of marketing emails were also affected. Opting out should mean genuine removal from the database, rather than retention in the database with a marker indicating that someone has opted out.”…. Source Computerworld • Epsilon - a rolodex for hackers in Spear Phishing attacks • The Epsilon hack highlights the danger of a large amount of data entrusted to a single vendor… and perhaps highlights the potential risks of large data-stores in the Cloud • Don’t keep all the eggs in a one basket and validate the security of your provider 5 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 6. Sony Breaches • Sony – Perhaps targest theft of identity information on record » Un-patched Redhat server connected directly to the Internet without a firewall • What did they really expect was going to happen…. • We can not confirm that Credit Card information was taken… » Yes when you don’t have a firewall in front of the server you will not have logs to determine what was removed from the server… • The estimated costs to Sony as a result of the breach go as high as $5.6 BILLION • Using good security to prevent a breach is cheaper then cleaning up the mess afterwards… 6 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 7. RSA (1) • When a small to medium sized company has a breach they are punished for being irresponsible » When it happens to a behemoth it is unapologetically called APT • So many questions remain… » Why was RSA not using their own products to protect their environment? » Why was Amazon not taken to task after it was revealed that the Amazon Cloud was used in cracking the internal passwords to facilitate the RSA breach? » Why has no one mentioned that the current issue with RSA Tokens seems eerily similar to the problem with the Pre-AES Tokens back in 2000 – See Cain & Able 7 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 8. RSA (2) • With the RSA breach what did we learn? » Policies without technical safeguards are useless » Passwords still suck » Hard shell / soft center is not simply not an acceptable security posture in the current threat environment » Apparently if you’re a behemoth you can get away with having poor security and calling the attack an APT 8 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 9. Android Malware (1) •Fastest growing mobile OS •Over 300,000 Android activations a day •Android overtook iOS as the dominant OS in US during 2H 2010 •First phone launched HTC G1 in 2008 •Currently an OS of choice for Motorola, HTC, Samsung, Sony Ericsson, among others
  • 10. Android Malware (2) •With all of the news about malicious Droid Apps downloaded from the Droid Marketplace it is clearly apparent that testing apps is perhaps not a high priority before turning them loose on users
  • 11. Android Malware (3) •A good example of Android security issues was highlighted with Angry Birds. Duo Security showed us that it was possible to install an app that allowed the unprompted installation of arbitrary applications with arbitrary permissions on a victim’s device http://blog.duosecurity.com
  • 12. When Angry Birds Attack •Hmmm…
  • 13. When Angry Birds Attack •Ouch…
  • 14. The Droid Dream Fiasco •There are serious issues over at Google’s Android Market
  • 15. Android – The Road Ahead In 2012 • If you use an Android smartphone you are now 2.5 times more likely to encounter malware (malicious software) than you were six months ago. •In 2011, 30% of Android users were likely to encounter a Web-based threat such as phishing scams, "drive by downloads" and browser exploits. http://www.cnn.com/2011/TECH/mobile/08/04/lookout.threat.report.gahran/ 15 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 16. BYOD – Blind Adoption • A recent survey of Companies with 2,000 or more employees indicated that 70% permitted BYOD yet less then 30% had policies to address device security 16 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 17. Considerations - Moving Forward in 2012 •Java •QRCodes •BYOD •Injection Malware •VoIP Attacks •Virtualization 17 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 18. Our Flaw Remediation Is Missing The Target • Since 2009 the most hacked software was 3rd party apps and browser add-ons like Adobe and Quicktime. • In Q4 2011 the new leading threat vector became Java • Yet we focus our attention on patching Microsoft OS/Applications. The bad guys know it… and are taking full advantage 18
  • 19. QR Codes • QR codes are becoming the new SPAM » In the simplest of terms a QR Code (or Quick Response code) is a two dimensional barcode that can contain up to 4,296 alphanumeric characters. » Their popularity has of course exploded one recent study showed that in June of 2011 over 14 million Americans scanned QR Codes with their mobile phone.
  • 20. Talk About Bad Timing •Malicious URLs are at all time highs – from Q2 2011 to Q4 2011 they are up an additional 89% •QR scanning growth is exploding – the Mobile Barcode Trend Report provides interesting statics: » Active users of QR Codes is up 525% » Average number of scans per code is up 39%
  • 21. Talk About Bad Timing (2) •Mobile Marketer reports QR code scanning is up 4,549% • It’s easy for anyone to create a QR code with any kind of content • Mobile devices such as iPhones and Androids out of the box are poorly equipped to deal with filtering QR codes and their underlying URLs
  • 22. Talk About Bad Timing (3) •Malicious QR codes are already making money for the bad guys. It is a certainty that the use of malicious QR codes will expand.
  • 23. BYOD (1) • Organizations are embracing BYOD without considering the security risks • At the same time the landscape of mobile devices is changing dramatically
  • 24. BYOD (2) • The time to get serious about security in BYOD is long over due
  • 25. BYOD (3) • Long overdue Google Bouncer
  • 26. Injection Malware (1) • Inserting malware in to a running process is now common
  • 29. Hactivism Continues To Grow • Anonymous is getting even more aggressive
  • 31. VoIP – The Song Remains The Same…
  • 32. VoIP Is Becoming A More Popular Vehicle
  • 33. What Took So Long?
  • 34. Wireshark – VoIP Call Sniffing / Recording 2 1 3 4
  • 35. UCSniff – Automated VoIP VLAN Hopping
  • 36. Virtualization – The Stars Are In Alignment (1)
  • 37. Virtualization – The Stars Are In Alignment (2)
  • 38. 2012 Initiatives 1. Adjust flaw remediation program immediately to include Java 2. Establish policies for QRcodes and deploy technical safeguards – Mobile device URL filter? 3. Establish policies for BYOD and deploy technical safeguards – many are free ! 4. No longer your grandfathers malware - Migrate to White Listing / Application Control 5. Get control of VoIP before it controls you 6. Virtualization is ripe for the picking, the party is over Host and Guest security must be a priority

Editor's Notes

  1. Insert a small stub of code which allocates a larger chunk of memory. The last instruction in this stub code is the software breakpoint instruction to transfer control back to the debugging process. Limitations are that the process you are infecting needs to have enough memory allocated past where the instruction pointer is pointing to support the shellcode. Approximately 40 bytes. The debugging process then inserts code to clean up the old process memory space and allocate room for the new image in its ideal location. The code also sets up the heap for the new process. The last instruction in this code is a software breakpoint. The debuger is then resumed so that this code may execute and allocate memory. When control returns to the debugger, it copies the new executable into the process memory in the appropriate manner. The debugger process modifies the stack and registers for the process as necessary Point at the new entry point. Detach.
  2. Not to overly simplify it but here is a Windows example of how this works 1. We exploit a vulnerability that allows us to inject shell code (typically 40 to 100 bytes or less) in to a running process 2. The shell code allocates additional memory for the process 3. Via backdoor established by shell code downloads malicious code, inserts it directly in to memory allocated in step 2 and establishes hooks to call malicious code 4. Shell code is removed from original code Allocated in RAM never touching the hard drive = no evidence ! Why a Linux example ? This is RAM resident so if you reboot it goes away… how often do you reboot Windows servers vs Linux servers…. Nuff said If you were doing forensics on this incident …. What would you do?
  3. Additionally, Wireshark allows recording the audio for the VoIP conversation into a file.   Through the “Telephony” menu and selecting the “RTP” menu item, it is possible to get this functionality: The “Stream Analysis – Show All Streams…” (Step 1) menu item can be selected to analyze in depth the Real-time Transport Protocol (RTP) stream associated with the currently selected RTP packet. From the RTP Streams window select the stream with the desired initial callers IP address (Step 2), select “Find Reverse” (Step 3) to automatically select mark both streams and then press “Analyze” (Step 4).
  4. Additionally, Wireshark allows recording the audio for the VoIP conversation into a file.   Through the “Telephony” menu and selecting the “RTP” menu item, it is possible to get this functionality: The “Stream Analysis – Show All Streams…” (Step 1) menu item can be selected to analyze in depth the Real-time Transport Protocol (RTP) stream associated with the currently selected RTP packet. From the RTP Streams window select the stream with the desired initial callers IP address (Step 2), select “Find Reverse” (Step 3) to automatically select mark both streams and then press “Analyze” (Step 4).