SlideShare a Scribd company logo
Make Every Spin
Count:
Putting The Security Odds
In Your Favor
About Me:
• Director of Engineering at
Cerdant
• 13 years
• Avid Golfer, Runner and
Outdoorsman
• Nerf Gun Enthusiast
• Twitter - @joshuaskeens
• joshua.skeens@cerdant.co
m
Make Every Spin Count: Putting
The Security Odds In Your Favor
 How can I put the odds in my favor?
 We first need to know what our odds are
 2017 Verizon Report statistics
 Best “bets” to increase your security odds
Verizon Report
2017
 10th Annual DBIR Report
 65 Sources
 Includes
 Breaches
 Incidents
Verizon Report 2017
Verizon Report 2017
Let’s stop
gambling with
our data.
• It’s never going to happen to
me!
• I’ve got a firewall and Anti-virus
I’m unhackable!
• My users never click on links
they shouldn’t
Verizon Report 2017
61%
• of the data breach victims in this year’s report
are businesses with under 1,000 employees
Verizon Report 2017
80%
• of hacking-related breaches leveraged either stolen passwords and/or weak or
guessable passwords.
95%
• of phishing attacks that led to a breach were followed by some sort of software
installation.
• 1 in 14 people were tricked into opening a link or attachment they shouldn't
• 25% of those people were tricked into doing it again
Top 25 Passwords of 2016
123456
123456789
qwerty
12345678
111111
123456789
0
1234567
password
123123
987654321
qwertyuiop
mynoob
123321
666666
18atcskd2
w
7777777
1q2w3e4r
654321
555555
3rjs1la7qe
google
1q2w3e4r5
t
123qwe
zxcvbnm
1q2w3e
Was your password on that list??!!
What is a hacker?!
Let’s stop
gambling and
let’s starting
WINNING!
 Nothing is hack proof
 But we don’t want to make anything easy
 Most hackers don’t want to work that hard
 What steps can we take to put the
odds in our favor?
Stacking the Odds in your favor
 Passwords
 Enforce Password Complexity
 8+ characters
 Require Upper Case, Lower Case, Special Characters and Numbers
 Password Rotation
 Teach password creation
 Yahoo & LinkedIn
 2FA – use it EVERYWHERE!!!
 https://twofactorauth.org/
 Minimize Privileges
 No Local Admin rights
 No Domain Admin rights
 Different Local Admin for each machine
 Microsoft LAPS
Stacking the Odds in your favor….
 Command Line (cmd)
 Disable access
 Most users don’t need access to CMD
 PowerShell
 Disable access
 BUT…..some users do need PowerShell access
Grant Privileges via AD Groups
Enable it when needed – default should be disabled
Stacking the Odds in your favor….
 Network Segmentation
 VLANs, VLANs, VLANs
 Isolate devices and departments
 DMZ for public facing servers
 Wireless Segmentation
 Multiple SSIDs
Employees
BYOD
Guest
Stacking the Odds in your favor….
 Protect the Gateway
 Next Generation Firewall
SonicWALL!!
 Strong Access Lists
Yes strict outbound port policies
 Audit your ruleset regularly
 DPI-SSL
60% to 70% of all traffic is encrypted now
 Scan for and block Applications
 Capture ATP
 Sandbox Malicious files before they even make it onto the network
Stacking the Odds in your favor….
 Anti-virus
 Deploy Anti-virus at the End Point
 New Artificial Intelligence (AI) AV
Cylance
No database
No patient-zero
Doesn’t need Internet Access to pull updates
98% effective rate
Cloud Management
Signature-based AV solutions are less than 40% effective
POC – ZERODay!
Stacking the Odds in your favor….
 OS Patching
 Move to supported OS
 Schedule routine patching
 Application Patching
 Patch Applications
Security Patches
Stacking the Odds in your favor….
 Device Inventory Management
 Spiceworks
 WhatsUp
 ManageEngine
 Application Inventory Management
 Ninite
 Spiceworks
 ManageEngine
Stacking the Odds in your favor….
 Attached Device Management
 Should employees be allowed to connect USB drives?
 Disable feature
 Provide company USBs
Lock down USBs to specific OUIs
*Cylance*
 Data Backup
 Backup critical data daily
 Do scheduled restores to test data backup validity
Stacking the Odds in your favor….
 Application Whitelisting
 Only allow “Approved” Applications to run
Cylance
Windows has Application Whitelisting Built-in
 Lockdown DNS Access
 Enforce DNS access to Local Server(s) only
 Lockdown outbound DNS access to DNS Servers only
 Vulnerability/Network Assessments
Why the Hackers “house”
normally win
Stacking the Odds in your favor….
 Employees
 Single largest Security Risk
 At least 60% of all incidents can be contributed to employees
 Easiest attack angle
 What can be done?
 Train employees on proper Email and Web browsing etiquette
KnowBe4
PhishMe
 Gauge employee computer & security knowledge
 Train employees on security awareness, and reward them for
reporting suspicious activity
You might be feeling like this now…
But You can do this!
• The 1st thing is to just get started
• Don’t be paralyzed
• Create your list and implement 1 new security
practice each week
• Schedule quarterly security reviews as soon as you
get back to the office
• There is no shame in doing the easiest 1st
• Anything is better than nothing
THANK YOU!!!!!

More Related Content

What's hot

Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
Blue Coat
 
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionInfographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Blue Coat
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
Blue Coat
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept X
Sophos Benelux
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
AlienVault
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
Giovanni Giovannelli
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
Sophos Benelux
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
MarketingArrowECS_CZ
 
Security Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas AzureSecurity Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas Azure
Alert Logic
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security
 
ATP
ATPATP
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
AlienVault
 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
DeServ - Tecnologia e Servços
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Symantec
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
Cisco Canada
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Storage Switzerland
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
Alert Logic
 
Network Security Tools
Network Security ToolsNetwork Security Tools
Network Security Tools
Emanuela Boroș
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
Reducing Your Attack Surface
Reducing Your Attack SurfaceReducing Your Attack Surface
Reducing Your Attack Surface
Alert Logic
 

What's hot (20)

Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionInfographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept X
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 
Security Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas AzureSecurity Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas Azure
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
ATP
ATPATP
ATP
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Network Security Tools
Network Security ToolsNetwork Security Tools
Network Security Tools
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Reducing Your Attack Surface
Reducing Your Attack SurfaceReducing Your Attack Surface
Reducing Your Attack Surface
 

Similar to Make Every Spin Count: Putting the Security Odds in Your Favor

Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
Sebastien Deleersnyder
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
Raleigh ISSA
 
The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - Powertech
HelpSystems
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
WindstoneHealth
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application Security
Imperva Incapsula
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat Ransomware
Ivanti
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
Quick Heal Technologies Ltd.
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
TechSoup
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
GFI Software
 
How to code securely: a crash course for non-coders
How to code securely: a crash course for non-codersHow to code securely: a crash course for non-coders
How to code securely: a crash course for non-coders
Jaap Karan Singh
 
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Eric Kolb
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
BeyondTrust
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
Jim Kaplan CIA CFE
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?
MenloSecurity
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
Cisco Canada
 
Novinky F5
Novinky F5Novinky F5
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
Chris Gates
 
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Imperva Incapsula
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 

Similar to Make Every Spin Count: Putting the Security Odds in Your Favor (20)

Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
 
The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - Powertech
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application Security
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat Ransomware
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
How to code securely: a crash course for non-coders
How to code securely: a crash course for non-codersHow to code securely: a crash course for non-coders
How to code securely: a crash course for non-coders
 
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
Novinky F5
Novinky F5Novinky F5
Novinky F5
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
 
Information Security
Information SecurityInformation Security
Information Security
 

Recently uploaded

2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
MJ Global
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
ABHILASH DUTTA
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Lviv Startup Club
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 

Recently uploaded (20)

2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 

Make Every Spin Count: Putting the Security Odds in Your Favor

  • 1. Make Every Spin Count: Putting The Security Odds In Your Favor
  • 2. About Me: • Director of Engineering at Cerdant • 13 years • Avid Golfer, Runner and Outdoorsman • Nerf Gun Enthusiast • Twitter - @joshuaskeens • joshua.skeens@cerdant.co m
  • 3. Make Every Spin Count: Putting The Security Odds In Your Favor  How can I put the odds in my favor?  We first need to know what our odds are  2017 Verizon Report statistics  Best “bets” to increase your security odds
  • 4. Verizon Report 2017  10th Annual DBIR Report  65 Sources  Includes  Breaches  Incidents
  • 7. Let’s stop gambling with our data. • It’s never going to happen to me! • I’ve got a firewall and Anti-virus I’m unhackable! • My users never click on links they shouldn’t
  • 8. Verizon Report 2017 61% • of the data breach victims in this year’s report are businesses with under 1,000 employees
  • 9. Verizon Report 2017 80% • of hacking-related breaches leveraged either stolen passwords and/or weak or guessable passwords. 95% • of phishing attacks that led to a breach were followed by some sort of software installation. • 1 in 14 people were tricked into opening a link or attachment they shouldn't • 25% of those people were tricked into doing it again
  • 10. Top 25 Passwords of 2016 123456 123456789 qwerty 12345678 111111 123456789 0 1234567 password 123123 987654321 qwertyuiop mynoob 123321 666666 18atcskd2 w 7777777 1q2w3e4r 654321 555555 3rjs1la7qe google 1q2w3e4r5 t 123qwe zxcvbnm 1q2w3e
  • 11. Was your password on that list??!!
  • 12. What is a hacker?!
  • 13. Let’s stop gambling and let’s starting WINNING!  Nothing is hack proof  But we don’t want to make anything easy  Most hackers don’t want to work that hard  What steps can we take to put the odds in our favor?
  • 14. Stacking the Odds in your favor  Passwords  Enforce Password Complexity  8+ characters  Require Upper Case, Lower Case, Special Characters and Numbers  Password Rotation  Teach password creation  Yahoo & LinkedIn  2FA – use it EVERYWHERE!!!  https://twofactorauth.org/  Minimize Privileges  No Local Admin rights  No Domain Admin rights  Different Local Admin for each machine  Microsoft LAPS
  • 15. Stacking the Odds in your favor….  Command Line (cmd)  Disable access  Most users don’t need access to CMD  PowerShell  Disable access  BUT…..some users do need PowerShell access Grant Privileges via AD Groups Enable it when needed – default should be disabled
  • 16. Stacking the Odds in your favor….  Network Segmentation  VLANs, VLANs, VLANs  Isolate devices and departments  DMZ for public facing servers  Wireless Segmentation  Multiple SSIDs Employees BYOD Guest
  • 17. Stacking the Odds in your favor….  Protect the Gateway  Next Generation Firewall SonicWALL!!  Strong Access Lists Yes strict outbound port policies  Audit your ruleset regularly  DPI-SSL 60% to 70% of all traffic is encrypted now  Scan for and block Applications  Capture ATP  Sandbox Malicious files before they even make it onto the network
  • 18. Stacking the Odds in your favor….  Anti-virus  Deploy Anti-virus at the End Point  New Artificial Intelligence (AI) AV Cylance No database No patient-zero Doesn’t need Internet Access to pull updates 98% effective rate Cloud Management Signature-based AV solutions are less than 40% effective POC – ZERODay!
  • 19. Stacking the Odds in your favor….  OS Patching  Move to supported OS  Schedule routine patching  Application Patching  Patch Applications Security Patches
  • 20. Stacking the Odds in your favor….  Device Inventory Management  Spiceworks  WhatsUp  ManageEngine  Application Inventory Management  Ninite  Spiceworks  ManageEngine
  • 21. Stacking the Odds in your favor….  Attached Device Management  Should employees be allowed to connect USB drives?  Disable feature  Provide company USBs Lock down USBs to specific OUIs *Cylance*  Data Backup  Backup critical data daily  Do scheduled restores to test data backup validity
  • 22. Stacking the Odds in your favor….  Application Whitelisting  Only allow “Approved” Applications to run Cylance Windows has Application Whitelisting Built-in  Lockdown DNS Access  Enforce DNS access to Local Server(s) only  Lockdown outbound DNS access to DNS Servers only  Vulnerability/Network Assessments
  • 23. Why the Hackers “house” normally win
  • 24. Stacking the Odds in your favor….  Employees  Single largest Security Risk  At least 60% of all incidents can be contributed to employees  Easiest attack angle  What can be done?  Train employees on proper Email and Web browsing etiquette KnowBe4 PhishMe  Gauge employee computer & security knowledge  Train employees on security awareness, and reward them for reporting suspicious activity
  • 25. You might be feeling like this now…
  • 26. But You can do this! • The 1st thing is to just get started • Don’t be paralyzed • Create your list and implement 1 new security practice each week • Schedule quarterly security reviews as soon as you get back to the office • There is no shame in doing the easiest 1st • Anything is better than nothing