SlideShare a Scribd company logo
1 of 106
Download to read offline
SACON
SACON	International	2017
Gregory	Pickett
Hellfire	Security
Cybersecurity	Operations
@shogun7273
India	|	Bangalore	|	November	10	– 11	|	Hotel	Lalit	Ashok
Open	Source	Security	Orchestration
SACON 2017
• How	This	All	Began
• Orchestrating	All	The	Things
• Behold	Skynet
• Making	It	Better
• Wrapping	Up
Overview
SACON 2017
• Multiple	Cloud	Servers
• All	Using	Fail2Ban	to	Protect	Themselves
• Can	I	share	Fail2Ban	jails	between	these
Servers?
Original	Question
SACON 2017
• How	do	we	get	to	threats	in	time?
• How	do	we	make	sure	that	the	evidence	gets	captured?
• How	do	we	make	sure	that	the	threat
is	stopped	before	it	is	too	late?
• How	do	we	do	this	with	a	limited	staff?
Other	Questions
SACON 2017
• Security	Operations
• Monitor	The	Enterprise
• Process	Alerts	(or	Correlations)
• Kick	Off	Incident	Response
• Despite	Multitude	of	Solutions
• Still	A	Manual	Process!
• Each	Solution	Kicked	Off	In	Sequence	By	Us
• A	Lot	of	Time	Is	Wasted	Being	A	Bridge	Between	Systems
This	Is	Because
SACON 2017
• Keep	Doing	What	Your	Doing
• Talk	Directly	To	Each	Other
• Get	What	You	Need	from	Each	Other
• Leave	Me	Out	Of	It
What	I	Want
SACON 2017
How	This	Would	Work
SACON 2017
Use	Cases
SACON 2017
• Received	Events	From	Peers
• Generate	A	Blacklist	from	Source	of	Threat	Events
• Use	With	Anything	That	Can	Consume	A	Blacklist
• Firewalls
• Endpoint	Solutions
• Detection	Tools
• Share	The	Blacklist	with	Vendors,	Partners,	and	Colleagues
Generate	Threat	Intelligence	Feed
SACON 2017
• Receives	Events	From	Peers
• Host	Firewall
• Network	Firewall
• Blocks	Source	of	Threat	Events
• Distributes	Events	Among	Peers
• Host	Firewall
• Network	Firewall
Firewall	Rule	Propagation
SACON 2017
• Drop	Source	of	Threat	Events
• Distributes	Events	Among	Peers
• Web	Application	Firewalls
• Intrusion	Prevention	Systems
Drop	Propagation
SACON 2017
• Receives	Events	From	External	Threat	Feeds
• Host	Firewall
• Network	Firewall
• Blocks	Source	of	Threat	Events
Prevent	Known	Threats
SACON 2017
• Receives	Events	From	Peers
• Host	Firewall
• Network	Firewall
• Redirects	Source	of	Threat	Away	From	Assets
NAT	to	Honeypot
SACON 2017
• Receives	Events	From	Peers
• Host	Firewall
• Network	Firewall
• Slows	Down	Source	of	Threat
NAT	to	Tarpit
SACON 2017
• Receives	Events	From	Peers
• Switches
• Routers
• Firewalls
• Runs	Packet	Capture	on	Source	of	Threat	Activity
Capture	Threat	Activity
SACON 2017
• Receives	Events	From	Peers
• FTP	Server
• File	Servers
• Honey	Pots
• Drops	Beacon	into	Path	of	Source	of	Threat	Activity
Inject	Beacon
SACON 2017
• Receives	Events	From	Peers
• Routers
• Firewalls
• Changes	the	Route	for	Source	of	Threat	Activity
• Run	Their	Traffic	Through	Different	Segment
• Segment	Contains	Additional	Inline	Sensors
• Afterwards,	It	Proceeds	to	Destination
Redirect	Traffic
SACON 2017
• Receives	Events	From	Peers
• Email	Server
• Reports	Source	of	Threat	to	Abuse	Address
Reporting	Threats
SACON 2017
• Receives	Events	From	Peers
• Switches
• Routers
• Firewalls
• Applies	ACL	to	Target	of	Threat	Activity
Host	Isolation
SACON 2017
• Receives	Events	From	Peers
• Switch
• Router
• Firewall
• Server
• Application
• Verbose	Logging	for	Source	of	Threat	Activity
• Verbose	Logging	for	Target	of	Threat	Activity
Additional	Logging
SACON 2017
• Receives	Events	From	Peers
• LDAP
• Active	Directory
• Radius
• TACACS+
• Starts	Password	Reset	Process	for	Target	of	Threat
Trigger	Password	Resets
SACON 2017
Security	Orchestration
SACON 2017
• Swimlane
• Hexadite
• Siemplify
• Security	Orchestrator
• Phantom
• Cybersponse
Vendor	Solutions
SACON 2017
This	is	the	World
According to
Cybersponse
SACON 2017
• Provide	Context	(Meta-SIEM)
• Import	existing	cases	into	platform
• Acquire	additional	data	on	adversary,	target,	or	payload
• Push	Out	to	Other	Platforms
• Workflow	and	Reporting
• Decision	Making	and	Execution
• Perform	Incident	Response
• Delete	files	and	kills	processes
• Force	password	changes	and	disables	accounts
• Block	addresses
What	They	Do
SACON 2017
• Machine	to	Controller
• Connected	Only	to	Controller
• Messages	Only	the	Controller
• Events	Shared	Only	with	the	Controller
• Nodes	exists	in	a	hierarchy
• Slaved	to	The	Controller
• Just	Execute	Commands	Given
• Centralized,	Limited	in	Scope,	and	Expensive
How	They	Do	It
SACON 2017
• Still	Requires	Intervention
• Instead	of	being	dependent	on	me
• It	is	now	dependent	on	me	and	my	expensive	solution
Doesn’t	Really	Solve	My	Problem
SACON 2017
• Share	Fail2Ban	Jails
• Ban	Actions,	Custom	Scripts,	and	Cron	Jobs
• Ban	actions,	and	shared	file	mount
• Vallumd
• Import	Known	Threats	into	Fail2Ban
• Custom	Scripts
• NAT	iptables	threats	to	Honey	Pot
• psad	and	Custom	Scripts
• Report	Fail2Ban	threat	to	Abuse
• www.blocklist.de
Open	Source	Solutions
SACON 2017
• Machine	to	Machine
• Direct	Connections	to	Each	Other
• Messaging	Each	Other
• Sharing	Events
• Nodes	Retains	Autonomy
• They	keep	doing	their	job
• Expand	their	visibility
How	They	Do	It
SACON 2017
• Does	Not	Require	Intervention
• Limited	Use	Cases
• Messages	Too	Closely	Tied	To	Specific	Use
• Can	Only	Be	Used	For	Original	Purpose
• Now	Dependent	On	Function
We	Are	Getting	Closer
SACON 2017
• Shares	Events	Between	Systems	In	Common	Format
• Events	Are	Stored	Locally
• Peers	Make	Use	of	Shared	Events	How	They	See	Fit
• fail2ban
• modsecurity
• iptables
Adaptive	Network	Protocol	(ANP)
SACON 2017
Server	A
SACON 2017
Server	B
SACON 2017
• Sharing
• Multicast	to	Local	Peers
• Unicast	to	Remote	Peers
• Messages
• Add	Threat	Event
• Remove	Threat	Event
Protocol
SACON 2017
• Operations
• Sends	and	Receives	from	local	peers
on	UDP	Port	15000
• Receives	from	remote	peers	
on	TCP	Port	15000
• Every	message	signed	with	SHA256
• Rules
• The	Signature	Must	Be	A	Good	Signature
• If	Already	Known,	Do	Not	Share
• Do	Not	Reflect	Back	To	The	Source
Protocol
SACON 2017
• Version	is	1	Byte
• Type	is	1	Byte
• Event	is	Variable
• Signature	is	64	Bytes
Packet
SACON 2017
Packet
SACON 2017
• Add	Threat	Event
• Address
• Time-To-Live	(TTL)
• Remove	Threat	Event
• Address
• Time-To-Live	(TTL)
Messages
SACON 2017
• Local
• Remote
• Same	Network
• Across	Same	Location
• Across	Different	Locations
• Link-up	Cloud	Resources
• Different	Networks
Peering
SACON 2017
Single	Location
SACON 2017
Multiple	Locations
SACON 2017
Trusted	Partner	or	Vendor
SACON 2017
Cloud	Assets
SACON 2017
Communities
SACON 2017
Interfaces
SACON 2017
• Purpose
• Publish	Events	to	ANP
• Pull	Events	From	ANP
• Components
• Supporting
• Writer
• Reader
• Operations
• Publishes	via	Loopback	interface
• Pulls	from	via	published	lists
What	They	Do
SACON 2017
What	They	Do
SACON 2017
• Integrated	Solution
• ANP	installed	on	the	same	system
• Read	and	Writes	Locally
• Examples
• Fail2Ban
• Iptables
• modsec
Native
SACON 2017
• Stand	Alone	Solution
• ANP	installed	on	a	different	system
• Read	and	Writes	to	the	Remote	(Stand	Alone)	Solution
• Examples
• ASA
• Switch
• Router
Surrogate
SACON 2017
Surrogate
SACON 2017
Existing	Interfaces
SACON 2017
• Pulls	Events
• Reads	Threat	Events	from	ANP
• Adds	Threats	to	Jail
• Publishes	Events
• Writes	Jailed	Addresses	to	ANP
• Because	of	ANP	Aging,	this	means	threats	stay	jailed	for	24	hours
• Mistakes	can	be	reversed	using	an	additional	tool	to	inject	a	Remove	
Threat	event
Fail2Ban
SACON 2017
• Pulls	Events
• Reads	Threat	Events	from	ANP
• Adds	Threats	to	Blacklist
• Distribute	for	Internal	or	External	Use
• Detecting
• Blocking
• Threat	Indicator
Blacklist
SACON 2017
• Publishes	Its	Events
• Writes	Attacker	Addresses	to	ANP
• Pair	with	iptables	interface
• NAT	attackers	to	Honeypot
modsec
SACON 2017
• Pulls	Events
• Reads	Threat	Events	from	ANP
• NATs	Threats	from	Local	Webserver	to	Local	Honeypot
• High	Interaction	Honeypot	of	Your	Website?
• Log	Their	Activity
• Include	a	beacon?
iptables
SACON 2017
• Increased	Visibility
• We	don’t	change	our	enterprise
• Everything	Keeps	Doing	Its	Job
• We	are	giving	them	greater	visibility	to	do	so
• Ability	to	Be	Proactive
Sharing	Also	Provides
SACON 2017
Expanded	Visibility
SACON 2017
• Cooperative	Behavior
• Ability	for	the	Enterprise	To	Act	On	Its	Own
Emerges	With	Sharing
SACON 2017
Cooperative	Behavior
SACON 2017
Building	Skynet
SACON 2017
Acting	To	Defend	The	Network
SACON 2017
Acting	To	Investigate	A	Threat
SACON 2017
Acting	To	Respond	To	An	Incident
SACON 2017
Demonstrations
SACON 2017
Our	Systems
SACON 2017
Acting	To	Defend	The	Network
SACON 2017
• Local	ANP	Agent
• Your	System	or	Other	Network	Asset
• One	Way	Peering	to	Federation
• Run	The	Script
• Shares	“Remove	Threat”	event
• Sets	the	Threat	Expiration	To	Two	Hours
• Don’t	Forget	To	Clear	Any	Logs	That	Started	It	All
Remove	Tool
SACON 2017
Removing	Threats
SACON 2017
Technical	Details
SACON 2017
• Python
• Tested	with	Python	2.7.x
• Should	work	with	Python	3.6.x
• Other	Open	Source	Software	As	Required
• iptables
• modsec
• Fail2ban
• Etc.
Requirements	for	ANP	and	Interfaces
SACON 2017
1.Download	package
2.Unzip	package
3.Run	“python	setup.py	install”
4.Check	“readme.txt”	for	any	additional	steps
Installation	of	ANP	and	Interfaces
SACON 2017
Configuration	for	ANP
SACON 2017
• Defaults	Will	Work	Best
• Only	Need	to	Change
• Group
• Salt
• Occasionally	Need	to	Set
• Peers
• Debug
Configuration	for	ANP
SACON 2017
Configuration	for	Fail2Ban
SACON 2017
• Defaults	Will	Work	Best
• Only	Need	to	Change
• Jail
• Prefix
• Occasionally	Need	to	Set
• Debug
Configuration	for	Fail2Ban
SACON 2017
Configuration	for	Blacklist
SACON 2017
• Defaults	Will	Work	Best
• Only	Need	to	Change
• Blacklist
• Occasionally	Need	to	Set
• Debug
Configuration	for	Blacklist
SACON 2017
Configuration	for	modsec
SACON 2017
• Defaults	Will	Work	Best
• Only	Need	to	Change
• Log
• Occasionally	Need	to	Set
• Debug
Configuration	for	modsec
SACON 2017
Configuration	for	iptables
SACON 2017
• Defaults	Will	Work	Best
• Only	Need	to	Change
• Webserver
• Honeypot
• Occasionally	Need	to	Set
• Debug
Configuration	for	iptables
SACON 2017
Demonstrations
SACON 2017
• Associate	with	Our	WAP	(SaconCommunity)
• Start	Your	VM
• Peer	with	Other	Attendees
• Find	Your	Address	In	the	List
• Peer	With	The	System	Above	You
• Peer	With	The	System	Below	You
• This	will	be	the	salt:	SSttczghHYrU5fNE
Our	Community
SACON 2017
Building	Community
SACON 2017
• Change	Your	Root	Passwords
• Wait	for	the	Attacks
• Attempted	Logins
• Scanned	Websites
• Check	Response
• Check	Blacklist
• Check	iptables
• Check	fail2ban
Threat	Actor
fail2ban-client status sshd
iptables -t nat -L
SACON 2017
Introduce	Threats
SACON 2017
Extending	ANP
SACON 2017
• Purpose
• Publish	Events	to	ANP
• Pull	Events	From	ANP
• Components
• Supporting
• Writer
• Reader
• Operations
• Publishes	via	Loopback	interface
• Pulls	from	via	published	lists
Refresher	on	Interfaces
SACON 2017
Setup
<Supporting>
<Reader>
<Writer>
SACON 2017
Reader
SACON 2017
Reader	(Fail2Ban)
SACON 2017
Writer
SACON 2017
Writer	(Fail2Ban)
SACON 2017
Making	It	Better
SACON 2017
• Additional	Message	Types
• Add	Target	Event
• Remove	Target	Event
• More	Interfaces!
• Peer	Groups
• Filters	for	Peers	and	Messages
• Inclusion	of	IPv6	Addressing
Needed	Improvements
SACON 2017
• Internet	of	Things
• Reporting	Events
• Export	to	STIX/TAXII
Future	Direction
SACON 2017
• Machine	To	Machine	Communication	Solves	Many	Problems
• It	Doesn’t	Have	To	Be	The	Apocalypse
• With	It	We	Can
• Get	To	The	Threat	On	Time
• Make	Sure	Evidence	is	Captured
• Make	Sure	That	The	Threat	Is	Stopped
• We	Can	Do	It	With	A	Limited	Staff
Making	The	Difference
SACON 2017
• Its	Common	To	Kill	Problems	with	Money	and	People
• Understanding	Your	Problem	Means	Better	Results
• Enabling	Synergies
• Self	Defending	Networks
• Self	Investigating	Networks
• Self	Responding	Networks
Final	Thoughts
SACON 2017
Adaptive	Network	Protocol	(ANP)
SHA1 hash is 976b9e004641f511c9f3eef770b5426478e8646a
Updates can be found at https://adaptive-network-
protocol.sourceforge.io/
SACON 2017
Blacklist
SHA1 hash is 6fdf91572909e97c5f6e005c93da0524a03463c8
Updates can be found at https://adaptive-network-
protocol.sourceforge.io/
SACON 2017
Fail2Ban
SHA1 hash is 5c210858b5711d326bf1740620df4dedfe7a69c9
Updates can be found at https://adaptive-network-
protocol.sourceforge.io/
SACON 2017
iptables
SHA1 hash is 5c210858b5711d326bf1740620df4dedfe7a69c9
Updates can be found at https://adaptive-network-
protocol.sourceforge.io/
SACON 2017
modsec
SHA1 hash is 5c210858b5711d326bf1740620df4dedfe7a69c9
Updates can be found at https://adaptive-network-
protocol.sourceforge.io/
SACON 2017
• https://cybersponse.com/
• https://www.hexadite.com/
• https://www.phantom.us/
• https://www.siemplify.co/
• https://www.fireeye.com/products/security-orchestrator.html
• https://swimlane.com/
• https://www.saas-secure.com/online-services/fail2ban-ip-sharing.html
• http://www.blocklist.de/en/download.html
• https://www.blackhillsinfosec.com/configure-distributed-fail2ban/
• https://stijn.tintel.eu/blog/2017/01/08/want-to-share-your-fail2ban-ip-
blacklists-between-all-your-machines-now-you-can
• https://serverfault.com/questions/625656/sharing-of-fail2ban-banned-ips
• https://github.com/fail2ban/fail2ban/issues/874
Links
SACON 2017
• https://superuser.com/questions/940600/iptables-redirect-blocked-ips-
from-one-chain-to-a-honeypot
• http://cipherdyne.org/psad/
• https://taxiiproject.github.io/
• https://stixproject.github.io/
Links
SACON 2017
Questions

More Related Content

What's hot

SACON - Immutable architecture (Nilanjan De)
SACON - Immutable architecture (Nilanjan De)SACON - Immutable architecture (Nilanjan De)
SACON - Immutable architecture (Nilanjan De)Priyanka Aash
 
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Priyanka Aash
 
SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)Priyanka Aash
 
SACON - API Security (Suhas Desai)
SACON - API Security (Suhas Desai)SACON - API Security (Suhas Desai)
SACON - API Security (Suhas Desai)Priyanka Aash
 
(SACON) Anant Shrivastava - cloud pentesting
(SACON) Anant Shrivastava - cloud pentesting(SACON) Anant Shrivastava - cloud pentesting
(SACON) Anant Shrivastava - cloud pentestingPriyanka Aash
 
Modernizing Traditional Security - DEM13 - AWS re:Inforce 2019
Modernizing Traditional Security - DEM13 - AWS re:Inforce 2019 Modernizing Traditional Security - DEM13 - AWS re:Inforce 2019
Modernizing Traditional Security - DEM13 - AWS re:Inforce 2019 Amazon Web Services
 
Cloud security for financial services
Cloud security for financial servicesCloud security for financial services
Cloud security for financial servicesMoshe Ferber
 
(SACON) Pradyumn Nand & Mrinal Pande - Metron & Blitz, Building and scaling y...
(SACON) Pradyumn Nand & Mrinal Pande - Metron & Blitz, Building and scaling y...(SACON) Pradyumn Nand & Mrinal Pande - Metron & Blitz, Building and scaling y...
(SACON) Pradyumn Nand & Mrinal Pande - Metron & Blitz, Building and scaling y...Priyanka Aash
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyNetworkCollaborators
 
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23   from zero to secure in 1 minute - nir valtman and moshe ferberDefcon23   from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferberMoshe Ferber
 
Jamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS SecurityJamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS Securitycentralohioissa
 
(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
 (SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ... (SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...Priyanka Aash
 
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...Priyanka Aash
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXNetworkCollaborators
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckAmazon Web Services
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
 

What's hot (20)

SACON - Immutable architecture (Nilanjan De)
SACON - Immutable architecture (Nilanjan De)SACON - Immutable architecture (Nilanjan De)
SACON - Immutable architecture (Nilanjan De)
 
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)
 
SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)
 
SACON - API Security (Suhas Desai)
SACON - API Security (Suhas Desai)SACON - API Security (Suhas Desai)
SACON - API Security (Suhas Desai)
 
(SACON) Anant Shrivastava - cloud pentesting
(SACON) Anant Shrivastava - cloud pentesting(SACON) Anant Shrivastava - cloud pentesting
(SACON) Anant Shrivastava - cloud pentesting
 
Modernizing Traditional Security - DEM13 - AWS re:Inforce 2019
Modernizing Traditional Security - DEM13 - AWS re:Inforce 2019 Modernizing Traditional Security - DEM13 - AWS re:Inforce 2019
Modernizing Traditional Security - DEM13 - AWS re:Inforce 2019
 
Cloud security for financial services
Cloud security for financial servicesCloud security for financial services
Cloud security for financial services
 
(SACON) Pradyumn Nand & Mrinal Pande - Metron & Blitz, Building and scaling y...
(SACON) Pradyumn Nand & Mrinal Pande - Metron & Blitz, Building and scaling y...(SACON) Pradyumn Nand & Mrinal Pande - Metron & Blitz, Building and scaling y...
(SACON) Pradyumn Nand & Mrinal Pande - Metron & Blitz, Building and scaling y...
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
 
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23   from zero to secure in 1 minute - nir valtman and moshe ferberDefcon23   from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
 
Trust No One - Zero Trust on the Akamai Platform
Trust No One - Zero Trust on the Akamai PlatformTrust No One - Zero Trust on the Akamai Platform
Trust No One - Zero Trust on the Akamai Platform
 
Jamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS SecurityJamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS Security
 
(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
 (SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ... (SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
 
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 

Viewers also liked

SACON - Enterprise Security Architecture (Bikash Barai)
SACON - Enterprise Security Architecture (Bikash Barai)SACON - Enterprise Security Architecture (Bikash Barai)
SACON - Enterprise Security Architecture (Bikash Barai)Priyanka Aash
 
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)Priyanka Aash
 
SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)Priyanka Aash
 
SACON - Connected cars (Aditya Kakrania)
SACON - Connected cars (Aditya Kakrania)SACON - Connected cars (Aditya Kakrania)
SACON - Connected cars (Aditya Kakrania)Priyanka Aash
 
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)Priyanka Aash
 
SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)
SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)
SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)Priyanka Aash
 
SACON - Windows Forensic (Dr. Phil Polstra)
SACON - Windows Forensic (Dr. Phil Polstra)SACON - Windows Forensic (Dr. Phil Polstra)
SACON - Windows Forensic (Dr. Phil Polstra)Priyanka Aash
 
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
SACON - Threat Hunting Workshop (Shomiron Das Gupta)SACON - Threat Hunting Workshop (Shomiron Das Gupta)
SACON - Threat Hunting Workshop (Shomiron Das Gupta)Priyanka Aash
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 

Viewers also liked (9)

SACON - Enterprise Security Architecture (Bikash Barai)
SACON - Enterprise Security Architecture (Bikash Barai)SACON - Enterprise Security Architecture (Bikash Barai)
SACON - Enterprise Security Architecture (Bikash Barai)
 
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
 
SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)
 
SACON - Connected cars (Aditya Kakrania)
SACON - Connected cars (Aditya Kakrania)SACON - Connected cars (Aditya Kakrania)
SACON - Connected cars (Aditya Kakrania)
 
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)
 
SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)
SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)
SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)
 
SACON - Windows Forensic (Dr. Phil Polstra)
SACON - Windows Forensic (Dr. Phil Polstra)SACON - Windows Forensic (Dr. Phil Polstra)
SACON - Windows Forensic (Dr. Phil Polstra)
 
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
SACON - Threat Hunting Workshop (Shomiron Das Gupta)SACON - Threat Hunting Workshop (Shomiron Das Gupta)
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 

Similar to Open Source Security Orchestration at SACON 2017

Hybrid Integration with BizTalk Server - ACSUG
Hybrid Integration with BizTalk Server - ACSUGHybrid Integration with BizTalk Server - ACSUG
Hybrid Integration with BizTalk Server - ACSUGWagner Silveira
 
Serverless Event-Driven Programming: Are We Ready for the Paradigm Shift?
Serverless Event-Driven Programming: Are We Ready for the Paradigm Shift?Serverless Event-Driven Programming: Are We Ready for the Paradigm Shift?
Serverless Event-Driven Programming: Are We Ready for the Paradigm Shift?Ben Kehoe
 
RICON 2014 - Build a Cloud Day - Crash Course Open Source Cloud Computing
RICON 2014 - Build a Cloud Day - Crash Course Open Source Cloud ComputingRICON 2014 - Build a Cloud Day - Crash Course Open Source Cloud Computing
RICON 2014 - Build a Cloud Day - Crash Course Open Source Cloud ComputingMark Hinkle
 
Rolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing KeyRolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing KeyAPNIC
 
Architect secure cloud services.
Architect secure cloud services.Architect secure cloud services.
Architect secure cloud services.Moshe Ferber
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesAmazon Web Services
 
All you need to know about Orient Me
All you need to know about Orient MeAll you need to know about Orient Me
All you need to know about Orient MeLetsConnect
 
SOCCNX11 All you need to know about Orient Me
SOCCNX11 All you need to know about Orient MeSOCCNX11 All you need to know about Orient Me
SOCCNX11 All you need to know about Orient MeNico Meisenzahl
 
SocCnx11 - All you need to know about orient me
SocCnx11 - All you need to know about orient meSocCnx11 - All you need to know about orient me
SocCnx11 - All you need to know about orient mepanagenda
 
NIC - Understand how Lync integrates with Exchange - Level 300
NIC - Understand how Lync integrates with Exchange - Level 300NIC - Understand how Lync integrates with Exchange - Level 300
NIC - Understand how Lync integrates with Exchange - Level 300Ståle Hansen
 
Ståle Hansen - Understand how lync integrates with exchange
Ståle Hansen - Understand how lync integrates with exchangeStåle Hansen - Understand how lync integrates with exchange
Ståle Hansen - Understand how lync integrates with exchangeNordic Infrastructure Conference
 
Confluent On Azure: Why you should add Confluent to your Azure toolkit | Alic...
Confluent On Azure: Why you should add Confluent to your Azure toolkit | Alic...Confluent On Azure: Why you should add Confluent to your Azure toolkit | Alic...
Confluent On Azure: Why you should add Confluent to your Azure toolkit | Alic...HostedbyConfluent
 
MAIDSAFE Installer DEMO Project SAFE London
MAIDSAFE Installer DEMO  Project SAFE LondonMAIDSAFE Installer DEMO  Project SAFE London
MAIDSAFE Installer DEMO Project SAFE LondonJames Littlejohn
 
Integrate 2017 unlock azure hybrid integration with biz talk - ws
Integrate 2017   unlock azure hybrid integration with biz talk - wsIntegrate 2017   unlock azure hybrid integration with biz talk - ws
Integrate 2017 unlock azure hybrid integration with biz talk - wsWagner Silveira
 
Docker Federal Summit 2017 General Session
Docker Federal Summit 2017 General SessionDocker Federal Summit 2017 General Session
Docker Federal Summit 2017 General SessionDocker, Inc.
 
DevOpsDays 2018 - Migrating a Cloud Native App to k8s
DevOpsDays 2018 - Migrating a Cloud Native App to k8sDevOpsDays 2018 - Migrating a Cloud Native App to k8s
DevOpsDays 2018 - Migrating a Cloud Native App to k8sGökhan Şengün
 
AWS Lambda Function with Kotlin
AWS Lambda Function with KotlinAWS Lambda Function with Kotlin
AWS Lambda Function with KotlinTroy Miles
 
Visug: Say Hello to my little friend: a session on Kinect
Visug: Say Hello to my little friend: a session on KinectVisug: Say Hello to my little friend: a session on Kinect
Visug: Say Hello to my little friend: a session on KinectVisug
 

Similar to Open Source Security Orchestration at SACON 2017 (20)

Hybrid Integration with BizTalk Server - ACSUG
Hybrid Integration with BizTalk Server - ACSUGHybrid Integration with BizTalk Server - ACSUG
Hybrid Integration with BizTalk Server - ACSUG
 
Miranda
MirandaMiranda
Miranda
 
Serverless Event-Driven Programming: Are We Ready for the Paradigm Shift?
Serverless Event-Driven Programming: Are We Ready for the Paradigm Shift?Serverless Event-Driven Programming: Are We Ready for the Paradigm Shift?
Serverless Event-Driven Programming: Are We Ready for the Paradigm Shift?
 
RICON 2014 - Build a Cloud Day - Crash Course Open Source Cloud Computing
RICON 2014 - Build a Cloud Day - Crash Course Open Source Cloud ComputingRICON 2014 - Build a Cloud Day - Crash Course Open Source Cloud Computing
RICON 2014 - Build a Cloud Day - Crash Course Open Source Cloud Computing
 
Rolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing KeyRolling the Root Zone DNSSEC Key Signing Key
Rolling the Root Zone DNSSEC Key Signing Key
 
Architect secure cloud services.
Architect secure cloud services.Architect secure cloud services.
Architect secure cloud services.
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless Architectures
 
Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)
Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)
Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)
 
All you need to know about Orient Me
All you need to know about Orient MeAll you need to know about Orient Me
All you need to know about Orient Me
 
SOCCNX11 All you need to know about Orient Me
SOCCNX11 All you need to know about Orient MeSOCCNX11 All you need to know about Orient Me
SOCCNX11 All you need to know about Orient Me
 
SocCnx11 - All you need to know about orient me
SocCnx11 - All you need to know about orient meSocCnx11 - All you need to know about orient me
SocCnx11 - All you need to know about orient me
 
NIC - Understand how Lync integrates with Exchange - Level 300
NIC - Understand how Lync integrates with Exchange - Level 300NIC - Understand how Lync integrates with Exchange - Level 300
NIC - Understand how Lync integrates with Exchange - Level 300
 
Ståle Hansen - Understand how lync integrates with exchange
Ståle Hansen - Understand how lync integrates with exchangeStåle Hansen - Understand how lync integrates with exchange
Ståle Hansen - Understand how lync integrates with exchange
 
Confluent On Azure: Why you should add Confluent to your Azure toolkit | Alic...
Confluent On Azure: Why you should add Confluent to your Azure toolkit | Alic...Confluent On Azure: Why you should add Confluent to your Azure toolkit | Alic...
Confluent On Azure: Why you should add Confluent to your Azure toolkit | Alic...
 
MAIDSAFE Installer DEMO Project SAFE London
MAIDSAFE Installer DEMO  Project SAFE LondonMAIDSAFE Installer DEMO  Project SAFE London
MAIDSAFE Installer DEMO Project SAFE London
 
Integrate 2017 unlock azure hybrid integration with biz talk - ws
Integrate 2017   unlock azure hybrid integration with biz talk - wsIntegrate 2017   unlock azure hybrid integration with biz talk - ws
Integrate 2017 unlock azure hybrid integration with biz talk - ws
 
Docker Federal Summit 2017 General Session
Docker Federal Summit 2017 General SessionDocker Federal Summit 2017 General Session
Docker Federal Summit 2017 General Session
 
DevOpsDays 2018 - Migrating a Cloud Native App to k8s
DevOpsDays 2018 - Migrating a Cloud Native App to k8sDevOpsDays 2018 - Migrating a Cloud Native App to k8s
DevOpsDays 2018 - Migrating a Cloud Native App to k8s
 
AWS Lambda Function with Kotlin
AWS Lambda Function with KotlinAWS Lambda Function with Kotlin
AWS Lambda Function with Kotlin
 
Visug: Say Hello to my little friend: a session on Kinect
Visug: Say Hello to my little friend: a session on KinectVisug: Say Hello to my little friend: a session on Kinect
Visug: Say Hello to my little friend: a session on Kinect
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Open Source Security Orchestration at SACON 2017