SlideShare a Scribd company logo
The Threat is Real.
Protect Yourself.
Teri Radichel | @teriradichel
Director, Security Strategy & Research
And this…
How will you prevent your stolen data
from impersonating you?
Estimated Cost of Target Breach
Understanding The Cyber Threat Landscape
Election Hacking and Social Media Influence
• Voting machines hacked at Defcon in minutes
• Multiple announcements of voter data records breached
• Fake accounts and bots on social media
• Fake news articles
• Foreign entities purchasing advertising
• Similar reports in other countries
So What Does That
Have To Do With
My Business?
2017 Verizon Data Breach Investigations Report
Devices Infected With Malware
Attack Other Devices and Networks
How Can Businesses Protect Themselves?
•Understand common attack vectors
•Implement mitigations
•Monitor for anomalies
•Have a recovery plan
Understand Security Breach Trends
WatchGuard Quarterly Security Report
Where To Start…Risk Based Prioritization
Start by addressing the
security risk that is most
likely to occur and could
cause the most damage
to your business.
Use Multi-Factor Authentication.
Everywhere.
2017 Verizon Data Breach Investigations Report
81%
of hacking-related breaches leveraged either
stolen and/or weak passwords
Encryption is Not Preventing Breaches. Why?
Attackers can easily find the key.
Store encryption keys securely – not
right next to the encrypted data!
Don’t store all the data in ONE
place with the SAME key.
The initial attack
vectors and
spread of
ransomware can
be stopped in
many cases with
standard security
best practices.
41% Hit by Ransomware last 12 Months
Patch. Yes, It’s Hard.
• Every application
• Every software library
• Every computer
• Every printer
• Every network device
• Every IOT device
• Every phone
Consider using
software
repositories and
automated
monitoring for out
of date software.
Q: Is it Easier to Patch or Block a Port?
• WannaCry Port 445 (SMB) exposed to Internet .
• Mirai Botnet Port 23 (Telnet).
• NotPetya Port 445 and 139 on internal networks.
A well-designed network can prevent many attacks
before they reach the unpatched software.
Malware Must Traverse Your Network
MONITOR:
• Longest Sessions
• Most Sessions
• Most Data
• Unexpected Countries
• Strange TLDs
• Unusual Packet Sizes
• Automated Traffic
Know your traffic and
what doesn’t look right!
Cloud Attack Vectors Understand the cloud service
security controls before storing
sensitive data.
Follow best practices for access
controls such as AWS IAM top 10.
Limit network and administrative
access to what is required.
Monitor network traffic with tools
that help prevent and detect.
Breaches result from:
• Misconfiguration of access.
• No segregation of duties.
• Improper handling of keys.
• Poorly designed networks.
• Hybrid cloud (vs. cloud-only).
50%
of SMBs have been
breached in the
past 12 months
The 2016 State of SMB Cybersecurity,
Ponemon Institute
Plan ahead.
Back up data to an alternate
location, with different
access permissions and
encryption key.
Test regularly to make sure
your backups are working.
Teri Radichel |@teriradichel
https://secplicity.org

More Related Content

What's hot

Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Erin Sweeney
 
So Your Company Hired A Pentester
So Your Company Hired A PentesterSo Your Company Hired A Pentester
So Your Company Hired A Pentester
NorthBayWeb
 

What's hot (20)

#ALSummit: Architecting Security into your AWS Environment
#ALSummit: Architecting Security into your AWS Environment#ALSummit: Architecting Security into your AWS Environment
#ALSummit: Architecting Security into your AWS Environment
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slides
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Dos and Don’ts for Managing External Connectivity to/from Your Network
Dos and Don’ts for Managing External Connectivity to/from Your NetworkDos and Don’ts for Managing External Connectivity to/from Your Network
Dos and Don’ts for Managing External Connectivity to/from Your Network
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-MelhaouiCSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
 
Reality Check: Security in the Cloud
Reality Check: Security in the CloudReality Check: Security in the Cloud
Reality Check: Security in the Cloud
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesShift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy Changes
 
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security Model#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
 
Man in the Cloud Attacks
Man in the Cloud AttacksMan in the Cloud Attacks
Man in the Cloud Attacks
 
So Your Company Hired A Pentester
So Your Company Hired A PentesterSo Your Company Hired A Pentester
So Your Company Hired A Pentester
 
Automated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSAutomated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWS
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceReaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
 
Reducing Your Attack Surface
Reducing Your Attack SurfaceReducing Your Attack Surface
Reducing Your Attack Surface
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
 

Similar to The Threat Is Real. Protect Yourself.

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 

Similar to The Threat Is Real. Protect Yourself. (20)

Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cloud security
Cloud securityCloud security
Cloud security
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of Cybercrime
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 

More from Teri Radichel

More from Teri Radichel (16)

So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
Cloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptxCloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptx
 
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
 
Real World Cloud Compromise
Real World Cloud CompromiseReal World Cloud Compromise
Real World Cloud Compromise
 
Serverless Attack Vectors
Serverless Attack VectorsServerless Attack Vectors
Serverless Attack Vectors
 
Top Priorities for Cloud Application Security
Top Priorities for Cloud Application SecurityTop Priorities for Cloud Application Security
Top Priorities for Cloud Application Security
 
How the Cloud Changes Cyber Security
How the Cloud Changes Cyber SecurityHow the Cloud Changes Cyber Security
How the Cloud Changes Cyber Security
 
Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019
 
Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?
 
Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018
 
Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018
 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the Cloud
 
Packet Capture on AWS
Packet Capture on AWSPacket Capture on AWS
Packet Capture on AWS
 
Security for Complex Networks on AWS
Security for Complex Networks on AWSSecurity for Complex Networks on AWS
Security for Complex Networks on AWS
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
 
AWS Security Strategy
AWS Security StrategyAWS Security Strategy
AWS Security Strategy
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

The Threat Is Real. Protect Yourself.

  • 1. The Threat is Real. Protect Yourself. Teri Radichel | @teriradichel Director, Security Strategy & Research
  • 2.
  • 3. And this… How will you prevent your stolen data from impersonating you?
  • 4. Estimated Cost of Target Breach
  • 5. Understanding The Cyber Threat Landscape
  • 6. Election Hacking and Social Media Influence • Voting machines hacked at Defcon in minutes • Multiple announcements of voter data records breached • Fake accounts and bots on social media • Fake news articles • Foreign entities purchasing advertising • Similar reports in other countries
  • 7. So What Does That Have To Do With My Business?
  • 8. 2017 Verizon Data Breach Investigations Report
  • 9. Devices Infected With Malware Attack Other Devices and Networks
  • 10. How Can Businesses Protect Themselves? •Understand common attack vectors •Implement mitigations •Monitor for anomalies •Have a recovery plan
  • 11. Understand Security Breach Trends WatchGuard Quarterly Security Report
  • 12. Where To Start…Risk Based Prioritization Start by addressing the security risk that is most likely to occur and could cause the most damage to your business.
  • 13. Use Multi-Factor Authentication. Everywhere. 2017 Verizon Data Breach Investigations Report 81% of hacking-related breaches leveraged either stolen and/or weak passwords
  • 14. Encryption is Not Preventing Breaches. Why? Attackers can easily find the key. Store encryption keys securely – not right next to the encrypted data! Don’t store all the data in ONE place with the SAME key.
  • 15. The initial attack vectors and spread of ransomware can be stopped in many cases with standard security best practices. 41% Hit by Ransomware last 12 Months
  • 16. Patch. Yes, It’s Hard. • Every application • Every software library • Every computer • Every printer • Every network device • Every IOT device • Every phone Consider using software repositories and automated monitoring for out of date software.
  • 17. Q: Is it Easier to Patch or Block a Port? • WannaCry Port 445 (SMB) exposed to Internet . • Mirai Botnet Port 23 (Telnet). • NotPetya Port 445 and 139 on internal networks. A well-designed network can prevent many attacks before they reach the unpatched software.
  • 18. Malware Must Traverse Your Network MONITOR: • Longest Sessions • Most Sessions • Most Data • Unexpected Countries • Strange TLDs • Unusual Packet Sizes • Automated Traffic Know your traffic and what doesn’t look right!
  • 19. Cloud Attack Vectors Understand the cloud service security controls before storing sensitive data. Follow best practices for access controls such as AWS IAM top 10. Limit network and administrative access to what is required. Monitor network traffic with tools that help prevent and detect. Breaches result from: • Misconfiguration of access. • No segregation of duties. • Improper handling of keys. • Poorly designed networks. • Hybrid cloud (vs. cloud-only).
  • 20. 50% of SMBs have been breached in the past 12 months The 2016 State of SMB Cybersecurity, Ponemon Institute Plan ahead. Back up data to an alternate location, with different access permissions and encryption key. Test regularly to make sure your backups are working.

Editor's Notes

  1. Why I got into security…the story of my own personal cyber-attack experience. Side note: I cannot help but wonder in the case of my breach if some insiders were not involved, or at least covering up their own lack of knowledge in the matter. Companies would be wise to beware of the insider threat, whether intentional or accidental: https://www.secplicity.org/2017/09/01/insider-threat-history-defense/
  2. Just a few of the top breaches in 2017. As one of my twitter followers pointed out – does this slide need an explanation?
  3. Our identity for everything we do online is often verified via the information that was stolen in the Equifax breach. Now what?
  4. https://www.infosecurity-magazine.com/news/target-breach-costs-could-total-1bn/ How many Target stores could we build for $1 billion dollars? I found one estimate that said a Target store costs $41 million dollars to build… How many people could be employed for $1 billion dollars? How many new projects or how much more marketing and advertising could Target do for $1 billion?
  5. The cyber-threat landscape extends past the borders of our country and involves more than just bank accounts. If you work in IT or security, it’s a good idea to become familiar with these groups, how they operate, and the potential damage security breaches can cause. Here’s some research I did into the possibility of cyber-attacks being involved in recent US Navy ship collisions: https://www.secplicity.org/2017/08/26/us-navy-ship-collisions-result-hacking/
  6. https://www.secplicity.org/2017/09/07/social-media-bots-influencing/ https://www.wired.com/story/voting-machine-hacks-defcon/ (June 20, 2017) http://money.cnn.com/2017/08/17/technology/business/chicago-voter-records-exposed-upguard/index.html (Aug 17, 2017)
  7. http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/
  8. When we leave our networks, computers, and devices unprotected, pretty soon we have a whole mess of computers that have been compromised and are talking to each other over the Internet and attacking other computers. A botnet is a group of computers infected with malware from a particular attacker will talk back to what is called a command and control or “C2” server. The infected computers controlled by the attacker are called ”zombies” or ”bots”. The attacker uses these servers to perform various illegal activities. So are all these computers the attackers computers? No. They are your computers and my computers, under the attacker’s control.
  9. Read security breach reports to determine what the top attack vectors are hitting companies or organizations like yours. https://www.watchguard.com/wgrd-resource-center/security-report
  10. This image comes from my paper and case study on the Target Breach: https://www.sans.org/reading-room/whitepapers/casestudies/case-study-critical-controls-prevented-target-breach-35412 The concept of risk based approach to security is explained further in the SANS Security Bootcamp: https://www.sans.org/course/security-essentials-bootcamp-style
  11. http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/ If multi-factor authentication is required, will be harder for attackers who have stolen passwords to use those stolen credentials.
  12. A recent article on ideas for protecting encryption keys: https://www.secplicity.org/2017/08/09/carbon-black-data-leaks-good-reminder-protect-keys/ I wrote about not protecting encryption keys being the equivalent of leaving your house for work, locking the door and leaving the keys hanging on the door in 2010. I did not read this anywhere and thought I came up with it independently, but have since heard other people use this analogy. Here’s my original post where I was pondering the issue with encryption keys: http://websitenotebook.blogspot.com/2010/10/securing-encryption-keys.html
  13. This prior ransomware statistic previously posted on the Barkly web site and referencing Osterman Research is probably much worse now. Barkly reports that 6 in 10 malware payloads were ransomware in 2017. https://blog.barkly.com/ransomware-statistics-2017
  14. WannaCry https://www.us-cert.gov/ncas/alerts/TA16-288A Mirai https://isc.sans.edu/forums/diary/What+is+happening+on+2323TCP/21563/ NotPetya https://securelist.com/schroedingers-petya/78870/ Auto-Block Suspicious Ports with WatchGuard Firewall https://www.secplicity.org/2017/08/11/using-firewall-policies-auto-block-rogue-hosts-external-networks/
  15. WatchGuard Dimension https://www.watchguard.com/wgrd-products/watchguard-dimension I found out I was had malware running on my web server by looking at network traffic. You can and should do the same.
  16. I’ll be speaking more about this at AWS re:Invent 2017 and possibly at other upcoming conferences. https://reinvent.awsevents.com/ If in Seattle you can also attend the Seattle AWS Architects & Engineers Meetup: https://www.meetup.com/Seattle-AWS-Architects-Engineers/
  17. Ponemon Institute 2016 State of SMB Cybersecurity https://signup.keepersecurity.com/state-of-smb-cybersecurity-report/
  18. For more information about the latest threats and how to protection your resources and your network follow me on twitter @teriradichel I also write blog posts on current threats and defenses at Secplicity.org. You can find my articles here on things like protecting cloud resources, configuring networks, and mitigating the latest threats here: https://www.secplicity.org/author/teriradichel/