Keynote Information Security days Luxembourg 2015
World’s biggest Hack?
• Was their security ”make believe”?
Me
• Father of 3, happily married.
• I work for a Bank. Am also independent IT/Infosec
consultant. Any opinions presented here are my own
and do not represent my employer.
• Contributor to ”@TheAnalogies project” making IT and
Infosec understandable outside the echo chambers
• Member of the I am the Cavalry movement – trying to
make connected devices worthy of our trust
• @ClausHoumann
• I present on security a lot at conferences -> Find my
work on slideshare
What is a keynote?
• Painting the big picture
• Strategic views -> Not Tactical view
The big picture
• Existing tools, and even Next-
Generation APT tools have limits/are
broken:
– Examples: https://blog.mrg-effitas.com/wp-
content/uploads/2014/11/Crysys_MRG_APT_detection_test_20
14.pdf
– He created the stupidest malware imaginiable. No one detected
it.
– http://archive.hack.lu/2014/Bypasss_sandboxes_for_fun.pdf
– Paul Jung -> Present here today -> shows how easily malware
can detect sandboxes
The big picture
• No silver bullets exist. Beware of the phrases:
– ”Counter any threat”
– ”Detect any malware”
– ”You only need our solution”
– Proceed with caution
– VPT
(vendor persistent threat)
The big picture
• That being said, many awesome vendors and
products are present today! There is no
#Infosec without them
• They have my respect
Solar Eclipse?
Doing it wrong (Source: Stefan Esser)
Source: With permission from Daniel Miessler @danielmiessler
And my own version
Doing it right
• EURODNS in Luxembourg has just made it
possible for each client to get an SSL
certificate for their website for free
• This simple change makes a difference
The job of the enterprise defender:
• Trying to not purchase crappy products
(Lemons -> Source: Haroon Meer @wearetroopers
• While trying to build a real skilled defense
Keynote Information Security days Luxembourg 2015
It’s an assymetrical conflict
X-wing
Compliance
• Is
• NOT
• Security
• Compliance is preparing to fight a war
• Using antiquated weapons
• Against enemies of decades past
Why worry now?
• Companies that get hacked are fine...look at
Sony, Target, Apple etc. -> stock prices not
affected, end users don’t care.
– Breaches and lawyer expenses following these are
an acceptable cost of doing business
– Right?
– No, maybe not anymore...next slide
Board Level Attention required, NOW!
• EU Data protection regulation:
– Mandatory breach reporting within 72 hours
– 5% of revenue as fine possible
• Threat level increasing sharply
• Attack surface increasing (think IoT, BYOD)
Want to beat assymetricality?
Here’s how:
• A strategic approach to security leveraging
methods that work
Pyramids
- This one is Joshua Corman’s.
Defensible Infrastructure
Operational Excellence
Situational
Awareness
Counter-
measures
The Foundation
Defensible Infrastructure
Software and Hardware built as
”secure by default” is ideal
here. Rugged DevOps.
Your choices of tech impacts
you ever after
You must assemble carefully,
like Lego
Without backdoors or Golden Keys!
Mastery
Operational Excellence
Master all aspects of your Development,
Operations and Outsourcing. Train like the
Ninjas!
DevOps (Rugged DevOps)
Change Management
Patch Management
Asset Management
Information classification & localization
Basically, all the cornerstones of ITIL
You name it. Master it.
Gain the ability to handle situations correctly – Floodlights ON
Situational
Awareness
”People don’t write software anymore, they assemble it” Quote Joshua Corman.
-> Know which lego blocks you have in your infrastructure
-> Actionable threat intelligence
-> Automate as much as you can, example: IOC’s automatically fed from sources
into SIEM with alerting on matches
Are we affected by Poodle? Shellshock?
WinShock? Heartbleed? Should we patch now?
Next week? Are we under attack? Do we have
compromised endpoint? Are there anomalies
in our LAN traffic?
Counter that which you profit from
countering
• Decrease attacker ROI below critical threshold
by applying countermeasures
• Most Security tools fall within this category
• Limit spending until you’re laid the
foundational levels of the pyramid
Counter-
measures
Footnote: Cyber kill chain is patented by Lockheed Martin.
Mapping to other strategic approaches
Defensible Infrastructure
Operational Excellence
Situational
Awareness
Counter-
measures
Lockheed Martin patented
Nigel Wilson ->
@nigesecurityguy
Defensive hot zones
• Basketball and
other sports
analysis ->
• – FIND the
HOT zones of
your
opponents.
• Defend there.
Defensive hot zones
• Basketball and
other sports
analysis ->
• – FIND the
HOT zones of
your
opponents.
• Defend there.
Hot zones!
• You need to secure:
– The (Mobile) user/
endpoints
– The networks
– Data in transit
– The Cloud
– Internal systems
Sample protections added only, not the
complete picture of course
Best Practices – High level
• Create awareness – Security awareness training
• Increase the security budget
– Justify investments BEFORE the breach.
– It’s easier when you’re actually being attacked. But
too late.
• Use the Cyber Kill Chain model or Nigel Wilsons
”Defensible Security Posture” to gain capability to
thwart attackers
• Training, skills and people!
Hot zone 1:
A real world PC
• Microsoft EMET 5.2
• Java
• Adobe Flash Player/Reader
• AV
• Executable files kill you, so use:
– Adblocking extension in browser
– Advanced endpoint protection solutions
– Secure Web Gateway
– White listing, black listing
– No admin credentials left behind
And then cross your fingers
Hot zone 1, more
• PC defense should include:
– Whitelisting
– Blacklisting
– Sandboxing
– Registry defenses
– Change roll-backs
– HIPS
– Domain policies
– Log collection and review
– MFA
– ACL’s/Firewall rules
– Heuristics detection/prevention
– DNS audit and protection
Hot zone 2:
The networks
• Baselining everything
• Spot anomalies
• Monitor, observe, record
• Advanced network level tools
• Test your network resilience/security with Ixia
BreakingPoint. Ask me for free test licenses.
• Network Security Monitoring (NSM)
• Don’t forget the insider threat
Hot zone 3+4:
Data in Transit/Cloud
• Trust in encryption
• Remember you secure what you put in the cloud. The Cloud
provider doesn’t
• Great new mobile collaboration tools exist
• SaaS monitoring and DLP tools exist -> ”CloudWalls”
• Cloudcrypters
• CloudTrail, CloudWatch, Config-log/change-trackers, vuln.mgmt
• Story about the Vulnerability patched during Bash/Shellshock public
confusion period
• And this for home study: https://securosis.com/blog/security-best-
practices-for-amazon-web-services
Cloud
• Segmentation
• Compartmentalisation
• Need to know
Cloud
• Concentration risk
• Secure the administrative credentials and APIs
• ENISA:
– https://www.enisa.europa.eu/activities/risk-
management/files/deliverables/cloud-computing-risk-
assessment
– https://resilience.enisa.europa.eu/cloud-computing-
certification
• A funny story about cloud certification providers
hacking me
Best practices
• Use EMET
• Use ad-blockers
• Use advanced endpoint threat prevention
solutions
• Use ”Adversary mind-set” and threat modeling
A more defensible infrastructure
• Avoid expense in depth
• Research and find the best counter measures
• Open Source tools can be awesome
• Full packet capture and Deep packet
inspection/Proxies for visibility
• KNOW WHAT’S GOING ON IN YOUR
NETWORKS
• Watch and learn from attack patterns
Best practices - Mitigate risks
Source: Dave Sweigert
Automate Threat Intelligence IOC
• Use multiple IOC feeds
• Automate daily:
– IOC feed retrival,
– Insertion into SIEM,
– Correlation against all-time logfiles,
– Alerting on matches
– Manual follow-up on alerts
You need to ally up!
• Security and Infrastructure aren’t enemies
• Security and the office of the CIO aren’t
enemies
• Ally up & Bromance!
And the unexpected extra win
• Real security will actually make you compliant
in many areas of compliance
Q & A
• Ask me question, or I’ll ask you questions
Sources used
– http://www.itbusinessedge.com
– Heartbleed.com
– https://nigesecurityguy.wordpress.com/
– Lockheed Martins ”Cyber Kill Chain”
– Joshua Corman and David Etue from RSAC 2014
”Not Go Quietly: Surprising Strategies and
Teammates to Adapt and Overcome”
– Lego

More Related Content

PPTX
Keynote at the Cyber Security Summit Prague 2015
PPTX
Presentation infra and_datacentrre_dialogue_v2
PPTX
Defending Enterprise IT - beating assymetricality
PDF
Common WebApp Vulnerabilities and What to Do About Them
PDF
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
PDF
Event Presentation: Cyber Security for Industrial Control Systems
PDF
How to Protect Your Mainframe from Hackers (v1.0)
PDF
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
Keynote at the Cyber Security Summit Prague 2015
Presentation infra and_datacentrre_dialogue_v2
Defending Enterprise IT - beating assymetricality
Common WebApp Vulnerabilities and What to Do About Them
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Event Presentation: Cyber Security for Industrial Control Systems
How to Protect Your Mainframe from Hackers (v1.0)
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

What's hot (20)

PPTX
IT Security Management -- People, Procedures and Tools
PPTX
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
PDF
Managing Next Generation Threats to Cyber Security
PDF
Cyber security and the mainframe (v1.3)
PDF
12 Simple Cybersecurity Rules For Your Small Business
PDF
2019 FRSecure CISSP Mentor Program: Class Ten
PDF
2019 FRSecure CISSP Mentor Program: Class Eleven
PDF
The Cloud is in the details webinar - Rothke
PPTX
Security challenges in 2017
PDF
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
PDF
Top 5 myths of it security in the light of current events tisa pro talk 4 2554
PDF
2019 FRecure CISSP Mentor Program: Session Two
PDF
Mainframe Security - It's not just about your ESM v2.2
PPTX
Mind the gap
PPT
Beware the Firewall My Son: The Workshop
PDF
2019 FRSecure CISSP Mentor Program: Class One
PPT
Cultivating security in the small nonprofit
PDF
Current & Emerging Cyber Security Threats
PPTX
Incident Response in the age of Nation State Cyber Attacks
PPTX
Threat Modeling Lessons from Star Wars
IT Security Management -- People, Procedures and Tools
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
Managing Next Generation Threats to Cyber Security
Cyber security and the mainframe (v1.3)
12 Simple Cybersecurity Rules For Your Small Business
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Eleven
The Cloud is in the details webinar - Rothke
Security challenges in 2017
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
Top 5 myths of it security in the light of current events tisa pro talk 4 2554
2019 FRecure CISSP Mentor Program: Session Two
Mainframe Security - It's not just about your ESM v2.2
Mind the gap
Beware the Firewall My Son: The Workshop
2019 FRSecure CISSP Mentor Program: Class One
Cultivating security in the small nonprofit
Current & Emerging Cyber Security Threats
Incident Response in the age of Nation State Cyber Attacks
Threat Modeling Lessons from Star Wars
Ad

Viewers also liked (14)

PDF
Cyber Kill Chain vs. Cyber Criminals
PPTX
600.412.Lecture06
PPT
SOAP Overview
PDF
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
PDF
Cloud Breach – Preparation and Response
PDF
Targeted attacks
PDF
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
PDF
Certificate_eWPT
PPTX
Demonstrate the defense and attack strategies
PDF
Présentation #Wallcode
DOCX
Antivirus Bypass Techniques - 2016
PDF
Alphorm.com support de la formation programmer en C# 6
PDF
Alphorm.com Support de la formation Programmer en C# avec visual studio 2015
Cyber Kill Chain vs. Cyber Criminals
600.412.Lecture06
SOAP Overview
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
Advanced Persistent Threats (APTs) - Information Security Management
Cloud Breach – Preparation and Response
Targeted attacks
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
Certificate_eWPT
Demonstrate the defense and attack strategies
Présentation #Wallcode
Antivirus Bypass Techniques - 2016
Alphorm.com support de la formation programmer en C# 6
Alphorm.com Support de la formation Programmer en C# avec visual studio 2015
Ad

Similar to Keynote Information Security days Luxembourg 2015 (20)

PPTX
NZISF Talk: Six essential security services
PPT
Commercial and government cyberwarfare
PPT
Commercial And Government Cyberwarfare
PDF
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
PDF
Corona| COVID IT Tactical Security Preparedness: Threat Management
PPTX
Intro to INFOSEC
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PDF
Mickey pacsec2016_final
PDF
Big Bang Theory: The Evolution of Pentesting High Security Environments
PDF
Users awarness programme for Online Privacy
PDF
Vulnerability Management: A Comprehensive Overview
PPT
Lecture 4 presentation of cyber security
PDF
110307 cloud security requirements gourley
PDF
Rothke - A Pragmatic Approach To Purchasing Information Security Products
PDF
C days2015
PPTX
Presentation 10.pptx
PPTX
Privacies are Coming
PDF
Infosec russia cnemeth_v1.2.ppt
PDF
terry-gilsenan-pie-operating.10433
PPTX
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
NZISF Talk: Six essential security services
Commercial and government cyberwarfare
Commercial And Government Cyberwarfare
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Corona| COVID IT Tactical Security Preparedness: Threat Management
Intro to INFOSEC
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Mickey pacsec2016_final
Big Bang Theory: The Evolution of Pentesting High Security Environments
Users awarness programme for Online Privacy
Vulnerability Management: A Comprehensive Overview
Lecture 4 presentation of cyber security
110307 cloud security requirements gourley
Rothke - A Pragmatic Approach To Purchasing Information Security Products
C days2015
Presentation 10.pptx
Privacies are Coming
Infosec russia cnemeth_v1.2.ppt
terry-gilsenan-pie-operating.10433
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx

More from Claus Cramon Houmann (6)

PPTX
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
PPTX
The cavalry is us i tdays-luxembourg 2014.11.20 v1.0
PPTX
The unspeakable-pitfalls of mobile security
PPTX
Defensive strategies
PPTX
Mitigating the clicker
PPTX
Css 2013 claushoumann Building comprehensively for IT Security
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
The cavalry is us i tdays-luxembourg 2014.11.20 v1.0
The unspeakable-pitfalls of mobile security
Defensive strategies
Mitigating the clicker
Css 2013 claushoumann Building comprehensively for IT Security

Recently uploaded (20)

PPTX
Configure Apache Mutual Authentication
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPT
Geologic Time for studying geology for geologist
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Consumable AI The What, Why & How for Small Teams.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Configure Apache Mutual Authentication
Module 1 Introduction to Web Programming .pptx
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
The influence of sentiment analysis in enhancing early warning system model f...
OpenACC and Open Hackathons Monthly Highlights July 2025
Geologic Time for studying geology for geologist
Comparative analysis of machine learning models for fake news detection in so...
Taming the Chaos: How to Turn Unstructured Data into Decisions
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A review of recent deep learning applications in wood surface defect identifi...
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
CloudStack 4.21: First Look Webinar slides
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Consumable AI The What, Why & How for Small Teams.pdf
Basics of Cloud Computing - Cloud Ecosystem
NewMind AI Weekly Chronicles – August ’25 Week III
Convolutional neural network based encoder-decoder for efficient real-time ob...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf

Keynote Information Security days Luxembourg 2015

  • 2. World’s biggest Hack? • Was their security ”make believe”?
  • 3. Me • Father of 3, happily married. • I work for a Bank. Am also independent IT/Infosec consultant. Any opinions presented here are my own and do not represent my employer. • Contributor to ”@TheAnalogies project” making IT and Infosec understandable outside the echo chambers • Member of the I am the Cavalry movement – trying to make connected devices worthy of our trust • @ClausHoumann • I present on security a lot at conferences -> Find my work on slideshare
  • 4. What is a keynote? • Painting the big picture • Strategic views -> Not Tactical view
  • 5. The big picture • Existing tools, and even Next- Generation APT tools have limits/are broken: – Examples: https://blog.mrg-effitas.com/wp- content/uploads/2014/11/Crysys_MRG_APT_detection_test_20 14.pdf – He created the stupidest malware imaginiable. No one detected it. – http://archive.hack.lu/2014/Bypasss_sandboxes_for_fun.pdf – Paul Jung -> Present here today -> shows how easily malware can detect sandboxes
  • 6. The big picture • No silver bullets exist. Beware of the phrases: – ”Counter any threat” – ”Detect any malware” – ”You only need our solution” – Proceed with caution – VPT (vendor persistent threat)
  • 7. The big picture • That being said, many awesome vendors and products are present today! There is no #Infosec without them • They have my respect
  • 9. Doing it wrong (Source: Stefan Esser)
  • 10. Source: With permission from Daniel Miessler @danielmiessler
  • 11. And my own version
  • 12. Doing it right • EURODNS in Luxembourg has just made it possible for each client to get an SSL certificate for their website for free • This simple change makes a difference
  • 13. The job of the enterprise defender: • Trying to not purchase crappy products (Lemons -> Source: Haroon Meer @wearetroopers • While trying to build a real skilled defense
  • 15. It’s an assymetrical conflict X-wing
  • 16. Compliance • Is • NOT • Security • Compliance is preparing to fight a war • Using antiquated weapons • Against enemies of decades past
  • 17. Why worry now? • Companies that get hacked are fine...look at Sony, Target, Apple etc. -> stock prices not affected, end users don’t care. – Breaches and lawyer expenses following these are an acceptable cost of doing business – Right? – No, maybe not anymore...next slide
  • 18. Board Level Attention required, NOW! • EU Data protection regulation: – Mandatory breach reporting within 72 hours – 5% of revenue as fine possible • Threat level increasing sharply • Attack surface increasing (think IoT, BYOD)
  • 19. Want to beat assymetricality? Here’s how: • A strategic approach to security leveraging methods that work
  • 20. Pyramids - This one is Joshua Corman’s. Defensible Infrastructure Operational Excellence Situational Awareness Counter- measures
  • 21. The Foundation Defensible Infrastructure Software and Hardware built as ”secure by default” is ideal here. Rugged DevOps. Your choices of tech impacts you ever after You must assemble carefully, like Lego Without backdoors or Golden Keys!
  • 22. Mastery Operational Excellence Master all aspects of your Development, Operations and Outsourcing. Train like the Ninjas! DevOps (Rugged DevOps) Change Management Patch Management Asset Management Information classification & localization Basically, all the cornerstones of ITIL You name it. Master it.
  • 23. Gain the ability to handle situations correctly – Floodlights ON Situational Awareness ”People don’t write software anymore, they assemble it” Quote Joshua Corman. -> Know which lego blocks you have in your infrastructure -> Actionable threat intelligence -> Automate as much as you can, example: IOC’s automatically fed from sources into SIEM with alerting on matches Are we affected by Poodle? Shellshock? WinShock? Heartbleed? Should we patch now? Next week? Are we under attack? Do we have compromised endpoint? Are there anomalies in our LAN traffic?
  • 24. Counter that which you profit from countering • Decrease attacker ROI below critical threshold by applying countermeasures • Most Security tools fall within this category • Limit spending until you’re laid the foundational levels of the pyramid Counter- measures Footnote: Cyber kill chain is patented by Lockheed Martin.
  • 25. Mapping to other strategic approaches Defensible Infrastructure Operational Excellence Situational Awareness Counter- measures Lockheed Martin patented Nigel Wilson -> @nigesecurityguy
  • 26. Defensive hot zones • Basketball and other sports analysis -> • – FIND the HOT zones of your opponents. • Defend there.
  • 27. Defensive hot zones • Basketball and other sports analysis -> • – FIND the HOT zones of your opponents. • Defend there.
  • 28. Hot zones! • You need to secure: – The (Mobile) user/ endpoints – The networks – Data in transit – The Cloud – Internal systems Sample protections added only, not the complete picture of course
  • 29. Best Practices – High level • Create awareness – Security awareness training • Increase the security budget – Justify investments BEFORE the breach. – It’s easier when you’re actually being attacked. But too late. • Use the Cyber Kill Chain model or Nigel Wilsons ”Defensible Security Posture” to gain capability to thwart attackers • Training, skills and people!
  • 30. Hot zone 1: A real world PC • Microsoft EMET 5.2 • Java • Adobe Flash Player/Reader • AV • Executable files kill you, so use: – Adblocking extension in browser – Advanced endpoint protection solutions – Secure Web Gateway – White listing, black listing – No admin credentials left behind And then cross your fingers
  • 31. Hot zone 1, more • PC defense should include: – Whitelisting – Blacklisting – Sandboxing – Registry defenses – Change roll-backs – HIPS – Domain policies – Log collection and review – MFA – ACL’s/Firewall rules – Heuristics detection/prevention – DNS audit and protection
  • 32. Hot zone 2: The networks • Baselining everything • Spot anomalies • Monitor, observe, record • Advanced network level tools • Test your network resilience/security with Ixia BreakingPoint. Ask me for free test licenses. • Network Security Monitoring (NSM) • Don’t forget the insider threat
  • 33. Hot zone 3+4: Data in Transit/Cloud • Trust in encryption • Remember you secure what you put in the cloud. The Cloud provider doesn’t • Great new mobile collaboration tools exist • SaaS monitoring and DLP tools exist -> ”CloudWalls” • Cloudcrypters • CloudTrail, CloudWatch, Config-log/change-trackers, vuln.mgmt • Story about the Vulnerability patched during Bash/Shellshock public confusion period • And this for home study: https://securosis.com/blog/security-best- practices-for-amazon-web-services
  • 35. Cloud • Concentration risk • Secure the administrative credentials and APIs • ENISA: – https://www.enisa.europa.eu/activities/risk- management/files/deliverables/cloud-computing-risk- assessment – https://resilience.enisa.europa.eu/cloud-computing- certification • A funny story about cloud certification providers hacking me
  • 36. Best practices • Use EMET • Use ad-blockers • Use advanced endpoint threat prevention solutions • Use ”Adversary mind-set” and threat modeling
  • 37. A more defensible infrastructure • Avoid expense in depth • Research and find the best counter measures • Open Source tools can be awesome • Full packet capture and Deep packet inspection/Proxies for visibility • KNOW WHAT’S GOING ON IN YOUR NETWORKS • Watch and learn from attack patterns
  • 38. Best practices - Mitigate risks Source: Dave Sweigert
  • 39. Automate Threat Intelligence IOC • Use multiple IOC feeds • Automate daily: – IOC feed retrival, – Insertion into SIEM, – Correlation against all-time logfiles, – Alerting on matches – Manual follow-up on alerts
  • 40. You need to ally up! • Security and Infrastructure aren’t enemies • Security and the office of the CIO aren’t enemies • Ally up & Bromance!
  • 41. And the unexpected extra win • Real security will actually make you compliant in many areas of compliance
  • 42. Q & A • Ask me question, or I’ll ask you questions
  • 43. Sources used – http://www.itbusinessedge.com – Heartbleed.com – https://nigesecurityguy.wordpress.com/ – Lockheed Martins ”Cyber Kill Chain” – Joshua Corman and David Etue from RSAC 2014 ”Not Go Quietly: Surprising Strategies and Teammates to Adapt and Overcome” – Lego

Editor's Notes

  • #2: Or join these
  • #6: Paul Jung present & presenting
  • #7: Paul Jung present & presenting
  • #8: Paul Jung present & presenting
  • #9: No, that’s not a moon. Perspective matters. Things are not as they seem.
  • #21: The Egyptians built their pyramids from the bottom up. Because, that’s how you build pyramids. Start there!
  • #22: Laying a secure foundation matters supremely. History proves this
  • #23: As with any art, practice makes master. So, Practice!
  • #24: Automation is key for threat intelligence, threat detection and threat remediation
  • #26: Dont start by blindly buying tools, do the basics, master it and work from there
  • #31: In reality, you will have AV, Java and others. And you probably cannot enforce killing all executables
  • #33: In reality, you will have AV, Java and others. And you probably cannot enforce killing all executables
  • #34: In reality, you will have AV, Java and others. And you probably cannot enforce killing all executables