SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
EVERYTHING YOU NEED TO KNOW TO
SECURE YOUR WEB PRESENCE
ARE YOU AT
RISK?
INTRODUCTION TO THE CURRENT THREAT LANDSCAPE • IMPACT OF
AN ATTACK • INSIDE THE MIND OF A HACKER
CURRENT HIGH RISK TYPES OF ATTACK • KEY CONSIDERATIONS FOR
A RESILIENT WEB SECURITY STRATEGY
Senior Solutions Engineer
Akamai
DR. CLAUDIA JOHNSON
Security Services Manager
Melbourne IT
KEN PANGCHRIS POLKINGHORNE
OUR SPEAKERS
Chief Technology Officer
Content Security
INTRODUCTION TO
THE CURRENT
THREAT LANDSCAPE
Akamai found out about Shellshock and had all vulnerabilities patched before the vulnerability even became
public. Akamai’s Web Application Firewall (WAF) was updated to deliver a virtual patch to customers within hours
after the public announcement.
Case study
Shellshock 2014
MEGA ATTACK – a DDoS attack which is
greater than 100Gbps. This is extremely large
and we (Akamai) hardly ever saw them a
couple of years ago. In Q3 2014 we saw 17 on
one single customer. This is fairly new in terms
of volume.
SQLI AND XXS TOOLS – These days it is much
easier to launch attacks – no technical
knowledge is needed, and online tools can be
used, which are inexpensive.
CRIMINAL ACTORS – credit card credential
theft is on the rise but we are also seeing a lot
of corporate espionage – potentially launched
by state sponsored organisations.
MULTI VECTOR – the hacker is using more than
one attack vector to bring down the victim –
e.g. a combination of volumetric DDoS and
SQL injection. The DDoS attack would occupy
the security team, so it may not notice the
SQL injection.
INTRODUCTION TO THE ONLINE THREAT LANDSCAPE
IMPACT OF
404404
AN ATTACK
IMPACT OF AN ATTACK
It’s not easy to classify hackers or the methods that they are going to use.
DISTRIBUTE.IT EXAMPLE
An Australian trading platform was founded in 2002
by the Woerndle brothers.
By 2011 Distribute.IT had secured a 10% market share
and more than 200,000 clients on its books
June 2011 changed the game…
Hacker = an unemployed truck driver who learned from youtube and chatrooms
A hacker got access to master
user privileges which = access
to everything!
On the first day after being
back online, the main servers
were noticed to be going
intermittently offline. The
hacker had regained master
user privileges and defaced
site via VoIP and PHP
vulnerabilities.
The website spent over 6 days
offline to fix
Both Woerndle brothers lost
their homes
The company was nearly
bankrupt
RESULTS FROM PONEMON 2014 STUDY
IMPACT OF AN ATTACK
Ponemon publish “Cost of Data Breach” studies
annually since 2006
2014 Results: 314 companies interviewed, results do
not disclose any company names
Results are for companies in 10 countries in
North America, Europe, Asia and Australia,
across 16 industries
Australia
specifics:
0
10%
20%
30%
40%
50%
60%
MALICIOUS CODE SUSTAINED
PROBES
SUSPICIOUS
ACTIVITIES
UNAUTHORIZED
ACCESS
DENIAL OF
SERVICES
49%
37%
14%
47% 46%
7%
33%
11%
33%
49%
18%
22%
58%
20%
56%
Increased Stayed the same Decreased
Changes in security threats over the forthcoming year
22
Case Studies
analysed
Average
Breach Cost
$3MAUD
DON’T BE ‘THAT’ GUY…
What not to do
A lot of businesses think that they have nothing of value. So why do companies still have
server rooms locked? Why set passwords on servers and end user terminals?
Home Depot forgot that their point of sale (POS) network was IP enabled. Now they’re facing
multimillions of dollars in losses. You might not have a POS system in your network, but a full profile
with a person’s name, address, phone number and date of birth alone, is worth around $3.
If you have 1000 employees, that’s an easy $3k for a hacker if they can get it. Add in a bank account
number or a credit card, and you can be looking at up to $150 per record.
Case study
Home Depot
INSIDE THE MIND OF
A HACKER
UNDERSTANDING THE ATTACKERS
Different groups have different motivations. Three examples:
Make money Steal intellectual property from
government and corporates
Spread a message. Cause
embarrassment and brand damage
DDoS extortion, financial theft
(credit cards), personal data sale
Advanced, well planned, long term
attacks
Deface websites. Dump company
specific internal information
Understands certain hacking
methodology or vulnerability
Willing to move to another target if
protection level high
Nearly impossible to thwart
Well thought out Incident Response
Plan key is required for this type of
attack
High level of attention / press is key
Willing to move to another target if
protection level high
Advanced Persistent
Threat (APT) styleHacktivistsCyber crime
password
username
Ultimately it’s a risk reward industry. Any attacker wants a good ROI.
GOAL
HOW
WHAT ATTACKERS DO WE SEE THE MOST OFTEN?
Remote scanners looking for vulnerabilities.A
Q
THE VULNERABILITIES
The attackers are often exploiting the following:
Authentication issues
such as weak passwords
Basic web
vulnerabilities
Ineffective
security controls
Forgotten systems
and services
Misconfigurations
Out of date
patching
Poorly designed
systems
SO WHO’S GOING TO THREATEN ME AND MY COMPANY?
Threats come from many different sources, but they can
be broadly grouped into three classes.
Attackers are slightly more selective. They have better skills, or a position of trust, and they’ve gotten access to a
machine or group of machines. This can include when someone has found a vulnerability through scanning, and
have put it up for sale.
For example, if there’s an SQL injection that will dump the contents of a customer database or an employee
database, that can be sold for big money. Likewise, if someone has phished or brute forced some working
credentials to get into a system through a remote login, they can sell this.
This kind of access can either be for the direct theft of data, or for extortion.
This is where the attacker doesn’t know who they’re attacking, and in some ways, they don’t care. It’s all about
spray and pray, because the effort is so low, and so cheap, they can afford to send out 10,000 emails, to get one
victim. Random attacks include things like Cryptolocker and Script Kiddies (people who don’t have any technical
knowledge, using easy-to-use tools).
It’s very difficult to avoid being the victim of a targeted attack. ‘Anonymous’ hacking group is an example of this –
with many examples in the press. Anonymous is doing it in their own time for a political reason. Imagine if the
attacker was state sponsored, it was a paid full time job, with good access to tools and training.
RANDOM
OPPORTUNISTIC
TARGETED
CURRENT
HIGH RISK TYPES
OF ATTACK
HIGH RISK ATTACKS
High risk – depends on your company and the organisation you’re working for.
Top Tips:
CREATE A RISK PLAN CREATE AN INCIDENT
RESPONSE PLAN
WHERE IS THE CONTENT
What would pose the greatest financial impact if it
were to be breached or go offline?
OPERATIONAL DB
Do you have a DB which is a critical piece of your
daily operations?
WHICH SYSTEMS, WHICH DATA
Question of data becoming unavailable or
question of data being leaked?
TECHNOLOGY Q’S TO CONSIDER
Do you have issues around infrastructure being
able to handle a large amount of traffic? Do you
have some security in place but not capable of
handling a slow get, or slow post attack?
ONCE IDENTIFIED SYSTEMS
What do I need to do to protect those and how
much is going to cost me? Is it possible to
infiltrate critical systems via non-critical
unprotected path?
Where are the vulnerabilities?
How much is it going to cost me?
What’s the risk of an attack?
KEY CONSIDERATIONS FOR
A RESILIENT
WEB SECURITY STRATEGY
HOW DO I RESPOND?
There are different strategies for different risk profiles:
Everyone has to protect
against random attacks. No
exceptions.
If you have an internet
presence, you need to
consider where the
opportunities are to attack
and mitigate, reduce or
accept the risk.
If you have something worth
stealing by determined
cybercriminals or foreign
entities, you need to
consider how to defend
against that.
ASK YOURSELF
Does this information need
to be on the Internet?
Understand and reduce your
“attack surface”
Perform Penetration Tests
Establish a solid basic
security antivirus/firewalls/
web filtering
Emphasise safe online
behaviours through training
EVERYTHING ...!
Admin interfaces on CMSes
being made public
Remote access using only
username/password
BYOD and rogue devices can
be a weak point
Excessive permissions
exacerbates problems
Use global threat intelligence
Use APTexfiltration
detection tools
TARGETED ATTACKSRANDOM ATTACKS OPPORTUNISTIC
ATTACKS
STRATEGIES FOR DIFFERENT RISK PROFILES
“Gotchas”
KEY DEFENSE STRATEGIES
There is no magic security silver bullet. There
are however multiple effective, and cost
appropriate layers in the solution.
Ask questions of your service providers.
Understand who is responsible for what.
Report security incidents to relevant
authorities.
The biggest mistake organisations make is
assuming it won’t happen to them.
Get the basics right. Handle data
appropriately. Patch your systems. Enforce
complex passwords.
Design systems assuming it will be
compromised. This may sound bad, but it
makes for better designs.
KEY CONSIDERATIONS
What are the key components of a resilient security posture?
DDoS, Application Layer protection -
Consider both company Datacentre as
well as cloud based applications.
How can I build security into my
development process? You may have
development in-house, may outsource it -
this can be something that doesn’t cost a
lot of money but brings a lot of
advantages.
Be ready for an attack – protect and
mitigate as much as possible but have
something in place to react accordingly.
Who do I need to tell about the breach and
who is responsible for that?
Continual Improvement
Have someone on the board who
represents the topic of security – someone
who has security as their main concern.
Look at your organisation, where your
risks are, take a serious methodology of
risk and probability of being attacked and
develop a business plan that is relevant to
your organisation.
GOOD RESOURCES
Australian Signals Directorate (ASD) TOP 4
ASD.GOV.AU/INFOSEC/MITIGATIONSTRATEGIES.HTM
SANS Critical Security Controls
SANS.ORG/CRITICAL-SECURITY-CONTROLS/
Cloud Security Alliance
CLOUDSECURITYALLIANCE.ORG
BROUGHT TO YOU BY
For a complimentary Melbourne IT and Akamai assessment visit
MELBOURNEITENTERPRISE.COM.AU/AKAMAI-PRODUCT/
For a complimentary Melbourne IT and Content Security assessment email
CORPORATE.SALES@MELBOURNEIT.COM.AU
MELBOURNEITENTERPRISE.COM.AU AKAMAI.COM CONTENTSECURITY.COM.AU

Contenu connexe

Tendances

Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesSlideTeam
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligencecentralohioissa
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breachesxband
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec WaySymantec
 
Owasp e crime-london-2012-final
Owasp e crime-london-2012-finalOwasp e crime-london-2012-final
Owasp e crime-london-2012-finalMarco Morana
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentConSanFrancisco123
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceSymantec
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017NRC
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughSavvius, Inc
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesLiberteks
 
Gavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune SystemGavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune Systemcentralohioissa
 
Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Duo Security
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up bookDiego Souza
 
Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Armor
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012DaveEdwards12
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information securityMajor Hayden
 

Tendances (20)

Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec Way
 
Owasp e crime-london-2012-final
Owasp e crime-london-2012-finalOwasp e crime-london-2012-final
Owasp e crime-london-2012-final
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software Development
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
 
Gavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune SystemGavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune System
 
Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 

En vedette

How to be Ready When Large Scale Customers Hit Your Site as a Result of Succe...
How to be Ready When Large Scale Customers Hit Your Site as a Result of Succe...How to be Ready When Large Scale Customers Hit Your Site as a Result of Succe...
How to be Ready When Large Scale Customers Hit Your Site as a Result of Succe...Melbourne IT
 
Batxillerat tecnologic
Batxillerat tecnologicBatxillerat tecnologic
Batxillerat tecnologicandreaisonia
 
Drive Rapid and Constant Growth in Your Online Business
Drive Rapid and Constant Growth in Your Online BusinessDrive Rapid and Constant Growth in Your Online Business
Drive Rapid and Constant Growth in Your Online BusinessMelbourne IT
 
SLIDESHARE SHOWCASE
SLIDESHARE SHOWCASE SLIDESHARE SHOWCASE
SLIDESHARE SHOWCASE Michael Mars
 
Ciencias naturales
Ciencias naturalesCiencias naturales
Ciencias naturalesEvelyn Sagal
 
Trabajode computacion
Trabajode computacionTrabajode computacion
Trabajode computacionEvelyn Sagal
 
Delivering World-class User Experience and Increased Conversion
Delivering World-class User Experience and Increased ConversionDelivering World-class User Experience and Increased Conversion
Delivering World-class User Experience and Increased ConversionMelbourne IT
 
Redundancy insurance
Redundancy insuranceRedundancy insurance
Redundancy insuranceredundancy23
 
Let's Get Personal: Creating a Unique Web Experience Each and Every Time
Let's Get Personal: Creating a Unique Web Experience Each and Every TimeLet's Get Personal: Creating a Unique Web Experience Each and Every Time
Let's Get Personal: Creating a Unique Web Experience Each and Every TimeMelbourne IT
 
Implement cobit in your organization
Implement cobit in your organizationImplement cobit in your organization
Implement cobit in your organizationCheikh Hamallah DJIBA
 
The heritage of abundance presentation
The heritage of abundance presentationThe heritage of abundance presentation
The heritage of abundance presentationSugeng Silitonga
 
Chapter 19 sales promotions budget and evaluation sales and distribution mana...
Chapter 19 sales promotions budget and evaluation sales and distribution mana...Chapter 19 sales promotions budget and evaluation sales and distribution mana...
Chapter 19 sales promotions budget and evaluation sales and distribution mana...jasween23
 

En vedette (14)

How to be Ready When Large Scale Customers Hit Your Site as a Result of Succe...
How to be Ready When Large Scale Customers Hit Your Site as a Result of Succe...How to be Ready When Large Scale Customers Hit Your Site as a Result of Succe...
How to be Ready When Large Scale Customers Hit Your Site as a Result of Succe...
 
Batxillerat tecnologic
Batxillerat tecnologicBatxillerat tecnologic
Batxillerat tecnologic
 
Paradoks 1969
Paradoks 1969Paradoks 1969
Paradoks 1969
 
Drive Rapid and Constant Growth in Your Online Business
Drive Rapid and Constant Growth in Your Online BusinessDrive Rapid and Constant Growth in Your Online Business
Drive Rapid and Constant Growth in Your Online Business
 
SLIDESHARE SHOWCASE
SLIDESHARE SHOWCASE SLIDESHARE SHOWCASE
SLIDESHARE SHOWCASE
 
Ciencias naturales
Ciencias naturalesCiencias naturales
Ciencias naturales
 
Trabajode computacion
Trabajode computacionTrabajode computacion
Trabajode computacion
 
Computacion
ComputacionComputacion
Computacion
 
Delivering World-class User Experience and Increased Conversion
Delivering World-class User Experience and Increased ConversionDelivering World-class User Experience and Increased Conversion
Delivering World-class User Experience and Increased Conversion
 
Redundancy insurance
Redundancy insuranceRedundancy insurance
Redundancy insurance
 
Let's Get Personal: Creating a Unique Web Experience Each and Every Time
Let's Get Personal: Creating a Unique Web Experience Each and Every TimeLet's Get Personal: Creating a Unique Web Experience Each and Every Time
Let's Get Personal: Creating a Unique Web Experience Each and Every Time
 
Implement cobit in your organization
Implement cobit in your organizationImplement cobit in your organization
Implement cobit in your organization
 
The heritage of abundance presentation
The heritage of abundance presentationThe heritage of abundance presentation
The heritage of abundance presentation
 
Chapter 19 sales promotions budget and evaluation sales and distribution mana...
Chapter 19 sales promotions budget and evaluation sales and distribution mana...Chapter 19 sales promotions budget and evaluation sales and distribution mana...
Chapter 19 sales promotions budget and evaluation sales and distribution mana...
 

Similaire à Introduction to the Current Threat Landscape

Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017Bret Piatt
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?Gabe Akisanmi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewRobert Herjavec
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firmsJake Weaver
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfAhad
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxAhad
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughMartin Opsahl
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 

Similaire à Introduction to the Current Threat Landscape (20)

Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR Overview
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2
 
White hat march15 v2.2
White hat march15 v2.2White hat march15 v2.2
White hat march15 v2.2
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Introduction to the Current Threat Landscape

  • 1. EVERYTHING YOU NEED TO KNOW TO SECURE YOUR WEB PRESENCE ARE YOU AT RISK? INTRODUCTION TO THE CURRENT THREAT LANDSCAPE • IMPACT OF AN ATTACK • INSIDE THE MIND OF A HACKER CURRENT HIGH RISK TYPES OF ATTACK • KEY CONSIDERATIONS FOR A RESILIENT WEB SECURITY STRATEGY
  • 2. Senior Solutions Engineer Akamai DR. CLAUDIA JOHNSON Security Services Manager Melbourne IT KEN PANGCHRIS POLKINGHORNE OUR SPEAKERS Chief Technology Officer Content Security
  • 4. Akamai found out about Shellshock and had all vulnerabilities patched before the vulnerability even became public. Akamai’s Web Application Firewall (WAF) was updated to deliver a virtual patch to customers within hours after the public announcement. Case study Shellshock 2014 MEGA ATTACK – a DDoS attack which is greater than 100Gbps. This is extremely large and we (Akamai) hardly ever saw them a couple of years ago. In Q3 2014 we saw 17 on one single customer. This is fairly new in terms of volume. SQLI AND XXS TOOLS – These days it is much easier to launch attacks – no technical knowledge is needed, and online tools can be used, which are inexpensive. CRIMINAL ACTORS – credit card credential theft is on the rise but we are also seeing a lot of corporate espionage – potentially launched by state sponsored organisations. MULTI VECTOR – the hacker is using more than one attack vector to bring down the victim – e.g. a combination of volumetric DDoS and SQL injection. The DDoS attack would occupy the security team, so it may not notice the SQL injection. INTRODUCTION TO THE ONLINE THREAT LANDSCAPE
  • 6. IMPACT OF AN ATTACK It’s not easy to classify hackers or the methods that they are going to use. DISTRIBUTE.IT EXAMPLE An Australian trading platform was founded in 2002 by the Woerndle brothers. By 2011 Distribute.IT had secured a 10% market share and more than 200,000 clients on its books June 2011 changed the game… Hacker = an unemployed truck driver who learned from youtube and chatrooms A hacker got access to master user privileges which = access to everything! On the first day after being back online, the main servers were noticed to be going intermittently offline. The hacker had regained master user privileges and defaced site via VoIP and PHP vulnerabilities. The website spent over 6 days offline to fix Both Woerndle brothers lost their homes The company was nearly bankrupt
  • 7. RESULTS FROM PONEMON 2014 STUDY IMPACT OF AN ATTACK Ponemon publish “Cost of Data Breach” studies annually since 2006 2014 Results: 314 companies interviewed, results do not disclose any company names Results are for companies in 10 countries in North America, Europe, Asia and Australia, across 16 industries Australia specifics: 0 10% 20% 30% 40% 50% 60% MALICIOUS CODE SUSTAINED PROBES SUSPICIOUS ACTIVITIES UNAUTHORIZED ACCESS DENIAL OF SERVICES 49% 37% 14% 47% 46% 7% 33% 11% 33% 49% 18% 22% 58% 20% 56% Increased Stayed the same Decreased Changes in security threats over the forthcoming year 22 Case Studies analysed Average Breach Cost $3MAUD
  • 8. DON’T BE ‘THAT’ GUY… What not to do A lot of businesses think that they have nothing of value. So why do companies still have server rooms locked? Why set passwords on servers and end user terminals? Home Depot forgot that their point of sale (POS) network was IP enabled. Now they’re facing multimillions of dollars in losses. You might not have a POS system in your network, but a full profile with a person’s name, address, phone number and date of birth alone, is worth around $3. If you have 1000 employees, that’s an easy $3k for a hacker if they can get it. Add in a bank account number or a credit card, and you can be looking at up to $150 per record. Case study Home Depot
  • 9. INSIDE THE MIND OF A HACKER
  • 10. UNDERSTANDING THE ATTACKERS Different groups have different motivations. Three examples: Make money Steal intellectual property from government and corporates Spread a message. Cause embarrassment and brand damage DDoS extortion, financial theft (credit cards), personal data sale Advanced, well planned, long term attacks Deface websites. Dump company specific internal information Understands certain hacking methodology or vulnerability Willing to move to another target if protection level high Nearly impossible to thwart Well thought out Incident Response Plan key is required for this type of attack High level of attention / press is key Willing to move to another target if protection level high Advanced Persistent Threat (APT) styleHacktivistsCyber crime password username Ultimately it’s a risk reward industry. Any attacker wants a good ROI. GOAL HOW WHAT ATTACKERS DO WE SEE THE MOST OFTEN? Remote scanners looking for vulnerabilities.A Q
  • 11. THE VULNERABILITIES The attackers are often exploiting the following: Authentication issues such as weak passwords Basic web vulnerabilities Ineffective security controls Forgotten systems and services Misconfigurations Out of date patching Poorly designed systems
  • 12. SO WHO’S GOING TO THREATEN ME AND MY COMPANY? Threats come from many different sources, but they can be broadly grouped into three classes. Attackers are slightly more selective. They have better skills, or a position of trust, and they’ve gotten access to a machine or group of machines. This can include when someone has found a vulnerability through scanning, and have put it up for sale. For example, if there’s an SQL injection that will dump the contents of a customer database or an employee database, that can be sold for big money. Likewise, if someone has phished or brute forced some working credentials to get into a system through a remote login, they can sell this. This kind of access can either be for the direct theft of data, or for extortion. This is where the attacker doesn’t know who they’re attacking, and in some ways, they don’t care. It’s all about spray and pray, because the effort is so low, and so cheap, they can afford to send out 10,000 emails, to get one victim. Random attacks include things like Cryptolocker and Script Kiddies (people who don’t have any technical knowledge, using easy-to-use tools). It’s very difficult to avoid being the victim of a targeted attack. ‘Anonymous’ hacking group is an example of this – with many examples in the press. Anonymous is doing it in their own time for a political reason. Imagine if the attacker was state sponsored, it was a paid full time job, with good access to tools and training. RANDOM OPPORTUNISTIC TARGETED
  • 14. HIGH RISK ATTACKS High risk – depends on your company and the organisation you’re working for. Top Tips: CREATE A RISK PLAN CREATE AN INCIDENT RESPONSE PLAN WHERE IS THE CONTENT What would pose the greatest financial impact if it were to be breached or go offline? OPERATIONAL DB Do you have a DB which is a critical piece of your daily operations? WHICH SYSTEMS, WHICH DATA Question of data becoming unavailable or question of data being leaked? TECHNOLOGY Q’S TO CONSIDER Do you have issues around infrastructure being able to handle a large amount of traffic? Do you have some security in place but not capable of handling a slow get, or slow post attack? ONCE IDENTIFIED SYSTEMS What do I need to do to protect those and how much is going to cost me? Is it possible to infiltrate critical systems via non-critical unprotected path? Where are the vulnerabilities? How much is it going to cost me? What’s the risk of an attack?
  • 15. KEY CONSIDERATIONS FOR A RESILIENT WEB SECURITY STRATEGY
  • 16. HOW DO I RESPOND? There are different strategies for different risk profiles: Everyone has to protect against random attacks. No exceptions. If you have an internet presence, you need to consider where the opportunities are to attack and mitigate, reduce or accept the risk. If you have something worth stealing by determined cybercriminals or foreign entities, you need to consider how to defend against that.
  • 17. ASK YOURSELF Does this information need to be on the Internet? Understand and reduce your “attack surface” Perform Penetration Tests Establish a solid basic security antivirus/firewalls/ web filtering Emphasise safe online behaviours through training EVERYTHING ...! Admin interfaces on CMSes being made public Remote access using only username/password BYOD and rogue devices can be a weak point Excessive permissions exacerbates problems Use global threat intelligence Use APTexfiltration detection tools TARGETED ATTACKSRANDOM ATTACKS OPPORTUNISTIC ATTACKS STRATEGIES FOR DIFFERENT RISK PROFILES “Gotchas”
  • 18. KEY DEFENSE STRATEGIES There is no magic security silver bullet. There are however multiple effective, and cost appropriate layers in the solution. Ask questions of your service providers. Understand who is responsible for what. Report security incidents to relevant authorities. The biggest mistake organisations make is assuming it won’t happen to them. Get the basics right. Handle data appropriately. Patch your systems. Enforce complex passwords. Design systems assuming it will be compromised. This may sound bad, but it makes for better designs.
  • 19. KEY CONSIDERATIONS What are the key components of a resilient security posture? DDoS, Application Layer protection - Consider both company Datacentre as well as cloud based applications. How can I build security into my development process? You may have development in-house, may outsource it - this can be something that doesn’t cost a lot of money but brings a lot of advantages. Be ready for an attack – protect and mitigate as much as possible but have something in place to react accordingly. Who do I need to tell about the breach and who is responsible for that? Continual Improvement Have someone on the board who represents the topic of security – someone who has security as their main concern. Look at your organisation, where your risks are, take a serious methodology of risk and probability of being attacked and develop a business plan that is relevant to your organisation.
  • 20. GOOD RESOURCES Australian Signals Directorate (ASD) TOP 4 ASD.GOV.AU/INFOSEC/MITIGATIONSTRATEGIES.HTM SANS Critical Security Controls SANS.ORG/CRITICAL-SECURITY-CONTROLS/ Cloud Security Alliance CLOUDSECURITYALLIANCE.ORG
  • 21. BROUGHT TO YOU BY For a complimentary Melbourne IT and Akamai assessment visit MELBOURNEITENTERPRISE.COM.AU/AKAMAI-PRODUCT/ For a complimentary Melbourne IT and Content Security assessment email CORPORATE.SALES@MELBOURNEIT.COM.AU MELBOURNEITENTERPRISE.COM.AU AKAMAI.COM CONTENTSECURITY.COM.AU