SlideShare une entreprise Scribd logo
1  sur  22
Beyond the Fortress
Network
David C. Broussard
Principal Consultant
@dbroussa
Blogs.catapultsystems.com/dbroussard
Who am I?


The Fortress Network





Security in the old mindset




What are we concerned about again?




Did it work?



−
−
Bad EXTERNAL actor

−
−
−
−
−

−
Story Time

−
−
−
−

−
−
Story Time 2

−
−
−
−
−

−
−
−
Malicious INTERNAL Actor

−
−
−
−

−
−
Story Time 3

−
−
−
−

−
Story Time 4

−
−
−
−
−

−
−
Core questions about security





DELIVERY
Employee A opens infected
email on workstation2
A
Malware
EXPLOITATION
Employee B opens infected
email using mobile device2
BMalware
Infected phone disables
Antivirus; and compromised
credentials used to access
Email service
3Control Evasion
Password/Hash Dumping
3
Threat Actor gather
credentials on
compromised machine
COMMAND AND
CONTROL
Credentials harvested after
Employee attempts login
to bogus site
2
4
Threat Actors move
laterally within network
using compromised
credentials
Compromised Credential
ACTIONS ON
OBJECTIVE
5
Threat Actors use compromised
devices/accounts to exfiltrate PII
48 Hours 200+ Days
PII
Leak/Exfiltrate Data
Threat Actor targets employees
via phishing campaign1
Phishing
3
Compromised credentials
used to access service
Mobile Device Management

−
−
−
−
Risk Based Access



Data Loss Prevention and Encryption



Threat Detection and Prevention

−
−
−
−
Tools that you didn’t know you had






http://get.catapultsystems.com/0365-business-registration
http://get.catapultsystems.com/0365-bootcamp-registration-it-track/
@CloudWhisperers
Learn More

Contenu connexe

Tendances

Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
brn8brwn
 
2011 training presentation
2011 training presentation2011 training presentation
2011 training presentation
kaspersky-lab
 

Tendances (20)

Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
History & Future of Credentials Theft
History & Future of Credentials TheftHistory & Future of Credentials Theft
History & Future of Credentials Theft
 
Research Review - Cyberark Labs
Research Review - Cyberark LabsResearch Review - Cyberark Labs
Research Review - Cyberark Labs
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
2011 training presentation
2011 training presentation2011 training presentation
2011 training presentation
 
Hacking
HackingHacking
Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
 

Similaire à Beyond the Fortress Network

Select ONE of the following security incidents and provide the f.docx
Select ONE of the following security incidents and provide the f.docxSelect ONE of the following security incidents and provide the f.docx
Select ONE of the following security incidents and provide the f.docx
lvernon1
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Refer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docxRefer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docx
lorent8
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin Attack
Gavin Davey
 
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docxSheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
bjohn46
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
Raj vardhan
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
lmelaine
 
ThreatModeling.ppt
ThreatModeling.pptThreatModeling.ppt
ThreatModeling.ppt
tashon2
 

Similaire à Beyond the Fortress Network (20)

Select ONE of the following security incidents and provide the f.docx
Select ONE of the following security incidents and provide the f.docxSelect ONE of the following security incidents and provide the f.docx
Select ONE of the following security incidents and provide the f.docx
 
Security
Security Security
Security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Security & Compliance for Startups
Security & Compliance for StartupsSecurity & Compliance for Startups
Security & Compliance for Startups
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
Refer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docxRefer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docx
 
Network security
Network securityNetwork security
Network security
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin Attack
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2
 
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docxSheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
 
455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
IRJET- An Overview of Ethical Hacking
IRJET- An Overview of Ethical HackingIRJET- An Overview of Ethical Hacking
IRJET- An Overview of Ethical Hacking
 
ThreatModeling.ppt
ThreatModeling.pptThreatModeling.ppt
ThreatModeling.ppt
 

Plus de David Broussard

Plus de David Broussard (16)

SPSHOU18 Working on the Go With Microsoft
SPSHOU18   Working on the Go With MicrosoftSPSHOU18   Working on the Go With Microsoft
SPSHOU18 Working on the Go With Microsoft
 
SPSTC18 Working on the Go With Microsoft
SPSTC18   Working on the Go With MicrosoftSPSTC18   Working on the Go With Microsoft
SPSTC18 Working on the Go With Microsoft
 
SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365
 
HSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceHSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data Governance
 
SPSNE Sun Tzu and the Art of Digital Transformation
SPSNE   Sun Tzu and the Art of Digital TransformationSPSNE   Sun Tzu and the Art of Digital Transformation
SPSNE Sun Tzu and the Art of Digital Transformation
 
SPSCincy 2017 Hidden Gems in O365
SPSCincy 2017   Hidden Gems in O365SPSCincy 2017   Hidden Gems in O365
SPSCincy 2017 Hidden Gems in O365
 
Spshou Hidden Gems in O365
Spshou Hidden Gems in O365Spshou Hidden Gems in O365
Spshou Hidden Gems in O365
 
SPSAC - What do we Want? A New Intranet!
SPSAC - What do we Want?  A New Intranet!SPSAC - What do we Want?  A New Intranet!
SPSAC - What do we Want? A New Intranet!
 
SPSNYC - How to Sell Your Intranet
SPSNYC - How to Sell Your IntranetSPSNYC - How to Sell Your Intranet
SPSNYC - How to Sell Your Intranet
 
SPSDFW Bottom Up SharePoint Design
SPSDFW Bottom Up SharePoint DesignSPSDFW Bottom Up SharePoint Design
SPSDFW Bottom Up SharePoint Design
 
2014 SP Summit Vancouver Bottom Up SharePoint
2014 SP Summit Vancouver Bottom Up SharePoint2014 SP Summit Vancouver Bottom Up SharePoint
2014 SP Summit Vancouver Bottom Up SharePoint
 
SPSNYC Building Social Solutions
SPSNYC Building Social SolutionsSPSNYC Building Social Solutions
SPSNYC Building Social Solutions
 
SASUG April - Building Social Networks and the Social Journey
SASUG April - Building Social Networks and the Social JourneySASUG April - Building Social Networks and the Social Journey
SASUG April - Building Social Networks and the Social Journey
 
Catapult k2 partner event oct 12 2011
Catapult k2 partner event oct 12 2011Catapult k2 partner event oct 12 2011
Catapult k2 partner event oct 12 2011
 
Building the perfect share point farm
Building the perfect share point farmBuilding the perfect share point farm
Building the perfect share point farm
 
Spstc2011 share point for dotcom sites
Spstc2011   share point for dotcom sitesSpstc2011   share point for dotcom sites
Spstc2011 share point for dotcom sites
 

Dernier

Dernier (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Beyond the Fortress Network

Notes de l'éditeur

  1. Focused on access to data as opposed to securing the data itself Deny malicious users from accessing data except from inside of our secure network The cloud is seen as insecure primarily because we (IT) no longer can restrict access to the information Or can we? However, even the Fortress Network didn’t work completely What about email? Didn’t we lose control of that document once we hit send?
  2. Build high walls around our data Firewalls Network segments VPNs NTFS permissions Build deep defense in depth DMZs Detonation Chambers Pre-scan incoming requests (honey traps, URL scans) Malware protection Malicious link detection Spam and virus software on desktops and servers Interior security was much less strenuous Virus scans Malware But assumption was if you had access you could do anything