SlideShare une entreprise Scribd logo
1  sur  68
The Next Cyber Security Threat is Here - Are
You Prepared?
APTs– AdvancedPersistentThreats
Part1 –
Learn5 or 13 Waysto PreventAPTs
Moderator:BillMurphyandJamesCrifasi
Live Tweet from the event!
@TheRedZoneCIO
Schedule of Events
8:30am to 9:00am – Sign In & Breakfast
9:00am to 11:30am – Education Sessions)
11:30am to 12:30pm – lunch
(sponsored by ThunderDG & Thycotic Software)
Live Tweet from the event!
@TheRedZoneCIO
RedZone’s Chief Lieutenant Series
Sister of The CIO Executive Series which is a TOP IT Executive
Network specializing in bringing CIO’s together to
collaborate, network, and stay current on industry trends.
Just under 300 senior C-Suite IT executive members
Founded in 2000 | 13 years of experience bringing CIO’s together
Host a number of events – both virtual and physical – each year
Host a “Special Event” annually | Past events have included:
A Golf Outing, Dinner & Receptions
Live Tweet from the event!
@TheRedZoneCIO
President and Founder
• RedZone Technologies
• ThunderDG
• MA DR Solutions
• Beyond Limits Magazine
Keep In Touch With Bill:
@TheRedZoneCIO
CIO Executive Series Group
billm@redzonetech.net
About Bill Murphy
Live Tweet from the event!
@TheRedZoneCIO
About James Crifasi
Live Tweet from the event!
@TheRedZoneCIO
• CTO of RedZone Technologies
• Co-founder ThunderDG
• Co-founder MA DR
• University of Maryland Graduate | B.A. Criminology &
Criminal Justice | B.S. Computer Science – Algorithmic
Theory & AI | M.S. Interdisciplinary Management
• Keep In Touch With James: jcrifasi@redzonetech.net
Sponsors
RedZone Technologies
Assessment: IT Architecture and Design
Integration: Security| Disaster Recovery| Infrastructure
Managed Service Programs
Cloud Brokerage
(410) 897-9494
www.redzonetech.net
ThunderDG
Employee Policy Management, Education, and Awareness
www.thunderdg.com
Thycotic Software
Password Management
www.thycotic.com
Live Tweet from the event!
@TheRedZoneCIO
Agenda – 5 of 13 Methods to Prevent APTs –
Advanced Persistent Threats
1. MDM, BYOD & Mobility
2. Password - Roles Based Access Control to apps, servers & network devices
3. Configuration and Change Control
4. Prevent and Silence Outbound Hijackers
5. DCS policies - Security Education, Training, Awareness
Live Tweet from the event!
@TheRedZoneCIO
Agenda – 5 of 13 Methods to Prevent APTs –
Advanced Persistent Threats
1. VMWare Horizon Suite – View 5 | VDI
2. Thycotic Software – Password Security
3. C3 – Security Change Control for switches and routers
4. Bluecoat - Prevent and Silence Outbound Hijackers
5. ThunderDG – Policy and Education
.
Live Tweet from the event!
@TheRedZoneCIO
Set The Stage
Live Tweet from the event!
@TheRedZoneCIO
Reality Shift in IT
Live Tweet from the event!
@TheRedZoneCIO
• System communication is fundamentally changing – many
transactions occur over the web
• Network defenses are covering a shrinking portion of the attack
surface
• Cloud is changing our notion of a perimeter
• Worker mobility is redefining the IT landscape
• Security Model good people vs. bad people to enabling partial trust
• There are more “levels” of access: Extranets, partner
access, customer access
Reality Shift for Attackers
Live Tweet from the event!
@TheRedZoneCIO
• Cyber criminals are becoming organized and profit-driven
• An entire underground economy exists to support
cybercrime
• Attackers are shifting their methods to exploit both
• technical and human weaknesses
• Attackers after much more than traditional monetizable
data (PII, etc.)
• Hacktivism
• State-sponsored attacks
• IP attacks/breaches
What is an APT
Advanced Persistent Threat
Live Tweet from the event!
@TheRedZoneCIO
APTs are silent. They leave clues and trails but are essentially
designed not to be found.
• Spear Phishing
• Phishing
• Rootkits
• Traditional Hacker Tool Variants
• Worms
• Etc.
Economics of Phishing
Live Tweet from the event!
@TheRedZoneCIO
Hundreds of millions $!
Source: Bill Duane Talk on Authentication
Go Hunting!
Live Tweet from the event!
@TheRedZoneCIO
Change the rules of the game by becoming proactive in rooting out
malware..
Make It Hard….
Live Tweet from the event!
@TheRedZoneCIO
for these malicious Advanced Persistent Threats (APTs) to operate in
stealth.
Make It Hard….
Live Tweet from the event!
@TheRedZoneCIO
“Most costly breaches come from
simple
failures, not from attacker
ingenuity”
- RSA 2013 Conf Chair Hugh Thompson
Where Do You Start?
Live Tweet from the event!
@TheRedZoneCIO
Security Defense? Whack-
A-Mole? No!
Live Tweet from the event!
@TheRedZoneCIO
Plan
Live Tweet from the event!
@TheRedZoneCIO
Cunning – Be Different
Live Tweet from the event!
@TheRedZoneCIO
Security Scoreboard
Live Tweet from the event!
@TheRedZoneCIO
Security Scoreboard
Live Tweet from the event!
@TheRedZoneCIO
#1
Live Tweet from the event!
@TheRedZoneCIO
BYOD | MDM | Mobile Security
VMWare Horizon Suite
Live Tweet from the event!
@TheRedZoneCIO
Point Solutions vs. Integrated
VMWare Horizon Suite
Live Tweet from the event!
@TheRedZoneCIO
• Centralized data!
• Control and enforce data policy centrally
• Embrace all devices
• Stop doing MDM & get into data application management
• User centric philosophy
• Address application, data, VDI within one solution set
VMWare Horizon Suite
Live Tweet from the event!
@TheRedZoneCIO
Horizon View & Mirage
Live Tweet from the event!
@TheRedZoneCIO
Key Features of Horizon Suite
Live Tweet from the event!
@TheRedZoneCIO
1. Single end-user workspace
• Easy, secure access to all apps/data from any
mobile device
2. Centralized IT Management
3. File Sharing Capabilities
• Offline & online
• Document versioning, commenting & auditing
capabilities
VMWare and APT Defense
Live Tweet from the event!
@TheRedZoneCIO
1. Can you deliver a secure desktop in minutes?
• Efficiency with security is important to keep costs low.
2. IT being able to get the user back to a last known Golden Image is
critical!
Key Features of Horizon Suite
Live Tweet from the event!
@TheRedZoneCIO
• Enterprise-Level Security
• Data encryption on mobile devices
• Endpoint registration & remote wipe
capabilities
• Integration with Horizon View
• Easy access to Virtual Desktops & apps via
Horizon View
• Access View from any HTML5 browser via
remote protocol
Lessons Learned From Our
Experience With Horizon Suite
Live Tweet from the event!
@TheRedZoneCIO
1. Beta lockdown and engineering review
2. Make changes once to all departmental profiles
3. One of the key values of VDI is the ability to
restore a workstation back to a Golden
image, which is free of Malware/Crimeware.
#2
Live Tweet from the event!
@TheRedZoneCIO
Passwords & RBAC
Thycotic Software
Secret Server
Passwords | RBAC
Live Tweet from the event!
@TheRedZoneCIO
GAME OVER IF THE DOMAIN CONTROLLER IS
COMPROMISED!
Secret Server & RBAC
Live Tweet from the event!
@TheRedZoneCIO
In the wrong hands, privileged accounts
represent the biggest threat to enterprises
because these accounts can breach personal
data, complete unauthorized transactions, cause
denial-of-service attacks, and hide activity by
deleting audit data.
- Information Security Magazine, 2009
Live Tweet from the event!
@TheRedZoneCIO
Source:
www.unitedmedia.com/comics/dilbert
Privileged Accounts
Live Tweet from the event!
@TheRedZoneCIO
• UNIX / Linux Root
Accounts
• Windows Local
Admin Accounts
• AD
• Database
• Server
• Router
• Firewall
• Service Accounts are difficult to manage because they
don’t belong to a specific person
• Access & Passwords are shared by a team of administrators
• No accountability
Privileged Account Challenges
Privileged Accounts – Why Worry?
Live Tweet from the event!
@TheRedZoneCIO
• Powerful accounts that run your network
• The passwords are not being changed
• Extremely difficult to know where they are being
used
• Needed for emergency situations
• Vulnerable to multiple types of attacks
What is Secret Server?
Live Tweet from the event!
@TheRedZoneCIO
• Web-based password repository
• Distribute, organize & automatically
update privileged accounts from a
central location
• Complete reporting & auditing capabilities to
show who has access & when passwords are being
used
Mission Impossible Access
Live Tweet from the event!
@TheRedZoneCIO
How Secret Server Works
Live Tweet from the event!
@TheRedZoneCIO
Secret Server ROI
Live Tweet from the event!
@TheRedZoneCIO
What’s In It For Me?
Live Tweet from the event!
@TheRedZoneCIO
• Accountability
• Access Management
• Risk Management
• Security
• Compliance
• Reduced Labor costs
#3
Live Tweet from the event!
@TheRedZoneCIO
Security – Configuration and Change
Control
C3
C3 – Configuration and Change
Control
Live Tweet from the event!
@TheRedZoneCIO
• Systems are down – What happened?
• Are you dependent on the guy with the most
certifications to bail you out?
C3 – Configuration and Change
Control
Live Tweet from the event!
@TheRedZoneCIO
• Audit Changes?
• Who made the change?
• What changed?
C3 | Configuration Change Control
Live Tweet from the event!
@TheRedZoneCIO
C3 | Configuration Change Control
Live Tweet from the event!
@TheRedZoneCIO
C3 Features
Live Tweet from the event!
@TheRedZoneCIO
• Sends emails to specified individuals when changes are made to the
network configuration and highlights what those changes were
• Allows you to quickly visually identify system changes
• Consolidates all changes into a single change alert
• Allows for companies/organizations to hire less experienced (and less
expensive) talent so that they can be less dependent on certified (more
expensive) individuals
• System is managed by RedZone
Benefits of RZ Managing C3
Live Tweet from the event!
@TheRedZoneCIO
RedZone audits all C3 systems monthly, in which we...
• Review the change logs & talk to the client to make sure that their IT
professionals are receiving the change reports
• Ensure a valid backup for each system C3 is monitoring is taking place *
• Check that all of the clients’ existing devices are recognized and checked by
C3and that they haven’t add any new devices to, or removed any old devices
from, the network
Because, let’s face it, machines and automation are great, but if systems are not
being maintained by actual people, they can become inefficient or – even worse
– a handicap.
*Note: None of your data ever leaves your network; RedZone will never back up
your system to our network
#4
Live Tweet from the event!
@TheRedZoneCIO
Outbound Hijackers
Blue Coat
Outbound Hijackers
Live Tweet from the event!
@TheRedZoneCIO
• Prevent and silence outbound hijackers
• There are over 300 known hacker tools that are designed not to be
found
• Find the trails they leave behind
• Silence Outbound Hijackers Management
• There are specific sites to which an employee can go
• There is a tight acceptable use of internet
• Outbound Protocol Management & Control
• Lockdown of outbound UDP, for example
• Bluecoat Application Identification
Outbound Protection Methods
Live Tweet from the event!
@TheRedZoneCIO
• Firewall
• PC
• Network
Outbound Hijackers & Blue Coat
Live Tweet from the event!
@TheRedZoneCIO
#5
Live Tweet from the event!
@TheRedZoneCIO
DCS Policy | Security Policies and
End User Education and Awareness
ThunderDG
Live Tweet from the event!
@TheRedZoneCIO
Do You Have A DCS Policy?
Live Tweet from the event!
@TheRedZoneCIO
“In the absence of security education or
experience, people (employees, users,
customers, …) naturally make poor
security
decisions with technology”
- Hugh Thompson, RSA Conf 2013
DCS Policies
Live Tweet from the event!
@TheRedZoneCIO
• Implement and enforce DCS Policies to prevent “drive by” malware
infections
• What alarms go off when someone clicks something?
• Policy, as well as complimentary training, is a major element in
helping people be more secure because it ensures people fully
understand the policy and why it is in place
ThunderDG & DCS Policy
Management
Live Tweet from the event!
@TheRedZoneCIO
Complete solution for employee policy management w/ 3 key features
1. Electronic delivery, storage & tracking of employee policies
2. Electronic signing of employee policies
3. Integration with employee training portal to ensure full
understanding of policies
ThunderDG
Live Tweet from the event!
@TheRedZoneCIO
ThunderDG
Live Tweet from the event!
@TheRedZoneCIO
How ThunderDG Works
Live Tweet from the event!
@TheRedZoneCIO
Features & Benefits of ThunderDG
Live Tweet from the event!
@TheRedZoneCIO
ThunderDG allows you to…
• Send internal policies & contracts to thousands of signers instantly
• Send documents for both approval & signature in 1 easy step
• Create custom forms & workflows to help comply with company
standards
• Create a document library for standard forms & contracts
• Access complete document history & audit
So you can…
• Increase ROI
• Save time and money via the paperless, automated process
• Gain insight into your entire policy signing process
• Improve performance & enforce best practices
Questions?
Live Tweet from the event!
@TheRedZoneCIO
Upcoming Events
Live Tweet from the event!
@TheRedZoneCIO
Virtual Roundtable Collaboration - Wednesday, April 24th from 9am to
10am
Mobile Device Management Policies
Let us know if you’re interested in attending and we’ll be sure to
email you the link to register.
Upcoming Events
Live Tweet from the event!
@TheRedZoneCIO
Physical Event – Open To All Members
APT Crimeware & Malware | Part 2
You just attended Part 1 (we will provide a recap of the event on the
website shortly and will email you when that is available).
In Part 2, we will be reviewing:
• Application Whitelisting
• Data Loss Prevention (DLP)
• End User Policy Education, Training & Awareness
• Aggressive Patching for Servers, Workstations & 3rd Party Apps
Wednesday, May 15th from 8:30am to 12:30pm
Eggspectations in Columbia
We will email you with registration information as soon as it’s available.
Upcoming Events
Live Tweet from the event!
@TheRedZoneCIO
Physical Event – Open To All Members
APT Crimeware & Malware | Part 3
This will be the third and final installment of the APT Crimeware & Malware
Event Series and will focus on:
• Dropbox & Cloud Storage Mitigation
• Multi-Factor Authentication
• File Permission Security Audit
• Deep Defense APT
• How to Go Hunting!
Wednesday, June 12th from 8:30am to 12:30pm
Eggspectations in Columbia
We will email you with registration information as soon as it’s available.
Continue The Discussion
Follow the CIO Executive Series Group on LinkedIn!
Follow @TheRedZoneCIO on Twitter!
Live Tweet from the event!
@TheRedZoneCIO
Contacts
Kristine Wilson
Managing Coordinator | CIO Executive Series
Marketing Manager | RedZone Technologies
(410) 897-9494
kwilson@redzonetech.net
Live Tweet from the event!
@TheRedZoneCIO

Contenu connexe

Tendances

Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version externalZscaler
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Security Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the HeadlinesSecurity Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the HeadlinesDuo Security
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Shah Sheikh
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed SecurityDarryl Santa
 
Five critical conditions to maximizing security intelligence investments
Five critical conditions to maximizing security intelligence investmentsFive critical conditions to maximizing security intelligence investments
Five critical conditions to maximizing security intelligence investmentsIBM Security
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewRobert Herjavec
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...Brian Kelly
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Security Impact of Data Visibility - Your New 90-Second Superpower
Security Impact of Data Visibility - Your New 90-Second SuperpowerSecurity Impact of Data Visibility - Your New 90-Second Superpower
Security Impact of Data Visibility - Your New 90-Second SuperpowerThinAir
 
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller
Securing Access to PeopleSoft ERP with Duo Security and GreyHellerSecuring Access to PeopleSoft ERP with Duo Security and GreyHeller
Securing Access to PeopleSoft ERP with Duo Security and GreyHellerDuo Security
 
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityAscendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityCristian Garcia G.
 
Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Duo Security
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020DevOps.com
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloudcentralohioissa
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsSkycure
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 

Tendances (20)

Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Security Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the HeadlinesSecurity Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the Headlines
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
Five critical conditions to maximizing security intelligence investments
Five critical conditions to maximizing security intelligence investmentsFive critical conditions to maximizing security intelligence investments
Five critical conditions to maximizing security intelligence investments
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR Overview
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Security Impact of Data Visibility - Your New 90-Second Superpower
Security Impact of Data Visibility - Your New 90-Second SuperpowerSecurity Impact of Data Visibility - Your New 90-Second Superpower
Security Impact of Data Visibility - Your New 90-Second Superpower
 
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller
Securing Access to PeopleSoft ERP with Duo Security and GreyHellerSecuring Access to PeopleSoft ERP with Duo Security and GreyHeller
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller
 
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityAscendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber Security
 
Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
El Futuro de la Cibersegu
El Futuro de la CiberseguEl Futuro de la Cibersegu
El Futuro de la Cibersegu
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 

Similaire à 5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)

Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinarZscaler
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveRobert Herjavec
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE - ATT&CKcon
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterpriseJason Bloomberg
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014Ashlie Steele
 
Deep Dive to Understanding the Mirai Botnet
Deep Dive to Understanding the Mirai BotnetDeep Dive to Understanding the Mirai Botnet
Deep Dive to Understanding the Mirai BotnetSaeidGhasemshirazi
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMwareVMUG IT
 
Cisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCiscoKorea
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
 
Understing the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot securityUndersting the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot securitySaeidGhasemshirazi
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2FitCEO, Inc. (FCI)
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsBeyondTrust
 
Retail Security: Closing the Threat Gap
Retail Security: Closing the Threat GapRetail Security: Closing the Threat Gap
Retail Security: Closing the Threat GapTripwire
 

Similaire à 5 of 13 Ways To Prevent Advanced Persistent Threads (APTs) (20)

5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - November
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
Deep Dive to Understanding the Mirai Botnet
Deep Dive to Understanding the Mirai BotnetDeep Dive to Understanding the Mirai Botnet
Deep Dive to Understanding the Mirai Botnet
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
Cisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 nov
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
 
Understing the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot securityUndersting the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot security
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
Retail Security: Closing the Threat Gap
Retail Security: Closing the Threat GapRetail Security: Closing the Threat Gap
Retail Security: Closing the Threat Gap
 

Plus de RedZone Technologies

RedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone Technologies
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...RedZone Technologies
 
Modern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEMModern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEMRedZone Technologies
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipRedZone Technologies
 
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...RedZone Technologies
 
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...RedZone Technologies
 
RedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile PresentationRedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile PresentationRedZone Technologies
 
Mobile Device Management Policy Workshop Part 2 | CIO Executive Series
Mobile Device Management Policy Workshop Part 2 | CIO Executive SeriesMobile Device Management Policy Workshop Part 2 | CIO Executive Series
Mobile Device Management Policy Workshop Part 2 | CIO Executive SeriesRedZone Technologies
 
Move your Data Center to the Cloud
Move your Data Center to the CloudMove your Data Center to the Cloud
Move your Data Center to the CloudRedZone Technologies
 

Plus de RedZone Technologies (12)

RedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and Transformation
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
 
Modern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEMModern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEM
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
 
CIO Scoreboard Overview
CIO Scoreboard OverviewCIO Scoreboard Overview
CIO Scoreboard Overview
 
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
 
RedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile PresentationRedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile Presentation
 
RedZone Testimonials
RedZone TestimonialsRedZone Testimonials
RedZone Testimonials
 
Mobile Device Management Policy Workshop Part 2 | CIO Executive Series
Mobile Device Management Policy Workshop Part 2 | CIO Executive SeriesMobile Device Management Policy Workshop Part 2 | CIO Executive Series
Mobile Device Management Policy Workshop Part 2 | CIO Executive Series
 
Move your Data Center to the Cloud
Move your Data Center to the CloudMove your Data Center to the Cloud
Move your Data Center to the Cloud
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)

  • 1. The Next Cyber Security Threat is Here - Are You Prepared? APTs– AdvancedPersistentThreats Part1 – Learn5 or 13 Waysto PreventAPTs Moderator:BillMurphyandJamesCrifasi Live Tweet from the event! @TheRedZoneCIO
  • 2. Schedule of Events 8:30am to 9:00am – Sign In & Breakfast 9:00am to 11:30am – Education Sessions) 11:30am to 12:30pm – lunch (sponsored by ThunderDG & Thycotic Software) Live Tweet from the event! @TheRedZoneCIO
  • 3. RedZone’s Chief Lieutenant Series Sister of The CIO Executive Series which is a TOP IT Executive Network specializing in bringing CIO’s together to collaborate, network, and stay current on industry trends. Just under 300 senior C-Suite IT executive members Founded in 2000 | 13 years of experience bringing CIO’s together Host a number of events – both virtual and physical – each year Host a “Special Event” annually | Past events have included: A Golf Outing, Dinner & Receptions Live Tweet from the event! @TheRedZoneCIO
  • 4. President and Founder • RedZone Technologies • ThunderDG • MA DR Solutions • Beyond Limits Magazine Keep In Touch With Bill: @TheRedZoneCIO CIO Executive Series Group billm@redzonetech.net About Bill Murphy Live Tweet from the event! @TheRedZoneCIO
  • 5. About James Crifasi Live Tweet from the event! @TheRedZoneCIO • CTO of RedZone Technologies • Co-founder ThunderDG • Co-founder MA DR • University of Maryland Graduate | B.A. Criminology & Criminal Justice | B.S. Computer Science – Algorithmic Theory & AI | M.S. Interdisciplinary Management • Keep In Touch With James: jcrifasi@redzonetech.net
  • 6. Sponsors RedZone Technologies Assessment: IT Architecture and Design Integration: Security| Disaster Recovery| Infrastructure Managed Service Programs Cloud Brokerage (410) 897-9494 www.redzonetech.net ThunderDG Employee Policy Management, Education, and Awareness www.thunderdg.com Thycotic Software Password Management www.thycotic.com Live Tweet from the event! @TheRedZoneCIO
  • 7. Agenda – 5 of 13 Methods to Prevent APTs – Advanced Persistent Threats 1. MDM, BYOD & Mobility 2. Password - Roles Based Access Control to apps, servers & network devices 3. Configuration and Change Control 4. Prevent and Silence Outbound Hijackers 5. DCS policies - Security Education, Training, Awareness Live Tweet from the event! @TheRedZoneCIO
  • 8. Agenda – 5 of 13 Methods to Prevent APTs – Advanced Persistent Threats 1. VMWare Horizon Suite – View 5 | VDI 2. Thycotic Software – Password Security 3. C3 – Security Change Control for switches and routers 4. Bluecoat - Prevent and Silence Outbound Hijackers 5. ThunderDG – Policy and Education . Live Tweet from the event! @TheRedZoneCIO
  • 9. Set The Stage Live Tweet from the event! @TheRedZoneCIO
  • 10. Reality Shift in IT Live Tweet from the event! @TheRedZoneCIO • System communication is fundamentally changing – many transactions occur over the web • Network defenses are covering a shrinking portion of the attack surface • Cloud is changing our notion of a perimeter • Worker mobility is redefining the IT landscape • Security Model good people vs. bad people to enabling partial trust • There are more “levels” of access: Extranets, partner access, customer access
  • 11. Reality Shift for Attackers Live Tweet from the event! @TheRedZoneCIO • Cyber criminals are becoming organized and profit-driven • An entire underground economy exists to support cybercrime • Attackers are shifting their methods to exploit both • technical and human weaknesses • Attackers after much more than traditional monetizable data (PII, etc.) • Hacktivism • State-sponsored attacks • IP attacks/breaches
  • 12. What is an APT Advanced Persistent Threat Live Tweet from the event! @TheRedZoneCIO APTs are silent. They leave clues and trails but are essentially designed not to be found. • Spear Phishing • Phishing • Rootkits • Traditional Hacker Tool Variants • Worms • Etc.
  • 13. Economics of Phishing Live Tweet from the event! @TheRedZoneCIO Hundreds of millions $! Source: Bill Duane Talk on Authentication
  • 14. Go Hunting! Live Tweet from the event! @TheRedZoneCIO Change the rules of the game by becoming proactive in rooting out malware..
  • 15. Make It Hard…. Live Tweet from the event! @TheRedZoneCIO for these malicious Advanced Persistent Threats (APTs) to operate in stealth.
  • 16. Make It Hard…. Live Tweet from the event! @TheRedZoneCIO “Most costly breaches come from simple failures, not from attacker ingenuity” - RSA 2013 Conf Chair Hugh Thompson
  • 17. Where Do You Start? Live Tweet from the event! @TheRedZoneCIO
  • 18. Security Defense? Whack- A-Mole? No! Live Tweet from the event! @TheRedZoneCIO
  • 19. Plan Live Tweet from the event! @TheRedZoneCIO
  • 20. Cunning – Be Different Live Tweet from the event! @TheRedZoneCIO
  • 21. Security Scoreboard Live Tweet from the event! @TheRedZoneCIO
  • 22. Security Scoreboard Live Tweet from the event! @TheRedZoneCIO
  • 23. #1 Live Tweet from the event! @TheRedZoneCIO BYOD | MDM | Mobile Security VMWare Horizon Suite
  • 24. Live Tweet from the event! @TheRedZoneCIO Point Solutions vs. Integrated
  • 25. VMWare Horizon Suite Live Tweet from the event! @TheRedZoneCIO • Centralized data! • Control and enforce data policy centrally • Embrace all devices • Stop doing MDM & get into data application management • User centric philosophy • Address application, data, VDI within one solution set
  • 26. VMWare Horizon Suite Live Tweet from the event! @TheRedZoneCIO
  • 27. Horizon View & Mirage Live Tweet from the event! @TheRedZoneCIO
  • 28. Key Features of Horizon Suite Live Tweet from the event! @TheRedZoneCIO 1. Single end-user workspace • Easy, secure access to all apps/data from any mobile device 2. Centralized IT Management 3. File Sharing Capabilities • Offline & online • Document versioning, commenting & auditing capabilities
  • 29. VMWare and APT Defense Live Tweet from the event! @TheRedZoneCIO 1. Can you deliver a secure desktop in minutes? • Efficiency with security is important to keep costs low. 2. IT being able to get the user back to a last known Golden Image is critical!
  • 30. Key Features of Horizon Suite Live Tweet from the event! @TheRedZoneCIO • Enterprise-Level Security • Data encryption on mobile devices • Endpoint registration & remote wipe capabilities • Integration with Horizon View • Easy access to Virtual Desktops & apps via Horizon View • Access View from any HTML5 browser via remote protocol
  • 31. Lessons Learned From Our Experience With Horizon Suite Live Tweet from the event! @TheRedZoneCIO 1. Beta lockdown and engineering review 2. Make changes once to all departmental profiles 3. One of the key values of VDI is the ability to restore a workstation back to a Golden image, which is free of Malware/Crimeware.
  • 32. #2 Live Tweet from the event! @TheRedZoneCIO Passwords & RBAC Thycotic Software Secret Server
  • 33. Passwords | RBAC Live Tweet from the event! @TheRedZoneCIO GAME OVER IF THE DOMAIN CONTROLLER IS COMPROMISED!
  • 34. Secret Server & RBAC Live Tweet from the event! @TheRedZoneCIO In the wrong hands, privileged accounts represent the biggest threat to enterprises because these accounts can breach personal data, complete unauthorized transactions, cause denial-of-service attacks, and hide activity by deleting audit data. - Information Security Magazine, 2009
  • 35. Live Tweet from the event! @TheRedZoneCIO Source: www.unitedmedia.com/comics/dilbert
  • 36. Privileged Accounts Live Tweet from the event! @TheRedZoneCIO • UNIX / Linux Root Accounts • Windows Local Admin Accounts • AD • Database • Server • Router • Firewall • Service Accounts are difficult to manage because they don’t belong to a specific person • Access & Passwords are shared by a team of administrators • No accountability Privileged Account Challenges
  • 37. Privileged Accounts – Why Worry? Live Tweet from the event! @TheRedZoneCIO • Powerful accounts that run your network • The passwords are not being changed • Extremely difficult to know where they are being used • Needed for emergency situations • Vulnerable to multiple types of attacks
  • 38. What is Secret Server? Live Tweet from the event! @TheRedZoneCIO • Web-based password repository • Distribute, organize & automatically update privileged accounts from a central location • Complete reporting & auditing capabilities to show who has access & when passwords are being used
  • 39. Mission Impossible Access Live Tweet from the event! @TheRedZoneCIO
  • 40. How Secret Server Works Live Tweet from the event! @TheRedZoneCIO
  • 41. Secret Server ROI Live Tweet from the event! @TheRedZoneCIO
  • 42. What’s In It For Me? Live Tweet from the event! @TheRedZoneCIO • Accountability • Access Management • Risk Management • Security • Compliance • Reduced Labor costs
  • 43. #3 Live Tweet from the event! @TheRedZoneCIO Security – Configuration and Change Control C3
  • 44. C3 – Configuration and Change Control Live Tweet from the event! @TheRedZoneCIO • Systems are down – What happened? • Are you dependent on the guy with the most certifications to bail you out?
  • 45. C3 – Configuration and Change Control Live Tweet from the event! @TheRedZoneCIO • Audit Changes? • Who made the change? • What changed?
  • 46. C3 | Configuration Change Control Live Tweet from the event! @TheRedZoneCIO
  • 47. C3 | Configuration Change Control Live Tweet from the event! @TheRedZoneCIO
  • 48. C3 Features Live Tweet from the event! @TheRedZoneCIO • Sends emails to specified individuals when changes are made to the network configuration and highlights what those changes were • Allows you to quickly visually identify system changes • Consolidates all changes into a single change alert • Allows for companies/organizations to hire less experienced (and less expensive) talent so that they can be less dependent on certified (more expensive) individuals • System is managed by RedZone
  • 49. Benefits of RZ Managing C3 Live Tweet from the event! @TheRedZoneCIO RedZone audits all C3 systems monthly, in which we... • Review the change logs & talk to the client to make sure that their IT professionals are receiving the change reports • Ensure a valid backup for each system C3 is monitoring is taking place * • Check that all of the clients’ existing devices are recognized and checked by C3and that they haven’t add any new devices to, or removed any old devices from, the network Because, let’s face it, machines and automation are great, but if systems are not being maintained by actual people, they can become inefficient or – even worse – a handicap. *Note: None of your data ever leaves your network; RedZone will never back up your system to our network
  • 50. #4 Live Tweet from the event! @TheRedZoneCIO Outbound Hijackers Blue Coat
  • 51. Outbound Hijackers Live Tweet from the event! @TheRedZoneCIO • Prevent and silence outbound hijackers • There are over 300 known hacker tools that are designed not to be found • Find the trails they leave behind • Silence Outbound Hijackers Management • There are specific sites to which an employee can go • There is a tight acceptable use of internet • Outbound Protocol Management & Control • Lockdown of outbound UDP, for example • Bluecoat Application Identification
  • 52. Outbound Protection Methods Live Tweet from the event! @TheRedZoneCIO • Firewall • PC • Network
  • 53. Outbound Hijackers & Blue Coat Live Tweet from the event! @TheRedZoneCIO
  • 54. #5 Live Tweet from the event! @TheRedZoneCIO DCS Policy | Security Policies and End User Education and Awareness ThunderDG
  • 55. Live Tweet from the event! @TheRedZoneCIO Do You Have A DCS Policy?
  • 56. Live Tweet from the event! @TheRedZoneCIO “In the absence of security education or experience, people (employees, users, customers, …) naturally make poor security decisions with technology” - Hugh Thompson, RSA Conf 2013
  • 57. DCS Policies Live Tweet from the event! @TheRedZoneCIO • Implement and enforce DCS Policies to prevent “drive by” malware infections • What alarms go off when someone clicks something? • Policy, as well as complimentary training, is a major element in helping people be more secure because it ensures people fully understand the policy and why it is in place
  • 58. ThunderDG & DCS Policy Management Live Tweet from the event! @TheRedZoneCIO Complete solution for employee policy management w/ 3 key features 1. Electronic delivery, storage & tracking of employee policies 2. Electronic signing of employee policies 3. Integration with employee training portal to ensure full understanding of policies
  • 59. ThunderDG Live Tweet from the event! @TheRedZoneCIO
  • 60. ThunderDG Live Tweet from the event! @TheRedZoneCIO
  • 61. How ThunderDG Works Live Tweet from the event! @TheRedZoneCIO
  • 62. Features & Benefits of ThunderDG Live Tweet from the event! @TheRedZoneCIO ThunderDG allows you to… • Send internal policies & contracts to thousands of signers instantly • Send documents for both approval & signature in 1 easy step • Create custom forms & workflows to help comply with company standards • Create a document library for standard forms & contracts • Access complete document history & audit So you can… • Increase ROI • Save time and money via the paperless, automated process • Gain insight into your entire policy signing process • Improve performance & enforce best practices
  • 63. Questions? Live Tweet from the event! @TheRedZoneCIO
  • 64. Upcoming Events Live Tweet from the event! @TheRedZoneCIO Virtual Roundtable Collaboration - Wednesday, April 24th from 9am to 10am Mobile Device Management Policies Let us know if you’re interested in attending and we’ll be sure to email you the link to register.
  • 65. Upcoming Events Live Tweet from the event! @TheRedZoneCIO Physical Event – Open To All Members APT Crimeware & Malware | Part 2 You just attended Part 1 (we will provide a recap of the event on the website shortly and will email you when that is available). In Part 2, we will be reviewing: • Application Whitelisting • Data Loss Prevention (DLP) • End User Policy Education, Training & Awareness • Aggressive Patching for Servers, Workstations & 3rd Party Apps Wednesday, May 15th from 8:30am to 12:30pm Eggspectations in Columbia We will email you with registration information as soon as it’s available.
  • 66. Upcoming Events Live Tweet from the event! @TheRedZoneCIO Physical Event – Open To All Members APT Crimeware & Malware | Part 3 This will be the third and final installment of the APT Crimeware & Malware Event Series and will focus on: • Dropbox & Cloud Storage Mitigation • Multi-Factor Authentication • File Permission Security Audit • Deep Defense APT • How to Go Hunting! Wednesday, June 12th from 8:30am to 12:30pm Eggspectations in Columbia We will email you with registration information as soon as it’s available.
  • 67. Continue The Discussion Follow the CIO Executive Series Group on LinkedIn! Follow @TheRedZoneCIO on Twitter! Live Tweet from the event! @TheRedZoneCIO
  • 68. Contacts Kristine Wilson Managing Coordinator | CIO Executive Series Marketing Manager | RedZone Technologies (410) 897-9494 kwilson@redzonetech.net Live Tweet from the event! @TheRedZoneCIO