black hat usa 2015: a visual snapshot of security threats, trends and ideas

14
A VISUAL SNAPSHOT OF SECURITY THREATS, TRENDS AND IDEAS.

Upload: tripwire

Post on 07-Jan-2017

2.077 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas

A VISUAL SNAPSHOT OF SECURITY THREATS, TRENDS AND IDEAS.

Page 2: Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas

JEFF POLLARD, LASTLINE

Integrating Endpoint Workflow to Stop Attacks Before They Start

Victory does not always require a waged battle. By integrating best-

of-breed advanced malware analysis and endpoint technologies,

organizations can effectively identify and stop threats before

damage occurs.

@LASTLINEINC

Page 3: Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas

DR. JOHN JOHNSON, JOHN DEERE

Keep Your Company from Becoming Collateral Damage in a Cyberwar

Knowledge of who is attacking you and what they are after can help you to

develop an adaptive defense to advanced threats that involves breaking the kill chain to protect sensitive data,

and more quickly detecting and responding to threats.

@JOHNDJOHNSON

Page 4: Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas

ADAM SHOSTACK, AUTHOR

Threat Modeling: Lessons from Star Wars

A simple approach to Threat Modeling can be to start by

answering these four questions: What are you building/deploying?

What could go wrong? What are you going to do about it? And, did you do

a good job?

@ADAMSHOSTACK

Page 5: Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas

TODD BELL, INTERSEC

What’s the Big Deal with End-Point Security?

Endpoint security is becoming a “must have” for enterprises.

However, not all endpoint products are created equal. Know what to look for when selecting a vendor,

including API integration with existing tools sets and sandboxing

malware.

@INTERSECGROUP

Page 6: Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas

TERRY RAMOS, PALO ALTO NETWORKS

Enhanced Protection For Your Critical Servers

Reduce the time to detect and protect against advanced threats

from the network edge to endpoint systems. With Tripwire Enterprise and Palo Alto Networks’ WildFire, you get unprecedented protection

against zero-day exploits.

@PALOALTONTWKS

Page 7: Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas

CRAIG YOUNG, TRIPWIRE

Black Ops Recon: Finding Your Faults First

Adding fuzzing to your security test framework plenty of benefits. Inexpensive cloud computing resources were used to find

exploitable flaws in open source software at a cost of less than $0.25

per vulnerability.

@CRAIGTWEETS

Page 8: Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas

QUINN SHAMBLIN, BOSTON UNIVERSITY

Know Then Thyself: Using the Top 4 Critical Controls for

Effective Cyber Defense

Provide a product line that directly targets the Top 4 Critical Security Controls. The DBIR says only 10

vulnerabilities account for 99% of breaches, meaning many organizations

are still not getting the essentials right.

@BUINFOSEC

Page 9: Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas

DR. KEN BAYLOR,STEALTH WORKER

Cybercrime Tools: New Uses and Abuses

@BAYLORSECURITY

Modern botnets are a major threat in the global financial space,

responsible for stealing several hundred million dollars and billions in intellectual property. For smaller

banks, botnets can be business-ending.

Page 10: Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas

TRAVIS SMITH, TRIPWIRE

My Bro the ELK: Obtaining Context from Security Events

@MRTRAV

Using commercial and open-source threat intelligence tools, the

TARDIS framework allows you to gather additional intelligence from your current security infrastructure in order to detect historic and real-

time indicators of compromise.

Page 11: Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas

JAMES BRODSKY, SPLUNK

Tripwire + Splunk: Partnering to Provide You with Better Security

Intelligence

@JAMES_BRODSKY

Integrating Splunk with Tripwire provides the ability to easily visualize

the overall health of your IT environment to help reduce the cycle-

time of identifying vulnerabilities, security violations and mean time to

identify and remediate risks.

Page 12: Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas

DAVID NEWMAN, TELUS

Turning Admins into Cyber Defenders

@TELUS

By developing defensive capabilities and situational awareness, Admins learn to detect and react quickly to

any attack. Operationalizing security means they become participants, who are engaged and trained for

“cyberwar.”

Page 13: Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas

KELLY KINGMAN, KINGMNAN INK

Kelly is a graphic recorder that creates visual summaries of spoken content like talks,

discussions, and meetings. Her visuals stimulate creativity and

collaboration to help the audience retain and understand

information.

@KINGMANINK

Page 14: Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas

FOR THE LATEST SECURITY NEWS, TRENDS AND INSIGHTS,

VISIT US AT:

WWW.TRIPWIRE.COM/BLOG @TRIPWIREINC

IMAGE COURTESY OF SHUTTERSTOCK.COM