practical cyber defense
DESCRIPTION
This presentation was given at the CIISF Conference - "Cyber threat to opportunity: protecting your business in a changing world" held in jersey on 30th May 2014TRANSCRIPT
![Page 1: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/1.jpg)
Practical CyberDefense
By Paul Dutot
![Page 2: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/2.jpg)
About me
● Co Founder of the CIISF
Practical CyberDefense
● Employed as an Ethical Security Consultant @ Logicalis Jersey
● Practice Offensive & Defensive Security for businesses at all verticals
![Page 3: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/3.jpg)
Agenda
● Concepts I and II
Practical CyberDefense
● Stages 1-5 of a practical Cyber Defense with more demo's
● Resources
Questions at the end please
● Reverse & Bind Shells Demo
![Page 4: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/4.jpg)
Concepts I“Attackers have months to prepare, defenders have minutes to react”
Practical CyberDefense
“This is not a security control !!!!”
vs
![Page 5: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/5.jpg)
Concepts II“Security is a journey”
Practical CyberDefense
“What are the bad guys trying to achieve?
![Page 6: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/6.jpg)
Reverse & Bind Shells
Practical CyberDefense
Demo
![Page 7: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/7.jpg)
Stage 1 – Buy In
● Appoint a 'Cyber' champion
● 'C' level Buy In
● Maintain a 'Cyber' risk register
Practical CyberDefense
● Do Security Awareness
![Page 8: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/8.jpg)
Stage 2 - Reconnaisance
Some Forgotten Ones
Practical CyberDefense
Demo
![Page 9: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/9.jpg)
Reconnaisance Aims
Practical CyberDefense
● To profile your organsiation
● In preparation for social enginering attacks and or email phishing
![Page 10: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/10.jpg)
Reconnaisance - Mitigation
Practical CyberDefense
● Undertake reconnaisance to find public information
● Mitigate risk by takedown and creating contray information
● Test your defenses and train your users
![Page 11: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/11.jpg)
Phishing is a big deal !!!
Practical CyberDefense
![Page 12: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/12.jpg)
Stage 3 – Understanding AV
Is AV really protecting us - the case for and against
Practical CyberDefense
![Page 13: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/13.jpg)
Stage 3 – AV Bypass
Demo - The case against
Practical CyberDefense
![Page 14: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/14.jpg)
Stage 3 – The case for
We still need AV to protect us !
Practical CyberDefense
![Page 15: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/15.jpg)
Stage 4 – Think outside the box
● Databases – They are the end game
Practical CyberDefense
● Web applications – Owasp Top 10
● UC Communications – TDos / Toll Fraud
● Data Encryption – Laptops / Desktops / Databases
![Page 16: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/16.jpg)
Stage 5 – It's not if but whenSIEM – Security, Information& Event Monitoring
Practical CyberDefense
![Page 17: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/17.jpg)
Stage 5 – SIEM
OSSIM SIEM – Free open Source SIEM Demo
Practical CyberDefense
![Page 18: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/18.jpg)
Resources
Florida State● http://www.cs.fsu.edu/~redwood/OffensiveSecurity/
Practical CyberDefense
SANS Institute● http://www.sans.org/critical-security-controls/controls/
OWASP Top 10 - 2013● https://www.owasp.org/index.php/Top_10_2013-Top_10
![Page 19: Practical Cyber Defense](https://reader033.vdocument.in/reader033/viewer/2022061201/54796a9ab37959a22b8b46f0/html5/thumbnails/19.jpg)
Thank you – Any Questions?
Blog – http://cyberkryption.com
Practical CyberDefense
@cyberkryption