1 Im a Suit in a Cyber World! 16 Jul 2011. 2 Employment History Financial Services.

Slides:



Advertisements
Similar presentations
1 Radio Maria World. 2 Postazioni Transmitter locations.
Advertisements

The Fall Messier Marathon Guide
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Números.
Symantec 2010 Windows 7 Migration Global Results.
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
AGVISE Laboratories %Zone or Grid Samples – Northwood laboratory
Reflection nurulquran.com.
1
EuroCondens SGB E.
Worksheets.
& dding ubtracting ractions.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Addition and Subtraction Equations
Division ÷ 1 1 ÷ 1 = 1 2 ÷ 1 = 2 3 ÷ 1 = 3 4 ÷ 1 = 4 5 ÷ 1 = 5 6 ÷ 1 = 6 7 ÷ 1 = 7 8 ÷ 1 = 8 9 ÷ 1 = 9 10 ÷ 1 = ÷ 1 = ÷ 1 = 12 ÷ 2 2 ÷ 2 =
Disability status in Ethiopia in 1984, 1994 & 2007 population and housing sensus Ehete Bekele Seyoum ESA/STAT/AC.219/25.
By John E. Hopcroft, Rajeev Motwani and Jeffrey D. Ullman
1 When you see… Find the zeros You think…. 2 To find the zeros...
Western Public Lands Grazing: The Real Costs Explore, enjoy and protect the planet Forest Guardians Jonathan Proctor.
EQUS Conference - Brussels, June 16, 2011 Ambros Uchtenhagen, Michael Schaub Minimum Quality Standards in the field of Drug Demand Reduction Parallel Session.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
Add Governors Discretionary (1G) Grants Chapter 6.
CALENDAR.
Summative Math Test Algebra (28%) Geometry (29%)
ASCII stands for American Standard Code for Information Interchange
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
The 5S numbers game..
突破信息检索壁垒 -SciFinder Scholar 介绍
Discovering Computers 2012: Chapter 2
A Fractional Order (Proportional and Derivative) Motion Controller Design for A Class of Second-order Systems Center for Self-Organizing Intelligent.
The basics for simulations
© 2010 Concept Systems, Inc.1 Concept Mapping Methodology: An Example.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
PP Test Review Sections 6-1 to 6-6
MM4A6c: Apply the law of sines and the law of cosines.
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
TCCI Barometer March “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
Dynamic Access Control the file server, reimagined Presented by Mark on twitter 1 contents copyright 2013 Mark Minasi.
TCCI Barometer March “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
Progressive Aerobic Cardiovascular Endurance Run
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
Facebook Pages 101: Your Organization’s Foothold on the Social Web A Volunteer Leader Webinar Sponsored by CACO December 1, 2010 Andrew Gossen, Senior.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
TCCI Barometer September “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
When you see… Find the zeros You think….
2011 WINNISQUAM COMMUNITY SURVEY YOUTH RISK BEHAVIOR GRADES 9-12 STUDENTS=1021.
Before Between After.
2011 FRANKLIN COMMUNITY SURVEY YOUTH RISK BEHAVIOR GRADES 9-12 STUDENTS=332.
ST/PRM3-EU | | © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying.
Foundation Stage Results CLL (6 or above) 79% 73.5%79.4%86.5% M (6 or above) 91%99%97%99% PSE (6 or above) 96%84%100%91.2%97.3% CLL.
Subtraction: Adding UP
Discovering Computers & Microsoft Office 2010 Discovering Computers Chapter 3.
Objectives Overview Discuss the evolution of the Internet
Numeracy Resources for KS2
Static Equilibrium; Elasticity and Fracture
Essential Cell Biology
Resistência dos Materiais, 5ª ed.
PSSA Preparation.
& dding ubtracting ractions.
Lial/Hungerford/Holcomb/Mullins: Mathematics with Applications 11e Finite Mathematics with Applications 11e Copyright ©2015 Pearson Education, Inc. All.
UNDERSTANDING THE ISSUES. 22 HILLSBOROUGH IS A REALLY BIG COUNTY.
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
Chart Deception Main Source: How to Lie with Charts, by Gerald E. Jones Dr. Michael R. Hyman, NMSU.
Introduction Embedded Universal Tools and Online Features 2.
Schutzvermerk nach DIN 34 beachten 05/04/15 Seite 1 Training EPAM and CANopen Basic Solution: Password * * Level 1 Level 2 * Level 3 Password2 IP-Adr.
1 I’m a Suit in a Cyber World! October 2011 Twitter: #cybergamut.
Presentation transcript:

1 Im a Suit in a Cyber World! 16 Jul 2011

2 Employment History Financial Services

3 Employment History Financial Services

4 Employment History Ski Bum

5 Employment History Ski Bum

6 Employment History USAF Officer

7 Employment History USAF Officer

8 Employment History SAIC

9 Employment History SAIC Program Manager

10 Employment History SAIC Program Manager

11 Employment History SAIC Division Manager

12 Employment History SAIC Division Manager

13 Employment History SAIC Capture Manager

14 Employment History SAIC Capture Manager

15 Education History King College BA Economics & Business Administration

16 Education History King College BA Economics & Business Administration

17 Education History Chartered Life Underwriter

18 Education History Chartered Life Underwriter

19 Education History UMD Europe Bowie State University MS Management Information Systems

20 Education History UMD Europe Bowie State University MS Management Information Systems

21 Education History PMP

22 Education History PMP

23 Large Cyber Procurements SAIC Capture Manager

24 Large Cyber Procurements > $250,000,000

27 Introduction to cybergamut

28 History and Why Change In 2008 SAIC established cybernexus – Coming together or nexus of cyber analysts – Central Maryland In 2011 cybernexus renamed cybergamut – Runs the gamut of cyber disciplines – Global organization cybergamut nodes – San Antonio, Texas – Northern Virginia (Tysons Corner and Herndon) – Sioux Falls, South Dakota

29 Mission Statement cybergamut is a worldwide community of practice for cyber professionals across industry, academia, and government providing ongoing education, training, and certification opportunities throughout all phases of a cyber professionals career, utilizing traditional methods as well as non-traditional techniques like puzzles, Easter Eggs, and problem solving.

30 Easter Eggs

31 Easter Eggs (eeggs.com)

32 Challenge Cards

33 Challenge Coin

34 Technical Tuesday What it is – a technical exchange What it is not – A sales presentation – A product endorsement – For discussion of procurements – For discussion of procurement related issues

35 PDU and CPE PMI PDUs – PMI Baltimore approved most Technical Tuesday events as eligible for PMI PDUs under Category B, Continuing Education CPEs for CISSP – Self certification Other certifications – What do you need?

36 cybergamut Nodes Established node – San Antonio – Northern Virginia (Tysons Corner and Herndon) – Sioux Falls, SD Node requirements (as of now) – Open and accessible to all Industry, academia, and government – Room for at least 20 people Computer, projector, conference phone – Guarantee at least five people in the room In case someone else shows up so theyre not uncomfortable Future nodes - ??? – San Diego, CA – Rome, NY – Atlanta, GA

37 Previous Topics Defending a Large Network – Brian Rexroad of AT&T – 2 Dec 2008 DNI Essentials – Paul Schnegelberger of SAIC and John Sanders of Northrop Grumman TASC – Nov/Dec 2008 Digital Forensics – Jim Jaeger of General Dynamics – 13 Jan 2009 Case Studies in Cyber Attacks – Aaron Wilson of SAIC – 13 Jan 2009 Trickler – Greg Virgin of RedJack – 27 Jan 2009 Security Tools – Peiter Mudge Zatko of BBN – 27 Jan 2009 IPv6 – David Harris of SAIC – 10 Feb 2009 Exploitation Prediction – Darryl Ackley of New Mexico Tech – 24 Feb 2009 Analytic and IO Tools – Clift Briscoe and Nat Cooper of Edge – 24 Mar 2009 Distributed Systems Technologies and Internet Intelligence – George Economou of Akamai – 24 Mar 2009 Exploring the Social World of the Russian Hacker Community – Tom Holt of Michigan State University – 10 Mar 2009 Modern Forensic Investigative Techniques – Amber Schroader of Paraben – 10 Mar 2009 Defending Against BGP Man-In-The-Middle Attacks – Earl Zmijewski of Renesys – 14 Apr 2009 Examining the Storm Worm – Nico Lacchini of TDI – 26 May 2009 No-Tech Hacking – Johnny Long – 11 Jun 2009 Dirty Secrets of the Security Industry – Bruce Potter of Ponte Technologies – 14 Jul 2009 Windows Forensic Analysis: Dissecting the Windows Registry – Rob Lee of MANDIANT and the SANS Institute – 18 Aug 2009

38 Previous Topics cont. Silence of the RAM – Sean Bodmer of Savid Corporation – 22 Sep 2009 VoIP Security - Attacks, Threats and Countermeasures – Stuart McLeod of Global Knowledge – 3 Nov 2009 A Tale of Two Departments – How Commerce and State Dealt With Chinese Intrusions: Lessons Learned Plus: Security Heroes and the 20 Critical Controls – Alan Paller of the SANS Institute – 9 Mar 2010 Aurora – Aaron Barr of HBGary Federal – 27 Apr 2010 Malware reverse engineering at ITT – Paul Frank of ITT – 25 May 2010 Advanced Cyber Collection Techniques; Extracting and Analyzing Information from the Domain Name System – Tim Cague of The CYAN Group – 10 Aug 2010 The Rise of the Social Web – Aaron Barr of HBGary Federal – 5 Oct 2010 Why Security People S#ck – Gene Bransfield of Tenacity Solutions – 9 Nov 2010 Insider Threat and Real-World Incident Study – Presented by Michael Collins & Greg Virgin of RedJack along with Jim Downey of DISA PEO-MA – 30 Nov 2010 Network Monitoring – Josh Goldfarb of 21st Century Technologies – 4 Jan 2011 Network Device Exploitation with Universal Plug & Play – Terry Dunlap of Tactical Network Solutions – 8 Feb 2011 Deep Packet Inspection for Cybersecurity ASW&R – Jeff Kuhn of Pangia Technologies – 29 Mar 2011 Stuxnet Redux: Malware Attribution & Lessons Learned – Tom Parker of Securicon – 19 Apr 2011 Special Technical Tuesday and renaming – 10 May 2011 APT Intrusion Remediation: The Top Do's and Don'ts – Rob Lee of MANDIANT and The SANS Institute – 24 May 2011 Deep Packet Inspection – Peder Jungck of Cloudshield and SAIC – 28 Jun 2011 Our Security Status is Grim – Brian Snow – 19 Jul 2011

39 Upcoming Technical Tuesdays Looking for more speakers and topics such as: – Tor routing – Malware reverse engineering – Cyber situational awareness – Splunk – Cloud computing and cloud forensics – Geolocation of IP addresses and mobile devices – Digital forensics – E-discovery – Attack attribution – Deep packet inspection – Fuzzing – Writing secure code To suggest topics, volunteer to speak, or to receive an invitation, please contact:

40 Interesting Topics from the Chief 5uits Perspective

41 Remember!

42 Dash

43 Foreign Language 1337 = LEET = short for elite (maybe) – 5uit = Suit Pwn = Own – Your computer has been pwned Teh = the – Accidents become purposeful – This was before spell checkers – hard to do now Texting – LOL – ROFL – - OMG Powerpoint translated : and ) to this

44 Different Culture 95% male Black T-shirts Interesting facial hair Body art Add alcohol and mix vigorously Stickers everywhere Lock picking for fun (lock sport) Hackers arent all Bad – I Hack Charities As a 5uit, Im counter-counter-culture

48 Bot in a Botnet Whats a Bot and whats a Botnet? – Computers that have been taken over – Used for distribution of Spam and Malware – Used for other nefarious deeds

49 Bot in a Botnet Whats a Bot and whats a Botnet? – Computers that have been taken over – Used for distribution of Spam and Malware – Used for other nefarious deeds Does your Mom care?

50 Bot in a Botnet Whats a Bot and whats a Botnet? – Computers that have been taken over – Used for distribution of Spam and Malware – Used for other nefarious deeds Does your Mom care? Do you care?

Digital Hygiene

You cant Patch Stupid!!!

You cant Patch Stupid!!! Dont be Stupid

Dont use Reply All in a Mail Storm!!!

You cant Patch Stupid!!!

73 Social Engineering Extremely effective DEFCON Social Engineering Contest – Amazing what people will give away – Help desks were overly helpful

Click OK to Continue

76 Should I proceed?

77 Should I proceed? I did!!!

78 Phishing and Spearphishing s and targeted s – Usually with a link – Watch for typos and misspelllings V1AGRA [Insert company name here] has been sold!

79 What about this one?

80 Corporate Response

81 Another One!

82 Phishing and Spearphishing s and targeted s – Usually with a link – Watch for typos and misspelllings V1AGRA [Insert company name here] has been sold! DEFCON Skybox Demo – Trend tracking via Twitter – Tracking an individual via Social Media – Tiny urls and Bit.ly

83 GPS and other evil devices GPS, iPhones, etc remember everything iPhones sync EVERYTHING with their host Windows 7 Registry saves things a long time Forensics examiners dream Car thieves Go Home – Youre not home and now youre stranded

84 Supply Chain Where was your code written? Where was your hardware produced? How did it get to you? Thumb drives Hard drives

85 X begets Y begets Z… Needs beget innovation Innovation begets technology Policy and strategy follow – arent necessarily begotten Lack of policy begets ineffective or non-strategy Doctrine is the military word for policy Tactics are the refinement of military strategy difference between responsibility and authority – DHS has responsibilities – DoD has many clearly defined authorities National Cyber Policy is challenging – AFCEA story

86 Steganography Stuff hidden in pictures Stuff hidden in other non-obvious places

87 Who votes for #1?

88 Who votes for #2?

89 Who votes for #3?

90 Who votes for #4?

91 Steganography Lets check your votes...

92 #1 Malamute???; not Malware

93 #2

94 #2 is Malodorous; not Malware

95 #3 is Mal-wear; not Malware

96 #4 is Malicious; not Malware

97 Steganography None of those pictures – I dont think anyway… Very hard to detect in a single picture – Potential detection if you have both pictures 50 KB450 KB

98 Other Scary/Cool Concepts Segmented polymorphic malware – Bad stuff that changes its looks, delivered in parts Metamorphic malware – Bad stuff that changes what it does Cloud Computing – distributed virtualization – Which denomination? Hadoop – sons toy elephant – Cloud Security – Cloud Forensics Zero-day – Brand new malware or exploits

99 Should I click?

100 Social Networking On the Internet, nobody knows youre a dog – New Yorker Magazine, 1993 – Still true today Do you really know who your Friends are? – Would you cross the street to see them in person? – What are you revealing in your posts?

101 Fake Profile???

102 Social Networking On the Internet, nobody knows youre a dog – New Yorker Magazine, 1993 – Still true today Do you really know who your Friends are? – Would you cross the street to see them in person? – What are you revealing in your posts? My Daddys dating… Twitter – Spontaneous and quick – No filter / no retraction

104 Location-based Services Facebook Places and Foursquare Preparation for Travel – Set up light timers – Make your home look lived in Check in at out of state locations Photo metadata Okay for my Friends to know What about Friends of Friends? – What about Mafia Wars Friends of Friends?

105 User Names and Passwords Anonymous and LULZ Sony Attacks – 77 million users affected Other large data thefts User Name and Password combinations – How many do you use? – Remember the Bots?!? – This got my attention!

106 What do we do? I dont know… I think education helps…

107 Cyber Increases Volume Variety Velocity

108 Cyber Increases Volume = 111 slides Variety Velocity

109 Cyber Increases Volume = 111 slides Variety = 21 topics Velocity

110 Cyber Increases Volume = 111 slides Variety = 21 topics Velocity = 1 hour = <33 sec per slide

111 Thats all weve got!