Presentation is loading. Please wait.

Presentation is loading. Please wait.

Art of Stepping on the Same Rake, Volume 2

Similar presentations


Presentation on theme: "Art of Stepping on the Same Rake, Volume 2"— Presentation transcript:

1 Art of Stepping on the Same Rake, Volume 2
Hold Security, LLC Alex Holden, CISSP Chief Information Security Officer @HoldSecurity

2 WHO AM I AND WHY AM I HERE? Hold Security Threat Intelligence Program
5,000,000,000 stolen credentials recovered 2,000,000 site breaches identified Thousands of breaches prevented Adobe System Breach 2013 Target Brands Breach 2013 JP Morgan Chase breach 2014 Yahoo! Breach insights Insights into 60% of major security breaches since 2009

3 ABOUT ME 10 years CISO in a major brokerage firm
Security researcher and bug hunter Pen tester and auditor Hacker Hunter

4 CURRENT DEFENSES Policies / Regulations End-User Protection Anti-Virus
Server Defenses Spam Control Network Perimeter Firewalls IDS/IPS DLP Logging and Monitoring Awareness

5 WITH ALL THESE DEFENSES ARE YOU PROTECTED FROM THEM?

6 Defamation and Reputation Loss Stolen Secrets Stolen Data Availability
WHAT IS A THREAT TO YOU? Defamation and Reputation Loss Stolen Secrets Stolen Data Availability

7 PERIMETER – WHO KEEPS MOVING THE CHALK OUTLINE?
Brick and Mortar Cloud Vendors/Partners Employees Customers

8 INSIDE THE HACKER’S MIND
Exploit Infect Explore Abuse Profit

9 EXTORTION

10 WHAT ABOUT ANTI VIRUS? (This screenshot has been altered for viewing purposes)

11 Virtual Carding Basics
LEARN TO BE A HACKER Carding University Virtual Carding Basics Hacker University Job After Graduation Professor’s Insight

12 BLACK MARKETS ECONOMICS
Supply and Demand Respect and order amongst the thieves Destroying the competition

13 IDENTIFYING VIABLE THREATS
What is a Cyber Threat to You? Who Decides Which Threat is Viable? Do I Need to Have a Breach to React? Threats Hiding in Plain Sight

14 POSITIVE AND NEGATIVE BEHAVIOR MODELS
Stopping Malicious Attempts Fitting Detection Model Heuristics Model Lists of Bad Things

15 POSITIVE BEHAVIOR REWARDED
All Sins Forgiven Stolen Credentials Symbionts

16 ANONYMITY Hiding = blending in Sophistication and ease of use

17 WHAT DO HACKERS THINK ABOUT OUR DEFENSES?
Don’t Read Your Disclaimers, Security Statements, or Your Audit Reports Don’t Care That You Can’t Patch Your Mission Critical System Today Don’t Get Discouraged If Your Firewall Rejected Their First Access Attempt

18 CREDENTIALS Topic of the day – Mega Breaches
Infinite keys to a plethora of keyholes End-user re-education Authentication - Something you know - Something you have - Something you are

19 DEFENSE Learn about your enemy Tune your defenses toward the threat
- Fantasy Football Tune your defenses toward the threat Fortify against hackers NOT auditors Make yourself an unattractive target

20 Viruses 0days Credentials
DEFENSE 101 Viruses 0days Credentials Misconfigurations

21 CONCLUSIONS Hackers are winning We are improving
Information stolen today may be abused today and in 2025 Defense is easy

22 aholden@HoldSecurity.com - www.holdsecurity.com
THANK YOU Hold Security, LLC Alex Holden, CISSP -


Download ppt "Art of Stepping on the Same Rake, Volume 2"

Similar presentations


Ads by Google