SlideShare una empresa de Scribd logo
1 de 48
Descargar para leer sin conexión
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Layered	Security/Defense	In	
Depth
Nathan	Shepard
Customer	Information	Security	Manager
Dell	Services
October	7-8,	2016
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Bio
• Customer	Information	Security	Manager
• Currently	on	a	financial	customer
• Serviced	over	20	customers	in	my	17	years	with	Perot/Dell
• Healthcare
• Power
• Finance
• Others
• Corporate	level	consulting
• Information	Security	Management
• CISSP
• CISM
• CISA
• CRISK
• 33	Years	in	IT
• 21	Years	in	InfoSec
• Veteran,	U.S.	Army,	U.S.	Coast	Guard
NTX	ISSA	Cyber	Security	Conference	– October	7-8,	2016 2
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
This	Presentation
• Is	based	on	Information	Security	best	practices	(a	conglomeration	of	practices	
derived	from	regulatory	requirements	and	published	industry	standards)	and	is	
meant	to	give	a	general	overview	of	what	a	comprehensive	Information	Security	
program	should	look	like	in	any	given	industry.
• Is	high	level,	my	objective	is	to	outline	the	scope	of	an	entire	Information	
Security	program,	not	provide	precise	details	on	each	and	every	aspect.
• Is	not	a	sales	presentation.		I	have	nothing	to	sell	you.
• Isn’t	meant	to	scare	you,	but	it	might.
• Isn’t	meant	to	dissuade	you	from	following	an	InfoSec	career,	but	it	might.
• Don’t	ask	me	detailed	in	depth	questions	about	the	controls,	I’m	a	generalist.		I	
point	to	the	correct	subject	matter	experts	for	the	controls.
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Why	this	presentation?
• In	many	of	the	presentations	you	will	see	this	weekend,	or	at	other	venues,	you	will	
receive	an	in	depth	analysis	of	a	problem,	or	a	process,	or	a	tool,	or	a	control.
• While	these	are	excellent,	I	have	seen	no	presentations	on	how	it	all	fits	together.
• In	my	role,	I	frequently	have	to	interview	individuals	for	the	same	or	similar	positions	
as	the	one	I	occupy	and	enjoy.
• I	ask	each	one	of	them	to	explain	to	me	“Defense	in	Depth”	or	“Layered	Security”.		
Maybe	1	in	5	can	give	a	good	answer.		And	these	are	all	seasoned	security	
professionals.
• May	of	us	have	tunnel	vision,	knowing	a	LOT	about	specific	aspects	of	security,	but	
lacking	an	overview	of	the	entire	process.
• Today,	I	want	to	remedy	that	situation.
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Confusion!		So	many	vendors,	so	little	time.
Alert	
Logic
SecurIS
SafeNet
Sentinel	IPS
Shavlik
Solutionary
VeloCloud
Vipre
SourceFire
Niksun
Varonis
Cylance
Tempered
ThreatTrack
Cadre
SecureData Vormetric
VisualClick
Wild	Packets
ZixCorp
Attivo
ProtectWise
iScanOnLine
PaloAlto
NSFocus
UDI
SentinalOne
Data	Solutions
LightCyber
LogRhythm
Lumeta
LanDesk
NexusGuard
Kasperskey
JumpCloud
IXIA
InNet
Hytrust
Gigamon
eSkyCity
InfoBlox
F5
Fortinet
Future	
Com
Genalto
GlobalScape
Interface	
Masters
Preferred	Technology SkyPort	Systems
NetBoundry
Observable	
Networks
OpenDNS
Dell	Secure
Works
Sumologic
Unique	Digital
Cyber	Reason
Juniper
egress
Druva
DarkTrace
Cumulus
Symantec
Microsoft
McAfee
Nessus
Qualys
A10
Above	Security
AccuData
Barracuda
Beyond	
Security
BlueCoat
Cleo
CheckPoint
Cisco
Critical	Start
Critical	Watch
BitDefender
Sophos
TrendMicro
eset
BAE	
Systems
Clearswift
RedSeal
F-Secure
Stormshield
Webroot
Panda
IBM
Bit9
SnoopWall
InfoDefense
iNetU
Apcon Packetviper
SIMS
Tiepoint
Synack
Caliber
DirectDefense
AVI	
Networks
Forrester
Duo
SecureAuth
Stealthbits
Fidelis
Venafi
ForeScout
Xirrus
BeyondTrust
BluVector
Illumio
MaxNet
Aerohive
invincea
Centrify
Cyber-Ark
Axway
WatchGuard
iMPERVA
RSA
Riverbed
Tripwire
FireEye
Intelisecure
NetSpi
Accenture
TippingPoint
Aruba	
Networks
Extreme	Networks
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Layered	Security
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
By Layer
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Personnel
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
HR
• Right	to	work
• Background	Checks
• Resume	Checks
• On-Boarding
• Off-Boarding
• Corrective	Action
• PIP	(Performance	Improvement	Process)
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Awareness
• People	are	our	biggest	threat
• Annual	Awareness
• Routine	Awareness
• Group	On-Boarding	Awareness
• Active	Issue	Awareness
• Social	Engineering
• Phishing
• Avoiding	communications	overload
• Lack	of	sensitivity	towards	confidentiality
• Data	Handling	Procedures
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Physical
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Facilities
• Location	Considerations
• Flood,	Crime,	Earthquake,	Industrial,	Railroad,	Hurricanes,	Tornados,	Snow
• Perimeter	Controls
• Guards
• Vehicle	Barriers
• Fencing
• Lighting
• CCTV
• Sensors
• Access	Controls
• Card	Keys/Badge	Readers
• Man	Traps
• Internal	Controls
• Internal	zone	segmentation
• Card	Keys/Badge	Readers
• Motion	Sensors
• CCTV
• Wiring	closet	controls	(restricted	access)
• Physical	Security	Auditing	and	Penetration	Testing
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Data	Centers
• Redundancy:
• Locations Power	suppliers Off	line	power	(generators)
• Fuel	for	off	line	power Telecommunications Networking
• Air	Conditioning Water
• Capacity	Planning
• Access
• Highly	Restricted Card	Keys	 Locked	cabinets
• Segregated	areas	(fencing/locks) Tied	to	change	management Controlled	by	DC	Ops
• Detection
• Fire/Smoke Water Temperature
• Humidity CCTV Intrusion	(Doors)
• Fire	Suppression
• Change	Procedures
• Cleaning	and	Maintenance
• Hard	drive	retention/disposal
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Internal
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Network
• Segmentation
• Avoiding	flat	networks
• VLANs	for	separation
• Avoiding	any-any	rules
• Separate	Users	from	Infrastructure
• Separate	Development,	Test,	Q/A,	UAT,	Production
• Separate	regulated	areas	such	as	for	PCI	compliance
• Separate	other	high	risk	departments	(medial	records,	finance,	HR)
• Separate	by	major	Departments
• Separate	by	geographically
• Separate	by	function	(such	as	administrator	access	on	a	separate	VLAN)
• Admin	access
• Strict	controls	over	modify	access
• Ensure	all	of	your	eggs	are	NOT	in	one	basket	(San	Francisco,	2008,	
http://www.infoworld.com/article/2653004/misadventures/why-san-francisco-s-network-admin-
went-rogue.html)
• Network	Intrusion	Prevention/Detection
• On	internal	segments,	not	just	ingress/egress
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Network	(cont)
• Internal	Transmission	Encryption
• Password	transmission
• General	internal	transmission	encryption	is	not	mandated	(that	I	know	of),	but	should	be	
considered
• NAC	(Network	Access	Controls)
• Server	registration
• End	point	device	registration	and	mandatory	controls.
• Non-compliant	isolation
• Rogue	Wireless	Access	Points
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Servers/Databases
• Asset	Management
• If	you	don’t	know	what	you	have,	how	can	you	protect	it.
• Business	Ownership
• What	servers,	DBs,	support	what	applications
• File	Integrity	Monitoring
• HIDS
• Crown	Jewels	(PII,	PHI,	PCI,	DC,	Key	Manager,	Finance)
• Backups
• Backup	Encryption
• OS	Patching
• DB	Patching
• Encryption	at	Rest
• Access	Control
• Provisioning/De-Provisioning
• Separation	of	duties
• RBAC
• Auditing
• Identity	Management	(IDM)
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Servers/Databases	(cont)
• Admin	Access
• Unique	UserID	(no	generic)	access
• Don’t	use	the	same	UserID	as	their	normal	network/workstation	access.
• Minimize	domain	and	server	admin	access
• Log	actions	taken
• Encrypted	access	(no	Telnet)
• Change	Controls
• Post	deployment	changes	(applications,	databases,	etc)
• Vulnerability	Scanning
• Promotion	to	use	(Dev/Test/Prod)
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Servers/Databases	(cont)
• Secure	Configuration
• Industry	standard	controls	(vendor,	NIST,	customized) Gold	images
• Standardized	configurations	per	OS,	per	use,	per	zone Vulnerability	scanned	images
• Supported	OS	(n-1);	Documentation	(run	documents) Log	Settings
• Centralized	Logging Anti-Virus
• Removal	of	un-needed	services/software Asset	Management
• Patching Asset	Management	Agent
• Monitoring File	integrity	monitoring
• Authentication	credential	controls Encryption	at	Rest
• Encryption	in	transit Auto-logoff
• Default	UserIDs Default	Passwords
• No	dual-homed More
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Applications
• Asset	Management
• Naming	Standards;	Ownership;	Licensing;	Source	Code	Escrow.
• Authentication/Authorization
• Application	firewalls
• Application	vulnerability	scanning
• Secure	Coding	Processes
• Documentation
• Servers;	Network	Segments;	Databases;	Interactions;	Data	Flow;	Data	Classification
• Secure	Configuration
• Monitoring;	Logging;	Patching;	Encryption;	Network	Segment;
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Applications	(cont)
• SDLC	(Software	Development	Lifecycle)
• Code	change	controls
• Separation	of	duties
• Libraries	access
• Development	environment	controls
• Equal	security	controls
• Live	data	use	restrictions	(ePHI	De-Identification)
• Network	segregation
• No	development	on	production	systems
• Integrity	controls
• Input/output	verification Error	handling Incomplete	data
• Missing	field	required Data	field	Limit Balancing	controls	
• Duplicate	records	processing Data	buffer	overrun Check	digit	validation
• Data	field	combination	or	correlation	tests
• Scripting	vulnerabilities	identification	and	remediation	prior	to	publication
• Restrict	stored	data	changes	to	the	application	interface	only
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
EndPoint
• Desktop	admin	access
• Secure	Configuration
• Anti-Virus
• Local	Firewall
• Media	Controls
• Application	Controls
• Host	Data	Loss	Prevention
• Host	Intrusion	Prevention
• Disk/File	Encryption
• Patching
• Mobile	devices
• BYOD
• Monitored	24x7
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Vulnerability	Scanning
• Asset	identification
• Vulnerability	assessment
• Authenticated,	Un-Authenticated
• Frequency
• Impact
• External/Internal
• Workstations
• Remediation
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Virtualized	Environment
• Tools	may	differ	from	the	‘physical’	devices
• Consistency	of	controls	across	all	guests
• Hardening	of	the	host	virtualization	environment
• Ensuring	resource	allocation	has	accounted	for	security	control	overhead	(such	
as	AV	scanning	which	can	be	resource	intensive)
• Patching	and	Vulnerability	Scanning	at	the	HV	Level
• AV	needs	to	have	resource	utilization	leveling	to	ensure	that	simultaneous	scans	
or	updates	won't	impact	the	performance	of	virtual	environments
• May	require	a	different	product
• Randomize	when	scans	and	updates	take	place,	preventing	resource	
contention	and	leveling	CPU	resources
• IO	aware	Scan	Tuning,	and	multithreading	for	optimal	performance
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
External
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Penetration	Testing
• Done	by	an	internal	party	(pre-testing)
• Done	by	an	external	party	(Compliance	
Certification	such	as	PCI)
• Proactive	identification	of	weak	controls
• Remediation
• Re-scanning
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
DOS	Front	End
• Denial	of	Service	(DOS),	Distributed	Denial	of	Service	(DDOS)
• In	front	of	the	internet	router
• 3d	party	or	ISP	provided	services
• Monitoring
• Incoming	data	re-direct	and	filtering
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Firewalls
• Traditional	Firewalls
• NexGen	Firewalls
• At	the	parameter
• Segmenting
• Internal/External
• External/DMZ
• DMZ/Internal
• Internal/Internal
• Critical	Rules
• Deny	by	Default
• Elimination	of	any-any
• Restricting	rules	to	specific	IPs,	ranges,	ports
• Geo	Blocking
• Maintenance
• Reporting;	Alerting;	Logs
• Rule	Tracking
• Auditing
• Critical	to	have	a	periodic	3d	party	rules/configuration	review
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
NIPS/NIDS
• NIDS	(Passive)/NIPS	(Active)
• Positioning	is	critical.
• Internal/External
• Between	Zones
• Centralization	of	logs
• SIEM
• SOC
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
DMZ
• All	external	access	terminates	in	a	DMZ
• Site	2	Site	VPNs
• Client	2	Site	VPNs
• Web	Servers
• E-mail
• Internet
• Strict	controls	over	access	between	DMZ	and	internal	zones.
• Can	have	multiple	DMZ	Zones	such	as	a	separate	zone	for	vendor	or	3d	party	
interaction.
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
E-Mail	Gateway
• Anti-Spam
• Anti-Virus
• Secure	E-Mail	Delivery
• Compliance	Filtering
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Internet	Gateway
• Internet	Content	Filter
• Web	surfing Web	threats Social	media	use
• Instant	messaging Web	based	e-mail	use Live	Stream
• Reputational	blocking Lexical	and	a	scoring	systems
• ‘Break-the-glass’
• Can	be	used	for	compliance	monitoring	and	remediation
• Can	be	tied	to	AD/LDAP	for	positive	identification	of	the	individual
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Transmission	Encryption
• All	transmission	of	sensitive	or	regulated	data	over	open	networks	(the	Internet)
• All	transmission	of	passwords
• All	administrator	access	sessions	(no	Telnet	or	FTP)
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Data	Loss	Prevention
• Addresses	accidental	or	intentional	disclosure	of	data	and	data	theft
• Network-based
• Scan	and	report
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Cloud	Computing
• May	add	multiple	layers	to	Information	Security
• How	has	your	data?
• The	3d	party	you	contracted	with?
• The	DC	they	outsourced	to?
• 3d	Parties	the	DC	has	outsourced	to?
• Contract	Criticality
• Vendor	vetting Data	ownership Data	access
• Data	retention Data	restoration SLAs
• Geographical	Locations HR	Processes/Employee	Vetting
• You	are	not	relieved	of	responsibility
• Security	Controls
• Leveraged	Firewalls Leveraged	IPS Leveraged	Physical	Hdw
• Access	Management Centralized	logging Data	Flow
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
By Cross
Functional
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Policies,	Standards	and	Procedures
• Core	of	the	Information	Security	cyclical	process
• ISO9001:	“Document	what	you	do,	do	what	you	document”
• Used	to	educate	and	direct	the	end	users	as	well	as	IT	staff,	vendors,	etc
• Used	to	enforce	compliance,	consistent	configurations	and	practices
• Used	to	force	formal	exceptions	for	bad	practices
• Regulatory	required
• Audit	required
• Establish	a	process	for	documentation	review	and	approval
• Establish	document	templates	for	policies,	standards	and	procedures	
• Establish	a	numbering	system	to	ensure	a	logical	order	to	documentation
• Establish	a	desired	documentation	matrix	(next	slide)
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
My	Standard	Structure
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
BCP/DR
• Critical	part,	frequently	not	see	as	‘security’
• BC
• Where	will	an	employee	work?
• How	will	the	employee	connect?
• Are	there	‘off	line’	processes?
• What	services	are	mandatory?		Not?
• Exercises
• DR
• Planning
• Criticality
• Recovery	Point
• Recovery	Time
• Hot,	Warm,	Cold	Sites
• Exercises
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Audits
• Compliance
• HIPAA,	HITECH,	PCI,	FERC/NERC,	SEC,	GLBA,	SOX
• Self	Auditing
• Keep	your	controls	under	control.
• Access,	Incidents,	Tasks
• Internal	Audit
• Your	best	friend.		Helps	you	to	find	issues	first.
• External	‘Prep’	Audit
• Your	best	friend.		Helps	you	to	find	issues	first.
• External	Formal	Audit
• Good	time	to	take	a	vacation.
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Logging,	SIEM,	SOC
• Have	an	audit	trail.
• Anti-Forensic	resistant.
• Determine	what	must	be	logged	by	IPS,	DLP,	Firewalls,	Servers,	Applications,	AV,	
etc.
• React	at	the	earliest	possible	time	to	reduce	impact
• 24x7	or	via	report	and	request
• Expert	review	and	analysis	(if	using	a	managed	SOC)
• Minimize	false	positives	through	analysis	and	tuning
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Event	Analysis
4,159,085,410,119 - Total	Events	
157,202,478,589
Total	Security	Events
4,216,300,021	
Advance	Correlated	
Events
15,137,697
Analyst	Events
321,290
Tickets	Escalated
Event	Filters
Automated	Correlation	(MPLE)
Expert	Analysis	&	Investigation
Client	Escalations
Technology
People	&
Process
Escalations	is	0.000008%	of	Total	Events
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
CSIRT
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
ITIL	Processes
• Information	Technology	Infrastructure	Library
• ITIL	processes	are	used	throughout	the	Information	Security	program	to	ensure	
integration	with	the	rest	of	IT	operations
• Request	Management
• Incident	Management
• Change	Management
• Problem	Management
• Configuration	Management	Data	Base	(CMDB)	for	asset	tracking
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Governance
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
How	do	you	stack	up?
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
Question
and
Answer
@NTXISSA			#NTXISSACSC4Dell - Internal Use - Confidential
@NTXISSA			#NTXISSACSC4
The Collin College Engineering Department
Collin College Student	Chapter	of	the	North	Texas	ISSA
North	Texas	ISSA	(Information	Systems	Security	Association)
NTX	ISSA	Cyber	Security	Conference	– October	7-8,	2016 48
Thank	you

Más contenido relacionado

La actualidad más candente

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsPeter Rawsthorne
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Offensive Security basics part 1
Offensive Security basics  part 1Offensive Security basics  part 1
Offensive Security basics part 1wharpreet
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceAndreas Sfakianakis
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsLiwei Ren任力偉
 
Operational Security
Operational SecurityOperational Security
Operational SecuritySplunk
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08DallasHaselhorst
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 

La actualidad más candente (20)

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural Decisions
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Offensive Security basics part 1
Offensive Security basics  part 1Offensive Security basics  part 1
Offensive Security basics part 1
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Information classification
Information classificationInformation classification
Information classification
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and Algorithms
 
Operational Security
Operational SecurityOperational Security
Operational Security
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 

Destacado

NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3North Texas Chapter of the ISSA
 
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...North Texas Chapter of the ISSA
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNorth Texas Chapter of the ISSA
 
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret WeaponNTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret WeaponNorth Texas Chapter of the ISSA
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNorth Texas Chapter of the ISSA
 
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdANTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdANorth Texas Chapter of the ISSA
 
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...North Texas Chapter of the ISSA
 
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNorth Texas Chapter of the ISSA
 
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Day in the Life of a Security Solutions ArchitectNTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Day in the Life of a Security Solutions ArchitectNorth Texas Chapter of the ISSA
 
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
NTXISSACSC4 - Red, Amber, Green Status: The Human DashboardNTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
NTXISSACSC4 - Red, Amber, Green Status: The Human DashboardNorth Texas Chapter of the ISSA
 
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green GameNTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green GameNorth Texas Chapter of the ISSA
 

Destacado (20)

NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
 
NTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-VirusNTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-Virus
 
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
 
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
 
NTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic FailuresNTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic Failures
 
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret WeaponNTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
 
NTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - How Not to Build a Trojan HorseNTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - How Not to Build a Trojan Horse
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
 
NTXISSACSC4 - World of Discovery
NTXISSACSC4 - World of DiscoveryNTXISSACSC4 - World of Discovery
NTXISSACSC4 - World of Discovery
 
NTXISSACSC4 - A Day in the Life of a CISO
NTXISSACSC4 - A Day in the Life of a CISONTXISSACSC4 - A Day in the Life of a CISO
NTXISSACSC4 - A Day in the Life of a CISO
 
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdANTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
 
NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Cyber Insurance – Did You Know?NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Cyber Insurance – Did You Know?
 
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
 
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & MitigationNTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
 
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
 
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Day in the Life of a Security Solutions ArchitectNTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
 
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
NTXISSACSC4 - Red, Amber, Green Status: The Human DashboardNTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
 
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green GameNTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
 
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
 

Similar a Layered Security Overview for NTX ISSA Conference

Science DMZ security
Science DMZ securityScience DMZ security
Science DMZ securityJisc
 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02Shawn Wells
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...NetworkCollaborators
 
Biznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsBiznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsYusuf Hadiwinata Sutandar
 
BOSNOG NAC stack 2018
BOSNOG NAC stack 2018BOSNOG NAC stack 2018
BOSNOG NAC stack 2018GENIANS, INC.
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are ComingErnest Staats
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecRobb Boyd
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 
Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Brian Proctor - GICSP, CISSP, CRISC
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersMichael Davis
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPROIDEA
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014KBIZEAU
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewChristine MacDonald
 
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...DataStax
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are comingErnest Staats
 

Similar a Layered Security Overview for NTX ISSA Conference (20)

Science DMZ security
Science DMZ securityScience DMZ security
Science DMZ security
 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
 
Biznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsBiznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital Forensics
 
BOSNOG NAC stack 2018
BOSNOG NAC stack 2018BOSNOG NAC stack 2018
BOSNOG NAC stack 2018
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
 
Network security
Network securityNetwork security
Network security
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
CHANDRA HEBBAR_CV - 1
CHANDRA HEBBAR_CV - 1CHANDRA HEBBAR_CV - 1
CHANDRA HEBBAR_CV - 1
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 

Más de North Texas Chapter of the ISSA

Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediationNorth Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...North Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1North Texas Chapter of the ISSA
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNorth Texas Chapter of the ISSA
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNorth Texas Chapter of the ISSA
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill whiteNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNorth Texas Chapter of the ISSA
 

Más de North Texas Chapter of the ISSA (20)

Purple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcuttPurple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcutt
 
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cepNtxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cep
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
 
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5  gold 1 mimecast e mail resiliencyNtxissacsc5  gold 1 mimecast e mail resiliency
Ntxissacsc5 gold 1 mimecast e mail resiliency
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
 
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersenNtxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
 
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykesNtxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
 
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompsonNtxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompson
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
 
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_muellerNtxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
 

Último

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 

Último (20)

(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 

Layered Security Overview for NTX ISSA Conference

  • 1. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Layered Security/Defense In Depth Nathan Shepard Customer Information Security Manager Dell Services October 7-8, 2016
  • 2. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Bio • Customer Information Security Manager • Currently on a financial customer • Serviced over 20 customers in my 17 years with Perot/Dell • Healthcare • Power • Finance • Others • Corporate level consulting • Information Security Management • CISSP • CISM • CISA • CRISK • 33 Years in IT • 21 Years in InfoSec • Veteran, U.S. Army, U.S. Coast Guard NTX ISSA Cyber Security Conference – October 7-8, 2016 2
  • 3. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential This Presentation • Is based on Information Security best practices (a conglomeration of practices derived from regulatory requirements and published industry standards) and is meant to give a general overview of what a comprehensive Information Security program should look like in any given industry. • Is high level, my objective is to outline the scope of an entire Information Security program, not provide precise details on each and every aspect. • Is not a sales presentation. I have nothing to sell you. • Isn’t meant to scare you, but it might. • Isn’t meant to dissuade you from following an InfoSec career, but it might. • Don’t ask me detailed in depth questions about the controls, I’m a generalist. I point to the correct subject matter experts for the controls.
  • 4. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Why this presentation? • In many of the presentations you will see this weekend, or at other venues, you will receive an in depth analysis of a problem, or a process, or a tool, or a control. • While these are excellent, I have seen no presentations on how it all fits together. • In my role, I frequently have to interview individuals for the same or similar positions as the one I occupy and enjoy. • I ask each one of them to explain to me “Defense in Depth” or “Layered Security”. Maybe 1 in 5 can give a good answer. And these are all seasoned security professionals. • May of us have tunnel vision, knowing a LOT about specific aspects of security, but lacking an overview of the entire process. • Today, I want to remedy that situation.
  • 5. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Confusion! So many vendors, so little time. Alert Logic SecurIS SafeNet Sentinel IPS Shavlik Solutionary VeloCloud Vipre SourceFire Niksun Varonis Cylance Tempered ThreatTrack Cadre SecureData Vormetric VisualClick Wild Packets ZixCorp Attivo ProtectWise iScanOnLine PaloAlto NSFocus UDI SentinalOne Data Solutions LightCyber LogRhythm Lumeta LanDesk NexusGuard Kasperskey JumpCloud IXIA InNet Hytrust Gigamon eSkyCity InfoBlox F5 Fortinet Future Com Genalto GlobalScape Interface Masters Preferred Technology SkyPort Systems NetBoundry Observable Networks OpenDNS Dell Secure Works Sumologic Unique Digital Cyber Reason Juniper egress Druva DarkTrace Cumulus Symantec Microsoft McAfee Nessus Qualys A10 Above Security AccuData Barracuda Beyond Security BlueCoat Cleo CheckPoint Cisco Critical Start Critical Watch BitDefender Sophos TrendMicro eset BAE Systems Clearswift RedSeal F-Secure Stormshield Webroot Panda IBM Bit9 SnoopWall InfoDefense iNetU Apcon Packetviper SIMS Tiepoint Synack Caliber DirectDefense AVI Networks Forrester Duo SecureAuth Stealthbits Fidelis Venafi ForeScout Xirrus BeyondTrust BluVector Illumio MaxNet Aerohive invincea Centrify Cyber-Ark Axway WatchGuard iMPERVA RSA Riverbed Tripwire FireEye Intelisecure NetSpi Accenture TippingPoint Aruba Networks Extreme Networks
  • 6. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Layered Security
  • 7. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential By Layer
  • 8. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Personnel
  • 9. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential HR • Right to work • Background Checks • Resume Checks • On-Boarding • Off-Boarding • Corrective Action • PIP (Performance Improvement Process)
  • 10. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Awareness • People are our biggest threat • Annual Awareness • Routine Awareness • Group On-Boarding Awareness • Active Issue Awareness • Social Engineering • Phishing • Avoiding communications overload • Lack of sensitivity towards confidentiality • Data Handling Procedures
  • 11. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Physical
  • 12. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Facilities • Location Considerations • Flood, Crime, Earthquake, Industrial, Railroad, Hurricanes, Tornados, Snow • Perimeter Controls • Guards • Vehicle Barriers • Fencing • Lighting • CCTV • Sensors • Access Controls • Card Keys/Badge Readers • Man Traps • Internal Controls • Internal zone segmentation • Card Keys/Badge Readers • Motion Sensors • CCTV • Wiring closet controls (restricted access) • Physical Security Auditing and Penetration Testing
  • 13. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Data Centers • Redundancy: • Locations Power suppliers Off line power (generators) • Fuel for off line power Telecommunications Networking • Air Conditioning Water • Capacity Planning • Access • Highly Restricted Card Keys Locked cabinets • Segregated areas (fencing/locks) Tied to change management Controlled by DC Ops • Detection • Fire/Smoke Water Temperature • Humidity CCTV Intrusion (Doors) • Fire Suppression • Change Procedures • Cleaning and Maintenance • Hard drive retention/disposal
  • 14. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Internal
  • 15. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Network • Segmentation • Avoiding flat networks • VLANs for separation • Avoiding any-any rules • Separate Users from Infrastructure • Separate Development, Test, Q/A, UAT, Production • Separate regulated areas such as for PCI compliance • Separate other high risk departments (medial records, finance, HR) • Separate by major Departments • Separate by geographically • Separate by function (such as administrator access on a separate VLAN) • Admin access • Strict controls over modify access • Ensure all of your eggs are NOT in one basket (San Francisco, 2008, http://www.infoworld.com/article/2653004/misadventures/why-san-francisco-s-network-admin- went-rogue.html) • Network Intrusion Prevention/Detection • On internal segments, not just ingress/egress
  • 16. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Network (cont) • Internal Transmission Encryption • Password transmission • General internal transmission encryption is not mandated (that I know of), but should be considered • NAC (Network Access Controls) • Server registration • End point device registration and mandatory controls. • Non-compliant isolation • Rogue Wireless Access Points
  • 17. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Servers/Databases • Asset Management • If you don’t know what you have, how can you protect it. • Business Ownership • What servers, DBs, support what applications • File Integrity Monitoring • HIDS • Crown Jewels (PII, PHI, PCI, DC, Key Manager, Finance) • Backups • Backup Encryption • OS Patching • DB Patching • Encryption at Rest • Access Control • Provisioning/De-Provisioning • Separation of duties • RBAC • Auditing • Identity Management (IDM)
  • 18. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Servers/Databases (cont) • Admin Access • Unique UserID (no generic) access • Don’t use the same UserID as their normal network/workstation access. • Minimize domain and server admin access • Log actions taken • Encrypted access (no Telnet) • Change Controls • Post deployment changes (applications, databases, etc) • Vulnerability Scanning • Promotion to use (Dev/Test/Prod)
  • 19. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Servers/Databases (cont) • Secure Configuration • Industry standard controls (vendor, NIST, customized) Gold images • Standardized configurations per OS, per use, per zone Vulnerability scanned images • Supported OS (n-1); Documentation (run documents) Log Settings • Centralized Logging Anti-Virus • Removal of un-needed services/software Asset Management • Patching Asset Management Agent • Monitoring File integrity monitoring • Authentication credential controls Encryption at Rest • Encryption in transit Auto-logoff • Default UserIDs Default Passwords • No dual-homed More
  • 20. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Applications • Asset Management • Naming Standards; Ownership; Licensing; Source Code Escrow. • Authentication/Authorization • Application firewalls • Application vulnerability scanning • Secure Coding Processes • Documentation • Servers; Network Segments; Databases; Interactions; Data Flow; Data Classification • Secure Configuration • Monitoring; Logging; Patching; Encryption; Network Segment;
  • 21. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Applications (cont) • SDLC (Software Development Lifecycle) • Code change controls • Separation of duties • Libraries access • Development environment controls • Equal security controls • Live data use restrictions (ePHI De-Identification) • Network segregation • No development on production systems • Integrity controls • Input/output verification Error handling Incomplete data • Missing field required Data field Limit Balancing controls • Duplicate records processing Data buffer overrun Check digit validation • Data field combination or correlation tests • Scripting vulnerabilities identification and remediation prior to publication • Restrict stored data changes to the application interface only
  • 22. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential EndPoint • Desktop admin access • Secure Configuration • Anti-Virus • Local Firewall • Media Controls • Application Controls • Host Data Loss Prevention • Host Intrusion Prevention • Disk/File Encryption • Patching • Mobile devices • BYOD • Monitored 24x7
  • 23. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Vulnerability Scanning • Asset identification • Vulnerability assessment • Authenticated, Un-Authenticated • Frequency • Impact • External/Internal • Workstations • Remediation
  • 24. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Virtualized Environment • Tools may differ from the ‘physical’ devices • Consistency of controls across all guests • Hardening of the host virtualization environment • Ensuring resource allocation has accounted for security control overhead (such as AV scanning which can be resource intensive) • Patching and Vulnerability Scanning at the HV Level • AV needs to have resource utilization leveling to ensure that simultaneous scans or updates won't impact the performance of virtual environments • May require a different product • Randomize when scans and updates take place, preventing resource contention and leveling CPU resources • IO aware Scan Tuning, and multithreading for optimal performance
  • 25. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential External
  • 26. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Penetration Testing • Done by an internal party (pre-testing) • Done by an external party (Compliance Certification such as PCI) • Proactive identification of weak controls • Remediation • Re-scanning
  • 27. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential DOS Front End • Denial of Service (DOS), Distributed Denial of Service (DDOS) • In front of the internet router • 3d party or ISP provided services • Monitoring • Incoming data re-direct and filtering
  • 28. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Firewalls • Traditional Firewalls • NexGen Firewalls • At the parameter • Segmenting • Internal/External • External/DMZ • DMZ/Internal • Internal/Internal • Critical Rules • Deny by Default • Elimination of any-any • Restricting rules to specific IPs, ranges, ports • Geo Blocking • Maintenance • Reporting; Alerting; Logs • Rule Tracking • Auditing • Critical to have a periodic 3d party rules/configuration review
  • 29. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential NIPS/NIDS • NIDS (Passive)/NIPS (Active) • Positioning is critical. • Internal/External • Between Zones • Centralization of logs • SIEM • SOC
  • 30. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential DMZ • All external access terminates in a DMZ • Site 2 Site VPNs • Client 2 Site VPNs • Web Servers • E-mail • Internet • Strict controls over access between DMZ and internal zones. • Can have multiple DMZ Zones such as a separate zone for vendor or 3d party interaction.
  • 31. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential E-Mail Gateway • Anti-Spam • Anti-Virus • Secure E-Mail Delivery • Compliance Filtering
  • 32. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Internet Gateway • Internet Content Filter • Web surfing Web threats Social media use • Instant messaging Web based e-mail use Live Stream • Reputational blocking Lexical and a scoring systems • ‘Break-the-glass’ • Can be used for compliance monitoring and remediation • Can be tied to AD/LDAP for positive identification of the individual
  • 33. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Transmission Encryption • All transmission of sensitive or regulated data over open networks (the Internet) • All transmission of passwords • All administrator access sessions (no Telnet or FTP)
  • 34. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Data Loss Prevention • Addresses accidental or intentional disclosure of data and data theft • Network-based • Scan and report
  • 35. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Cloud Computing • May add multiple layers to Information Security • How has your data? • The 3d party you contracted with? • The DC they outsourced to? • 3d Parties the DC has outsourced to? • Contract Criticality • Vendor vetting Data ownership Data access • Data retention Data restoration SLAs • Geographical Locations HR Processes/Employee Vetting • You are not relieved of responsibility • Security Controls • Leveraged Firewalls Leveraged IPS Leveraged Physical Hdw • Access Management Centralized logging Data Flow
  • 36. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential By Cross Functional
  • 37. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Policies, Standards and Procedures • Core of the Information Security cyclical process • ISO9001: “Document what you do, do what you document” • Used to educate and direct the end users as well as IT staff, vendors, etc • Used to enforce compliance, consistent configurations and practices • Used to force formal exceptions for bad practices • Regulatory required • Audit required • Establish a process for documentation review and approval • Establish document templates for policies, standards and procedures • Establish a numbering system to ensure a logical order to documentation • Establish a desired documentation matrix (next slide)
  • 38. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential My Standard Structure
  • 39. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential BCP/DR • Critical part, frequently not see as ‘security’ • BC • Where will an employee work? • How will the employee connect? • Are there ‘off line’ processes? • What services are mandatory? Not? • Exercises • DR • Planning • Criticality • Recovery Point • Recovery Time • Hot, Warm, Cold Sites • Exercises
  • 40. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Audits • Compliance • HIPAA, HITECH, PCI, FERC/NERC, SEC, GLBA, SOX • Self Auditing • Keep your controls under control. • Access, Incidents, Tasks • Internal Audit • Your best friend. Helps you to find issues first. • External ‘Prep’ Audit • Your best friend. Helps you to find issues first. • External Formal Audit • Good time to take a vacation.
  • 41. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Logging, SIEM, SOC • Have an audit trail. • Anti-Forensic resistant. • Determine what must be logged by IPS, DLP, Firewalls, Servers, Applications, AV, etc. • React at the earliest possible time to reduce impact • 24x7 or via report and request • Expert review and analysis (if using a managed SOC) • Minimize false positives through analysis and tuning
  • 42. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Event Analysis 4,159,085,410,119 - Total Events 157,202,478,589 Total Security Events 4,216,300,021 Advance Correlated Events 15,137,697 Analyst Events 321,290 Tickets Escalated Event Filters Automated Correlation (MPLE) Expert Analysis & Investigation Client Escalations Technology People & Process Escalations is 0.000008% of Total Events
  • 43. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential CSIRT
  • 44. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential ITIL Processes • Information Technology Infrastructure Library • ITIL processes are used throughout the Information Security program to ensure integration with the rest of IT operations • Request Management • Incident Management • Change Management • Problem Management • Configuration Management Data Base (CMDB) for asset tracking
  • 45. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Governance
  • 46. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential How do you stack up?
  • 47. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential Question and Answer
  • 48. @NTXISSA #NTXISSACSC4Dell - Internal Use - Confidential @NTXISSA #NTXISSACSC4 The Collin College Engineering Department Collin College Student Chapter of the North Texas ISSA North Texas ISSA (Information Systems Security Association) NTX ISSA Cyber Security Conference – October 7-8, 2016 48 Thank you