APT Detection with Whitelisting and Log Monitoring
|
|
|
- Charity Jenkins
- 10 years ago
- Views:
Transcription
1 APT Detection with Whitelisting and Log Monitoring Aaron Beuhring Kyle Salous About Us Kyle Salous is a 10-year Info Sec vet, covering a broad spectrum of subjects. He has a BS in Information Security and an MS in Systems Engineering. Aaron Beuhring s a 13-yr IT vet w/ interests in computer forensics, ediscovery, security. He s pursuing his Masters in Info Sec & Assurance. We both work for an organization that has a pretty typical IT infrastructure. We ve had great success in the past few years thwarting advanced attacks and frustrating our pen testers. 2
2 What is Widely Believed to be the Problem: Attackers are using amazing zero day exploits to hack anyone they please, anytime, anywhere. Defenders are helpless to detect and block these attacks. 3 What is Really the Problem: Defenders rely far too much on blacklists. Signature based antivirus was not designed to detect never before seen malware. IP or domain reputation lists can t keep pace with threats. Content Delivery Networks have complicated this. 4
3 Content Delivery Networks and IP Reputation 5 Example Attack Vectors Cryptolocker: Arrives via , malicious link or now even USB worm. Installs itself within %APPDATA% then encrypts all your data. APT1: Phishing including a link to ZIP file is sent using an account set up in the name of someone the victim knows. Contents will be downloaded/extracted to user s profile where they will be executed. 6
4 Notice Something? Neither attack used 0-day. Both examples execute code from within the user s profile. The attacker simply asked the user to run something. Not very sophisticated but highly effective. 7 Raising Costs for Attackers Our Approach: Leverage whitelisting to force attackers to use exploits. Patch regularly to force attackers to use 0-day. Employ exploit mitigations technologies to force attackers to use really crafty 0-day. Limit admin rights to force attackers to escalate post exploitation. Leverage logs from all of the above to detect anything that has slipped by. 8
5 Limiting Costs for Your Company Application whitelisting with Microsoft Applocker or Third Party software. Network whitelisting with host based firewalls. Limit admin rights limited with Group Policy Preferences. Exploit mitigation with Microsoft EMET, modern browser sandboxes, OS mitigations. Advanced Log Monitoring and Alerting with a SIEM*. 9 What Does Whitelisting Entail? Must have buy in from the business side. Awareness of every program that executes on your end users machines. Understanding the networking protocols that these programs run. Training end users and IT staff on the process of vetting new software for a production environment. 10
6 Application Whitelisting Common Arguments Takes too much time to manage Inflexible Expensive AppLocker Management takes less time than malware remediation Flexible rules Part of your Windows license* 11 AppLocker AppLocker is included in: Windows 7 Ultimate and Enterprise editions Windows Server 2008 R2 Standard, Enterprise, Datacenter and Itanium editions Windows 8 Enterprise edition Windows Server 2012 Standard and Datacenter editions What about Home Editions? Parental Controls! 12
7 AppLocker File Types AppLocker has separate rule groups for EXE, MSI, scripts and DLLs. DLL enforcement is off by default and must be explicitly enabled. Cannot control macros or other interpreted languages Can control the interpreter! 13 AppLocker Rule Type Publisher Flexible but requires signed code Path Flexible but requires good ACLs Hash Least flexible but more absolute 14
8 Guidelines for AppLocker Rules Path rules are acceptable only if the path is location that standard users cannot write to. Use hash or publisher rules for everything else. Be careful when using the wizard to create rules, it may have unintended consequences. You may not want to allow anything signed by Microsoft! 15 Getting Started Choose approach: Gold Image vs. Default Rules Default rules Allow anyone to run programs from %PROGRAMFILES% and %WINDOWS% Allow admins to run anything. Must ensure that users don t have admin rights to be effective. 16
9 Default Rule Creation 17 Admin Enforcement End users should get no admin rights. Create a separate admin account for everyone in your IT department. Create a local admin account on each computer with a unique password. Use Group Policy Preference to reset membership of the local administrators group. 18
10 Admin GPO 19 What Default Rules Do Standard users can no longer run EXEs from User Profile Users need an admin to properly install software into %PROGRAMFILES% or %WINDOWS% Users will now need to call the Help Desk for assistance when they try to run a random download or install software. Software can be administratively installed to %PROGRAMFILES% with no additional rules needed. 20
11 More Importantly If done right, attackers now need to use exploitation to get access to your system. Attackers will be limited to regular user privileges post exploitation and will need to find a way to escalate. Attackers have limited options for persistence if they don t escalate. 21 AppLocker in Action 22
12 AppLocker in Action 23 AppLocker in Action 24
13 Rolling It Out Test thoroughly! AppLocker policies are additive. Use a separate policy for DLLs after you successfully implement EXE/MSI/SCRIPT blocking. Make use of your AD OU structure to target additional allowances to only those who need it. Push policies in audit mode first, check for warnings in AppLocker logs. 25 Gotchas Tools that run as System. (PSEXECSVC) Proactively whitelist legitimate applications that need to run from %APPDATA% - WebEx, Go2Meeting, Etc. hash and publisher rules ONLY! You need to be careful to add paths for locations like logon scripts. Make sure you have good ACLs for default paths. Exceptions for Default Rules 26
14 Additional Uses Block programs that don t have a business use Shockwave Anything made by Apple Other scripting AutoIt, Python, Perl, etc. Virtualization platforms Quickly block a malicious file that doesn t have an AV signature Block insecure versions of programs to augment your patch management
15 Network Whitelisting Host based Firewalls are almost always included with AV as part of an endpoint solution. Firewalls should be enabled inside the enterprise with granular rules. Application based rules should be used to allow traffic to the Internet ONLY for certain applications Explicitly deny and log traffic from all other directories and applications. 29 Host Firewall Rules Enforce the concept of least privilege on the network level. Centrally manage the installation and administration of firewall rules on all end hosts. Use different profiles to segment user groups based on sensitivity levels to the organization. Turn on logging for every rule and in some cases alerting for certain applications that might be used by attackers like PowerShell based on context. Build rules on the server side as well that only allow traffic for the application that is being hosted. 30
16 Firewall Rules Audit logs first, then enforce. 1. Allow application traffic to and from server subnets. 2. Allow powershell.exe, FTP.exe to specific server subnets 3. Deny powershell.exe, psexec.exe, psexecsvc.exe, winexecsvc.exe, FTP.exe anywhere else 4. Allow 80, 443 from specific applications and %PROGRAMFILES% or %WINDOWS% 5. Deny all Log Everything! 31 Example Denying PowerShell Internet Access 32
17 Monitoring Can get complicated and overwhelming quickly This is why we tightly control what can run! Define policy for logging and retention early on Build intelligent rules to detect and alert on APT activity: Lateral movement Unusual tools Traffic outside of baseline parameters 33 What to Log Collect the logs from all of the usual suspects: DNS, AD, Web, Network Firewall and IPS, Proxy, etc Client Event Logs: Applocker, NSA Guide. Augment client and device logs with flow data. Client firewall logs are a rich source of data Application making the connection Domain and User Local/Remote IP Sadly most don t do this! 34
18 Logging Problem 35 Actual Vendor Unfortunately, no, we were not aware of the specifics on how the external logging process worked. Logging to an external syslog server is a rarely used feature of <ProductName>. Once we were able to approach development about this, we were able to confirm that the product is working as designed. 36
19 Creative Firewall Alerts You can block or alert if any of the following try to connect to the internet or internal resources: FTP.EXE POWERSHELL.EXE NOTEPAD.EXE CALC.EXE Anything running in the user s profile You can create rules based on application name, hash, time, profile, user location and connection type. 37 Sample Log Sept 18 10:55:22 Firewall Security Server AV01: JACKSONJ,Local: Internal Domain,User: jacksonj, Internal Domain: test01,action: Permitted ,Local: 63446,Local: 90B11C60009,Remote: ;Remote: urs.microsoft.com,remote: 443,Remote: 0008E3FF009,TCP,Outbound, Start: :41:49, End: :41:49,Occurrences: 1,Application: C:/Program Files (x86)/internet Explorer/iexplore.exe,Rule: Approved Apps HTTP Port Outgoing 38
20 Sample False Positive Alert Suspicious traffic from PowerShell to a server Investigation Contact user who happens to be an admin Tuning Add false positive rule to SIEM for PowerShell traffic from that admin to that server only! 39 Sample True Positive Alert comes in for blocked traffic: TeamViewer.exe running from %APPDATA% attempting to connect to the internet on 443 Investigation Contact user who happens to be an admin User was no to the firm Remediation Remind user of policies for secure file transfer and remove team viewer 40
21 Client Firewall Log Gotchas Be sure to normalize times from clients that have been out of the office. EPS considerations for log burst when clients return to the network. Consider log buffer size and disk space Don t log certain dropped broadcast traffic SSDP, NetBIOS, etc. Your SIEM will see it as a port scan! Lock Firewall interface on end clients, enable a separate password for disabling. 41 Leverage Application Execution Logs Monitoring for blocked execution is good, monitoring for allowed execution is better! Advanced attackers use native functionality whenever possible. Baseline normal application usage by regular users. Audit and alert on unusual legitimate program use. Application execution tuple AppLocker { FilePath, Username } SysMon { Image, CommandLine, ParentImage, User } 42
22 Normal for an admin, abnormal for a user! SCHTASKS.EXE (scheduled jobs/tasks) NETSTAT.EXE (netstat -ano) SC.EXE (interact with services) XCOPY.EXE (copy files around) NSLOOKUP.EXE (recon) TASKKILL.EXE (kill running processes) TASKLIST.EXE (tasklist /v) ROUTE.EXE (adding persistent routes) REGSVR32.EXE (services) PING.EXE (check connectivity) WMIC.EXE (access Windows Management Instrumentation) POWERSHELL.EXE (Swiss army knife) Source: 43 Very Unusual! AT.EXE (scheduled jobs/tasks) PSEXEC.EXE (remote code execution) NBTSTAT.EXE (profile) FTP.EXE (download/upload) BITSADMIN.EXE (download/upload) MAKECAB.EXE (compression before exfil) QUSER.EXE (profile) IEEXEC.EXE (execute remote code) Source: 44
23 Sample False Positive Alert SC.EXE called by SERVICES.EXE running as SYSTEM Investigation Review logs, determine this is a normal occurrence in our environment Remediation Tune SIEM for this tuple 45 Sample True Positive Alert SC.EXE called by CMD.EXE running as standard user Happened during pen test Investigation Review logs, see multiple attempts to run malware Remediation Perform full analysis of computer and traffic to / from computer 46
24 Proactive Forensics Application whitelisting logs provide a record of every application executed. Client firewall logs show every network connection including the application that generated the connection. Prudent collection of system event logs can provide other data to complete the picture. By storing this in the SIEM we can now do forensics without relying on disk artifacts. 47 Conclusion Defenders need to focus more on configurations that will increase costs for attackers. Adding additional layers of blacklists will not solve the problem. Whitelisting is the most cost effective way to accomplish this. Whitelisting enables you to focus on detecting truly advanced threats. 48
25 Follow Us Follow us Materials available on: ShmooCon 2014: _Your_Attackers_Instead_of_Your_CFO 49
New Zealand National Cyber Security Centre
Unclassified New Zealand National Cyber Security Centre Application Whitelisting With Microsoft Applocker June 2012 V1.0.5 Application Whitelisting with Microsoft Applocker Cyber Security Plan As outlined
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Software that provides secure access to technology, everywhere.
Software that provides secure access to technology, everywhere. Joseph Patrick Schorr @JoeSchorr October, 2015 2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Agenda What are we dealing with? How
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
Security Analytics The Beginning of the End(Point)
Security Analytics The Beginning of the End(Point) Arie Joosse [email protected] It s 10am, what do you know about your endpoints? What applications are running? New ones that you didn t deploy
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions 1 Agenda What is Application Whitelisting (AWL) Protection provided by Application
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats
Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats Jody C. Patilla The Johns Hopkins University Session ID: TECH-107 Session Classification: Intermediate Objectives Get more out
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS
THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS BeyondTrust Solution Overview October 2014 Table of Contents Introduction... 3 BeyondTrust Solutions... 6 The BeyondInsight
Endpoint Security: Moving Beyond AV
Endpoint Security: Moving Beyond AV An Ogren Group Special Report July 2009 Introduction Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability,
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
WINDOWS SPLUNK LOGGING CHEAT SHEET - Win 7 - Win2012
This Windows Splunk Logging Cheat Sheet is intended to help you get started setting up Splunk reports and alerts for the most critical Windows security related events. By no means is this list extensive;
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
A Roadmap for Securing IIS 5.0
This document was grafted together from various Web and other sources by Thomas Jerry Scott for use in his Web and other Security courses. Jerry hopes you find this information helpful in your quest to
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store Mike Middleton Justin Prosco Mandiant, A FireEye Company Mike Middleton Principal Consultant Joined
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts.
Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
Windows Server 2003 End of Support. What does it mean? What are my options?
Windows Server 2003 End of Support What does it mean? What are my options? Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock) is looming No more patches from
RSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
How ByStorm Software enables NERC-CIP Compliance
How ByStorm Software enables NERC-CIP Compliance The North American Electric Reliability Corporation (NERC) has defined reliability standards to help maintain and improve the reliability of North America
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
October 2014. Application Control: The PowerBroker for Windows Difference
Application Control: The PowerBroker for Windows Difference October 2014 1 Table of Contents Introduction... 4 The Default-Deny Approach to Application Control... 4 Application Control s Dependence on
Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006
Reverse Shells Enable Attackers To Operate From Your Network Richard Hammer August 2006 Reverse Shells? Why should you care about reverse shells? How do reverse shells work? How do reverse shells get installed
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Xerox Next Generation Security: Partnering with McAfee White Paper
Xerox Next Generation Security: Partnering with McAfee White Paper 1 Background Today s MFPs are complex embedded systems. They contain, among other things, full scale operating systems, embedded web servers,
NetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
National Security Agency
National Security Agency Information Assurance Directorate Vulnerability Analysis and Operations Systems and Network Analysis Center Application Whitelisting using Software Restriction Policies Version
ILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate
GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS Joe Goldberg Splunk Session ID: SPO-W09 Session Classification: Intermediate About Me Joe Goldberg Current: Splunk - Security Evangelist
Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes!
We protect your most sensitive information from insider threats. Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes! VARONIS SYSTEMS About Me Dietrich
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
Securing SharePoint 101. Rob Rachwald Imperva
Securing SharePoint 101 Rob Rachwald Imperva Major SharePoint Deployment Types Internal Portal Uses include SharePoint as a file repository Only accessible by internal users Company Intranet External Portal
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
Industrial Security Solutions
Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
SANS Institute First Five Quick Wins
#1 QUICK WIN- APPLICATION WHITELISTING SANS Critical Controls: #2: Inventory of Authorized and Unauthorized Software 1) Deploy application whitelisting technology that allows systems to run software only
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off
Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off Times have Changed & A/V Executives Agree An A/V product as your sole endpoint protection solution isn t enough.
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES
NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES Introduction Les Chafin; Infrastructure Engineering Manager» HPES NASA ACES Responsible for:»
Securing OS Legacy Systems Alexander Rau
Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Web Security School Entrance Exam
Web Security School Entrance Exam By Michael Cobb 1) What is SSL used for? a. Encrypt data as it travels over a network b. Encrypt files located on a Web server c. Encrypt passwords for storage in a database
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
Targeted attacks: Tools and techniques
Targeted attacks: Tools and techniques Performing «red-team» penetration tests Lessons learned Presented on 17/03/2014 For JSSI OSSIR 2014 By Renaud Feil Agenda Objective: Present tools techniques that
EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE
EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE A reliable, high-performance network is critical to your IT infrastructure and organization. Equally important to network performance
Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.
Running head: UNIT 3 RESEARCH PROJECT 1 Unit 3 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/07/2014 UNIT 3 RESEARCH PROJECT 2
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper
ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks
WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
AdwareMedic. About AdwareMedic... 2. How to use AdwareMedic... 3. Frequently Asked Questions... 7. Version History... 9 License Agreement...
AdwareMedic http://www.adwaremedic.com [email protected] About AdwareMedic... 2 System Requirements... 2 Limitations... 2 How to use AdwareMedic... 3 Scan for Adware... 4 Optional items... 5 Firefox
Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support [email protected]
Microsoft Software Update Services and Managed Symantec Anti-virus Michael Satut TSS/Crown IT Support [email protected] Introduction The recent increase in virus and worm activity has created the
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
Symantec Endpoint Protection Analyzer Report
Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
