2400 baud of technical excitement
play

2400 Baud of Technical Excitement Pretty Sure this begins to date - PowerPoint PPT Presentation

Security Trends & Tactics AND Strategies of UETN The Quilt Winter Member Meeting 2018 Presented by Troy Jessup, UETN 2400 Baud of Technical Excitement Pretty Sure this begins to date me... DDoS Attacks on the Decline? Mitigation at


  1. Security Trends & Tactics 
 AND Strategies of UETN The Quilt Winter Member Meeting 2018 Presented by Troy Jessup, UETN

  2. 2400 Baud of Technical Excitement Pretty Sure this begins to date me...

  3. DDoS Attacks on the Decline? Mitigation at the ISP level is more effective, Fewer Attacks are occurring. Threat is not entirely gone however. SECURITY TRENDS...

  4. Cyber Liability Extending Responsibility for data and data storage practices becoming more regulated. SECURITY TRENDS...

  5. Internet of Things the brewing crisis. IoT Devices are increasing risk, but much of the risk is not understood. SECURITY TRENDS...

  6. Ransomware is changing. Focus on Cryptocurrency mining is surfacing. SECURITY TRENDS...

  7. Botnets Reign More sophisticated malware is being used to C&C SECURITY TRENDS...

  8. Network Scanning is faster, and more targeted Scanning at the rate of 10,000,000 hosts/sec Its becoming easy and fast to catalog targets for new attacks. SECURITY TRENDS...

  9. Timeframe for Action is quickly Shrinking. Attacks are much more quickly following vulnerability announcements. SECURITY TRENDS...

  10. Companies Compromising Security for Business Models Emerging more and more. The "Not so friendly Device" SECURITY TRENDS...

  11. Cisco Issues 
 "Smart Install" Critical issues for Cisco device networks and services. SECURITY TRENDS...

  12. Spectre / Meltdown 
 The aftermath... Critical Update for Tenant Networks, slightly less critical for public systems. Don't join the Panic! SECURITY TRENDS...

  13. Speculative Evaluation if A = true { } process this data if B = true { } process this data if all = false { END } speculative processed data is managed 
 outside protected memory.

  14. UETN STRATEGIES FOR SECURITY AREAS OF FOCUS

  15. Deeper Monitoring Capabilities and Tools Development Using better tools and monitoring options to catalog threats. UETN STRATEGIES FOR SECURITY

  16. Dr. Ray Timothy 
 Gary Herbert 
 Executive Director of UETN Governor of the State of Utah

  17. UETN OPERATIONS CENTER

  18. Penetration Testing Services for Connected Tenants In-Depth Testing to Identify threats, and establish baseline effectiveness of security controls. UETN STRATEGIES FOR SECURITY

  19. Supporting strategies for independent security personnel Working with tenants to build better security support in connected networks. UETN STRATEGIES FOR SECURITY

  20. 
 Security Focused Organization UtahSAINT Organization 
 SAINTCON Conference UETN STRATEGIES FOR SECURITY

  21. Security Briefings and Education Security Briefing Calls 
 Every 2 Weeks Includes Quilt Members UETN STRATEGIES FOR SECURITY

  22. Mentoring / Intern 
 Programs Providing assistance to connected organizations to send IT/Security Professionals to UETN for internships. UETN STRATEGIES FOR SECURITY

  23. UETN CHALLENGES FOR SECURITY AREAS OF FOCUS

  24. Monitoring Security on Large Pipes... 100Gbps Pipes 
 100+ Gbps make Monitoring Difficult. 3rd Party Tools are not 
 in the 100GB space yet. CHALLENGES IN SECURITY

  25. Referenced Slides https://tinyurl.com/QuiltSecurity

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend