new york metro joint computer security conference
play

New York Metro Joint Computer Security Conference William Hugh - PowerPoint PPT Presentation

New York Metro Joint Computer Security Conference William Hugh Murray whmurray@sprynet.com 705 Weed StreetNew Canaan, CT 06840 1-203-966-4769 1-203-326-1266 Mobile/SMS http://whmurray.blogspot.com/ CVEs Breaches IOCs


  1. New York Metro Joint Computer Security Conference William Hugh Murray whmurray@sprynet.com 705 Weed StreetNew Canaan, CT 06840 1-203-966-4769 1-203-326-1266 Mobile/SMS http://whmurray.blogspot.com/

  2. • CVEs • Breaches • IOCs • Extortion payments • Bait e-mail messages • Hostile or corrupt URLs • Espionage (leakage of intellectual property) • Point of Sale compromises • Wholesale and retail fraud • Patches • et cetera, et alter

  3. Attack Surface • Devices (desktops, servers, mobiles) • Appliances ("things") • VPN services, Remote Desktops • USB ports • Users • Privileged users • Credentials • Operating Systems • Gratuitous code • Content Managers (e.g., WordPress, plug-ins • Database Managers • Other services • Common Applications (word processors, spread sheets, browsers, browser extensions e-mail clients) • Et cetera, et alter

  4. Minimize the Attack Surface • Install only what you really need • Remove Unused or rarely used applications or services • Prefer purpose-built apps to general and flexible facilities (e.g., browsers, spread-sheets, word processors, content managers, operating systems) • Hide applications, systems, and services behind firewalls and end-to- end application layer encryption • Isolate e-mail and browsing

  5. Minimize the Attack Surface • Employee restrictive access control (i.e., least privilege, "white-list") at all layers • Consider Applications as a Service (e.g. Office 365) • Scan and patch only what is left (i.e., that which can be seen by potentially hostile processes) • Other (e.g., Mobile-based Strong Authentication, Privileged Access Management (PAM),Secure Configuration Management (SCM), Multi-party Controls, Document Management Systems, Replace passwords with asymmetric key cryptography based challenge response )

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend