Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Securing your company's networks

Securing your company's networks

I walk through the basics of protecting a large organization from today's threats.

NOTE: This deck has most of its content in the speaker notes.

Benjamin Scott

December 25, 2013
Tweet

More Decks by Benjamin Scott

Other Decks in Technology

Transcript

  1. github.com/bschmoker The Risk to Gov’t Strategic Intrusions • military advantage

    • diplomatic maneuvering Blunting economic edge • wide-scale industrial espionage • research and engineering copying
  2. github.com/bschmoker Losing economic value • vulnerable clients / social networks

    Theft and abuse of Assets • certificates / hosting / user accounts The Risk to Companies
  3. github.com/bschmoker The Threat Major Players: - Intelligence agencies - Mercenaries

    - Sympathizers Differences: - intent / goals - budget / workforce - stealthiness
  4. github.com/bschmoker For Instance APT28 - Uses Sofacy and Chopstick to

    spy on NATO targets APT29 - Uses Cozicar to spy on US targets Mercenaries - Uses Potao / BlackEnergy / UltraVNC on targets aligned with Russian conflicts