Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Securing your company's networks

Securing your company's networks

I walk through the basics of protecting a large organization from today's threats.

NOTE: This deck has most of its content in the speaker notes.

Avatar for Benjamin Scott

Benjamin Scott

December 25, 2013
Tweet

More Decks by Benjamin Scott

Other Decks in Technology

Transcript

  1. github.com/bschmoker The Risk to Gov’t Strategic Intrusions • military advantage

    • diplomatic maneuvering Blunting economic edge • wide-scale industrial espionage • research and engineering copying
  2. github.com/bschmoker Losing economic value • vulnerable clients / social networks

    Theft and abuse of Assets • certificates / hosting / user accounts The Risk to Companies
  3. github.com/bschmoker The Threat Major Players: - Intelligence agencies - Mercenaries

    - Sympathizers Differences: - intent / goals - budget / workforce - stealthiness
  4. github.com/bschmoker For Instance APT28 - Uses Sofacy and Chopstick to

    spy on NATO targets APT29 - Uses Cozicar to spy on US targets Mercenaries - Uses Potao / BlackEnergy / UltraVNC on targets aligned with Russian conflicts