Upgrade to Pro — share decks privately, control downloads, hide ads and more …

CircleCityCon 2017 - Security Training: Making your weakest link the strongest

CircleCityCon 2017 - Security Training: Making your weakest link the strongest

It is well known among security professionals that the weakest link in any organization's security is the employee- the so-called "human element". While endpoint security controls may mitigate this risk, they are nowhere close to removing it completely. This is where security training becomes essential. This talk will cover how to introduce and improve security training in any organization, along with industry best practices, and methods to keep knowledge retention high. The speaker will provide specific examples from his own experience of cases where a properly trained employee could have easily thwarted a devastating attack immediately. Will your employees be your weakest link, or your strongest asset?

Aaron Hnatiw

June 10, 2017
Tweet

More Decks by Aaron Hnatiw

Other Decks in Technology

Transcript

  1. Senior security researcher, Security Compass Aaron Hnatiw Twitter: @insp3ctre •

    Software developer • College professor • Security consultant • System administrator • Web developer
  2. Vulnerable to... •Phishing •Social engineering •Clicking any links on the

    internet •Sharing trade secrets •Insider threats
  3. Client-side security controls •Antivirus •Imaging software •DLP (data loss prevention)

    •Host-based IPS (intrusion prevention systems) •Host-based firewalls
  4. 1. Not at all •Formal training often ends after the

    first week •Security is not a component of the training •Security is not present anywhere in the employee handbook
  5. 2. Computer-based Advantages: •Self-paced •Less expensive •Easy metrics •Easy distribution

    across large organizations Disadvantages: •Poor retention* •Often no support without extra costs •Usually not tied back to relevant projects
  6. 3. Instructor-led Advantages: •Interactive environment •Better retention •More customized •Can

    be more fun Disadvantages: •More expensive •Easy to do poorly
  7. General staff •Security Basics •Forward suspicious emails to IT •Don’t

    enable Office macros •You should never be solicited for your password •When in doubt, report to IT •Lock your computer (pro tip: WIN + L) •Password management •Security policies & culture (e.g. if person does not have a badge out, request to see it)
  8. Management •Security Basics •Phishing & spear phishing awareness •Beware of

    attachments •You will never be solicited for your password •Policies around financial transfer sign-off & processes •Again- when in doubt, report to IT/Security
  9. Technical Operations •Security Basics •Platform-specific vulnerabilities •OWASP Top 10 •Secrets

    management (locally and in code) •Encryption & hashing •When to use one over the other •Don't roll your own •Salting •Trust, but validate •Recommended algorithms (referencing an organizational standard/policy) •Input validation •Output encoding •Where to learn more
  10. Hands-on hacking demos and labs •WebGoat •Metasploitable •Mutillidae •Old, unpatched

    operating systems (a use for XP!) •Hack This Site •RaceTheWeb.io •CTF events •https://ctftime.org/event/list/upcoming
  11. Theoretical scenarios •Tabletop scenarios •Provide minimal detail, force audience to

    ask clarifying & probing questions •Phishing email vs. real email •Developers: what happens when x happens in y application? •Reference real situations, where possible •Not full threat modelling. Goal is to get employees thinking about security.
  12. Testing retention •Test understanding throughout •Situation-based scenarios •Written tests (more

    quantifiable) •Exam at the end of the course •BONUS if there is a certification •Regular security audits of employees •Phishing & social engineering •Red team exercises •Questionnaires in performance reviews