♫musicjinni

AtlSecCon 2019 Day 01 - Eric Conrad - Build it Once, Build it Right: Architecting for Detection

video thumbnail
Atlantic Security Conference (AtlSecCon) 2019

Eric Conrad
SANS Faculty Fellow Eric Conrad is the lead author of SANS MGT414: SANS Training Program for CISSP® Certification, and coauthor of both SANS SEC511: Continuous Monitoring and Security Operations and SANS SEC542: Web App Penetration Testing and Ethical Hacking. He is also the lead author of the books the CISSP Study Guide, and the Eleventh Hour CISSP: Study Guide. Eric's career began in 1991 as a UNIX systems administrator for a small oceanographic communications company. He gained information security experience in a variety of industries, including research, education, power, Internet, and health care. He is now CTO of Backshore Communications, a company focusing on hunt teaming, intrusion detection, incident handling, and penetration testing. He is a graduate of the SANS Technology Institute with a master of science degree in information security engineering. In addition to the CISSP, he holds the prestigious GIAC Security Expert (GSE) certification as well as the GIAC GPEN, GCIH, GCIA, GCFA, GAWN, and GSEC certifications. Eric also blogs about information security at www.ericconrad.com.

Build it Once, Build it Right: Architecting for Detection
Defensible networks are designed to prevent and detect computer attacks, and are hardened at every layer. Per Richard Bejtlich, defensible networks "can be watched" and "limit an intruder’s freedom to maneuver." For example: modern malware often attempts to steal credentials and move laterally via tools such as WMIC, PSExec, and PowerShell. Most host-based firewalls can block (and log) based on applications such as PSExec. Prudent organizations use host-based firewalls to block and log network connections initiated by these tools from "regular" user desktops, and only allow authorized use from system administration drop boxes.

This talk focuses on designing a defensible security architecture that limits an intruder's ability to maneuver, and creates logs when it is successful in doing so. Specific examples will be provided that prevent recent malware such as Petya, NotPetya, SamSam, and others. We will provide an actionable list of techniques that prevent and detect the deadliest events that occur during virtually every successful breach.

Website:
https://atlseccon.com

Social Media:
https://twitter.com/AtlSecCon
https://www.linkedin.com/company/atlseccon
https://facebook.com/atlseccon
https://www.youtube.com/atlseccon

AtlSecCon 2019 Day 01 - Eric Conrad - Build it Once, Build it Right: Architecting for Detection

AtlSecCon 2018 - Dave Lewis - Data Breaches: Barbarians in the Throne Room

AtlSecCon 2018 - Opening Remarks & Keynote - Ted Demopoulos

Disclaimer DMCA