Top Banner
Beyond the Fortress Network David C. Broussard Principal Consultant @dbroussa Blogs.catapultsystems.com/dbroussard
22

Beyond the Fortress Network

Jan 29, 2018

Download

Technology

David Broussard
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Beyond the Fortress Network

Beyond the Fortress Network David C. Broussard

Principal Consultant

@dbroussa

Blogs.catapultsystems.com/dbroussard

Page 2: Beyond the Fortress Network

Who am I?

Page 3: Beyond the Fortress Network

The Fortress Network

Page 4: Beyond the Fortress Network

Security in the old mindset

Page 5: Beyond the Fortress Network

What are we concerned about again?

Page 6: Beyond the Fortress Network
Page 7: Beyond the Fortress Network

Did it work?

Page 8: Beyond the Fortress Network

Bad EXTERNAL actor

Page 9: Beyond the Fortress Network

Story Time

Page 10: Beyond the Fortress Network

Story Time 2

Page 11: Beyond the Fortress Network

Malicious INTERNAL Actor

Page 12: Beyond the Fortress Network

Story Time 3

Page 13: Beyond the Fortress Network

Story Time 4

Page 14: Beyond the Fortress Network

Core questions about security

Page 15: Beyond the Fortress Network
Page 16: Beyond the Fortress Network

DELIVERY

Employee A opens infected

email on workstation2

A

Malware

EXPLOITATION

Employee B opens infected

email using mobile device2

BMalware

Infected phone disables

Antivirus; and compromised

credentials used to access

Email service

3Control Evasion

Password/Hash Dumping

3Threat Actor gather

credentials on

compromised machine

COMMAND AND

CONTROL

Credentials harvested after

Employee attempts login

to bogus site2

4Threat Actors move

laterally within network

using compromised

credentials

Compromised Credential

ACTIONS ON

OBJECTIVE

5Threat Actors use compromised

devices/accounts to exfiltrate PII

48 Hours 200+ Days

PII

Leak/Exfiltrate Data

Threat Actor targets employees

via phishing campaign1

Phishing

3Compromised credentials

used to access service

Page 17: Beyond the Fortress Network

Mobile Device Management

Page 18: Beyond the Fortress Network

Risk Based Access

Page 19: Beyond the Fortress Network

Data Loss Prevention and Encryption

Page 20: Beyond the Fortress Network

Threat Detection and Prevention

Page 21: Beyond the Fortress Network

Tools that you didn’t know you had

Page 22: Beyond the Fortress Network

http://get.catapultsystems.com/0365-business-registration

http://get.catapultsystems.com/0365-bootcamp-registration-it-track/

@CloudWhisperers

Learn More