SlideShare a Scribd company logo
1 of 35
Security
CompensationHOW TO INVEST IN STARTUP SECURITY
April 8, 2015
INTRODUCTION
WHO ARE THOSE PEEPS UP IN FRONT?
33
Chris Grayson
• Security Associate
Austin Whipple
• Senior Security Analyst
RELEVANT BECAUSE EASTER
Some Cool Peeps
3
ChrisAustin
44
• Offloading Security Risk
• Security Best Practices for Start-ups
• Conclusion
WHATCHU TALKIN’ ‘BOUT HOLMES?
Agenda
OFFLOADING
ONLY MARGINALLY DIFFERENT FROM FREELOADING
66
• Risk = (Probability of a
threat occurring against
an asset) x (Value of
asset)
• Reducing risk can be
done by reducing the
probability of the threat
or reducing the value of
the asset.
• What is offloading risk?
THE GAME OF GLOBAL DOMINATION
Offloading Risk
77
• Email has lots of hidden
“gotchas:” spoofing,
forwarding, encryption,
backups, etc.
• These are incredibly
easy to overlook and
misconfigure.
Don’t do it yourself!
EVERY WEEK I CHECK THE EMAIL
Offloading Email
88
• Similar to email, there are
lots of “gotchas” that can
lead to exploitation
(Heartbleed).
• Platforms like Cloudflare
get early warning/access to
exploits to fix them before
the security advisory goes
public.
ENCRYPT ALL THE THINGS
Offloading SSL
99
• “Cloud” is not the be-all
and end-all of technology
solutions, but it does have
its place.
• Amazon suite, for example,
makes it easier to have
security by default.
EVERYTHING IS SECURE IN “THE CLOUD”
Offloading Hosting
1010
• In 2015, there aren’t very
many good reasons to be
doing your own payroll.
• If you aren’t
storing/handling/
processing those details, we
can’t steal them from you.
YOU CAN’T STEAL WHAT THEY DON’T HAVE
Offloading Payroll
1111
• For tech companies with a
product or a web presence,
research shows that having
a bug bounty is a good
idea.
• Bugcrowd: 193 – average
number of valid
submissions per bug
bounty run
YOU DEAL WITH MY PROBLEMS
Offloading Bug Bounties
SECURITY BEST
PRACTICES
START NOW OR FOREVER HOLD YOUR PEACE
1313
• As per Wikipedia, “every
module must be able to
access only the information
and resources that are
necessary for its legitimate
purpose.”
• Local admin rights, access to
file shares, other sensitive
information
• Not about trust – about
minimizing exposure
NO, THEY DON’T NEED AN ADMIN ACCOUNT
Principle of Least Privilege
1414
• Browsers are popular
targets.
• Script blocking
• ScriptSafe, ScriptBlock,
NoScript
• Ad blocking
• Adblock
• Tracker blocking
• Ghostery, Disconnect
THIS MIGHT HURT A LITTLE
Hardening Your Browser
1515
How a digital system
identifies a user.
• Authenticate with
Facebook, Google
• Private keys
• Two-factor authentication
on highly-sensitive
endpoints (email, VPN)
• Duo Security
WHO ARE YOU AND WHAT ARE YOU DOING ON MY SERVER?!
Authentication
1616
• Wikipedia defines
sandboxing as, “a security
mechanism for separating
running programs. It is
often used to execute
untested code.”
• Virtual machines!
• VMWare, VirtualBox
DOMO ARIGATO MR. ROBOTO
Virtualization
1717
Passwords are the most
ubiquitous form of authentication
• One of the most valuable
targets for an attacker.
• Don’t re-use them!
• Don’t share them!
• Don’t write them down!
• Use password vaults where
possible.
• KeePass, LastPass
YOU CAN’T LIVE WITH ‘EM, YOU CAN’T LIVE WITHOUT ‘EM
Password Management
1818
• Vulnerable services and
applications lead to
compromised businesses.
• Internal applications
shouldn’t be on the open
Internet.
• Have a network? VPN +
2FA
• No network? SSH +
private key + port
forwarding
YOU’VE GOT WHAT ON YOUR EXTERNAL NETWORK?!
Applications and Services
1919
Only if you insist…
• Not using publicly-vulnerable
software
• All sensitive information is
encrypted when transmitted
across the network
• If passwords are used, the
passwords are strong
• Web application? Pay
attention to the OWASP top
10
UGH FINE – WELL IF IT HAS TO BE ON THE INTERNET
Applications and Services
2020
Majority of sensitive
communication occurs
via email.
• Encrypt your emails
• Protect your domain
from spoofed emails
AN AGE OLD PROTOCOL WITH SERIOUS SECURITY IMPLICATIONS
Email
2121
• Don’t leave sensitive files
sitting around
• USB drives, FTP servers,
anonymously-accessible
file shares
• Encryption
• ZIP files, Truecrypt
volumes
• Don’t email files!
• Syncing files
• GIT, SVN, Box.com,
Dropbox.com, Seafile
EVERYBODY DOES IT
File Sharing
2222
Employees will come
and go.
• Establish a process
for provisioning and
revocation
• May not seem
necessary…
• But by the time it is, it’s
too late.
PAY A LITTLE NOW OR A LOT LATER
Account Provisioning and Revocation
2323
• Security controls only
count when they’re used.
• Uniform practices
• Repeatable,
• Thought out
• Documented
• Verbalized.
• Don’t over-engineer!
BUT I THOUGHT WE WERE TALKING ABOUT SECURITY…
Process Management
2424
• Don’t do it
• Seriously – don’t do it
• Wireless networks pose
significant risk
• Open wireless network for
guests
• WPA2-PSK for employee
Internet access
CUT ALL THE CLUTTER
Wireless Networks
CONCLUSION
BRINGING IT ALL FULL-CIRCLE
2626
Now that we’ve blown your mind…
2727
If you can offload to a secure service, do it!
Start security ASAP - you’ll be glad you did later.
IF YOU DON’T REMEMBER ANYTHING ELSE…
Key Takeaways
PARTING WORDS
ALWAYS THE HARDEST PART… :’(
QUESTIONS
AND MAYBE ANSWERS
3030
• @BishopFox
• Facebook.com/BishopFoxConsulting
• LinkedIn.com/Company/Bishop-Fox
• Google.com/+BishopFox
WE’RE A CHATTY BUNCH
Contact Us
Thank You
3232
Wikipedia – Principle of Least Privilege
http://en.wikipedia.org/wiki/Principle_of_least_privilege
ScriptSafe Chrome Plugin
https://chrome.google.com/webstore/detail/scriptsafe/oiigbmnaadbkfbmpbfijlflahbdbdgdf?hl=en
NoScript Firefox Plugin
https://addons.mozilla.org/en-us/firefox/addon/noscript/
AdBlock
https://adblockplus.org/
Ghostery
https://www.ghostery.com/en/
Disconnect
https://disconnect.me/
Authenticate with Google
https://developers.google.com/identity/
SLIDE 1 OF 4
Additional Resources
3333
Authenticate with Facebook
https://developers.facebook.com/docs/facebook-login/v2.3
Wikipedia – Key Authentication
http://en.wikipedia.org/wiki/Key_authentication
Wikipedia – Two-Factor Authentication
http://en.wikipedia.org/wiki/Two_factor_authentication
Duo Two-Factor Authentication
https://www.duosecurity.com/
Better Security Through Sandboxing
http://www.windowsecurity.com/articles-tutorials/windows_os_security/Better-Security-through-Sandboxing.html
KeePass Password Safe
http://keepass.info/
LastPass
https://lastpass.com/
SLIDE 2 OF 4
Additional Resources
3434
OpenVPN How-To
https://openvpn.net/index.php/open-source/documentation/howto.html
SSH Port Forwarding
https://help.ubuntu.com/community/SSH/OpenSSH/PortForwarding
OWASP Top 10
https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
Microsoft – Building a Strong Password Policy
https://technet.microsoft.com/en-us/library/cc736605%28v=ws.10%29.aspx
Getting Started with S/MIME
http://www.office.mvps.org/smime/
DKIM Explained
http://www.gettingemaildelivered.com/dkim-explained-how-to-set-up-and-use-domainkeys-identified-mail-effectively
Setting up SPF Records
http://www.rackspace.com/apps/support/portal/1212
SLIDE 3 OF 4
Additional Resources
3535
How to Set Up DMARC Email Authentication
http://www.gettingemaildelivered.com/how-to-set-up-dmarc-email-authentication
Encrypting ZIP Files with 7-Zip
http://www.northeastern.edu/securenu/?page_id=2573
TrueCrypt
http://truecrypt.sourceforge.net/
Bug Bounties Helpful
https://www.eecs.berkeley.edu/~daw/papers/vrp-use13.pdf
Bug Bounties Helpful, pt. 2
http://www.cmswire.com/cms/information-management/bug-bounty-programs-help-companies-track-vulnerabilities-
027932.php
Bugcrowd
https://bugcrowd.com/products/bounty
SLIDE 4 OF 4
Additional Resources

More Related Content

What's hot

Weaponizing Corporate Intel: This Time, It's Personal!
Weaponizing Corporate Intel: This Time, It's Personal!Weaponizing Corporate Intel: This Time, It's Personal!
Weaponizing Corporate Intel: This Time, It's Personal!Beau Bullock
 
Big data in the cloud - Shekhar Vemuri
Big data in the cloud - Shekhar VemuriBig data in the cloud - Shekhar Vemuri
Big data in the cloud - Shekhar Vemuriclairvoyantllc
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Luis Grangeia
 
Online passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOnline passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOVHcloud
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleGuardicore
 
Lets talk about bug hunting
Lets talk about bug huntingLets talk about bug hunting
Lets talk about bug huntingKirill Ermakov
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed OverviewSensePost
 
Sullivan red october-oscon-2014
Sullivan red october-oscon-2014Sullivan red october-oscon-2014
Sullivan red october-oscon-2014Cloudflare
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented DefenceSensePost
 
Optimizing ModSecurity on NGINX and NGINX Plus
Optimizing ModSecurity on NGINX and NGINX PlusOptimizing ModSecurity on NGINX and NGINX Plus
Optimizing ModSecurity on NGINX and NGINX PlusChristian Folini
 
MRA AMA Part 7: The Circuit Breaker Pattern
MRA AMA Part 7: The Circuit Breaker PatternMRA AMA Part 7: The Circuit Breaker Pattern
MRA AMA Part 7: The Circuit Breaker PatternNGINX, Inc.
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsSecurity Innovation
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tatSensePost
 

What's hot (20)

Weaponizing Corporate Intel: This Time, It's Personal!
Weaponizing Corporate Intel: This Time, It's Personal!Weaponizing Corporate Intel: This Time, It's Personal!
Weaponizing Corporate Intel: This Time, It's Personal!
 
Big data in the cloud - Shekhar Vemuri
Big data in the cloud - Shekhar VemuriBig data in the cloud - Shekhar Vemuri
Big data in the cloud - Shekhar Vemuri
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 
presentation
presentationpresentation
presentation
 
Online passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOnline passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattack
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
 
Lets talk about bug hunting
Lets talk about bug huntingLets talk about bug hunting
Lets talk about bug hunting
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed Overview
 
DAVIX - VizSec 2008
DAVIX - VizSec 2008DAVIX - VizSec 2008
DAVIX - VizSec 2008
 
Sullivan red october-oscon-2014
Sullivan red october-oscon-2014Sullivan red october-oscon-2014
Sullivan red october-oscon-2014
 
So You Want to be a Hacker?
So You Want to be a Hacker?So You Want to be a Hacker?
So You Want to be a Hacker?
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented Defence
 
Csp and http headers
Csp and http headersCsp and http headers
Csp and http headers
 
Secure Web Coding
Secure Web CodingSecure Web Coding
Secure Web Coding
 
Botconf ppt
Botconf   pptBotconf   ppt
Botconf ppt
 
Optimizing ModSecurity on NGINX and NGINX Plus
Optimizing ModSecurity on NGINX and NGINX PlusOptimizing ModSecurity on NGINX and NGINX Plus
Optimizing ModSecurity on NGINX and NGINX Plus
 
MRA AMA Part 7: The Circuit Breaker Pattern
MRA AMA Part 7: The Circuit Breaker PatternMRA AMA Part 7: The Circuit Breaker Pattern
MRA AMA Part 7: The Circuit Breaker Pattern
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software Systems
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tat
 

Viewers also liked

Data structure and algorithm
Data structure and algorithmData structure and algorithm
Data structure and algorithmTrupti Agrawal
 
AP Computer Science Test Prep - Part 3 - Data Structure & Algorithm
AP Computer Science Test Prep - Part 3 - Data Structure & AlgorithmAP Computer Science Test Prep - Part 3 - Data Structure & Algorithm
AP Computer Science Test Prep - Part 3 - Data Structure & AlgorithmNR Computer Learning Center
 
Meaningful Elearning with Digital Badges & Missions
Meaningful Elearning with Digital Badges & MissionsMeaningful Elearning with Digital Badges & Missions
Meaningful Elearning with Digital Badges & MissionsShelly Sanchez Terrell
 
Introduction to datastructure and algorithm
Introduction to datastructure and algorithmIntroduction to datastructure and algorithm
Introduction to datastructure and algorithmPratik Mota
 
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMY
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMYComputer Science Engineering : Data structure & algorithm, THE GATE ACADEMY
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMYklirantga
 
Data structure and algorithm.(dsa)
Data structure and algorithm.(dsa)Data structure and algorithm.(dsa)
Data structure and algorithm.(dsa)mailmerk
 
17 online learning resources and websites you should check out
17 online learning resources and websites you should check out17 online learning resources and websites you should check out
17 online learning resources and websites you should check outTiffany St James
 
10 Principles of English Teaching (SLA Research)
10 Principles of English Teaching (SLA Research)10 Principles of English Teaching (SLA Research)
10 Principles of English Teaching (SLA Research)Phung Huy
 
12 Hacks That Will Improve Your Studying
 12 Hacks That Will Improve Your Studying 12 Hacks That Will Improve Your Studying
12 Hacks That Will Improve Your StudyingKaplan
 
The 8 C's of Learning Starting with Citizenship
The 8 C's of Learning Starting with Citizenship The 8 C's of Learning Starting with Citizenship
The 8 C's of Learning Starting with Citizenship Shelly Sanchez Terrell
 
16 Maxims of Skillful Teaching
16 Maxims of Skillful Teaching16 Maxims of Skillful Teaching
16 Maxims of Skillful TeachingWiley
 
មេរៀនៈ Data Structure and Algorithm in C/C++
មេរៀនៈ Data Structure and Algorithm in C/C++មេរៀនៈ Data Structure and Algorithm in C/C++
មេរៀនៈ Data Structure and Algorithm in C/C++Ngeam Soly
 
How to Pack a Punch With Social Media
How to Pack a Punch With Social MediaHow to Pack a Punch With Social Media
How to Pack a Punch With Social MediaGuy Kawasaki
 
Data structure and algorithm All in One
Data structure and algorithm All in OneData structure and algorithm All in One
Data structure and algorithm All in Onejehan1987
 
If I Knew Then What I Know Now/Skills That I Think Students Should Have/What ...
If I Knew Then What I Know Now/Skills That I Think Students Should Have/What ...If I Knew Then What I Know Now/Skills That I Think Students Should Have/What ...
If I Knew Then What I Know Now/Skills That I Think Students Should Have/What ...Guy Kawasaki
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital AgeAngela Maiers
 
What I learned teaching programming to 150 beginners
What I learned teaching programming to 150 beginnersWhat I learned teaching programming to 150 beginners
What I learned teaching programming to 150 beginnersEtiene Dalcol
 

Viewers also liked (17)

Data structure and algorithm
Data structure and algorithmData structure and algorithm
Data structure and algorithm
 
AP Computer Science Test Prep - Part 3 - Data Structure & Algorithm
AP Computer Science Test Prep - Part 3 - Data Structure & AlgorithmAP Computer Science Test Prep - Part 3 - Data Structure & Algorithm
AP Computer Science Test Prep - Part 3 - Data Structure & Algorithm
 
Meaningful Elearning with Digital Badges & Missions
Meaningful Elearning with Digital Badges & MissionsMeaningful Elearning with Digital Badges & Missions
Meaningful Elearning with Digital Badges & Missions
 
Introduction to datastructure and algorithm
Introduction to datastructure and algorithmIntroduction to datastructure and algorithm
Introduction to datastructure and algorithm
 
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMY
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMYComputer Science Engineering : Data structure & algorithm, THE GATE ACADEMY
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMY
 
Data structure and algorithm.(dsa)
Data structure and algorithm.(dsa)Data structure and algorithm.(dsa)
Data structure and algorithm.(dsa)
 
17 online learning resources and websites you should check out
17 online learning resources and websites you should check out17 online learning resources and websites you should check out
17 online learning resources and websites you should check out
 
10 Principles of English Teaching (SLA Research)
10 Principles of English Teaching (SLA Research)10 Principles of English Teaching (SLA Research)
10 Principles of English Teaching (SLA Research)
 
12 Hacks That Will Improve Your Studying
 12 Hacks That Will Improve Your Studying 12 Hacks That Will Improve Your Studying
12 Hacks That Will Improve Your Studying
 
The 8 C's of Learning Starting with Citizenship
The 8 C's of Learning Starting with Citizenship The 8 C's of Learning Starting with Citizenship
The 8 C's of Learning Starting with Citizenship
 
16 Maxims of Skillful Teaching
16 Maxims of Skillful Teaching16 Maxims of Skillful Teaching
16 Maxims of Skillful Teaching
 
មេរៀនៈ Data Structure and Algorithm in C/C++
មេរៀនៈ Data Structure and Algorithm in C/C++មេរៀនៈ Data Structure and Algorithm in C/C++
មេរៀនៈ Data Structure and Algorithm in C/C++
 
How to Pack a Punch With Social Media
How to Pack a Punch With Social MediaHow to Pack a Punch With Social Media
How to Pack a Punch With Social Media
 
Data structure and algorithm All in One
Data structure and algorithm All in OneData structure and algorithm All in One
Data structure and algorithm All in One
 
If I Knew Then What I Know Now/Skills That I Think Students Should Have/What ...
If I Knew Then What I Know Now/Skills That I Think Students Should Have/What ...If I Knew Then What I Know Now/Skills That I Think Students Should Have/What ...
If I Knew Then What I Know Now/Skills That I Think Students Should Have/What ...
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
 
What I learned teaching programming to 150 beginners
What I learned teaching programming to 150 beginnersWhat I learned teaching programming to 150 beginners
What I learned teaching programming to 150 beginners
 

Similar to Security Compensation - How to Invest in Start-Up Security

Security is not a feature
Security is not a featureSecurity is not a feature
Security is not a featureElizabeth Smith
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB DeploymentMongoDB
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secureLYRASIS
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Michael Gough
 
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINEPENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINEChris Gates
 
Protecting Your Data with Encryption
Protecting Your Data with EncryptionProtecting Your Data with Encryption
Protecting Your Data with EncryptionEd Leighton-Dick
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Deepak Khari
 
Blog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being HackedBlog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being HackedBrian Layman
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication TechnologiesNicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologiesNicholas Davis
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Digital Bond
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Homezaimorkai
 
Summers@Mizzou 2017 Hacker Tracker Talk
Summers@Mizzou 2017 Hacker Tracker TalkSummers@Mizzou 2017 Hacker Tracker Talk
Summers@Mizzou 2017 Hacker Tracker TalkPrasad Calyam
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)Sam Bowne
 
WordPress Security Basics
WordPress Security BasicsWordPress Security Basics
WordPress Security BasicsRyan Plas
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins
 

Similar to Security Compensation - How to Invest in Start-Up Security (20)

Security is not a feature
Security is not a featureSecurity is not a feature
Security is not a feature
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB Deployment
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
 
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINEPENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
 
Protecting Your Data with Encryption
Protecting Your Data with EncryptionProtecting Your Data with Encryption
Protecting Your Data with Encryption
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Blog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being HackedBlog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being Hacked
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Cyber Safety 101
Cyber Safety 101Cyber Safety 101
Cyber Safety 101
 
CloudStack Secured
CloudStack SecuredCloudStack Secured
CloudStack Secured
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
 
Summers@Mizzou 2017 Hacker Tracker Talk
Summers@Mizzou 2017 Hacker Tracker TalkSummers@Mizzou 2017 Hacker Tracker Talk
Summers@Mizzou 2017 Hacker Tracker Talk
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
WordPress Security Basics
WordPress Security BasicsWordPress Security Basics
WordPress Security Basics
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
 

More from Christopher Grayson

CableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkCableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkChristopher Grayson
 
You, and Me, and Docker Makes Three
You, and Me, and Docker Makes ThreeYou, and Me, and Docker Makes Three
You, and Me, and Docker Makes ThreeChristopher Grayson
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm HereChristopher Grayson
 
Addressing Security Regression Through Unit Testing
Addressing Security Regression Through Unit TestingAddressing Security Regression Through Unit Testing
Addressing Security Regression Through Unit TestingChristopher Grayson
 
Cloudstone - Sharpening Your Weapons Through Big Data
Cloudstone - Sharpening Your Weapons Through Big DataCloudstone - Sharpening Your Weapons Through Big Data
Cloudstone - Sharpening Your Weapons Through Big DataChristopher Grayson
 
Introduction to LavaPasswordFactory
Introduction to LavaPasswordFactoryIntroduction to LavaPasswordFactory
Introduction to LavaPasswordFactoryChristopher Grayson
 
Root the Box - An Open Source Platform for CTF Administration
Root the Box - An Open Source Platform for CTF AdministrationRoot the Box - An Open Source Platform for CTF Administration
Root the Box - An Open Source Platform for CTF AdministrationChristopher Grayson
 
Grey H@t - Academic Year 2012-2013 Recap
Grey H@t - Academic Year 2012-2013 RecapGrey H@t - Academic Year 2012-2013 Recap
Grey H@t - Academic Year 2012-2013 RecapChristopher Grayson
 
Grey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request ForgeryGrey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request ForgeryChristopher Grayson
 

More from Christopher Grayson (10)

CableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkCableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home Network
 
You, and Me, and Docker Makes Three
You, and Me, and Docker Makes ThreeYou, and Me, and Docker Makes Three
You, and Me, and Docker Makes Three
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 
Addressing Security Regression Through Unit Testing
Addressing Security Regression Through Unit TestingAddressing Security Regression Through Unit Testing
Addressing Security Regression Through Unit Testing
 
Cloudstone - Sharpening Your Weapons Through Big Data
Cloudstone - Sharpening Your Weapons Through Big DataCloudstone - Sharpening Your Weapons Through Big Data
Cloudstone - Sharpening Your Weapons Through Big Data
 
Introduction to LavaPasswordFactory
Introduction to LavaPasswordFactoryIntroduction to LavaPasswordFactory
Introduction to LavaPasswordFactory
 
Root the Box - An Open Source Platform for CTF Administration
Root the Box - An Open Source Platform for CTF AdministrationRoot the Box - An Open Source Platform for CTF Administration
Root the Box - An Open Source Platform for CTF Administration
 
Grey H@t - Academic Year 2012-2013 Recap
Grey H@t - Academic Year 2012-2013 RecapGrey H@t - Academic Year 2012-2013 Recap
Grey H@t - Academic Year 2012-2013 Recap
 
Grey H@t - DNS Cache Poisoning
Grey H@t - DNS Cache PoisoningGrey H@t - DNS Cache Poisoning
Grey H@t - DNS Cache Poisoning
 
Grey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request ForgeryGrey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request Forgery
 

Recently uploaded

Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 

Recently uploaded (20)

Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 

Security Compensation - How to Invest in Start-Up Security

  • 1. Security CompensationHOW TO INVEST IN STARTUP SECURITY April 8, 2015
  • 2. INTRODUCTION WHO ARE THOSE PEEPS UP IN FRONT?
  • 3. 33 Chris Grayson • Security Associate Austin Whipple • Senior Security Analyst RELEVANT BECAUSE EASTER Some Cool Peeps 3 ChrisAustin
  • 4. 44 • Offloading Security Risk • Security Best Practices for Start-ups • Conclusion WHATCHU TALKIN’ ‘BOUT HOLMES? Agenda
  • 6. 66 • Risk = (Probability of a threat occurring against an asset) x (Value of asset) • Reducing risk can be done by reducing the probability of the threat or reducing the value of the asset. • What is offloading risk? THE GAME OF GLOBAL DOMINATION Offloading Risk
  • 7. 77 • Email has lots of hidden “gotchas:” spoofing, forwarding, encryption, backups, etc. • These are incredibly easy to overlook and misconfigure. Don’t do it yourself! EVERY WEEK I CHECK THE EMAIL Offloading Email
  • 8. 88 • Similar to email, there are lots of “gotchas” that can lead to exploitation (Heartbleed). • Platforms like Cloudflare get early warning/access to exploits to fix them before the security advisory goes public. ENCRYPT ALL THE THINGS Offloading SSL
  • 9. 99 • “Cloud” is not the be-all and end-all of technology solutions, but it does have its place. • Amazon suite, for example, makes it easier to have security by default. EVERYTHING IS SECURE IN “THE CLOUD” Offloading Hosting
  • 10. 1010 • In 2015, there aren’t very many good reasons to be doing your own payroll. • If you aren’t storing/handling/ processing those details, we can’t steal them from you. YOU CAN’T STEAL WHAT THEY DON’T HAVE Offloading Payroll
  • 11. 1111 • For tech companies with a product or a web presence, research shows that having a bug bounty is a good idea. • Bugcrowd: 193 – average number of valid submissions per bug bounty run YOU DEAL WITH MY PROBLEMS Offloading Bug Bounties
  • 12. SECURITY BEST PRACTICES START NOW OR FOREVER HOLD YOUR PEACE
  • 13. 1313 • As per Wikipedia, “every module must be able to access only the information and resources that are necessary for its legitimate purpose.” • Local admin rights, access to file shares, other sensitive information • Not about trust – about minimizing exposure NO, THEY DON’T NEED AN ADMIN ACCOUNT Principle of Least Privilege
  • 14. 1414 • Browsers are popular targets. • Script blocking • ScriptSafe, ScriptBlock, NoScript • Ad blocking • Adblock • Tracker blocking • Ghostery, Disconnect THIS MIGHT HURT A LITTLE Hardening Your Browser
  • 15. 1515 How a digital system identifies a user. • Authenticate with Facebook, Google • Private keys • Two-factor authentication on highly-sensitive endpoints (email, VPN) • Duo Security WHO ARE YOU AND WHAT ARE YOU DOING ON MY SERVER?! Authentication
  • 16. 1616 • Wikipedia defines sandboxing as, “a security mechanism for separating running programs. It is often used to execute untested code.” • Virtual machines! • VMWare, VirtualBox DOMO ARIGATO MR. ROBOTO Virtualization
  • 17. 1717 Passwords are the most ubiquitous form of authentication • One of the most valuable targets for an attacker. • Don’t re-use them! • Don’t share them! • Don’t write them down! • Use password vaults where possible. • KeePass, LastPass YOU CAN’T LIVE WITH ‘EM, YOU CAN’T LIVE WITHOUT ‘EM Password Management
  • 18. 1818 • Vulnerable services and applications lead to compromised businesses. • Internal applications shouldn’t be on the open Internet. • Have a network? VPN + 2FA • No network? SSH + private key + port forwarding YOU’VE GOT WHAT ON YOUR EXTERNAL NETWORK?! Applications and Services
  • 19. 1919 Only if you insist… • Not using publicly-vulnerable software • All sensitive information is encrypted when transmitted across the network • If passwords are used, the passwords are strong • Web application? Pay attention to the OWASP top 10 UGH FINE – WELL IF IT HAS TO BE ON THE INTERNET Applications and Services
  • 20. 2020 Majority of sensitive communication occurs via email. • Encrypt your emails • Protect your domain from spoofed emails AN AGE OLD PROTOCOL WITH SERIOUS SECURITY IMPLICATIONS Email
  • 21. 2121 • Don’t leave sensitive files sitting around • USB drives, FTP servers, anonymously-accessible file shares • Encryption • ZIP files, Truecrypt volumes • Don’t email files! • Syncing files • GIT, SVN, Box.com, Dropbox.com, Seafile EVERYBODY DOES IT File Sharing
  • 22. 2222 Employees will come and go. • Establish a process for provisioning and revocation • May not seem necessary… • But by the time it is, it’s too late. PAY A LITTLE NOW OR A LOT LATER Account Provisioning and Revocation
  • 23. 2323 • Security controls only count when they’re used. • Uniform practices • Repeatable, • Thought out • Documented • Verbalized. • Don’t over-engineer! BUT I THOUGHT WE WERE TALKING ABOUT SECURITY… Process Management
  • 24. 2424 • Don’t do it • Seriously – don’t do it • Wireless networks pose significant risk • Open wireless network for guests • WPA2-PSK for employee Internet access CUT ALL THE CLUTTER Wireless Networks
  • 26. 2626 Now that we’ve blown your mind…
  • 27. 2727 If you can offload to a secure service, do it! Start security ASAP - you’ll be glad you did later. IF YOU DON’T REMEMBER ANYTHING ELSE… Key Takeaways
  • 28. PARTING WORDS ALWAYS THE HARDEST PART… :’(
  • 30. 3030 • @BishopFox • Facebook.com/BishopFoxConsulting • LinkedIn.com/Company/Bishop-Fox • Google.com/+BishopFox WE’RE A CHATTY BUNCH Contact Us
  • 32. 3232 Wikipedia – Principle of Least Privilege http://en.wikipedia.org/wiki/Principle_of_least_privilege ScriptSafe Chrome Plugin https://chrome.google.com/webstore/detail/scriptsafe/oiigbmnaadbkfbmpbfijlflahbdbdgdf?hl=en NoScript Firefox Plugin https://addons.mozilla.org/en-us/firefox/addon/noscript/ AdBlock https://adblockplus.org/ Ghostery https://www.ghostery.com/en/ Disconnect https://disconnect.me/ Authenticate with Google https://developers.google.com/identity/ SLIDE 1 OF 4 Additional Resources
  • 33. 3333 Authenticate with Facebook https://developers.facebook.com/docs/facebook-login/v2.3 Wikipedia – Key Authentication http://en.wikipedia.org/wiki/Key_authentication Wikipedia – Two-Factor Authentication http://en.wikipedia.org/wiki/Two_factor_authentication Duo Two-Factor Authentication https://www.duosecurity.com/ Better Security Through Sandboxing http://www.windowsecurity.com/articles-tutorials/windows_os_security/Better-Security-through-Sandboxing.html KeePass Password Safe http://keepass.info/ LastPass https://lastpass.com/ SLIDE 2 OF 4 Additional Resources
  • 34. 3434 OpenVPN How-To https://openvpn.net/index.php/open-source/documentation/howto.html SSH Port Forwarding https://help.ubuntu.com/community/SSH/OpenSSH/PortForwarding OWASP Top 10 https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project Microsoft – Building a Strong Password Policy https://technet.microsoft.com/en-us/library/cc736605%28v=ws.10%29.aspx Getting Started with S/MIME http://www.office.mvps.org/smime/ DKIM Explained http://www.gettingemaildelivered.com/dkim-explained-how-to-set-up-and-use-domainkeys-identified-mail-effectively Setting up SPF Records http://www.rackspace.com/apps/support/portal/1212 SLIDE 3 OF 4 Additional Resources
  • 35. 3535 How to Set Up DMARC Email Authentication http://www.gettingemaildelivered.com/how-to-set-up-dmarc-email-authentication Encrypting ZIP Files with 7-Zip http://www.northeastern.edu/securenu/?page_id=2573 TrueCrypt http://truecrypt.sourceforge.net/ Bug Bounties Helpful https://www.eecs.berkeley.edu/~daw/papers/vrp-use13.pdf Bug Bounties Helpful, pt. 2 http://www.cmswire.com/cms/information-management/bug-bounty-programs-help-companies-track-vulnerabilities- 027932.php Bugcrowd https://bugcrowd.com/products/bounty SLIDE 4 OF 4 Additional Resources

Editor's Notes

  1. Doing these things will not only improve security, but they also provide organizational maturity, and will allow you to easily scale once the time comes. Offloading Security Risk Relying on tried and true services instead of managing them in-house can boost productivity as well as security posture. Security Best Practices for Start-ups Security is much easier to improve when built from the ground up, and here’s where you can start. Conclusion What did we talk about, and where can you go to learn more?
  2. Otherwise known as “Easy Wins”
  3. Risk calculation: http://www.dhses.ny.gov/ocs/local-government/documents/Risk-Management-Guide-2012.pdf Reducing probability of threat – Limiting attack surface, defense in depth Reducing value of asset – storing only hashed passwords instead of plaintext passwords You’re not just paying for the (hopefully excellent) service, you’re paying for the reduced overhead, risk, and (sometimes) someone to blame in case something goes wrong. Offloading risk, in this context, means using other service and product providers to do things they specialize in, leaving you more time and effort to spend on what you do best.
  4. They are not only easy to overlook, it’s expensive to hire someone who will get all of them. Much easier and safer to use an email service. Do you have an expert on hand that knows about DKIM and SPF? Is handling email the best use of their time and expertise? If you’re using Gmail for email, we don’t even attempt all the normal stuff we do with emails and phishing campaigns. They just have their stuff locked down too well. Gmail, Outlook, Yahoo, Rackspace
  5. They often throw in DDoS protection and caching, too. Amazon
  6. Hosting, server maintenance, storage (backups), database – Downside is you have little control over downtime (which happens less and less often). Upside is this third party manages everything for you, with security built in to the process, and can scale up and down. It’s a lot easier to hack/break into a place that is not an Amazon datacenter. There is a tradeoff on control, but one upside is we are much less likely to be successful breaking into (or hacking) an Amazon datacenter than ATV.
  7. Payroll – if you aren’t storing/handling/processing those details, I can’t steal them.
  8. Bug Bounties – https://www.eecs.berkeley.edu/~daw/papers/vrp-use13.pdf http://www.cmswire.com/cms/information-management/bug-bounty-programs-help-companies-track-vulnerabilities-027932.php https://bugcrowd.com/products/bounty having one and having someone else run it = very effective Having someone else run it is an even better idea.
  9. Encrypt your emails with S/MIME! Protect your domain from spoofed emails with SPF, DKIM, and DMARC!
  10. Uniform practices allow for proper process management and oversight. Processes should be repeatable, thought out, documented and verbalized. Wiki, Confluence Don’t over-engineer!
  11. If you can offload to a secure service, do it! The cost of offloading responsibilities and processes to third-parties may seem significant in terms of dollar amount, but it’s way cheaper than securely taking on those processes and responsibilities internally. Start security ASAP - you’ll be glad you did later. Good security practices take time, effort, and money, but they’re important to the health of an organization. Taking the time now to invest in your security will not only greatly improve your operational security posture – it will save you immense amounts of time, effort, and money in the long run.