SlideShare ist ein Scribd-Unternehmen logo
1 von 17
We are all InfoSec
Michael Swinarski
Director Information Security
TOP 5 CYBERSECURITY FACTS FOR 2017
-CSO ONLINE JUNE 2017
1. CYBER CRIME DAMAGE COSTS TO HIT $6 TRILLION ANNUALLY BY 2021.
2. CYBERSECURITY SPENDING TO EXCEED $1 TRILLION FROM 2017 TO 2021.
3. CYBER CRIME WILL MORE THAN TRIPLE THE NUMBER OF UNFILLED CYBERSECURITY JOBS,
WHICH IS PREDICTED TO REACH 3.5 MILLION BY 2021.
4. HUMAN ATTACK SURFACE TO REACH 4 BILLION PEOPLE BY 2020.
5. GLOBAL RANSOMWARE DAMAGE COSTS ARE PREDICTED TO EXCEED $5 BILLION IN 2017.
CURRENT EVENTS - MALWARE
THE AV-TEST INSTITUTE REGISTERS OVER
250,000 NEW MALICIOUS PROGRAMS
EVERY DAY.
CURRENT EVENTS - RANSOMWARE
1. 250% RISE IN ATTACKS
2. ON TRACK FOR $5 BILLION IN
DAMAGES
1. UP $325 MILLION IN 2015
3. TO NAME A FEW…
1. WANNA CRY
2. PETYA
3. NOTPETYA
CURRENT EVENTS – 2017 DATA BREACHES
E-Sports Entertainment Association (ESEA)
Xbox 360 ISO and PSP ISO
InterContinental Hotels Group (IHG)
Arby’s
River City Media
Verifone
Dun & Bradstreet
Saks Fifth Avenue
UNC Health Care
America’s JobLink
FAFSA: IRS Data Retrieval Tool
Chipotle
Sabre Hospitality Solutions
Gmail
Bronx Lebanon Hospital Center
Brooks Brothers
DocuSign
One Login
Kmart
University of Oklahoma
Washington State University
Deep Root Analytics
Blue Cross Blue Shield / Anthem
California Association of Realtors
Verizon
Online Spam bot
TalentPen and TigerSwan
Equifax
U.S. Securities and Exchange Commission (SEC)
SVR Tracking
Deloitte
Sonic
Whole Foods Market
WE ARE ALL SECURITY PROFESSIONALS
“THE RISE OF CYBER THREATS MEANS THAT THE PEOPLE
ONCE ASSIGNED TO SETTING UP COMPUTERS AND EMAIL
SERVERS MUST NOW TREAT SECURITY AS TOP PRIORITY”
-CHRISTOPHER MIMS, WALL STREET JOURNAL
FOR DEVELOPERS AND TESTERS
• OWASP TOP 10
• MOST CRITICAL WEB APPLICATION
SECURITY RISKS
• HTTPS://WWW.OWASP.ORG
OWASP TOP 10 (2017 RC2)
• A1 INJECTION
• A2 BROKEN AUTHENTICATION AND SESSION MANAGEMENT
• A3 CROSS-SITE SCRIPTING (XSS)
• A4 BROKEN ACCESS CONTROL
• A5 SECURITY MISCONFIGURATION
• A6 SENSITIVE DATA EXPOSURE
• A7 INSUFFICIENT ATTACK PROTECTION
• A8 CROSS-SITE REQUEST FORGERY (CSRF)
• A9 USING COMPONENTS WITH KNOWN VULNERABILITIES
• A10 UNDER PROTECTED APIS
Source
A1 INJECTION (Since 1998)
INJECTION FLAWS, SUCH AS SQL, OS, AND
LDAP INJECTION OCCUR WHEN UNTRUSTED
DATA IS SENT TO AN INTERPRETER AS PART OF
A COMMAND OR QUERY. THE ATTACKER’S
HOSTILE DATA CAN TRICK THE INTERPRETER
INTO EXECUTING UNINTENDED COMMANDS
OR ACCESSING DATA WITHOUT PROPER
AUTHORIZATION.
Source
Little Bobby Tables
PREVENT INJECTION
How Do I Prevent Injection? Preventing injection requires keeping data separate from commands and queries.
• The preferred option is to use a safe API which avoids the use of the interpreter entirely or provides a parameterized interface,
or migrate to use ORMs or Entity Framework. NB: When parameterized, stored procedures can still introduce SQL injection if
PL/SQL or T-SQL concatenates queries and data, or executes hostile data with EXECUTE IMMEDIATE or exec().
• Positive or "white list" input validation, but this is not a complete defense as many applications require special characters, such
as text areas or APIs for mobile applications
• For any residual dynamic queries, escape special characters using the specific escape syntax for that interpreter. OWASP's
Java Encoder and similar libraries provide such escaping routines. NB: SQL structure such as table names, column names,
and so on cannot be escaped, and thus user-supplied structure names are dangerous. This is a common issue in report writing
software.
• Use LIMIT and other SQL controls within queries to prevent mass disclosure of records in case of SQL injection.
Source
FOR SYSTEM ENGINEERS/ADMIN/IMPLEMENTERS
• CENTER FOR INTERNET SECURITY (CIS) TOP 20
• SECURE YOUR ENTIRE ORGANIZATION AGAINST TODAY'S MOST PERVASIVE THREATS
• HTTPS://WWW.CISECURITY.ORG
CIS TOP 20
1. INVENTORY OF AUTHORIZED AND UNAUTHORIZED DEVICES
2. INVENTORY OF AUTHORIZED AND UNAUTHORIZED SOFTWARE
3. SECURE CONFIGURATIONS FOR HARDWARE AND SOFTWARE
4. CONTINUOUS VULNERABILITY ASSESSMENT AND REMEDIATION
5. CONTROLLED USE OF ADMINISTRATIVE PRIVILEGES
6. MAINTENANCE, MONITORING, AND ANALYSIS OF AUDIT LOGS
7. EMAIL AND WEB BROWSER PROTECTIONS
8. MALWARE DEFENSES
9. LIMITATION AND CONTROL OF NETWORK PORTS
10. DATA RECOVERY CAPABILITY
11. SECURE CONFIGURATIONS FOR NETWORK DEVICES
12. BOUNDARY DEFENSE
13. DATA PROTECTION
14. CONTROLLED ACCESS BASED ON THE NEED TO KNOW
15. WIRELESS ACCESS CONTROL
16. ACCOUNT MONITORING AND CONTROL
17. SECURITY SKILLS ASSESSMENT AND APPROPRIATE TRAINING TO FILL
GAPS
18. APPLICATION SOFTWARE SECURITY
19. INCIDENT RESPONSE AND MANAGEMENT
20. PENETRATION TESTS AND RED TEAM EXERCISES
Source
REFERENCES FOR INFOSEC (and others)
• NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST)
• CYBER SECURITY FRAMEWORK
• HTTPS://WWW.NIST.GOV/CYBERFRAMEWORK
• EXAMPLES
• NIST 800-53: A publication that recommends security controls for federal information systems and organizations and documents security controls for information
systems
• NIST 800-50: Building an Information Technology Security Awareness and Training Program
• NIST 800-52: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations
• NIST 800-57: Recommendation provides cryptographic key management guidance
• NIST 800-61: Guidelines for Computer Security Incident Handling
• NIST 800-63: Digital Identity Guidelines. Authentication and Lifecycle Management
INFORMATION SECURITY CAREERS
• “'NEGATIVE JOBLESSNESS' IN INFOSEC"
• BANKINFOSECURITY.COM (JULY 2014)
• "ZERO-PERCENT CYBERSECURITY
UNEMPLOYMENT, 1 MILLION JOBS UNFILLED"
• CSOONLINE.COM (SEPT 2016)
• “THE AVERAGE TIME TO FILL AN OPEN POSITION
IN INFORMATION SECURITY IS 130 DAYS”
• CEB ANALYSIS
Salaries according to Dice.com (April 2016)
Application Security Manager $165,000
Cybersecurity Engineer $170,000
Lead Security Engineer $174,375
Cybersecurity Lead $175,000
Director of Security $178,333
Chief Information Security Officer $192,500
IT Security Consultant $198,909
Global Information Security Director $200,000
Chief Security Officer $225,000
Lead Software Security Engineer $233,333
Q&A - DISCUSSION
THANK YOU
MICHAEL SWINARSKI
LINKED IN: linkedin.com/in/mswinarski
TWITTER: @ITRogueLeader
SLIDE SHARE: https://www.slideshare.net/MichaelSwinarski/presentations

Weitere ähnliche Inhalte

Was ist angesagt?

Network basic security
Network basic  securityNetwork basic  security
Network basic security
Mohamed Radji
 

Was ist angesagt? (20)

Detection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEyeDetection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEye
 
011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs
 
Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360Network Situational Awareness using Tripwire IP360
Network Situational Awareness using Tripwire IP360
 
Cyber security
Cyber securityCyber security
Cyber security
 
Communication security 2021
Communication security 2021Communication security 2021
Communication security 2021
 
3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.com
 
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration Overview
 
5 must-have security testing tools for your pentesting tasks
5 must-have security testing tools for your pentesting tasks5 must-have security testing tools for your pentesting tasks
5 must-have security testing tools for your pentesting tasks
 
Tripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire Adaptive Threat Protection
Tripwire Adaptive Threat Protection
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Think Like a Hacker
Think Like a HackerThink Like a Hacker
Think Like a Hacker
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Tripwire IP360 Vulnerability Management: Searching FOCUS for Security Analyti...
Tripwire IP360 Vulnerability Management: Searching FOCUS for Security Analyti...Tripwire IP360 Vulnerability Management: Searching FOCUS for Security Analyti...
Tripwire IP360 Vulnerability Management: Searching FOCUS for Security Analyti...
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
Uncover threats and protect your organization
Uncover threats and protect your organizationUncover threats and protect your organization
Uncover threats and protect your organization
 
Re solution - corona virus cyber security infographic
Re solution - corona virus cyber security infographicRe solution - corona virus cyber security infographic
Re solution - corona virus cyber security infographic
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
 
Secure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checkingSecure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checking
 

Ähnlich wie We are all info sec

Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Editor IJCATR
 

Ähnlich wie We are all info sec (20)

Information Security: We are all InfoSec (updated for 2018)
Information Security: We are all InfoSec (updated for 2018)Information Security: We are all InfoSec (updated for 2018)
Information Security: We are all InfoSec (updated for 2018)
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPS
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud apps
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
7 Ways to Stay 7 Years Ahead of the Threat 2015
7 Ways to Stay 7 Years Ahead of the Threat 20157 Ways to Stay 7 Years Ahead of the Threat 2015
7 Ways to Stay 7 Years Ahead of the Threat 2015
 
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Edgescan   vulnerability stats report 2019 - h-isac-2-2-2019Edgescan   vulnerability stats report 2019 - h-isac-2-2-2019
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
 
76 s201919
76 s20191976 s201919
76 s201919
 
Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

We are all info sec

  • 1. We are all InfoSec Michael Swinarski Director Information Security
  • 2. TOP 5 CYBERSECURITY FACTS FOR 2017 -CSO ONLINE JUNE 2017 1. CYBER CRIME DAMAGE COSTS TO HIT $6 TRILLION ANNUALLY BY 2021. 2. CYBERSECURITY SPENDING TO EXCEED $1 TRILLION FROM 2017 TO 2021. 3. CYBER CRIME WILL MORE THAN TRIPLE THE NUMBER OF UNFILLED CYBERSECURITY JOBS, WHICH IS PREDICTED TO REACH 3.5 MILLION BY 2021. 4. HUMAN ATTACK SURFACE TO REACH 4 BILLION PEOPLE BY 2020. 5. GLOBAL RANSOMWARE DAMAGE COSTS ARE PREDICTED TO EXCEED $5 BILLION IN 2017.
  • 3. CURRENT EVENTS - MALWARE THE AV-TEST INSTITUTE REGISTERS OVER 250,000 NEW MALICIOUS PROGRAMS EVERY DAY.
  • 4. CURRENT EVENTS - RANSOMWARE 1. 250% RISE IN ATTACKS 2. ON TRACK FOR $5 BILLION IN DAMAGES 1. UP $325 MILLION IN 2015 3. TO NAME A FEW… 1. WANNA CRY 2. PETYA 3. NOTPETYA
  • 5. CURRENT EVENTS – 2017 DATA BREACHES E-Sports Entertainment Association (ESEA) Xbox 360 ISO and PSP ISO InterContinental Hotels Group (IHG) Arby’s River City Media Verifone Dun & Bradstreet Saks Fifth Avenue UNC Health Care America’s JobLink FAFSA: IRS Data Retrieval Tool Chipotle Sabre Hospitality Solutions Gmail Bronx Lebanon Hospital Center Brooks Brothers DocuSign One Login Kmart University of Oklahoma Washington State University Deep Root Analytics Blue Cross Blue Shield / Anthem California Association of Realtors Verizon Online Spam bot TalentPen and TigerSwan Equifax U.S. Securities and Exchange Commission (SEC) SVR Tracking Deloitte Sonic Whole Foods Market
  • 6. WE ARE ALL SECURITY PROFESSIONALS “THE RISE OF CYBER THREATS MEANS THAT THE PEOPLE ONCE ASSIGNED TO SETTING UP COMPUTERS AND EMAIL SERVERS MUST NOW TREAT SECURITY AS TOP PRIORITY” -CHRISTOPHER MIMS, WALL STREET JOURNAL
  • 7. FOR DEVELOPERS AND TESTERS • OWASP TOP 10 • MOST CRITICAL WEB APPLICATION SECURITY RISKS • HTTPS://WWW.OWASP.ORG
  • 8. OWASP TOP 10 (2017 RC2) • A1 INJECTION • A2 BROKEN AUTHENTICATION AND SESSION MANAGEMENT • A3 CROSS-SITE SCRIPTING (XSS) • A4 BROKEN ACCESS CONTROL • A5 SECURITY MISCONFIGURATION • A6 SENSITIVE DATA EXPOSURE • A7 INSUFFICIENT ATTACK PROTECTION • A8 CROSS-SITE REQUEST FORGERY (CSRF) • A9 USING COMPONENTS WITH KNOWN VULNERABILITIES • A10 UNDER PROTECTED APIS Source
  • 9. A1 INJECTION (Since 1998) INJECTION FLAWS, SUCH AS SQL, OS, AND LDAP INJECTION OCCUR WHEN UNTRUSTED DATA IS SENT TO AN INTERPRETER AS PART OF A COMMAND OR QUERY. THE ATTACKER’S HOSTILE DATA CAN TRICK THE INTERPRETER INTO EXECUTING UNINTENDED COMMANDS OR ACCESSING DATA WITHOUT PROPER AUTHORIZATION. Source
  • 11. PREVENT INJECTION How Do I Prevent Injection? Preventing injection requires keeping data separate from commands and queries. • The preferred option is to use a safe API which avoids the use of the interpreter entirely or provides a parameterized interface, or migrate to use ORMs or Entity Framework. NB: When parameterized, stored procedures can still introduce SQL injection if PL/SQL or T-SQL concatenates queries and data, or executes hostile data with EXECUTE IMMEDIATE or exec(). • Positive or "white list" input validation, but this is not a complete defense as many applications require special characters, such as text areas or APIs for mobile applications • For any residual dynamic queries, escape special characters using the specific escape syntax for that interpreter. OWASP's Java Encoder and similar libraries provide such escaping routines. NB: SQL structure such as table names, column names, and so on cannot be escaped, and thus user-supplied structure names are dangerous. This is a common issue in report writing software. • Use LIMIT and other SQL controls within queries to prevent mass disclosure of records in case of SQL injection. Source
  • 12. FOR SYSTEM ENGINEERS/ADMIN/IMPLEMENTERS • CENTER FOR INTERNET SECURITY (CIS) TOP 20 • SECURE YOUR ENTIRE ORGANIZATION AGAINST TODAY'S MOST PERVASIVE THREATS • HTTPS://WWW.CISECURITY.ORG
  • 13. CIS TOP 20 1. INVENTORY OF AUTHORIZED AND UNAUTHORIZED DEVICES 2. INVENTORY OF AUTHORIZED AND UNAUTHORIZED SOFTWARE 3. SECURE CONFIGURATIONS FOR HARDWARE AND SOFTWARE 4. CONTINUOUS VULNERABILITY ASSESSMENT AND REMEDIATION 5. CONTROLLED USE OF ADMINISTRATIVE PRIVILEGES 6. MAINTENANCE, MONITORING, AND ANALYSIS OF AUDIT LOGS 7. EMAIL AND WEB BROWSER PROTECTIONS 8. MALWARE DEFENSES 9. LIMITATION AND CONTROL OF NETWORK PORTS 10. DATA RECOVERY CAPABILITY 11. SECURE CONFIGURATIONS FOR NETWORK DEVICES 12. BOUNDARY DEFENSE 13. DATA PROTECTION 14. CONTROLLED ACCESS BASED ON THE NEED TO KNOW 15. WIRELESS ACCESS CONTROL 16. ACCOUNT MONITORING AND CONTROL 17. SECURITY SKILLS ASSESSMENT AND APPROPRIATE TRAINING TO FILL GAPS 18. APPLICATION SOFTWARE SECURITY 19. INCIDENT RESPONSE AND MANAGEMENT 20. PENETRATION TESTS AND RED TEAM EXERCISES Source
  • 14. REFERENCES FOR INFOSEC (and others) • NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) • CYBER SECURITY FRAMEWORK • HTTPS://WWW.NIST.GOV/CYBERFRAMEWORK • EXAMPLES • NIST 800-53: A publication that recommends security controls for federal information systems and organizations and documents security controls for information systems • NIST 800-50: Building an Information Technology Security Awareness and Training Program • NIST 800-52: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations • NIST 800-57: Recommendation provides cryptographic key management guidance • NIST 800-61: Guidelines for Computer Security Incident Handling • NIST 800-63: Digital Identity Guidelines. Authentication and Lifecycle Management
  • 15. INFORMATION SECURITY CAREERS • “'NEGATIVE JOBLESSNESS' IN INFOSEC" • BANKINFOSECURITY.COM (JULY 2014) • "ZERO-PERCENT CYBERSECURITY UNEMPLOYMENT, 1 MILLION JOBS UNFILLED" • CSOONLINE.COM (SEPT 2016) • “THE AVERAGE TIME TO FILL AN OPEN POSITION IN INFORMATION SECURITY IS 130 DAYS” • CEB ANALYSIS Salaries according to Dice.com (April 2016) Application Security Manager $165,000 Cybersecurity Engineer $170,000 Lead Security Engineer $174,375 Cybersecurity Lead $175,000 Director of Security $178,333 Chief Information Security Officer $192,500 IT Security Consultant $198,909 Global Information Security Director $200,000 Chief Security Officer $225,000 Lead Software Security Engineer $233,333
  • 17. THANK YOU MICHAEL SWINARSKI LINKED IN: linkedin.com/in/mswinarski TWITTER: @ITRogueLeader SLIDE SHARE: https://www.slideshare.net/MichaelSwinarski/presentations