SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Agenda Preface Who am I What is a Incidet How do we prepare The Policy The Incident response plan Creating a Computer Security Incident Response Team External Forensic Partner
Agenda Incident Response and Forensic techniques Ressponsible disclosure Now how does this look like in real life? The Good
Agenda The Bad The Ugly So ...WTF, may i rant a bit please? So x.509 is death, huh? The desasters from 20/11  Sony and no end The comming out of the RSA Breach Commodo Diginotar , StarSSL…
Agenda Preface Why bother? The fisrst Virus was progammed1986 and we did not learn anything! You are a CIO/CSO? YOU FAILED! over 80% of all incidents are techniques older than 20 YEARS ! APT, yeah right. Are you any better?
Agenda Who am I CIO Computer nerd since the mid 70‘s A Hacker  Spearhead and founder of BerlinSides A nobody
Agenda What is a Incidet in the InfoSec @indi303‘s maintenance window. A attack against your Network (or Bogk in your Network) A SE attempt A lost USB Stick A Mcafee update
Agenda How do we prepare The Policy What is a incident Who to report to What to report Wich mesurements to take The Incident response plan  Helpdesk     Intrusion detection monitoring personnel     A system administrator     A firewall administrator     A business partner     A manager     The security department or a security person.     An outside source.
Agenda Creating a Computer Security Incident Response Team  Step 1: Obtain management support and buy-in  Step 2: Determine the CSIRT strategic plan  Step 3: Gather relevant information  Step 4: Design the CSIRT vision  Step 5: Communicate the CSIRT vision and operational plan  Step 6: Begin CSIRT implementation  Step 7: Announce the operational CSIRT  Step 8: Evaluate CSIRT effectiveness Incident Response and Forensic techniques WTF is WFT (WINDOWS FORENSIC TOOLCHEST™) FRED (First Responder's Evidence Disk)
Agenda Ressponsible disclosure To the Police To our staff To our business Partners To the Public
Agenda Now how does this look like in real life? You‘re most likly into infosec, look for yourself How many of you know your companies Incident response plan? From those who had their hands up, are you sure all emploees know the IR Policy? Why is that so?
Agenda The Good Apache https://blogs.apache.org/infra/entry/apache_org_downtime_report https://blogs.apache.org/infra/entry/apache_org_04_09_2010 PHPFog http://blog.phpfog.com/2011/03/22/how-we-got-owned-by-a-few-teenagers-and-why-it-will-never-happen-again/ Comodo  http://blogs.comodo.com/it-security/data-security/the-recent-ra-compromise/ (March 23) https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html
Agenda The Bad Kernel.Org Can‘t find a statement on their webside on the first page in Google search Sony Very late under pressure did some kind of incident response, info from the Company was horrible Diginotar Diginotar, got into incident response, took ‘em 2 months to report
Agenda The Ugly RSA Kept the secret over a long time  Apple Very late patching things, and if mostly never the Opensource parts of the OS HP OMG
Agenda So ...WTF, may i rant a bit please? So x.509 is death, huh? The desasters from 20/11  Sony and no end The comming out of the RSA Breach Comodo Diginotar , StarSSL…
Agenda How can we change this? As customer As a professional All the Anonymous, Lulzsec J3st3r and others Are we really prepared? What‘s about the daily skiddie? Predictions, who will fall next? Thanx for listening

Weitere ähnliche Inhalte

Was ist angesagt?

Via forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linuxVia forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linux
viaForensics
 
Security Kung Fu: Firewall Logs
Security Kung Fu: Firewall LogsSecurity Kung Fu: Firewall Logs
Security Kung Fu: Firewall Logs
Joshua Berman
 

Was ist angesagt? (20)

So You Think You Can Hack | sitNL 2016
So You Think You Can Hack | sitNL 2016So You Think You Can Hack | sitNL 2016
So You Think You Can Hack | sitNL 2016
 
cher nsa
cher nsacher nsa
cher nsa
 
How to scale mobile application security testing
How to scale mobile application security testingHow to scale mobile application security testing
How to scale mobile application security testing
 
Participate in SIPit
Participate in SIPitParticipate in SIPit
Participate in SIPit
 
Shifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and securityShifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and security
 
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceMobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic Menace
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
 
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityIntroduction to Personal Privacy and Security
Introduction to Personal Privacy and Security
 
Via forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linuxVia forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linux
 
Cybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsCybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar Associations
 
Security Kung Fu: Firewall Logs
Security Kung Fu: Firewall LogsSecurity Kung Fu: Firewall Logs
Security Kung Fu: Firewall Logs
 
Win the Cyber War! with Precognitive Heuristics technology
Win the Cyber War! with Precognitive Heuristics technologyWin the Cyber War! with Precognitive Heuristics technology
Win the Cyber War! with Precognitive Heuristics technology
 
Threat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill ChainThreat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill Chain
 
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
 
Shall we fear privacy/security on Internet ?
Shall we fear privacy/security on Internet ?Shall we fear privacy/security on Internet ?
Shall we fear privacy/security on Internet ?
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the Code
 
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
 
CSA Raleigh application security and deception in the cloud
CSA Raleigh   application security and deception in the cloudCSA Raleigh   application security and deception in the cloud
CSA Raleigh application security and deception in the cloud
 
IoT_Policy
IoT_PolicyIoT_Policy
IoT_Policy
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and Practitioners
 

Ähnlich wie Incident response : the good the bad and the ugly or how to keep your face after a security breach

Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Hamisi Kibonde
 
Network security monitoring with open source tools
Network security monitoring with open source toolsNetwork security monitoring with open source tools
Network security monitoring with open source tools
terriert
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
abnmi
 

Ähnlich wie Incident response : the good the bad and the ugly or how to keep your face after a security breach (20)

Introduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSecIntroduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSec
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
 
Network security monitoring with open source tools
Network security monitoring with open source toolsNetwork security monitoring with open source tools
Network security monitoring with open source tools
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest
 
Cybersecurity is a Necessity, Not an Option, in the Face of Global Security T...
Cybersecurity is a Necessity, Not an Option, in the Face of Global Security T...Cybersecurity is a Necessity, Not an Option, in the Face of Global Security T...
Cybersecurity is a Necessity, Not an Option, in the Face of Global Security T...
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
Learn How-To Build Your IoT Project
Learn How-To Build Your IoT ProjectLearn How-To Build Your IoT Project
Learn How-To Build Your IoT Project
 
Merge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptxMerge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptx
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
 
Splunk for ITOps
Splunk for ITOpsSplunk for ITOps
Splunk for ITOps
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Incident response : the good the bad and the ugly or how to keep your face after a security breach

  • 1. Agenda Preface Who am I What is a Incidet How do we prepare The Policy The Incident response plan Creating a Computer Security Incident Response Team External Forensic Partner
  • 2. Agenda Incident Response and Forensic techniques Ressponsible disclosure Now how does this look like in real life? The Good
  • 3. Agenda The Bad The Ugly So ...WTF, may i rant a bit please? So x.509 is death, huh? The desasters from 20/11 Sony and no end The comming out of the RSA Breach Commodo Diginotar , StarSSL…
  • 4. Agenda Preface Why bother? The fisrst Virus was progammed1986 and we did not learn anything! You are a CIO/CSO? YOU FAILED! over 80% of all incidents are techniques older than 20 YEARS ! APT, yeah right. Are you any better?
  • 5. Agenda Who am I CIO Computer nerd since the mid 70‘s A Hacker Spearhead and founder of BerlinSides A nobody
  • 6. Agenda What is a Incidet in the InfoSec @indi303‘s maintenance window. A attack against your Network (or Bogk in your Network) A SE attempt A lost USB Stick A Mcafee update
  • 7. Agenda How do we prepare The Policy What is a incident Who to report to What to report Wich mesurements to take The Incident response plan Helpdesk Intrusion detection monitoring personnel A system administrator A firewall administrator A business partner A manager The security department or a security person. An outside source.
  • 8. Agenda Creating a Computer Security Incident Response Team Step 1: Obtain management support and buy-in Step 2: Determine the CSIRT strategic plan Step 3: Gather relevant information Step 4: Design the CSIRT vision Step 5: Communicate the CSIRT vision and operational plan Step 6: Begin CSIRT implementation Step 7: Announce the operational CSIRT Step 8: Evaluate CSIRT effectiveness Incident Response and Forensic techniques WTF is WFT (WINDOWS FORENSIC TOOLCHEST™) FRED (First Responder's Evidence Disk)
  • 9. Agenda Ressponsible disclosure To the Police To our staff To our business Partners To the Public
  • 10. Agenda Now how does this look like in real life? You‘re most likly into infosec, look for yourself How many of you know your companies Incident response plan? From those who had their hands up, are you sure all emploees know the IR Policy? Why is that so?
  • 11. Agenda The Good Apache https://blogs.apache.org/infra/entry/apache_org_downtime_report https://blogs.apache.org/infra/entry/apache_org_04_09_2010 PHPFog http://blog.phpfog.com/2011/03/22/how-we-got-owned-by-a-few-teenagers-and-why-it-will-never-happen-again/ Comodo http://blogs.comodo.com/it-security/data-security/the-recent-ra-compromise/ (March 23) https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html
  • 12. Agenda The Bad Kernel.Org Can‘t find a statement on their webside on the first page in Google search Sony Very late under pressure did some kind of incident response, info from the Company was horrible Diginotar Diginotar, got into incident response, took ‘em 2 months to report
  • 13. Agenda The Ugly RSA Kept the secret over a long time Apple Very late patching things, and if mostly never the Opensource parts of the OS HP OMG
  • 14. Agenda So ...WTF, may i rant a bit please? So x.509 is death, huh? The desasters from 20/11 Sony and no end The comming out of the RSA Breach Comodo Diginotar , StarSSL…
  • 15. Agenda How can we change this? As customer As a professional All the Anonymous, Lulzsec J3st3r and others Are we really prepared? What‘s about the daily skiddie? Predictions, who will fall next? Thanx for listening