Based on one decade of impactful security research and several years as a risk manager, Karsten Nohl reflects upon what he would have done differently in pushing a data security agenda. Our community is convinced that stellar IT security is paramount for companies large and small: We need security for system availability, for brand reputation, to prevent fraud, and to keep data private. But is more security always better? Poorly chosen protection measures can have large externalities on the productivity, innovation capacity, and even happiness of organizations. Can too much security be worse than too little security? This talk investigates the trade-off between security and innovation along several examples of current security research. It finds that some hacking research is counter-productive in bringing the most security to most people, by spreading fear too widely. --- Karsten Nohl Karsten Nohl has spoken widely on security gaps since 2006. He and co-investigators have uncovered flaws in mobile communication, payment, and other widely-used infrastructures. In his work at an Asian 4G and digital services provider, and as Chief Scientist at Security Research Labs in Berlin, a risk management think tank specializing in emerging IT threats, Karsten challenges security assumptions in proprietary systems and is fascinated by the security-innovation trade-off. Hailing from the Rhineland, he studied electrical engineering in Heidelberg and earned a doctorate in 2008 from the University of Virginia.
A method to define minimum controls, policies, and procedures to apply to devices not controlled by the organization.
This document proposes replacing existing security operation centers (SOCs) with modernized Cyber Intelligence Operations Centers (CIOCs) to better coordinate organizational cyber defense strategies. The CIOC would integrate intelligence cycle processes, defense-in-depth approaches, big data analytics, and control frameworks. This centralized command structure is needed to mobilize against cyber threats in a coordinated, strategic manner across both private and public sectors. The document outlines the growing cyber threat landscape and need for modernized processes to predict, prevent, detect, and respond to attacks as organizations fight an undeclared global cyber war.
Critical Exploitable Vulnerabilities Increased Investment Cost Per Exploit 5 Critical Attributes Top Cureent Trends
This document summarizes a presentation on threat modeling concepts and processes. It began with defining key threat modeling terms like assets, threats, vulnerabilities, and risk. It described threat modeling as understanding potential threats to a system. The presentation covered approaches like STRIDE and asking questions. It emphasized decomposing systems and identifying threats through data flows. Determining mitigations and risk ratings for threats was also discussed. The goal of threat modeling is to have an ongoing, living understanding of security risks to a system.
This document discusses 10 controls (C1 through C10) for developing secure software. Each control is described in 1-2 pages and addresses how it mitigates many of the top 10 risks from the OWASP list, including injection, XSS, sensitive data exposure, access control issues, and more. Specific techniques are provided, such as query parameterization to prevent SQL injection, output encoding to prevent XSS, validating all input, secure authentication and authorization practices, encrypting data, and centralized error handling.
How to ensure that security implemented in IoT devices and systems is up to the provider's requirements and yet don't mean over-spending on unnecessary mechanisms? That's what the Security Maturity Model, developed by Industrial Internet Consortium with our contribution, is about. Read more at http://iiconsortium.org/.
The document discusses the evolution of cybersecurity threats and the IBM X-Force mission to monitor threats, research new attacks and develop protections, and educate customers. It outlines how threats have become more sophisticated, organized, and challenging over time as cybercrime has become organized. It also summarizes IBM's security capabilities and coverage across networks, endpoints, vulnerabilities, malware, and more.
The document discusses the importance of a full stack cyber security approach from an information security professional's perspective. It recommends scanning both external and internal networks as the first and second lines of defense, similar to an airbag and seatbelt in a car. The document also provides an overview of a product demo for a network security workflow automation tool that allows for discovery scanning, dynamic asset management, risk prioritization, and flexible reporting.
Cybersecurity is difficult. It is a serious endeavor which over time strives to find a balance in managing the security of computing capabilities to protect the technology which connects and enriches the lives of everyone. Characteristics of cyber risk continue to mature and expand on the successes of technology innovation, integration, and adoption. It is no longer a game of tactics, but rather a professional discipline, continuous in nature, where to be effective strategic leadership must establish effective and efficient structures for evolving controls to sustain an optimal level of security. This presentation will discuss the emerging challenges as it analyzes the cause-and-effect relationships of factors driving the future of cybersecurity.
A presentation made to the 6th Cyber Resiliency Workshop, sponsored by Mitre Corporation (May 18, 2016)
The document discusses several topics related to cybersecurity including integrating endpoint technologies to stop threats, developing adaptive defenses to identify attackers, using threat modeling to assess vulnerabilities, selecting effective endpoint security products, protecting critical servers from advanced threats, finding exploitable flaws through fuzzing, implementing the top 4 critical controls, modern botnets posing major risks to banks, gathering additional threat intelligence from security tools, and training admins to detect and react to attacks.
Cyber security hands on-training. Learn advanced applications of Cyber Security to embedded systems. It’s all about Cyber and Security. Proudly presented by: Tonex.Com Index / Highlights: Understanding cyber security, risk and action tools. Integrating Cybersecurity and Enterprise Risk Management (ERM). What is Secure Embedded Systems ? How does it protect ? Advance methods & procedure to analyze, reverse, debug ? Value of risk assessment methodologies, failure analysis ? How to set up and measure successful mission control system ? Which professionals need to learn cyber security approaches ? Case studies and workshop. Request more information Sign up for Hands-On Cybersecurity Course https://www.tonex.com/training-courses/cyber-security-embedded-systems-training-bootcamp-hands-on/
CyCOPS is an information security company based in Hyderabad, India founded in 2008. It has a team of 25 security professionals with certifications like CISSP and CEH. CyCOPS provides services like vulnerability assessments, penetration testing, security audits, digital forensics, and wireless security. It has experience working with clients in India and abroad from sectors like banking, government, and technology. CyCOPS also partners with IBM and Sipera Systems to offer additional managed security services and unified communications security solutions.
The document discusses implementing a defense-in-depth security strategy for internal networks, which combines best practices, policies, and tiered defenses. It recommends automating primary security tasks, deploying network access control systems, implementing rigorous patching, and focusing on high-risk assets. A behavioral approach is also needed to validate the full extent of any network security threats.
This document provides an overview of the KL SOC (Security Operations Center). It discusses the SOC's scope, including monitoring, vulnerability assessment, incident management, and threat hunting. It outlines the incident lifecycle and processes for detection, data analysis, validation, categorization, prioritization, and response. It also discusses threat intelligence products, a digital forensics lab, search capabilities, and notable APT campaigns over time. The document reviews internal redteaming, levels of detection, service lines, and research conducted by the SOC.
SentinelOne was founded in 2013 by an elite group of cybersecurity and defense experts who share a strong passion for disruption, and a clear vision for a path forward in a post-antivirus era. Building on their experiences learned at Check Point Software Technologies, IBM, Intel Security, Palo Alto Networks, and White Hat Security, the team is committed to the mission of defeating advanced cyber threats and instilling confidence in our digital way of life. Find out more at https://sentinelone.com
This document discusses web application security and summarizes key topics from a presentation on the subject. It introduces the Open Web Application Security Project (OWASP) Top 10 list of vulnerabilities, covering Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) in more detail. It also discusses security frameworks like ISO 27001 and the Payment Card Industry Data Security Standard (PCI DSS). The presentation emphasizes the importance of validating all user input to prevent injection attacks.
10 年にわたる精力的なセキュリティ研究と、数年にわたるリスク管理者としての経験を通じて、カールステン・ノールは情報セキュリティに関する議論を進める中で、もっといい結果が残せたのではないかと考えるようになった。 世間では、非の打ち所のない IT セキュリティ対策を講じることが、企業の規模に依らずその企業にとって最も重要なものであると確信されている。我々はシステムの可用性やブランドに対する高評価を確保するため、詐欺行為を回避するため、そして情報の機密性を保持するためにセキュリティを必要としている。 浅はかな考えで採用された防御策は、生産性、イノベーションの可能性、そして組織の幸福度にすら、それぞれ大きな外部性を持つ。行き過ぎたセキュリティ対策は、不充分なセキュリティ対策よりも悪いものなのだろうか? 今回の講演では、現代のセキュリティの研究での様々な実例を通じて、セキュリティとイノベーションの間に発��するドレードオフの関係について取り扱う。講演では、いくつかのハッキングの研究は、多くの人に最善にセキュリティを提供することによって、および、脅威を広く広め過ぎることによって、非生産的であることへの気づきを提供する。 --- カールステン・ノールKarsten Nohl カールステン・ノールは 2006 年からセキュリティレベルの格差について幅広く講演している。彼は共同研究者と共に、モバイル通信や支払いに利用されるような世間で幅広く使用されている情報基盤における欠陥を発見してきた。アジアの 4G とデジタルサービスのプロバイダ、ベルリンの Security Research Labs の主任研究員、新たな IT 脅威の分析に特化したリスクマネジメントのシンクタンクにおける業務を通じて、カールステンは顧客の独自システムのセキュリティ評価に取り組み、セキュリティとイノベーションの間で発生するトレードオフの関係に強い興味を抱くようになった。ラインラントからあまり遠くないハイデルベルグで電気工学を学び、2008 年にヴァージニア大学で博士号を修めた。
The most common story that we hear: something happens with ATM that makes it empty, leaving no forensic evidence. No money and no logs. We have collected huge number of cases on how ATMs could be hacked during our researches, incidents responses and security assessments. A lot of malware infects ATM through the network or locally. There are black boxes, which connect to communications port of devices directly. There are also network attacks, such as rogue processing center or MiTM. How to stop the ATMs fraud? How to protect ATMs from attacks such as black box jackpotting? How to prevent network hijacking such as rogue processing center or MiTM? Some of these issues can be fixed by configuration means, some fixed by compensation measures, but many only by vendor. We will tell you about what bank can do now and what we as a community of security specialists should force to vendors. Before we spoke about vulnerabilities and fraud methods used by criminals. Now we would like to combine our expertise to help financial and security society with more direct advices how to implement security measures or approaches to make ATMs more secure. --- Olga Kochetova Olga is interested in how various devices interact with cash or plastic cards. She is a senior specialist for the penetration testing team at Kaspersky Lab. Olga has authored multiple articles and webinars about ATM security. She is also the author of advisories about various vulnerabilities for major ATM vendors and has been a speaker at international conferences, including Black Hat Europe, Hack in Paris, Positive Hack Days, Security Analyst Summit, Nuit Du Hack, Hack In The Box Singapore and others. --- Alexey Osipov Lead Expert on a Penetration Testing Team at Kaspersky Lab. An author of variety of techniques and utilities exploiting vulnerabilities in XML protocols and telecom equipment security. Author of advisories for various vulnerabilities for major ATM vendors. A speaker at international security conferences: Black Hat, Hack in Paris (presenting the paper on ATM vulnerabilities), NoSuchCon Paris, Nuit du Hack, Hack In The Box Singapore, Positive Hack Days, Chaos Communication Congress.
SQLi攻撃の迅速で正確な検知をする libinjection は Black Hat USA 2012 で紹介された。 2年たった現在、そのアルゴリズムは多くのオープンソースや専用WAFsやハニーポットで利用されている。 本講演では、XSSを検知する新しいアルゴリズムを紹介する。 SQLi 同様、libinjection アルゴリズムは正規表現を使わず、とても速く、誤検��率が少ない。 そして、オリジナルの libinjection アルゴリズムのように、GitHubで無償の使用許諾で入手できる。 ニック・ガルブレス - Nick Galbreath ニック・ガルブレス氏は、オンライン広告取引システム開発の世界的リーディング企業である IPONWEB の技術担当副社長である。 IPONWEB 以前は、セキュリティ・詐欺・認証・その他大企業的機能を扱う監視グループ Etsyの技術部長。 Etsy 以前は彼はソーシャルとeコマース企業に所属し、それらに�� Right Media、UPromise、Friendster、Open Marketなどがある。 彼の著書に「Cryptography for Internet and Database Applications (Wiley)」がある。 彼は、Black Hat、Def Con、DevOpsDays、OWASP関連イベントでの講演経験を持つ。 ボストン大学の数学修士を保有、現在は東京在住である。 講演歴) 2013年 - LASCON http://lascon.org/about/, 基調講演者, 米国・テキサス州オースティン - DevOpsDays 日本・東京 - Security Development Conference (Microsoft), 米国・カリフォルニア州サンフランシスコ - DevOpsDays 米国・テキサス州オースティン - Positive Hack Days http://phdays.com, ロシア・モスクワ - RSA USA, San Francisco, CA, 講師とパネリスト 2012年 - DefCon 米国・ネバダ州ラスベガス - BlackHat USA 米国・ ネバダ州ラスベガス - その他
OS Xのセキュリティ脆弱性研究はMacのデバイスが人気になるにつれ、より人気が高まっている。OX XのIOKitはユーザモードからの切り替えにおけるカーネル自身およびカーネル拡張の危殆化によりハッカーからの多くの攻撃にさらされている。多くの研究者はこの分野の研究(リファレンスを参照のこと)を進めており、我々は本研究分野の次のいくつかの成果を共有したい。 1. カーネル脆弱性を検出するためのコンテキストエンライトメントによるパッシブファジングフレームワーク 2. SMAP&SMEPをバイパスするためのユーザモードプログラムからカーネルメモリを占有するための��クスプロイト技術 3. 本ファジング手法により検出された脆弱性の活用方法とOS Xに対し二度の成功をもたらしたルート詐取のための新たなエクスプロイト手法 我々は次の新たな手法を紹介する。PFACEと呼ばれる、OS X IO Kitに対するコンテキストエンライトメントによるパッシブファジングである。PFACEは次のような特徴を有する。 第一に、条件依存でありシステムクラッシュをもたらすコードの実行および検出を深くまた広く許可する。次に以下が含まれるモジュールを出力する。コンテキスト:脆弱性の疑いに対するインジケーター。インジケーターは最初にモジュールをレビューするための手段としてレビュアーにとって有用であろう。 多くの脆弱性を有する場合、主要な課題はどのようにROPガジェットをユーザモードプログラムからカーネル空間に転送するかである。なぜなら近年のOS XではSMAPおよびSMEPを許可しているためである。高名なセキュリティ研究者であるステファン・エッサーはOSDataはカーネルメモリを占拠する良い構造であると提案している。[リファレンスセクション5]もちろんOSDataは確かによいデータ構造である。しかし、実際にはOSDataが機能しないいくつかの課題が存在する。我々はOSDATAがユーザモードプログラムからカーネルメモリを占拠するよう機能させるための新たな手法を発見し、本手法により、新たな脆弱性の検出およびOS X (10.11.3) のルート詐取に成功している。 実際に我々はCVEにおける多くの脆弱性を発見しており、ファジング効果によるカーネルクラッシュを実現している。また、我々はMac OS X(10.11.3)においていくつかの脆弱性を使って、二つの異なるローカル権限昇格手法を確立している。 --- Moony Li & Jack Tang