Lessons Learned: Black Hat’s Infrastructure 
THE TWEETS MUST FLOW 
September 11, 2014
25,000 DNS PACKETS 
IN 4 SECONDS BY ONE CLASSROOM
3 
Then: Technical Engineer & Volunteer Director @ Black Hat 
Now: Security Analyst @ Bishop Fox 
Twitter: @conandooley 
HOW DID I GET HERE? 
Who am I?
4 
Introduction 
Black Hat 
•Good to talk at; also good to talk about! 
Entertain 
•I have some stories 
Lessons Learned 
•There were some great security lessons learned 
Going Meta 
•Experience at Black Hat as it relates to the problems I see in security 
LET’S TALK ABOUT YOU AND ME
5 
Owning Things 
•Black Hat is owned by UBM 
Technical Staff 
•Usually one person, supporting everything 
•Sometimes two –those were the good days 
Security Basics 
•Segment everything 
•Redundancy 
•Keep it simple 
24/7/365 ON CALL 
Supporting Infrastructure
6 
This cloud is dark because 
of all the black hats 
Firewalls in High 
Availability Mode 
Switches with lots of 
VLANs 
It’s BSD and virtualized 
BSD all the way down 
PRETTY PICTURES 
Supporting Infrastructure
EVENTS 
USA! USA! USA! USA! (OH, AND EUROPE, AND ABU DHABI, AND…)
8 
Volunteers 
•Approximately 75 people willing to work insane hours 
•Wouldn’t be possible without them 
Attendees 
•Nearly 10,000 attendees: Elevate tweets, not privileges 
Trainings 
•1500 Wired Students: Ready to chew gum and pop shells 
Presenters 
•Yes, my live demo requires Internet! 
HACKIN’ AROUND THE WORLD, BUT MOSTLY IN THE DESERT 
Overview
9 
Assumptions made about Black Hat’s on-site network: 
•It’s stacked deep with 0days! 
•Second most hostile network in the world … 
Security must be the top priority at Black Hat! 
SOME SAY… 
Black Hat’s Event Network
LOL (FIND PICTURE)
11 
Why would a media company care about security? 
•None of their other events need security! 
Security Priorities the Business Cares About 
•Don’t get the registration database owned 
•Protect the CFP platform 
•Avoid Brand Damage 
•That’s it, right? 
The Reality of it All
12 
Linksys Routers 
•Every classroom, blessed with their own tiny blue protector 
Switches 
•10/100 is all any honest network needs 
Artisanal, Bespoke Cables 
•Handmade with love 
•Welcome Volunteer, here’s a roll of cable, some ends, and a punch down tool! 
LITTLE BOXES MADE OF TICKYTACKY 
Blue Boxes
THE ENTIRE WORLD IS FIRE (FIND PICTURE)
THANKFULLY, I WASN’T AROUND THEN 
BUT I DID HELP FIX IT…
15 
STILL KEEPING IT SIMPLE 
Keep Calm and Segment Your Network 
SOHO? More like SO NO 
•Replaced Linksys boxes with Soekris6501 
OpenBSD 
•Reliable 
•Simple 
•Does nothing (except what you tell it to) 
Quality of Service 
•PF and ALTQ
16 
Classrooms 
Soekris 6501 per 
Classroom 
Hotel Switches 
…Gateway laptop? 
PRETTY PICTURES, A CAVEMAN COULD DO IT EDITION 
Design
17 
LIKE FISHER PRICE, BUT WITH MORE USB ADAPTERS 
Baby’s First NOC 
Laptop Gateway 
•Quad Core 
•Battery Backup 
•Plenty of USB Ports…good for 10/100 USB adapters 
Physical Setup 
•Cardboard Walls 
•Power Strip 
•Table 
•Sometimes the lock would jam –impossible to pick
THREAT MAUDLIN 
SHOULD HAVE BEEN MORE OPTIMISTIC
19 
Nope. 
Definitely not. 
Strict no ski mask policy. 
Block them all. 
SHOW ME YOUR HACKING HAT 
External Attackers
20 
No mask policy: still good 
Everyone’s gottalive somewhere… 
100% successful defense through intimidation and/or yelling 
BEWARE OF PEOPLE WEARING MASKS OF THEIR OWN FACE 
Internal Attackers
21 
FORMALIZE! 
A Simple Threat Model and Mitigations 
External Attackers 
•Blocked 
Bad Students 
•Limited to their classrooms or the Internet 
Bad Attendees 
•Could be jerks on the wireless –accepted risk 
•No access to physical networks without breaking something 
Other Network Attackers 
•Press –VLANs and isolation plus warnings 
•Staff –Access controlled 
•Registration –Access controlled
22 
BACK TO BASICS 
Controlled Hostility 
Monitor 
•Know where you’re down 
•Helps you yell at the right people 
Wireless 
•Auto-smooshrogue APs 
•Pineapple the world 
•Pineapple: Spoof networks wireless devices have connected to previously 
•No one cares as long as the Internet works
BLACK HAT: HACKERS BEHAVING NICELY
GOOD DESIGN 
COULDN’T TELL YOU WHAT IT IS, BUT I KNOW IT WHEN I SEE IT
25 
Principals 
•Keep it Simple –Yes. Still. 
•Know your networks – Drop everything that doesn’t belong 
•Segment –Put like with like 
•Control Physical Access – No USB access, no random drops 
•Repeatable –Automate everything you can 
Implementation 
•No Services –Exposed as little as possible 
•Dropped it, it was hot – 94% traffic dropped at the gateway 
•Smart Segments –Break it for your class, they’ll yell at you for me 
•Protect your ports – Ethernet, USB 
•YERP 
STILL NOT TIRED OF KEEPING IT SIMPLE 
Design Goals
26 
•Simple Tool –Everyone’s reinvented this wheel, but YOLO 
•Pushes Preset Configurations –You knew what you wanted, right? 
•Brain Dead Operation –No sleep is standard, and you don’t want to screw it up in front of everyone 
WELL, MOSTLY 
YERP: YERP, Everything Runs Perfectly
27 
Use it: 
clone git repo 
fab yerp.deploy_config:config=<configfile location> -H <targets> 
http://github.com/conandooley/yerp 
HOW DID I GET HERE, I AM NOT GOOD WITH COMPUTERS 
YERP: YERP, Everything Runs Perfectly
28 
People are generally pretty good 
Designed to be secure or non-functional 
Technical failures had a far more significant impact 
Biggest technical problem? State table exhaustion 
OUTCOMES ARE IMPORTANT 
End Results
ENOUGH ABOUT BLACK HAT 
WE’RE GOING META
30 
Security is never a priority –Let’s learn to live with that. 
Training failed, people demanded refunds –Had to happen to be taken seriously. Why? 
That jammed lock –Who would actually be stopped by that? 
You’ve got advantages –What are they? Wear them out. 
You own this –Know what lives on your network and verify. 
They only care about the business –So learn enough to show the concerns via business cases 
WELL, I WROTE THEM DOWN FOR YOU 
Remember Those Things I Said to Remember?
31 
•Listen to your Users –There are many ways to give them what they want, find the secure ways 
•Understand What They Need –If you know what they want, chances are there is a way to do it securely 
•Create Secure Defaults –Make security choices for them when you can 
•Educate –When you do have to make life more difficult, explain why 
•Link security to outcomes –Define consequences, show how they happen 
•Prioritize –Let’s figure out what makes a difference, and work on that first 
ONE SIZE NEVER FITS ALL 
Build Security Into Operations
32 
•Get out of the comfort zone –We’ve made some impact over the years but nowhere near enough 
•Learn to Market Ourselves –We’re struggling with effective communication, we need to fix that 
•Define Language –What does “breach” really mean? 
•Common knowledge is flawed –The common solution is quick, easy, and almost always wrong 
•Let’s make friends everywhere –More different, unique people caring about security is great 
•Impact and outcomes –An honest conversation needs to happen 
NOW WE ARE ALL SPACE CADETS 
Going More Meta Again
QUESTIONS?
Thank You!

More Related Content

PPT
Technology at tutorials
PPTX
Emerging Technologies in Libraries
PPTX
Keynote at the Cyber Security Summit Prague 2015
PDF
Using Video to Communicate Technology
PPTX
New technology
PPTX
5 technologies that have changed our lives
PPTX
New Technologies and their role in the workplace
PPTX
Oklahoma ABLE Tech - Making Technology "Work" for You
Technology at tutorials
Emerging Technologies in Libraries
Keynote at the Cyber Security Summit Prague 2015
Using Video to Communicate Technology
New technology
5 technologies that have changed our lives
New Technologies and their role in the workplace
Oklahoma ABLE Tech - Making Technology "Work" for You

Viewers also liked (20)

PPTX
44CON 2013 - .Net Havoc - Manipulating Properties of Dormant Server Side Web ...
PPTX
44CON 2014 - Researching Android Device Security with the Help of a Droid Arm...
PDF
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
PPTX
44CON @ IPexpo - You're fighting an APT with what exactly?
PDF
44CON London 2015 - Hunting Asynchronous Vulnerabilities
PDF
44CON London 2015 - reverse reverse engineering
PPTX
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
PDF
44CON 2014 - Flushing Away Preconceptions of Risk, Thom Langford
PDF
44CON 2014 - Breaking AV Software
PDF
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
PDF
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
PDF
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
PDF
44CON 2014 - Advanced Excel Hacking, Didier Stevens
PDF
44CON London 2015 - Playing with Fire: Attacking the FireEye MPS
PDF
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
PDF
44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...
PDF
44CON London 2015 - Inside Terracotta VPN
PDF
44CON London 2015 - Smart Muttering; a story and toolset for smart meter plat...
PDF
44CON 2014 - GreedyBTS: Hacking Adventures in GSM, Hacker Fantastic
PDF
44CON 2014 - Binary Protocol Analysis with CANAPE, James Forshaw
44CON 2013 - .Net Havoc - Manipulating Properties of Dormant Server Side Web ...
44CON 2014 - Researching Android Device Security with the Help of a Droid Arm...
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - reverse reverse engineering
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Flushing Away Preconceptions of Risk, Thom Langford
44CON 2014 - Breaking AV Software
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
44CON 2014 - Advanced Excel Hacking, Didier Stevens
44CON London 2015 - Playing with Fire: Attacking the FireEye MPS
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...
44CON London 2015 - Inside Terracotta VPN
44CON London 2015 - Smart Muttering; a story and toolset for smart meter plat...
44CON 2014 - GreedyBTS: Hacking Adventures in GSM, Hacker Fantastic
44CON 2014 - Binary Protocol Analysis with CANAPE, James Forshaw
Ad

Similar to 44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley (20)

PDF
Sscp Systems Security Certified Practitioner Allinone Exam Guide Third Editio...
PDF
Architecting Secure Web Systems
PPTX
Cyber crime &_info_security
PPTX
Network security - Defense in Depth
PPTX
PACE-IT: Common Network Vulnerabilities
PDF
Cybersecurity Roadmap for Beginners
ODP
A journey through an INFOSEC labyrinth
PDF
Break IT Down by Josh Smith
DOCX
Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx
PPTX
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
PPTX
Implementing security for your library | PLAN Tech Day Conference
PPTX
Cyber Security
PDF
Information Security Risk Management
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PPTX
So You Want to be a Hacker?
PDF
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
PDF
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
PPT
IT8005_EC_Unit_III_Securing_Communication_Channels
PPTX
Getting involved in network security
PDF
Networking Essay Example
Sscp Systems Security Certified Practitioner Allinone Exam Guide Third Editio...
Architecting Secure Web Systems
Cyber crime &_info_security
Network security - Defense in Depth
PACE-IT: Common Network Vulnerabilities
Cybersecurity Roadmap for Beginners
A journey through an INFOSEC labyrinth
Break IT Down by Josh Smith
Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
Implementing security for your library | PLAN Tech Day Conference
Cyber Security
Information Security Risk Management
Wfh security risks - Ed Adams, President, Security Innovation
So You Want to be a Hacker?
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
IT8005_EC_Unit_III_Securing_Communication_Channels
Getting involved in network security
Networking Essay Example
Ad

More from 44CON (20)

ODP
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
PPTX
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
PPTX
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
PDF
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
PDF
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
PDF
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
PDF
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
PDF
Pwning the 44CON Nerf Tank
PDF
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
PDF
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
PDF
44CON London 2015 - Is there an EFI monster inside your apple?
PPTX
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
PPTX
44CON London 2015 - How to drive a malware analyst crazy
PDF
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
PDF
44CON London 2015 - Going AUTH the Rails on a Crazy Train
PDF
44CON London 2015 - Software Defined Networking (SDN) Security
PDF
44CON London 2015 - DDoS mitigation EPIC FAIL collection
PDF
44CON London 2015 - Windows 10: 2 Steps Forward, 1 Step Back
PPTX
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell
PDF
44CON London - Attacking VxWorks: from Stone Age to Interstellar
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Pwning the 44CON Nerf Tank
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - Windows 10: 2 Steps Forward, 1 Step Back
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell
44CON London - Attacking VxWorks: from Stone Age to Interstellar

Recently uploaded (20)

PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
Benefits of Physical activity for teenagers.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPTX
Modernising the Digital Integration Hub
PDF
Unlock new opportunities with location data.pdf
PDF
Architecture types and enterprise applications.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
August Patch Tuesday
PPT
Geologic Time for studying geology for geologist
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
The various Industrial Revolutions .pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
1 - Historical Antecedents, Social Consideration.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Benefits of Physical activity for teenagers.pptx
What is a Computer? Input Devices /output devices
Hindi spoken digit analysis for native and non-native speakers
O2C Customer Invoices to Receipt V15A.pptx
Modernising the Digital Integration Hub
Unlock new opportunities with location data.pdf
Architecture types and enterprise applications.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
CloudStack 4.21: First Look Webinar slides
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
observCloud-Native Containerability and monitoring.pptx
August Patch Tuesday
Geologic Time for studying geology for geologist
Chapter 5: Probability Theory and Statistics
Univ-Connecticut-ChatGPT-Presentaion.pdf
The various Industrial Revolutions .pptx
sustainability-14-14877-v2.pddhzftheheeeee

44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

  • 1. Lessons Learned: Black Hat’s Infrastructure THE TWEETS MUST FLOW September 11, 2014
  • 2. 25,000 DNS PACKETS IN 4 SECONDS BY ONE CLASSROOM
  • 3. 3 Then: Technical Engineer & Volunteer Director @ Black Hat Now: Security Analyst @ Bishop Fox Twitter: @conandooley HOW DID I GET HERE? Who am I?
  • 4. 4 Introduction Black Hat •Good to talk at; also good to talk about! Entertain •I have some stories Lessons Learned •There were some great security lessons learned Going Meta •Experience at Black Hat as it relates to the problems I see in security LET’S TALK ABOUT YOU AND ME
  • 5. 5 Owning Things •Black Hat is owned by UBM Technical Staff •Usually one person, supporting everything •Sometimes two –those were the good days Security Basics •Segment everything •Redundancy •Keep it simple 24/7/365 ON CALL Supporting Infrastructure
  • 6. 6 This cloud is dark because of all the black hats Firewalls in High Availability Mode Switches with lots of VLANs It’s BSD and virtualized BSD all the way down PRETTY PICTURES Supporting Infrastructure
  • 7. EVENTS USA! USA! USA! USA! (OH, AND EUROPE, AND ABU DHABI, AND…)
  • 8. 8 Volunteers •Approximately 75 people willing to work insane hours •Wouldn’t be possible without them Attendees •Nearly 10,000 attendees: Elevate tweets, not privileges Trainings •1500 Wired Students: Ready to chew gum and pop shells Presenters •Yes, my live demo requires Internet! HACKIN’ AROUND THE WORLD, BUT MOSTLY IN THE DESERT Overview
  • 9. 9 Assumptions made about Black Hat’s on-site network: •It’s stacked deep with 0days! •Second most hostile network in the world … Security must be the top priority at Black Hat! SOME SAY… Black Hat’s Event Network
  • 11. 11 Why would a media company care about security? •None of their other events need security! Security Priorities the Business Cares About •Don’t get the registration database owned •Protect the CFP platform •Avoid Brand Damage •That’s it, right? The Reality of it All
  • 12. 12 Linksys Routers •Every classroom, blessed with their own tiny blue protector Switches •10/100 is all any honest network needs Artisanal, Bespoke Cables •Handmade with love •Welcome Volunteer, here’s a roll of cable, some ends, and a punch down tool! LITTLE BOXES MADE OF TICKYTACKY Blue Boxes
  • 13. THE ENTIRE WORLD IS FIRE (FIND PICTURE)
  • 14. THANKFULLY, I WASN’T AROUND THEN BUT I DID HELP FIX IT…
  • 15. 15 STILL KEEPING IT SIMPLE Keep Calm and Segment Your Network SOHO? More like SO NO •Replaced Linksys boxes with Soekris6501 OpenBSD •Reliable •Simple •Does nothing (except what you tell it to) Quality of Service •PF and ALTQ
  • 16. 16 Classrooms Soekris 6501 per Classroom Hotel Switches …Gateway laptop? PRETTY PICTURES, A CAVEMAN COULD DO IT EDITION Design
  • 17. 17 LIKE FISHER PRICE, BUT WITH MORE USB ADAPTERS Baby’s First NOC Laptop Gateway •Quad Core •Battery Backup •Plenty of USB Ports…good for 10/100 USB adapters Physical Setup •Cardboard Walls •Power Strip •Table •Sometimes the lock would jam –impossible to pick
  • 18. THREAT MAUDLIN SHOULD HAVE BEEN MORE OPTIMISTIC
  • 19. 19 Nope. Definitely not. Strict no ski mask policy. Block them all. SHOW ME YOUR HACKING HAT External Attackers
  • 20. 20 No mask policy: still good Everyone’s gottalive somewhere… 100% successful defense through intimidation and/or yelling BEWARE OF PEOPLE WEARING MASKS OF THEIR OWN FACE Internal Attackers
  • 21. 21 FORMALIZE! A Simple Threat Model and Mitigations External Attackers •Blocked Bad Students •Limited to their classrooms or the Internet Bad Attendees •Could be jerks on the wireless –accepted risk •No access to physical networks without breaking something Other Network Attackers •Press –VLANs and isolation plus warnings •Staff –Access controlled •Registration –Access controlled
  • 22. 22 BACK TO BASICS Controlled Hostility Monitor •Know where you’re down •Helps you yell at the right people Wireless •Auto-smooshrogue APs •Pineapple the world •Pineapple: Spoof networks wireless devices have connected to previously •No one cares as long as the Internet works
  • 23. BLACK HAT: HACKERS BEHAVING NICELY
  • 24. GOOD DESIGN COULDN’T TELL YOU WHAT IT IS, BUT I KNOW IT WHEN I SEE IT
  • 25. 25 Principals •Keep it Simple –Yes. Still. •Know your networks – Drop everything that doesn’t belong •Segment –Put like with like •Control Physical Access – No USB access, no random drops •Repeatable –Automate everything you can Implementation •No Services –Exposed as little as possible •Dropped it, it was hot – 94% traffic dropped at the gateway •Smart Segments –Break it for your class, they’ll yell at you for me •Protect your ports – Ethernet, USB •YERP STILL NOT TIRED OF KEEPING IT SIMPLE Design Goals
  • 26. 26 •Simple Tool –Everyone’s reinvented this wheel, but YOLO •Pushes Preset Configurations –You knew what you wanted, right? •Brain Dead Operation –No sleep is standard, and you don’t want to screw it up in front of everyone WELL, MOSTLY YERP: YERP, Everything Runs Perfectly
  • 27. 27 Use it: clone git repo fab yerp.deploy_config:config=<configfile location> -H <targets> http://github.com/conandooley/yerp HOW DID I GET HERE, I AM NOT GOOD WITH COMPUTERS YERP: YERP, Everything Runs Perfectly
  • 28. 28 People are generally pretty good Designed to be secure or non-functional Technical failures had a far more significant impact Biggest technical problem? State table exhaustion OUTCOMES ARE IMPORTANT End Results
  • 29. ENOUGH ABOUT BLACK HAT WE’RE GOING META
  • 30. 30 Security is never a priority –Let’s learn to live with that. Training failed, people demanded refunds –Had to happen to be taken seriously. Why? That jammed lock –Who would actually be stopped by that? You’ve got advantages –What are they? Wear them out. You own this –Know what lives on your network and verify. They only care about the business –So learn enough to show the concerns via business cases WELL, I WROTE THEM DOWN FOR YOU Remember Those Things I Said to Remember?
  • 31. 31 •Listen to your Users –There are many ways to give them what they want, find the secure ways •Understand What They Need –If you know what they want, chances are there is a way to do it securely •Create Secure Defaults –Make security choices for them when you can •Educate –When you do have to make life more difficult, explain why •Link security to outcomes –Define consequences, show how they happen •Prioritize –Let’s figure out what makes a difference, and work on that first ONE SIZE NEVER FITS ALL Build Security Into Operations
  • 32. 32 •Get out of the comfort zone –We’ve made some impact over the years but nowhere near enough •Learn to Market Ourselves –We’re struggling with effective communication, we need to fix that •Define Language –What does “breach” really mean? •Common knowledge is flawed –The common solution is quick, easy, and almost always wrong •Let’s make friends everywhere –More different, unique people caring about security is great •Impact and outcomes –An honest conversation needs to happen NOW WE ARE ALL SPACE CADETS Going More Meta Again