SlideShare a Scribd company logo
SENTRYGT.COM
BUILDING A
HACKER-RESISTANT
NETWORK
Protecting Your Confidential Information
and Your Business
SENTRYGT.COM
Agenda
• A real-world case study
• The impact
• Protecting yourself, your people and
your livelihood
SENTRYGT.COM
SENTRYGT.COM
Hackers Got…
Sony’s entire network:
• ALL users’ email accounts
• ALL data files: Salaries, SSNs
• ALL promotional materials
• ALL contracts and agreements
on their network
• ALL schedules and project
plans
SENTRYGT.COM
How did the
hacker(s) succeed?
SENTRYGT.COM
What damage has been done so far?
Release Cancelled Private communication
now public
Confidential
Information now public
Executive humiliation
SENTRYGT.COM
What did it cost?
$40 million to produce $35 million to promote
$$$$$ million for PR $$$$$ million for Network Security
At least
$100
million
SENTRYGT.COM
Could this happen to you?
SENTRYGT.COM
Is your technology platform:
•Monitored?
•Protected?
•Secure?
•Redundant?
•Backed up locally and
remotely?
SENTRYGT.COM
Threats
Viruses SPAM Worms
Keyloggers Trojan Horses DDoS attacks
SPAM bots
Man-in-the Middle
attacks Port Scans
Packet Sniffers Password Crackers And MORE!
SENTRYGT.COM
Solutions
The Foundation:
• Location(s)
• Connectivity
• Equipment
• Operating system(s)
• Applications
• Security policies
• Safeguards
SENTRYGT.COM
Location(s)
• On-premises
• Local data center
• Remote data center
• Cloud computing provider
• Hybrid environment
SENTRYGT.COM
Connectivity
• T1
• Business-class
cable/fiber
• DS3, OC3
• GigE, MetroE
• AirBand, AboveNet
SENTRYGT.COM
Equipment
• Server(s)
• Router(s)
• Switches
• Firewall/VPN appliances
• IDS/IPS devices
SENTRYGT.COM
Operating System(s)
• Windows Server
• Standard or Essentials
• Enterprise
• System Center, Data Center
• Linux
• Mac (OSX, OS 11)
• Unix/AIX
SENTRYGT.COM
Applications
• CRM, ERP, MRP, OE
• Accounting
• Office suites (Word, WordPerfect)
• AV-AS-AM software
• Back-up software
• Network management software
SENTRYGT.COM
Security Policies
• Administrator access
• User access settings
• Event and Error Log reviews
• Password policy
• Acceptable-use policy
• WSUS and automatic updates
• 24x7x365 monitoring
• Penetration testing,
vulnerability analyses
SENTRYGT.COM
Esssential
Safeguards
• Regular random test file
restores
• Staged attacks and drills
• Quarterly Technology
Reviews
• Ongoing new-threat
analyses
• Regular user training
sessions
SENTRYGT.COM
Network Access
• Do you have the administrator
password to your own network?
• When was the last time you
tested it?
• When was the last time you
changed it?
• Who else has it?
• Is it stored in a secure location?
SENTRYGT.COM
The cost of having a hacker-resistant
network will be far less than the cost
of not having one.
SENTRYGT.COM
One Final Thought:
SENTRYGT.COM
Questions?
SENTRYGT.COM
Thank you for your time!
Brad Wohlander, CEO
SENTRY GLOBAL TECHNOLOGIES, LLC
5700 Granite Parkway
Suite 200
Plano, Texas 75024
972.491.0300
bww@sentrygt.com

More Related Content

PDF
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
PDF
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
PDF
DEF CON 23 - vivek ramachadran - chellam
PPT
Covid 19 staying cyber secure
PDF
Genian NAC Overview
PDF
What we learned from MISA Ontario 2020 Infosec
PPTX
Essential Layers of IBM i Security: System-Access Security
PPTX
Cyber Security Overview for Small Businesses
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
DEF CON 23 - vivek ramachadran - chellam
Covid 19 staying cyber secure
Genian NAC Overview
What we learned from MISA Ontario 2020 Infosec
Essential Layers of IBM i Security: System-Access Security
Cyber Security Overview for Small Businesses

What's hot (20)

PPT
Understanding Technology Stakeholders
PDF
Mickey pacsec2016_final
PPTX
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
PPTX
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
PDF
Genian NAC Datasheet
PPTX
Practical SME Security on a Shoestring
PPTX
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
PDF
Current & Emerging Cyber Security Threats
PDF
Cybersecurity Summit AHR20 Protect Cimetrics
PPTX
Introduction to Security (Hardware, Software, Data & Policies)
PPTX
Security Landscape Presentation
PPTX
CompTIA Security+ Chapter Four Review
PDF
CSF18 - How to Block Ransomware - Sami Laiho
PDF
CSF18 - GDPR - Sami Laiho
PPTX
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
PPTX
Security architecture design patterns iltam 2018 - ofer rivlin
PPTX
Segmenting your Network for Security - The Good, the Bad and the Ugly
PPTX
Security challenges in d2d communication by ajithkumar vyasarao
PDF
Bugbounty Programs - Codemotion
PDF
10. hddn-datalekaje-hs-01
Understanding Technology Stakeholders
Mickey pacsec2016_final
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Genian NAC Datasheet
Practical SME Security on a Shoestring
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Current & Emerging Cyber Security Threats
Cybersecurity Summit AHR20 Protect Cimetrics
Introduction to Security (Hardware, Software, Data & Policies)
Security Landscape Presentation
CompTIA Security+ Chapter Four Review
CSF18 - How to Block Ransomware - Sami Laiho
CSF18 - GDPR - Sami Laiho
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Security architecture design patterns iltam 2018 - ofer rivlin
Segmenting your Network for Security - The Good, the Bad and the Ugly
Security challenges in d2d communication by ajithkumar vyasarao
Bugbounty Programs - Codemotion
10. hddn-datalekaje-hs-01

Similar to Building a Hacker Resistant Network (20)

PPTX
New Horizons SCYBER Presentation
PPTX
CyberSecurity.pptx
PPTX
Year of pawnage - Ian trump
PPTX
640-554 IT Certification and Career Paths
PPTX
SITSecure Audits
PPTX
It security the condensed version
PPTX
Mining attackers mind
PDF
Do You Know About Cyber Security? | Secninjaz Technologies LLP
PPTX
Implementing security for your library | PLAN Tech Day Conference
PDF
Cubeitz 1 Million Bit Encryption
PDF
CubeiTz Brochure
PDF
100+ Cyber Security Interview Questions and Answers in 2022
PPT
Meletis Belsis - Introduction to information security
PDF
Cybersecurity - Webinar Session
PPTX
Why do women love chasing down bad guys?
PDF
CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz
PPTX
Cyber Threats and Data Privacy in a Digital World
PPTX
Cyber Security
PPTX
Cyber War, Cyber Peace, Stones, and Glass Houses
PPTX
Cybersecurity.pptx
New Horizons SCYBER Presentation
CyberSecurity.pptx
Year of pawnage - Ian trump
640-554 IT Certification and Career Paths
SITSecure Audits
It security the condensed version
Mining attackers mind
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Implementing security for your library | PLAN Tech Day Conference
Cubeitz 1 Million Bit Encryption
CubeiTz Brochure
100+ Cyber Security Interview Questions and Answers in 2022
Meletis Belsis - Introduction to information security
Cybersecurity - Webinar Session
Why do women love chasing down bad guys?
CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz
Cyber Threats and Data Privacy in a Digital World
Cyber Security
Cyber War, Cyber Peace, Stones, and Glass Houses
Cybersecurity.pptx

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Spectroscopy.pptx food analysis technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Cloud computing and distributed systems.
Reach Out and Touch Someone: Haptics and Empathic Computing
“AI and Expert System Decision Support & Business Intelligence Systems”
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Understanding_Digital_Forensics_Presentation.pptx
Network Security Unit 5.pdf for BCA BBA.
sap open course for s4hana steps from ECC to s4
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Agricultural_Statistics_at_a_Glance_2022_0.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Programs and apps: productivity, graphics, security and other tools
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectroscopy.pptx food analysis technology
The AUB Centre for AI in Media Proposal.docx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Building a Hacker Resistant Network

Editor's Notes

  • #4: In December 2014 a breach of Sony’s technology infrastructure made world-wide headlines. What happened?
  • #6: The hackers succeeded by capturing or using the administrator password or user name of a network administrator who had access to everything on the internal Sony network.
  • #7: Release of a major film has been all but cancelled Private and embarrassing intercompany communications have been made public Confidential company information has become public Executives’ personal comments and anecdotes have been taken out of context and created consternation and humiliation
  • #8: “The Interview” movie cost over $40 million to produce SONY spent another $35 million or so on promotion and materials for the film The public-relations and additional network security expenditures haven’t even been calculated yet, but are estimated to be at least $100 million
  • #11: Viruses Spam Worms Keyloggers Trojan horses DDoS attacks Spam bots Man-in-the-middle attacks Port scans Packet sniffers Password crackers . . . and more!
  • #12: You don’t build a house and start with the roof. You start with the foundation. These items are the foundation. I’ll address each one.