SlideShare a Scribd company logo
Make Every Spin
Count:
Putting The Security Odds
In Your Favor
About Me:
• Director of Engineering at
Cerdant
• 13 years
• Avid Golfer, Runner and
Outdoorsman
• Nerf Gun Enthusiast
• Twitter - @joshuaskeens
• joshua.skeens@cerdant.co
m
Make Every Spin Count: Putting
The Security Odds In Your Favor
 How can I put the odds in my favor?
 We first need to know what our odds are
 2017 Verizon Report statistics
 Best “bets” to increase your security odds
Verizon Report
2017
 10th Annual DBIR Report
 65 Sources
 Includes
 Breaches
 Incidents
Verizon Report 2017
Verizon Report 2017
Let’s stop
gambling with
our data.
• It’s never going to happen to
me!
• I’ve got a firewall and Anti-virus
I’m unhackable!
• My users never click on links
they shouldn’t
Verizon Report 2017
61%
• of the data breach victims in this year’s report
are businesses with under 1,000 employees
Verizon Report 2017
80%
• of hacking-related breaches leveraged either stolen passwords and/or weak or
guessable passwords.
95%
• of phishing attacks that led to a breach were followed by some sort of software
installation.
• 1 in 14 people were tricked into opening a link or attachment they shouldn't
• 25% of those people were tricked into doing it again
Top 25 Passwords of 2016
123456
123456789
qwerty
12345678
111111
123456789
0
1234567
password
123123
987654321
qwertyuiop
mynoob
123321
666666
18atcskd2
w
7777777
1q2w3e4r
654321
555555
3rjs1la7qe
google
1q2w3e4r5
t
123qwe
zxcvbnm
1q2w3e
Was your password on that list??!!
What is a hacker?!
Let’s stop
gambling and
let’s starting
WINNING!
 Nothing is hack proof
 But we don’t want to make anything easy
 Most hackers don’t want to work that hard
 What steps can we take to put the
odds in our favor?
Stacking the Odds in your favor
 Passwords
 Enforce Password Complexity
 8+ characters
 Require Upper Case, Lower Case, Special Characters and Numbers
 Password Rotation
 Teach password creation
 Yahoo & LinkedIn
 2FA – use it EVERYWHERE!!!
 https://twofactorauth.org/
 Minimize Privileges
 No Local Admin rights
 No Domain Admin rights
 Different Local Admin for each machine
 Microsoft LAPS
Stacking the Odds in your favor….
 Command Line (cmd)
 Disable access
 Most users don’t need access to CMD
 PowerShell
 Disable access
 BUT…..some users do need PowerShell access
Grant Privileges via AD Groups
Enable it when needed – default should be disabled
Stacking the Odds in your favor….
 Network Segmentation
 VLANs, VLANs, VLANs
 Isolate devices and departments
 DMZ for public facing servers
 Wireless Segmentation
 Multiple SSIDs
Employees
BYOD
Guest
Stacking the Odds in your favor….
 Protect the Gateway
 Next Generation Firewall
SonicWALL!!
 Strong Access Lists
Yes strict outbound port policies
 Audit your ruleset regularly
 DPI-SSL
60% to 70% of all traffic is encrypted now
 Scan for and block Applications
 Capture ATP
 Sandbox Malicious files before they even make it onto the network
Stacking the Odds in your favor….
 Anti-virus
 Deploy Anti-virus at the End Point
 New Artificial Intelligence (AI) AV
Cylance
No database
No patient-zero
Doesn’t need Internet Access to pull updates
98% effective rate
Cloud Management
Signature-based AV solutions are less than 40% effective
POC – ZERODay!
Stacking the Odds in your favor….
 OS Patching
 Move to supported OS
 Schedule routine patching
 Application Patching
 Patch Applications
Security Patches
Stacking the Odds in your favor….
 Device Inventory Management
 Spiceworks
 WhatsUp
 ManageEngine
 Application Inventory Management
 Ninite
 Spiceworks
 ManageEngine
Stacking the Odds in your favor….
 Attached Device Management
 Should employees be allowed to connect USB drives?
 Disable feature
 Provide company USBs
Lock down USBs to specific OUIs
*Cylance*
 Data Backup
 Backup critical data daily
 Do scheduled restores to test data backup validity
Stacking the Odds in your favor….
 Application Whitelisting
 Only allow “Approved” Applications to run
Cylance
Windows has Application Whitelisting Built-in
 Lockdown DNS Access
 Enforce DNS access to Local Server(s) only
 Lockdown outbound DNS access to DNS Servers only
 Vulnerability/Network Assessments
Why the Hackers “house”
normally win
Stacking the Odds in your favor….
 Employees
 Single largest Security Risk
 At least 60% of all incidents can be contributed to employees
 Easiest attack angle
 What can be done?
 Train employees on proper Email and Web browsing etiquette
KnowBe4
PhishMe
 Gauge employee computer & security knowledge
 Train employees on security awareness, and reward them for
reporting suspicious activity
You might be feeling like this now…
But You can do this!
• The 1st thing is to just get started
• Don’t be paralyzed
• Create your list and implement 1 new security
practice each week
• Schedule quarterly security reviews as soon as you
get back to the office
• There is no shame in doing the easiest 1st
• Anything is better than nothing
THANK YOU!!!!!

More Related Content

PPTX
Thinking Differently About Security Protection and Prevention
PPTX
Cerdant Security State of the Union
PPSX
SonicWALL Advanced Features
PPTX
Preventing Today's Malware
PDF
Revolutionizing Advanced Threat Protection
PPTX
Advanced Threat Protection - Sandboxing 101
PPTX
Advanced Threat Protection
PDF
CAS MAA Infographic
Thinking Differently About Security Protection and Prevention
Cerdant Security State of the Union
SonicWALL Advanced Features
Preventing Today's Malware
Revolutionizing Advanced Threat Protection
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection
CAS MAA Infographic

What's hot (20)

PPTX
Content Analysis System and Advanced Threat Protection
PDF
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
PDF
Advanced Threat Protection Lifecycle Infographic
PPTX
Taking the battle to Ransomware with Sophos Intercept X
PPTX
How Malware Works
PPTX
Sophos Next-Generation Enduser Protection
PPTX
This is Next-Gen IT Security - Introducing Intercept X
PDF
Advanced Threat Protection – ultimátní bezpečnostní řešení
PDF
Security Implications of the Cloud - CSS Dallas Azure
PPTX
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
PPTX
Intercept X - Sophos Endpoint
PPTX
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
PPTX
Two for Attack: Web and Email Content Protection
PPTX
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
PDF
Security Implications of the Cloud
PDF
Network Security Tools
PDF
Complete Endpoint protection
PDF
Reducing Your Attack Surface
Content Analysis System and Advanced Threat Protection
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Advanced Threat Protection Lifecycle Infographic
Taking the battle to Ransomware with Sophos Intercept X
How Malware Works
Sophos Next-Generation Enduser Protection
This is Next-Gen IT Security - Introducing Intercept X
Advanced Threat Protection – ultimátní bezpečnostní řešení
Security Implications of the Cloud - CSS Dallas Azure
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Improve Situational Awareness for Federal Government with AlienVault USM
Intercept X - Sophos Endpoint
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Two for Attack: Web and Email Content Protection
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Security Implications of the Cloud
Network Security Tools
Complete Endpoint protection
Reducing Your Attack Surface
Ad

Similar to Make Every Spin Count: Putting the Security Odds in Your Favor (20)

PPTX
Cyber security awareness for end users
PDF
Solvay secure application layer v2015 seba
PDF
Managing privileged account security
PPTX
The Truth About Viruses on Power Systems - Powertech
PPTX
Cybersecurity Training
PPTX
A DevOps Guide to Web Application Security
PDF
OSB120 Beat Ransomware
PPT
Protecting Your organization from WannaCry Ransomware
PDF
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
PPTX
Prevent Getting Hacked by Using a Network Vulnerability Scanner
PDF
How to code securely: a crash course for non-coders
PPTX
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
PDF
Crush Common Cybersecurity Threats with Privilege Access Management
PPT
Dos and Dont to be followed to protect information and technology
PDF
Cybersecurity update 12
PPTX
A Closer Look at Isolation: Hype or Next Gen Security?
PDF
Behind the Curtain: Exposing Advanced Threats
PDF
PDF
Client-Side Penetration Testing Presentation
PPTX
CS5300 class presentation on managing information systems
Cyber security awareness for end users
Solvay secure application layer v2015 seba
Managing privileged account security
The Truth About Viruses on Power Systems - Powertech
Cybersecurity Training
A DevOps Guide to Web Application Security
OSB120 Beat Ransomware
Protecting Your organization from WannaCry Ransomware
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Prevent Getting Hacked by Using a Network Vulnerability Scanner
How to code securely: a crash course for non-coders
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Crush Common Cybersecurity Threats with Privilege Access Management
Dos and Dont to be followed to protect information and technology
Cybersecurity update 12
A Closer Look at Isolation: Hype or Next Gen Security?
Behind the Curtain: Exposing Advanced Threats
Client-Side Penetration Testing Presentation
CS5300 class presentation on managing information systems
Ad

Recently uploaded (20)

PDF
MSPs in 10 Words - Created by US MSP Network
PPTX
Probability Distribution, binomial distribution, poisson distribution
PPTX
Lecture (1)-Introduction.pptx business communication
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPTX
Amazon (Business Studies) management studies
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
Business model innovation report 2022.pdf
PDF
Types of control:Qualitative vs Quantitative
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PDF
A Brief Introduction About Julia Allison
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
IFRS Notes in your pocket for study all the time
PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
Reconciliation AND MEMORANDUM RECONCILATION
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
MSPs in 10 Words - Created by US MSP Network
Probability Distribution, binomial distribution, poisson distribution
Lecture (1)-Introduction.pptx business communication
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Amazon (Business Studies) management studies
HR Introduction Slide (1).pptx on hr intro
Business model innovation report 2022.pdf
Types of control:Qualitative vs Quantitative
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
A Brief Introduction About Julia Allison
Nidhal Samdaie CV - International Business Consultant
IFRS Notes in your pocket for study all the time
WRN_Investor_Presentation_August 2025.pdf
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Reconciliation AND MEMORANDUM RECONCILATION
unit 1 COST ACCOUNTING AND COST SHEET

Make Every Spin Count: Putting the Security Odds in Your Favor

  • 1. Make Every Spin Count: Putting The Security Odds In Your Favor
  • 2. About Me: • Director of Engineering at Cerdant • 13 years • Avid Golfer, Runner and Outdoorsman • Nerf Gun Enthusiast • Twitter - @joshuaskeens • joshua.skeens@cerdant.co m
  • 3. Make Every Spin Count: Putting The Security Odds In Your Favor  How can I put the odds in my favor?  We first need to know what our odds are  2017 Verizon Report statistics  Best “bets” to increase your security odds
  • 4. Verizon Report 2017  10th Annual DBIR Report  65 Sources  Includes  Breaches  Incidents
  • 7. Let’s stop gambling with our data. • It’s never going to happen to me! • I’ve got a firewall and Anti-virus I’m unhackable! • My users never click on links they shouldn’t
  • 8. Verizon Report 2017 61% • of the data breach victims in this year’s report are businesses with under 1,000 employees
  • 9. Verizon Report 2017 80% • of hacking-related breaches leveraged either stolen passwords and/or weak or guessable passwords. 95% • of phishing attacks that led to a breach were followed by some sort of software installation. • 1 in 14 people were tricked into opening a link or attachment they shouldn't • 25% of those people were tricked into doing it again
  • 10. Top 25 Passwords of 2016 123456 123456789 qwerty 12345678 111111 123456789 0 1234567 password 123123 987654321 qwertyuiop mynoob 123321 666666 18atcskd2 w 7777777 1q2w3e4r 654321 555555 3rjs1la7qe google 1q2w3e4r5 t 123qwe zxcvbnm 1q2w3e
  • 11. Was your password on that list??!!
  • 12. What is a hacker?!
  • 13. Let’s stop gambling and let’s starting WINNING!  Nothing is hack proof  But we don’t want to make anything easy  Most hackers don’t want to work that hard  What steps can we take to put the odds in our favor?
  • 14. Stacking the Odds in your favor  Passwords  Enforce Password Complexity  8+ characters  Require Upper Case, Lower Case, Special Characters and Numbers  Password Rotation  Teach password creation  Yahoo & LinkedIn  2FA – use it EVERYWHERE!!!  https://twofactorauth.org/  Minimize Privileges  No Local Admin rights  No Domain Admin rights  Different Local Admin for each machine  Microsoft LAPS
  • 15. Stacking the Odds in your favor….  Command Line (cmd)  Disable access  Most users don’t need access to CMD  PowerShell  Disable access  BUT…..some users do need PowerShell access Grant Privileges via AD Groups Enable it when needed – default should be disabled
  • 16. Stacking the Odds in your favor….  Network Segmentation  VLANs, VLANs, VLANs  Isolate devices and departments  DMZ for public facing servers  Wireless Segmentation  Multiple SSIDs Employees BYOD Guest
  • 17. Stacking the Odds in your favor….  Protect the Gateway  Next Generation Firewall SonicWALL!!  Strong Access Lists Yes strict outbound port policies  Audit your ruleset regularly  DPI-SSL 60% to 70% of all traffic is encrypted now  Scan for and block Applications  Capture ATP  Sandbox Malicious files before they even make it onto the network
  • 18. Stacking the Odds in your favor….  Anti-virus  Deploy Anti-virus at the End Point  New Artificial Intelligence (AI) AV Cylance No database No patient-zero Doesn’t need Internet Access to pull updates 98% effective rate Cloud Management Signature-based AV solutions are less than 40% effective POC – ZERODay!
  • 19. Stacking the Odds in your favor….  OS Patching  Move to supported OS  Schedule routine patching  Application Patching  Patch Applications Security Patches
  • 20. Stacking the Odds in your favor….  Device Inventory Management  Spiceworks  WhatsUp  ManageEngine  Application Inventory Management  Ninite  Spiceworks  ManageEngine
  • 21. Stacking the Odds in your favor….  Attached Device Management  Should employees be allowed to connect USB drives?  Disable feature  Provide company USBs Lock down USBs to specific OUIs *Cylance*  Data Backup  Backup critical data daily  Do scheduled restores to test data backup validity
  • 22. Stacking the Odds in your favor….  Application Whitelisting  Only allow “Approved” Applications to run Cylance Windows has Application Whitelisting Built-in  Lockdown DNS Access  Enforce DNS access to Local Server(s) only  Lockdown outbound DNS access to DNS Servers only  Vulnerability/Network Assessments
  • 23. Why the Hackers “house” normally win
  • 24. Stacking the Odds in your favor….  Employees  Single largest Security Risk  At least 60% of all incidents can be contributed to employees  Easiest attack angle  What can be done?  Train employees on proper Email and Web browsing etiquette KnowBe4 PhishMe  Gauge employee computer & security knowledge  Train employees on security awareness, and reward them for reporting suspicious activity
  • 25. You might be feeling like this now…
  • 26. But You can do this! • The 1st thing is to just get started • Don’t be paralyzed • Create your list and implement 1 new security practice each week • Schedule quarterly security reviews as soon as you get back to the office • There is no shame in doing the easiest 1st • Anything is better than nothing