SlideShare a Scribd company logo
MSP Security Masterclass
Webinar 2 of 3
Tyler Wrightson
Leet Cyber Security
Twitter: @tbwrightson
MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2
@tbwrightson
MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2
Takeaway
MSP360 Cybersecurity Master Class part 2
Last Week Recap
• Hackers Target MSPs
• Risk is Bidirectional
1. Admin policy & Training to avoid password reuse
2. MFA Everything (of value)
3. Minimum Necessary & Least Privilege
4. Complacency
MSP360 Cybersecurity Master Class part 2
Agenda
• Pragmatic Guidance on Controls for your clients
– No sales pitch, no ‘academic bs’
• Foundations
• Top Five controls
MSP360 Cybersecurity Master Class part 2
Small Business
Double Edged Sword
Small Business
Strength in Size
Small Business is
Manageable
Foundations – Pragmatism
Quantify Specifics of This
Not This
Business Impact
MSP360 Cybersecurity Master Class part 2
Vulnerability != Risk
MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2
What do you think of X control?
Top Five Controls
Top Five Controls - 1
MFA
https://bit.ly/LCS-Legacy
MFA
– “Other Sites”
• Wiki, Project Management, CRM, etc
• Don’t forget forgotten sites (pun intended)
– Assume adversary can find everything
• DNS, public records, social engineering
Top Five Controls - 1
MFA
– Email & VPN
– Legacy Protocols
• https://bit.ly/LCS-Legacy
– “Other Sites”
• Wiki, Project Management, CRM, etc
• Don’t forget forgotten sites (pun intended)
– Assume adversary can find everything
• DNS, public records, social engineering
Top Five Controls - 2
Important App
Internal Network
Junk App Internal App
DC
Access Everything – Bad
Important App
Internal Network
Junk App Internal App
DC
Access Servers Only - Good
Important App
Internal Network
Junk App Internal App
DC
Access Only Necessary - Best
Important App
Internal Network
Junk App
Internal App
DC
Access Workstation RDP - Bad
Important App
Internal Network
Junk App
Internal App
DC
Access Workstation RDP – Better
TCP Port 3389
Important App
Internal Network
Junk App
Internal App
DC
Access Workstation RDP – Best
TCP Port 3389
Internal Network
Most Networks
Internet
DMZ App
DMZ
Good
Internet
DMZ App
Internal Network
DMZ
Good – No Internal Access from DMZ
Internet
DMZ App
Internal Network
Nothing Inbound
DMZ
Good – No Internal Access from DMZ
Internet
DMZ App
Internal Network
Nothing Inbound
DMZ
Better – No WKS Access from Servers
Internet
DMZ App
Servers
Nothing Inbound
Workstations
Minimal Inbound
DMZ
Better – No WKS to WKS
Internet
DMZ App
Servers
Nothing Inbound
Workstations
Private VLAN
Minimal Inbound
DMZ
Better – No WKS to WKS
Internet
DMZ App
Servers
Nothing Inbound
High Priv
Low Priv
DMZ
Better – No WKS to WKS
Internet
DMZ App
Servers
Nothing Inbound
General Pop
Finance
Manufacturing
Poll – VPN Configuration
Top Five Controls - 4
Local Administrators Group
Local Administrators Group
Domain Users
Local Administrators Group
Primary User
Credential Reuse
SuperSecretPass99$$
Most Networks
SuperSecretPass99$$
SuperSecretPass99$$
Same Local Admin Everywhere
SuperSecretPass99$$
aad3b435b51404eeaad3b435b51404ee
Pass The Hash
aad3b435b51404eeaad3b435b51404ee$$
ServerManagerPass1!
Not Much Better
WorkstationPass99$$
Credential Reuse - LAPS
Microsoft PAWs
Privileged Users
• Less is More
• ANY privileges
• Domain Admins, Enterprise Admin, Schema Admins
• Password Reset
Top Five Controls - 4
• Local Administrator Configuration
• Local Administrative Passwords
– Unique for each host
• LAPS & PAWS
• Limit priv users
– DAs (ent admins, schema admins)
Top Five Controls - 5
MDR
– Specifically Managed
– Not NSM
Questions
MSP360 Cybersecurity Master Class part 2

More Related Content

PPTX
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
PPTX
providenetworksystemadministration.pptxhnnhgcbdjckk
PPTX
chp unit 1 Provide Network System Administration.pptx
PPTX
F5 Networks: миграция c Microsoft TMG
PPTX
TACOM 2014: Back To Basics
PDF
Certified Information Systems Security Professional (cissp) Domain “access co...
PPTX
Multi domain security-management_technical_presentation
PPTX
Managed Security: How Secure Are You During COVID?
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
providenetworksystemadministration.pptxhnnhgcbdjckk
chp unit 1 Provide Network System Administration.pptx
F5 Networks: миграция c Microsoft TMG
TACOM 2014: Back To Basics
Certified Information Systems Security Professional (cissp) Domain “access co...
Multi domain security-management_technical_presentation
Managed Security: How Secure Are You During COVID?

Similar to MSP360 Cybersecurity Master Class part 2 (20)

PDF
Who will guard the guards
PDF
Tips to Remediate your Vulnerability Management Program
PPT
Protecting Customer Confidential Information
PPTX
Compliance technical controls and you rva sec 2019
PDF
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PDF
From Workstation to Domain Admin: Why Secure Administration isn't Secure and ...
PDF
Secure Architecture and Incident Management for E-Business
PPT
Chapter 11 Presentation
PDF
Advanced persistent threats
PPTX
4 Cyber Security KPIs
PPT
e-DMZ Products Overview
PDF
User_Access_IIA-LA_3-9-2016
DOCX
1. Written assignmentscommunication must demonstrate professional.docx
PPTX
Are Your Endpoints Protected?
PPTX
Techorama 2019 - Azure Security Center Unleashed
PPTX
Top 10 steps towards eliminating inside threats by paresh thakkar
PPTX
Offence oriented Defence
PDF
The Federal Information Security Management Act
PPTX
ISBB_Chapter6.pptx
Who will guard the guards
Tips to Remediate your Vulnerability Management Program
Protecting Customer Confidential Information
Compliance technical controls and you rva sec 2019
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
PACE-IT, Security + 5.3: Security Controls for Account Management
From Workstation to Domain Admin: Why Secure Administration isn't Secure and ...
Secure Architecture and Incident Management for E-Business
Chapter 11 Presentation
Advanced persistent threats
4 Cyber Security KPIs
e-DMZ Products Overview
User_Access_IIA-LA_3-9-2016
1. Written assignmentscommunication must demonstrate professional.docx
Are Your Endpoints Protected?
Techorama 2019 - Azure Security Center Unleashed
Top 10 steps towards eliminating inside threats by paresh thakkar
Offence oriented Defence
The Federal Information Security Management Act
ISBB_Chapter6.pptx
Ad

More from MSP360 (20)

PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
PPTX
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make .pptx
PPTX
Webinar - Protecting Your Microsoft 365 Data
PPTX
Endpoint Backup: 3 Reasons MSPs Ignore It
PPTX
What's New in MSP360 RMM webinar February 2025
PPTX
What's New in MSP360 Backup -webinar 11/22/2024
PPTX
What's New in MSP360 - webinar November 2024
PPTX
Ransomware Evolution: What to Expect in 2025
PPTX
Getting Started with the MSP360 Platform
PPTX
The State of Ransomware in 2024: Trends, Threats, and Effective Countermeasures
PPTX
Storage 101: A Deep Dive into Cloud and Local Storage With MSP360
PPTX
Setting Up Backup Policies for Success webinar
PPTX
Whats new at MSP360 Webinar - June 2024
PPTX
Webinar - Generating More Revenue with MSP360
PPTX
Seamless Data Protection with MSP360 + Wasabi
PPTX
Getting Started with MSP360 RMM webinar April 2024
PPTX
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
PPTX
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
PPTX
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...
PPTX
The Role of Backup and Recovery in the New Ransomware Economy
MSP360 Backup Scheduling and Retention Best Practices.pptx
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make .pptx
Webinar - Protecting Your Microsoft 365 Data
Endpoint Backup: 3 Reasons MSPs Ignore It
What's New in MSP360 RMM webinar February 2025
What's New in MSP360 Backup -webinar 11/22/2024
What's New in MSP360 - webinar November 2024
Ransomware Evolution: What to Expect in 2025
Getting Started with the MSP360 Platform
The State of Ransomware in 2024: Trends, Threats, and Effective Countermeasures
Storage 101: A Deep Dive into Cloud and Local Storage With MSP360
Setting Up Backup Policies for Success webinar
Whats new at MSP360 Webinar - June 2024
Webinar - Generating More Revenue with MSP360
Seamless Data Protection with MSP360 + Wasabi
Getting Started with MSP360 RMM webinar April 2024
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...
The Role of Backup and Recovery in the New Ransomware Economy
Ad

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Empathic Computing: Creating Shared Understanding
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Getting Started with Data Integration: FME Form 101
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
1. Introduction to Computer Programming.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Machine Learning_overview_presentation.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Empathic Computing: Creating Shared Understanding
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
Digital-Transformation-Roadmap-for-Companies.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Unlocking AI with Model Context Protocol (MCP)
Getting Started with Data Integration: FME Form 101
Network Security Unit 5.pdf for BCA BBA.
Group 1 Presentation -Planning and Decision Making .pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Programs and apps: productivity, graphics, security and other tools
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
1. Introduction to Computer Programming.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine Learning_overview_presentation.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”

MSP360 Cybersecurity Master Class part 2