Practical CyberDefense
By Paul Dutot
About me
● Co Founder of the CIISF
Practical CyberDefense
● Employed as an Ethical Security
Consultant @ Logicalis Jersey
● Practice Offensive & Defensive Security for
businesses at all verticals
Agenda
● Concepts I and II
Practical CyberDefense
● Stages 1-5 of a practical Cyber Defense
with more demo's
● Resources
Questions at the end please
● Reverse & Bind Shells Demo
Concepts I
“Attackers have
months to prepare,
defenders have
minutes to react”
Practical CyberDefense
“This is not a security
control !!!!”
vs
Concepts II
“Security is a journey”
Practical CyberDefense
“What are the bad guys
trying to achieve?
Reverse & Bind Shells
Practical CyberDefense
Demo
Stage 1 – Buy In
● Appoint a 'Cyber'
champion
● 'C' level Buy In
● Maintain a 'Cyber'
risk register
Practical CyberDefense
● Do Security
Awareness
Stage 2 - Reconnaisance
Some Forgotten Ones
Practical CyberDefense
Demo
Reconnaisance Aims
Practical CyberDefense
● To profile your organsiation
● In preparation for social enginering attacks and or
email phishing
Reconnaisance - Mitigation
Practical CyberDefense
● Undertake reconnaisance to find public
information
● Mitigate risk by takedown and creating contray
information
● Test your defenses and train your users
Phishing is a big deal !!!
Practical CyberDefense
Stage 3 – Understanding AV
Is AV really protecting us - the case for and
against
Practical CyberDefense
Stage 3 – AV Bypass
Demo - The case against
Practical CyberDefense
Stage 3 – The case for
We still need AV to protect us !
Practical CyberDefense
Stage 4 – Think outside the box
● Databases – They are the end game
Practical CyberDefense
● Web applications – Owasp Top 10
● UC Communications – TDos / Toll Fraud
● Data Encryption – Laptops / Desktops / Databases
Stage 5 – It's not if but when
SIEM – Security, Information& Event Monitoring
Practical CyberDefense
Stage 5 – SIEM
OSSIM SIEM – Free open Source SIEM Demo
Practical CyberDefense
Resources
Florida State
● http://www.cs.fsu.edu/~redwood/OffensiveSecurity/
Practical CyberDefense
SANS Institute
● http://www.sans.org/critical-security-controls/controls/
OWASP Top 10 - 2013
● https://www.owasp.org/index.php/Top_10_2013-Top_10
Thank you – Any Questions?
Blog – http://cyberkryption.com
Practical CyberDefense
@cyberkryption
paul.dutot@je.logicalis.com

More Related Content

PDF
The Risks of YOLOing-2.pdf
PPTX
Incident response : the good the bad and the ugly or how to keep your face af...
PPTX
Staying Safe Online for HR Professionals
PDF
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
ODP
A journey through an INFOSEC labyrinth
PPT
Virus Precautions
PPT
How you can become a hacker with no security experience
ZIP
Protecting Public Hotspots
The Risks of YOLOing-2.pdf
Incident response : the good the bad and the ugly or how to keep your face af...
Staying Safe Online for HR Professionals
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
A journey through an INFOSEC labyrinth
Virus Precautions
How you can become a hacker with no security experience
Protecting Public Hotspots

Viewers also liked (20)

PDF
A Threat Hunter Himself
PPTX
44CON London 2015: NTFS Analysis with PowerForensics
PPTX
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
PDF
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
PPTX
Hunting on the cheap
PPTX
Building a Successful Threat Hunting Program
PDF
CrowdCasts Monthly: Going Beyond the Indicator
PDF
Blue team reboot - HackFest
PPTX
BSidesDC - **** it, Do It Live (PowerShell Digital Forensics)
PDF
Workshop threat-hunting
PPTX
SOC2016 - The Investigation Labyrinth
PDF
Building an Analytics Enables SOC
PDF
Threat Hunting Workshop
PPTX
PowerShell for Penetration Testers
PPTX
I hunt sys admins 2.0
PPTX
Building an Empire with PowerShell
PPTX
Lateral Movement with PowerShell
PPTX
The Travelling Pentester: Diaries of the Shortest Path to Compromise
PDF
Threat Hunting with Splunk
PPTX
Abstract Tools for Effective Threat Hunting
A Threat Hunter Himself
44CON London 2015: NTFS Analysis with PowerForensics
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Hunting on the cheap
Building a Successful Threat Hunting Program
CrowdCasts Monthly: Going Beyond the Indicator
Blue team reboot - HackFest
BSidesDC - **** it, Do It Live (PowerShell Digital Forensics)
Workshop threat-hunting
SOC2016 - The Investigation Labyrinth
Building an Analytics Enables SOC
Threat Hunting Workshop
PowerShell for Penetration Testers
I hunt sys admins 2.0
Building an Empire with PowerShell
Lateral Movement with PowerShell
The Travelling Pentester: Diaries of the Shortest Path to Compromise
Threat Hunting with Splunk
Abstract Tools for Effective Threat Hunting
Ad

Similar to Practical Cyber Defense (20)

PDF
Year Zero
PDF
2020 FRsecure CISSP Mentor Program - Class 1
PDF
OISF - Continuous Skills Improvement for Everyone
PDF
Cybersecurity for Your Law Firm: Data Security and Data Encryption
PDF
CyberSecurity Consultancy asdddddddddddd
PDF
Glasswall - How to Prevent, Detect and React to Ransomware incidents
PPTX
Protecting endpoints from targeted attacks
PPTX
Cyber Frontline - Level 1 - Module 1.pptx
PPTX
Keynote Information Security days Luxembourg 2015
PDF
Small Business Administration Recommendations
PDF
CSA Raleigh application security and deception in the cloud
PPTX
You Will Be Breached
PPTX
Cyber RM - Controls - Module 9 Powerpoint Presentation
DOCX
Current Article Review1. Locate a current article about Regul.docx
PPTX
12 Crucial Windows Security Skills for 2017
PPTX
Security Champions - Introduce them in your Organisation
PDF
2019 FRSecure CISSP Mentor Program: Class Ten
PPT
Intro to-ssdl--lone-star-php-2013
PPTX
Information Security Awareness Session -2020
Year Zero
2020 FRsecure CISSP Mentor Program - Class 1
OISF - Continuous Skills Improvement for Everyone
Cybersecurity for Your Law Firm: Data Security and Data Encryption
CyberSecurity Consultancy asdddddddddddd
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Protecting endpoints from targeted attacks
Cyber Frontline - Level 1 - Module 1.pptx
Keynote Information Security days Luxembourg 2015
Small Business Administration Recommendations
CSA Raleigh application security and deception in the cloud
You Will Be Breached
Cyber RM - Controls - Module 9 Powerpoint Presentation
Current Article Review1. Locate a current article about Regul.docx
12 Crucial Windows Security Skills for 2017
Security Champions - Introduce them in your Organisation
2019 FRSecure CISSP Mentor Program: Class Ten
Intro to-ssdl--lone-star-php-2013
Information Security Awareness Session -2020
Ad

More from Paul Dutot IEng MIET MBCS CITP OSCP CSTM (10)

PPTX
Welcome to the #WannaCry Wine Club
PPTX
Scanning Channel Islands Cyberspace
PPTX
Incident Response in the wake of Dear CEO
PDF
Logicalis Security Conference
ODP
Exploiting buffer overflows
ODP
A Letter from Anonymous to the Jersey Finance Industry
PDF
WI-FI Security in Jersey 2011
Welcome to the #WannaCry Wine Club
Scanning Channel Islands Cyberspace
Incident Response in the wake of Dear CEO
Logicalis Security Conference
Exploiting buffer overflows
A Letter from Anonymous to the Jersey Finance Industry
WI-FI Security in Jersey 2011

Recently uploaded (20)

PPT
Ethics in Information System - Management Information System
PPTX
Reading as a good Form of Recreation
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PPTX
Introduction to cybersecurity and digital nettiquette
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
Containerization lab dddddddddddddddmanual.pdf
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
si manuel quezon at mga nagawa sa bansang pilipinas
PPTX
Internet Safety for Seniors presentation
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
Database Information System - Management Information System
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PDF
Course Overview and Agenda cloud security
Ethics in Information System - Management Information System
Reading as a good Form of Recreation
Alethe Consulting Corporate Profile and Solution Aproach
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
Introduction to cybersecurity and digital nettiquette
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Mathew Digital SEO Checklist Guidlines 2025
Containerization lab dddddddddddddddmanual.pdf
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Alethe Consulting Corporate Profile and Solution Aproach
si manuel quezon at mga nagawa sa bansang pilipinas
Internet Safety for Seniors presentation
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
AI_Cyberattack_Solutions AI AI AI AI .pptx
newyork.pptxirantrafgshenepalchinachinane
Database Information System - Management Information System
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
Course Overview and Agenda cloud security

Practical Cyber Defense

  • 2. About me ● Co Founder of the CIISF Practical CyberDefense ● Employed as an Ethical Security Consultant @ Logicalis Jersey ● Practice Offensive & Defensive Security for businesses at all verticals
  • 3. Agenda ● Concepts I and II Practical CyberDefense ● Stages 1-5 of a practical Cyber Defense with more demo's ● Resources Questions at the end please ● Reverse & Bind Shells Demo
  • 4. Concepts I “Attackers have months to prepare, defenders have minutes to react” Practical CyberDefense “This is not a security control !!!!” vs
  • 5. Concepts II “Security is a journey” Practical CyberDefense “What are the bad guys trying to achieve?
  • 6. Reverse & Bind Shells Practical CyberDefense Demo
  • 7. Stage 1 – Buy In ● Appoint a 'Cyber' champion ● 'C' level Buy In ● Maintain a 'Cyber' risk register Practical CyberDefense ● Do Security Awareness
  • 8. Stage 2 - Reconnaisance Some Forgotten Ones Practical CyberDefense Demo
  • 9. Reconnaisance Aims Practical CyberDefense ● To profile your organsiation ● In preparation for social enginering attacks and or email phishing
  • 10. Reconnaisance - Mitigation Practical CyberDefense ● Undertake reconnaisance to find public information ● Mitigate risk by takedown and creating contray information ● Test your defenses and train your users
  • 11. Phishing is a big deal !!! Practical CyberDefense
  • 12. Stage 3 – Understanding AV Is AV really protecting us - the case for and against Practical CyberDefense
  • 13. Stage 3 – AV Bypass Demo - The case against Practical CyberDefense
  • 14. Stage 3 – The case for We still need AV to protect us ! Practical CyberDefense
  • 15. Stage 4 – Think outside the box ● Databases – They are the end game Practical CyberDefense ● Web applications – Owasp Top 10 ● UC Communications – TDos / Toll Fraud ● Data Encryption – Laptops / Desktops / Databases
  • 16. Stage 5 – It's not if but when SIEM – Security, Information& Event Monitoring Practical CyberDefense
  • 17. Stage 5 – SIEM OSSIM SIEM – Free open Source SIEM Demo Practical CyberDefense
  • 18. Resources Florida State ● http://www.cs.fsu.edu/~redwood/OffensiveSecurity/ Practical CyberDefense SANS Institute ● http://www.sans.org/critical-security-controls/controls/ OWASP Top 10 - 2013 ● https://www.owasp.org/index.php/Top_10_2013-Top_10
  • 19. Thank you – Any Questions? Blog – http://cyberkryption.com Practical CyberDefense @cyberkryption paul.dutot@je.logicalis.com