SlideShare a Scribd company logo
Starting in 2 Minutes…
            2:02PM ET / 11:02AM PT

September 2012
Security Vulnerability Session

Jason Dettbarn
Senior Security Analyst
Kaseya
Today’s Speaker




            Jason Dettbarn
            Senior Security Analyst



About Jason:
- MS in Computer Science
- 8 Years Embedded Software Engineer
- Research in Network Security & Encryption
No borders
(Online Threats Worldwide March – SecureNet.com)
The Laws of
Vulnerabilities
• Prevalence: Measures the turnover rate of
  vulnerabilities in the “Top 20” list during a
  year.
   • Half of the most prevalent critical vulnerabilities are
                                                         STILL
     replaced by new vulnerabilities each year.
     in the top 20 vulnerabilities list after a FULL year.
• Persistence: Total life span of vulnerabilities.
   • Persistence remains virtually unlimited.
• Exploitation: Time interval between an exploit
  announcement and the first attack.
   • Average < 10 days
• Half-life: Time interval for reducing occurrence
  of a vulnerability by half.
   • Average is 30 days, varying by industry sector.
Average…
Vulnerability Defense
• Anti-virus
• Anti-malware
• Microsoft Updates
• 3rd Party Updates
• Control, LPU
  • App audit/block
• Location alerts
• Secure/recover stolen assets/data
• Server Access – No more holes
Kaseya Security Stack

Patching       Antivirus    AntiMalware    Remediation


                                              Agent
 Operating                                  Procedures
  System        Kaseya
                Antivirus
 MS Office
                                             Monitoring
                               Kaseya
                             AntiMalware
                                            Service Desk
               Kaseya                          & PSA
               Endpoint
 3rd Party *   Security
                                            Scheduling &
                                            Management
Security Through Obscurity
• Hidden Web URLs
• Port Checking or Port
  Redirection
• Temporary Applications
  (http/ftp/telnet/wifi)
Stuxnet Virus




 Break Into Hardened Nuclear Facilities?
How Did They Do It




 USB Drives Dropped in Parking Lot
 (leveraging autorun on the USB)
Distributed Computing
Folding@Home (Stanford Program)
 SETI @Home
Botnet Virus




 Millions of dormant blackhat botents
 available for purchase
Windows Patching &
Firewalls are not enough
3rd Party Software Vulnerabilities are
currently the highest form of exploits today
MS Internet Explorer




One of the first vulnerabilities to affect all
production shipping versions of the
browser & OS
Java – two zero-day exploit
- Java 7 Update 7 – Addresses 2 active
zero-day exploits
- Not Fixed = Stille exists ability to disable
  JVM sandbox and allows remote code
  execution
Adobe Flash – APSB12-19
- Flash Player 11.4 – Addresses 6 security
  updates (released 8/31)
- Considered also be at fault within an
  Internet Explorerer Vulnerability
Software Deploy & Update
• Java Updates
• Adobe Flash
• Other 3rd Party
  Software
• Approve Updates
  for All Systems


                 Try KSDU
http://www.kaseya.com/lps/global/lp/ksdu-trial.aspx
50% Off Promotion Ends 9/31
• Java Updates
• Adobe Flash
• Other 3rd Party
  Software




                 Try KSDU
http://www.kaseya.com/lps/global/lp/ksdu-trial.aspx
Sofware Deployment & Update
• Kaseya bullet-proof in industry
• Partners success is our success
• Time to manage new system provisioning
• Time involved in auditing and patching

  WHY NOW?
  Promotion ending 9/31/2012

          50% OFF
Sofware Deployment & Update
TRY IT!
http://www.kaseya.com/lps/global/lp/ksdu-trial.aspx



https://www1.gotomeeting.com/register/310107217
Questions & Answers




Follow-up Questions to:
Jason Dettbarn
jason.dettbarn@kaseya.com

More Related Content

PPTX
Next Generation Firewalls
PDF
Advanced Threat Protection – ultimátní bezpečnostní řešení
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PDF
The Threat Landscape & Network Security Measures
PPTX
A Closer Look at Isolation: Hype or Next Gen Security?
PPTX
SYMANTEC ENDPOINT PROTECTION Administration Introduction
PPTX
Six Steps to SIEM Success
PPTX
Vulnerability Assessment
Next Generation Firewalls
Advanced Threat Protection – ultimátní bezpečnostní řešení
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
The Threat Landscape & Network Security Measures
A Closer Look at Isolation: Hype or Next Gen Security?
SYMANTEC ENDPOINT PROTECTION Administration Introduction
Six Steps to SIEM Success
Vulnerability Assessment

What's hot (20)

PDF
Protecting Against Ransomware
PPTX
Advanced Threat Protection
PDF
Symantec Endpoint Protection 12
PPTX
Intercept X - Sophos Endpoint
PDF
Bezpečnost není jen antivirus
PPTX
Make Every Spin Count: Putting the Security Odds in Your Favor
PPTX
Thinking Differently About Security Protection and Prevention
PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
PPTX
The next generation of IT security
PPT
Info Security - Vulnerability Assessment
PPT
Sandbox Technology in AntiVirus
PDF
Cyber security webinar 6 - How to build systems that resist attacks?
PPTX
Taking the battle to Ransomware with Sophos Intercept X
PPTX
Symantec Endpoint Protection
PDF
Defending Servers - Cyber security webinar part 3
PPTX
Cerdant Security State of the Union
PDF
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
PPTX
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
PDF
Next Generation Firewall and IPS
PPTX
Security Presenatation for Onforce Pro Town Hall
Protecting Against Ransomware
Advanced Threat Protection
Symantec Endpoint Protection 12
Intercept X - Sophos Endpoint
Bezpečnost není jen antivirus
Make Every Spin Count: Putting the Security Odds in Your Favor
Thinking Differently About Security Protection and Prevention
Improve Situational Awareness for Federal Government with AlienVault USM
The next generation of IT security
Info Security - Vulnerability Assessment
Sandbox Technology in AntiVirus
Cyber security webinar 6 - How to build systems that resist attacks?
Taking the battle to Ransomware with Sophos Intercept X
Symantec Endpoint Protection
Defending Servers - Cyber security webinar part 3
Cerdant Security State of the Union
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Next Generation Firewall and IPS
Security Presenatation for Onforce Pro Town Hall
Ad

Viewers also liked (15)

PPTX
VPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
PPT
Managing System Security
PDF
Data Science for Cyber Risk
PPT
OPSEC Vulnerabilities And Indicators
PPTX
Social Media Cyber Security Awareness Briefing
PPTX
Kaseya Kaspersky Breaches
PDF
Computer Security and Risks
PPTX
Firewall presentation
PPTX
Audit Process, Audit Procedures, Audit Planning, Auditing
PDF
It Security Audit Process
PPTX
6. audit techniques
PPT
Active Directory Training
PPTX
Cyber security
PPT
Network Security and Cryptography
VPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
Managing System Security
Data Science for Cyber Risk
OPSEC Vulnerabilities And Indicators
Social Media Cyber Security Awareness Briefing
Kaseya Kaspersky Breaches
Computer Security and Risks
Firewall presentation
Audit Process, Audit Procedures, Audit Planning, Auditing
It Security Audit Process
6. audit techniques
Active Directory Training
Cyber security
Network Security and Cryptography
Ad

Similar to September 2012 Security Vulnerability Session (20)

PDF
Cisco Security Presentation
PPTX
Endpoint Protection as a Service (EPaaS)
PPTX
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
PPT
Trend Micro VForum Agentless Scanning Presentation
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
PDF
Azure 101: Shared responsibility in the Azure Cloud
PPTX
New Horizons for End-User Computing Event - Trend
PPTX
pr-host-intrusion-prevention-customer-presentation (5).pptx
PDF
Custom defense - Blake final
PPT
Redefining Endpoint Security
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PPTX
Tech Throwdown: Secure Containerization vs Whitelisting
PPTX
Rik Ferguson
PPTX
PACE-IT: Common Network Security Issues
PPT
Prueba de Presentacion
PDF
Revolutionizing Advanced Threat Protection
PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
PPT
How PCI And PA DSS will change enterprise applications
PPTX
Post Wannacry Update
Cisco Security Presentation
Endpoint Protection as a Service (EPaaS)
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
Trend Micro VForum Agentless Scanning Presentation
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Azure 101: Shared responsibility in the Azure Cloud
New Horizons for End-User Computing Event - Trend
pr-host-intrusion-prevention-customer-presentation (5).pptx
Custom defense - Blake final
Redefining Endpoint Security
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Tech Throwdown: Secure Containerization vs Whitelisting
Rik Ferguson
PACE-IT: Common Network Security Issues
Prueba de Presentacion
Revolutionizing Advanced Threat Protection
Automating Critical Security Controls for Threat Remediation and Compliance
How PCI And PA DSS will change enterprise applications
Post Wannacry Update

More from Kaseya (20)

PDF
Enterprise Mobility Management I: What's Next for Management (MDM)
PDF
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
PDF
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
PDF
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
PDF
365 Command: Managing SharePoint in Office 365
PDF
365 Command: Managing Exchange in Office 365
PDF
Advanced Administration: Mobile Device Management
PDF
Advanced Administration: Kaseya Traverse
PDF
Advanced Administration: Kaseya BYOD Suite
PDF
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
PDF
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
PDF
Security and Backup II: Vision and Direction
PDF
Security and Backup I: OEM Architecture
PDF
Kaseya Monitoring Suite Overview
PDF
Kaseya Asset Discovery Overview
PDF
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
PDF
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
PDF
Kaseya Technology Alliance Partner Landscape
PDF
Advanced Administration: Kaseya Virtual Administrator
PDF
Kaseya Corporate Update and Roadmap Q1 2014
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
365 Command: Managing SharePoint in Office 365
365 Command: Managing Exchange in Office 365
Advanced Administration: Mobile Device Management
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya BYOD Suite
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Security and Backup II: Vision and Direction
Security and Backup I: OEM Architecture
Kaseya Monitoring Suite Overview
Kaseya Asset Discovery Overview
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Kaseya Technology Alliance Partner Landscape
Advanced Administration: Kaseya Virtual Administrator
Kaseya Corporate Update and Roadmap Q1 2014

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Modernizing your data center with Dell and AMD
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Advanced IT Governance
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Machine learning based COVID-19 study performance prediction
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Modernizing your data center with Dell and AMD
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Monthly Chronicles - July 2025
NewMind AI Weekly Chronicles - August'25 Week I
Diabetes mellitus diagnosis method based random forest with bat algorithm
Advanced IT Governance
Unlocking AI with Model Context Protocol (MCP)
Spectral efficient network and resource selection model in 5G networks
GamePlan Trading System Review: Professional Trader's Honest Take
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Machine learning based COVID-19 study performance prediction
The Rise and Fall of 3GPP – Time for a Sabbatical?
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

September 2012 Security Vulnerability Session

  • 1. Starting in 2 Minutes… 2:02PM ET / 11:02AM PT September 2012 Security Vulnerability Session Jason Dettbarn Senior Security Analyst Kaseya
  • 2. Today’s Speaker Jason Dettbarn Senior Security Analyst About Jason: - MS in Computer Science - 8 Years Embedded Software Engineer - Research in Network Security & Encryption
  • 3. No borders (Online Threats Worldwide March – SecureNet.com)
  • 4. The Laws of Vulnerabilities • Prevalence: Measures the turnover rate of vulnerabilities in the “Top 20” list during a year. • Half of the most prevalent critical vulnerabilities are STILL replaced by new vulnerabilities each year. in the top 20 vulnerabilities list after a FULL year. • Persistence: Total life span of vulnerabilities. • Persistence remains virtually unlimited. • Exploitation: Time interval between an exploit announcement and the first attack. • Average < 10 days • Half-life: Time interval for reducing occurrence of a vulnerability by half. • Average is 30 days, varying by industry sector.
  • 6. Vulnerability Defense • Anti-virus • Anti-malware • Microsoft Updates • 3rd Party Updates • Control, LPU • App audit/block • Location alerts • Secure/recover stolen assets/data • Server Access – No more holes
  • 7. Kaseya Security Stack Patching Antivirus AntiMalware Remediation Agent Operating Procedures System Kaseya Antivirus MS Office Monitoring Kaseya AntiMalware Service Desk Kaseya & PSA Endpoint 3rd Party * Security Scheduling & Management
  • 8. Security Through Obscurity • Hidden Web URLs • Port Checking or Port Redirection • Temporary Applications (http/ftp/telnet/wifi)
  • 9. Stuxnet Virus Break Into Hardened Nuclear Facilities?
  • 10. How Did They Do It USB Drives Dropped in Parking Lot (leveraging autorun on the USB)
  • 12. Botnet Virus Millions of dormant blackhat botents available for purchase
  • 13. Windows Patching & Firewalls are not enough 3rd Party Software Vulnerabilities are currently the highest form of exploits today
  • 14. MS Internet Explorer One of the first vulnerabilities to affect all production shipping versions of the browser & OS
  • 15. Java – two zero-day exploit - Java 7 Update 7 – Addresses 2 active zero-day exploits - Not Fixed = Stille exists ability to disable JVM sandbox and allows remote code execution
  • 16. Adobe Flash – APSB12-19 - Flash Player 11.4 – Addresses 6 security updates (released 8/31) - Considered also be at fault within an Internet Explorerer Vulnerability
  • 17. Software Deploy & Update • Java Updates • Adobe Flash • Other 3rd Party Software • Approve Updates for All Systems Try KSDU http://www.kaseya.com/lps/global/lp/ksdu-trial.aspx
  • 18. 50% Off Promotion Ends 9/31 • Java Updates • Adobe Flash • Other 3rd Party Software Try KSDU http://www.kaseya.com/lps/global/lp/ksdu-trial.aspx
  • 19. Sofware Deployment & Update • Kaseya bullet-proof in industry • Partners success is our success • Time to manage new system provisioning • Time involved in auditing and patching WHY NOW? Promotion ending 9/31/2012 50% OFF
  • 20. Sofware Deployment & Update TRY IT! http://www.kaseya.com/lps/global/lp/ksdu-trial.aspx https://www1.gotomeeting.com/register/310107217
  • 21. Questions & Answers Follow-up Questions to: Jason Dettbarn jason.dettbarn@kaseya.com

Editor's Notes

  • #4: Current THREAT levels.In addition to THREATS that are already detected, new ones are being developed on a daily basis to take advantage of flaws in operating systems and applications. Browsers and media applications like Adobe Flash are less apparent delivery methods that can be exploited. A solid security policy that includes regular OS and Application Patching, accessing and using a system with a non-administrator accounts and reliable anti-virus and malware programs can drastically reduce your risk profile.Worm is a sub-class of a virus but it can spread without human action by replicating itself as well as taking advantage of other transport features on a machine, most often causing network issues by sending out hundreds and thousands of copies of itself.
  • #5: Long term research project by QualysEighty percent of vulnerability exploits are now available within single digit days after the vulnerability&apos;s public release. Exploitation – Nearly all damage from automated attacks is during the first 15 days of outbreak.compared to 60 days in 2004.