SlideShare a Scribd company logo
Manage risk not
data or systems
Hackers knows a lot about
your security without
touching your network
Candan BOLUKBAS
CTO & Co-Founder, NormShield
“
”
A problem well defined is half solved.
John Dewey, American philosopher
Open source intelligence (OSINT)
Social media
Vulnerability Databases
Blogs and user generated content
Hacktivist forums
Black Markets
Underground
Data leakage
• Human Errors & Omissions
• Passive Vulnerability Scan
• Internet-wide Scanners
• E-mail & Password Harvesting
• Mass & Spear Phishing
• Fraudulent Domains & Apps
• Malware Activities
• Data Leakage & Whistleblowing
Hackers conduct reconnaissance
Think Like a Hacker
Source: https://webforms.ey.com/Publication/vwLUAssets/ey-global-information-security-survey-2016-pdf/$FILE/GISS_2016_Report_Final.pdf
Unreliable Threat Intelligence Data
https://webroot-cms-cdn.s3.amazonaws.com/9114/5445/5911/ponemon-importance-of-cyber-threat-intelligence.pdf
Too many alerts and false positives
https://webroot-cms-cdn.s3.amazonaws.com/9114/5445/5911/ponemon-importance-of-cyber-threat-intelligence.pdf - 2015
Threat intelligence not visible to decision makers
https://www.anomali.com/files/white-papers/Ponemon-Research-Report.pdf
https://baydynamics.com/content/uploads/2016/06/how-board-of-directors-feel-about-cyber-security-reports.pdf
Think Like a Hacker
Cyber Threat Intelligence must be:
Timely
Relevant
Verified
Accurate
Actionable
Stay one step ahead of hackers
• Executive scorecard: Understandable format, informed business
decisions, measurable performance
• Vulnerabilities tracking: Uncovering known vulnerabilities on a daily
and weekly basis, monitoring CVEs and tracking exploitations in the
wild
• System change detection: Detect newly deployed servers,
applications, ports or services to the internet without security checks.
• Actionable intelligence: Provide verified risks and
recommended actions to enable sound business decisions.
Think and Act Like a Hacker!
It is critical to have continuous visibility to all the vulnerabilities in
company’s publicly accessible systems and potential risks in cyberspace.
For example, NormShield has over 400 crawlers that collect data from hacker
sites, internet wide-scanners, reputation sites, search engines, etc. We also
manually extract data from dark web and sites that require membership.
Use the tools and techniques that hackers use to plan attacks, discover the
Internet footprint of their targets, and identify weaknesses to exploit.
Every hacking attempt starts with reconnaissance step (the first step of the
Cyber-Kill Chain).
Passive Scan area
Think Like a Hacker
info@normshield.com
@NormShield
(571) 335-0222
normshield.com
8201 Greensboro Drive,
Suite 300, McLean, VA 22102
Stop by our table
to get your free
cyber threat scorecard.

More Related Content

PPTX
NormShield Cyber Threat & Vulnerability Orchestration Overview
PPTX
3rd Party Cyber Security: Manage your ecosystem!
PDF
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
PDF
Cambodia CERT Seminar: Incident response for ransomeware attacks
PDF
NormShieldBrochure
PDF
Triangulum - Ransomware Evolved - Why your backups arent good enough
PPTX
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
PDF
Threat intelligence Primary Tradecraft and Research
NormShield Cyber Threat & Vulnerability Orchestration Overview
3rd Party Cyber Security: Manage your ecosystem!
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
Cambodia CERT Seminar: Incident response for ransomeware attacks
NormShieldBrochure
Triangulum - Ransomware Evolved - Why your backups arent good enough
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Threat intelligence Primary Tradecraft and Research

What's hot (20)

PPT
Safeguard your enterprise against ransomware
PPTX
Combating Insider Threats – Protecting Your Agency from the Inside Out
PPTX
Cerdant Security State of the Union
PDF
The State of Threat Detection 2019
PDF
You can't detect what you can't see illuminating the entire kill chain
PPTX
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
PPTX
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
PDF
Part 1: Identifying Insider Threats with Fidelis EDR Technology
PDF
Cisa ransomware guide
PDF
The Cost of Doing Nothing: A Ransomware Backup Story
PPTX
Thinking Differently About Security Protection and Prevention
PDF
Game Changing Cyber Defensive Strategies for 2019
PPTX
Make Every Spin Count: Putting the Security Odds in Your Favor
PDF
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
PDF
IT security in 2021: Why Ransomware Is Still The Biggest Threat
PDF
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
PPTX
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
PPTX
Information security trends and steps for (OSAC) Middle East divsion
PPTX
kill-chain-presentation-v3
PDF
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
Safeguard your enterprise against ransomware
Combating Insider Threats – Protecting Your Agency from the Inside Out
Cerdant Security State of the Union
The State of Threat Detection 2019
You can't detect what you can't see illuminating the entire kill chain
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Cisa ransomware guide
The Cost of Doing Nothing: A Ransomware Backup Story
Thinking Differently About Security Protection and Prevention
Game Changing Cyber Defensive Strategies for 2019
Make Every Spin Count: Putting the Security Odds in Your Favor
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
IT security in 2021: Why Ransomware Is Still The Biggest Threat
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Information security trends and steps for (OSAC) Middle East divsion
kill-chain-presentation-v3
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory

Viewers also liked (13)

PPTX
Surge 2013: Maximizing Scalability, Resiliency, and Engineering Velocity in t...
PPS
Information Gathering With Google
PPTX
Information gathering
PDF
Security Monitoring with eBPF
PDF
OSINT for Attack and Defense
PDF
Open Source Intelligence (OSINT)
PPTX
Blackmagic Open Source Intelligence OSINT
PPTX
Gathering information presentation.
PDF
OSINT- Leveraging data into intelligence
PDF
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
PDF
Offensive OSINT
PDF
Critical Infrastructure Protection from Terrorist Attacks
PPTX
Invoke-Obfuscation nullcon 2017
Surge 2013: Maximizing Scalability, Resiliency, and Engineering Velocity in t...
Information Gathering With Google
Information gathering
Security Monitoring with eBPF
OSINT for Attack and Defense
Open Source Intelligence (OSINT)
Blackmagic Open Source Intelligence OSINT
Gathering information presentation.
OSINT- Leveraging data into intelligence
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
Offensive OSINT
Critical Infrastructure Protection from Terrorist Attacks
Invoke-Obfuscation nullcon 2017

Similar to Think Like a Hacker (20)

PDF
SplunkLive! Stockholm 2015 breakout - Analytics based security
PDF
Information Security Risk Management
PDF
SplunkLive! Amsterdam 2015 - Analytics based security breakout
PDF
Stopping zero day threats
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PPTX
Defend-Against-Next-Gen-Attacks-with-Wire-Data-by-Pete-Anderson.pptx
PPTX
Operational Security Intelligence
PDF
Cybersecurity Nightmare_ 16 Billion Passwords Leaked in Data Breach by Orage ...
PPTX
Security in the age of open source - Myths and misperceptions
PDF
How Safe is your Data?
PDF
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
PDF
World best web apps security and Active detection of malicious link
PPTX
2. Pengantar Keamanan Sistem Informasi 2024.pptx
PDF
The evolving threat in the face of increased connectivity
PPTX
Why do women love chasing down bad guys?
PPTX
Analyzing Cyber-Attacks: Case Studies of Five Organizations
PPTX
Cyber security fundamentals & ethical hacking
PDF
F5 Hero Asset - Inside the head of a Hacker Final
PPTX
Information security - what is going on 2016
PPT
Hackers are innocent
SplunkLive! Stockholm 2015 breakout - Analytics based security
Information Security Risk Management
SplunkLive! Amsterdam 2015 - Analytics based security breakout
Stopping zero day threats
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Defend-Against-Next-Gen-Attacks-with-Wire-Data-by-Pete-Anderson.pptx
Operational Security Intelligence
Cybersecurity Nightmare_ 16 Billion Passwords Leaked in Data Breach by Orage ...
Security in the age of open source - Myths and misperceptions
How Safe is your Data?
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
World best web apps security and Active detection of malicious link
2. Pengantar Keamanan Sistem Informasi 2024.pptx
The evolving threat in the face of increased connectivity
Why do women love chasing down bad guys?
Analyzing Cyber-Attacks: Case Studies of Five Organizations
Cyber security fundamentals & ethical hacking
F5 Hero Asset - Inside the head of a Hacker Final
Information security - what is going on 2016
Hackers are innocent

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Big Data Technologies - Introduction.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
Chapter 3 Spatial Domain Image Processing.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Big Data Technologies - Introduction.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Reach Out and Touch Someone: Haptics and Empathic Computing
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
A Presentation on Artificial Intelligence
Advanced methodologies resolving dimensionality complications for autism neur...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity

Think Like a Hacker

  • 1. Manage risk not data or systems Hackers knows a lot about your security without touching your network Candan BOLUKBAS CTO & Co-Founder, NormShield
  • 2. “ ” A problem well defined is half solved. John Dewey, American philosopher
  • 3. Open source intelligence (OSINT) Social media Vulnerability Databases Blogs and user generated content Hacktivist forums Black Markets Underground Data leakage • Human Errors & Omissions • Passive Vulnerability Scan • Internet-wide Scanners • E-mail & Password Harvesting • Mass & Spear Phishing • Fraudulent Domains & Apps • Malware Activities • Data Leakage & Whistleblowing Hackers conduct reconnaissance
  • 6. Unreliable Threat Intelligence Data https://webroot-cms-cdn.s3.amazonaws.com/9114/5445/5911/ponemon-importance-of-cyber-threat-intelligence.pdf
  • 7. Too many alerts and false positives https://webroot-cms-cdn.s3.amazonaws.com/9114/5445/5911/ponemon-importance-of-cyber-threat-intelligence.pdf - 2015
  • 8. Threat intelligence not visible to decision makers https://www.anomali.com/files/white-papers/Ponemon-Research-Report.pdf https://baydynamics.com/content/uploads/2016/06/how-board-of-directors-feel-about-cyber-security-reports.pdf
  • 10. Cyber Threat Intelligence must be: Timely Relevant Verified Accurate Actionable
  • 11. Stay one step ahead of hackers • Executive scorecard: Understandable format, informed business decisions, measurable performance • Vulnerabilities tracking: Uncovering known vulnerabilities on a daily and weekly basis, monitoring CVEs and tracking exploitations in the wild • System change detection: Detect newly deployed servers, applications, ports or services to the internet without security checks. • Actionable intelligence: Provide verified risks and recommended actions to enable sound business decisions.
  • 12. Think and Act Like a Hacker! It is critical to have continuous visibility to all the vulnerabilities in company’s publicly accessible systems and potential risks in cyberspace. For example, NormShield has over 400 crawlers that collect data from hacker sites, internet wide-scanners, reputation sites, search engines, etc. We also manually extract data from dark web and sites that require membership. Use the tools and techniques that hackers use to plan attacks, discover the Internet footprint of their targets, and identify weaknesses to exploit. Every hacking attempt starts with reconnaissance step (the first step of the Cyber-Kill Chain).
  • 15. info@normshield.com @NormShield (571) 335-0222 normshield.com 8201 Greensboro Drive, Suite 300, McLean, VA 22102 Stop by our table to get your free cyber threat scorecard.

Editor's Notes

  • #2: Are you familiar with Gartner and their recent reporting? Gartner is seeing the benefits of enterprises deploying rapid detection and response approaches. They are so committed to this approach they have named it SOAR – Security Operations and Reporting. NormShield is at the forefront of SOAR with a solution specifically designed for <large/mid-sized enterprises> like yours. The most important thing is that with NormShield you automatically see, prioritize and act on cyber threats. SOURCE: By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, up from less than 30% in 2016. Gartner Gartner estimates that 5% of large and midsize enterprises currently use SOAR technologies, but expects this to grow to 30% by 2019… with SOAR, ROI and business value can easily be demonstrated by solving operational day-to-day problems.