Presentations – Sense of Security Thu, 27 Feb 2020 22:52:42 +0000 en-US hourly 1 https://wordpress.org/?v=5.3.2 Presentation: RSA USA 2020 – Preventing an Enterprise Win10 Rollout Being Remotely Controlled and Ransomed /presentation-rsa-usa-2020-preventing-an-enterprise-win10-rollout-being-remotely-controlled-and-ransomed/ /presentation-rsa-usa-2020-preventing-an-enterprise-win10-rollout-being-remotely-controlled-and-ransomed/#respond Thu, 27 Feb 2020 22:52:42 +0000 /?p=6939 ...we call these Dynamic Risk Assessments (DRA). This type of assessment is based on the premise that we are not stifled by prescriptive rules, a spreadsheet listing the methods we must use, or having meetings with any number of stakeholders who may not disclose the true state of affairs for fear of losing credibility or possibly their job.

The post Presentation: RSA USA 2020 – Preventing an Enterprise Win10 Rollout Being Remotely Controlled and Ransomed appeared first on Sense of Security.

]]>
Our COO Murray Goldschmidt, a top RSA speaker held a presentation at RSA USA 2020 on the topic of Preventing an Enterprise Win10 Rollout Being Remotely Controlled and Ransomed

Windows 10 is the platform of choice for large scale, corporate controlled, end user OS deployments. Referred to through many names incl Enterprise Roll-Outs, Standard Operating Environments (SOE), Golden Image deployment etc they all relate to the same thing. A standardized deployment that needs to be secured at creation and then managed for the lifetime in operation. Large corps & govt tend to use the same formula. Create an image. Add in some enterprise mgmt features, end point security & full disk encryption. Harden. Test it (maybe). Operate it in the field. Deal with any fall out. These are high cost, time sensitive, task management centric projects. Using an outsourced partner to design, implement & manage the process adds in an element of supply chain risk – making the entire solution susceptible to long term time-in-market attacks. This includes a timeless opportunity for total environment-take-over. It is our experience that organisations are short-changing themselves by doing very limited testing of the system prior to deployment. At best this is limited to a hardening review.

This presentation describes a case-study for why testing is required to address a stream of risks and how this saved a large corporate from deploying an image that was certain to result in 10,000+ machines being remotely controlled by an adversary.

To learn more download our presentation here. For more information call us on 1300 922 933.

The post Presentation: RSA USA 2020 – Preventing an Enterprise Win10 Rollout Being Remotely Controlled and Ransomed appeared first on Sense of Security.

]]>
/presentation-rsa-usa-2020-preventing-an-enterprise-win10-rollout-being-remotely-controlled-and-ransomed/feed/ 0
Presentation: RSA USA 2020 – What Was Once Old Is New Again: Domain Squatting in 2020 /presentation-rsa-usa-2020-what-was-once-old-is-new-again-domain-squatting-in-2020/ /presentation-rsa-usa-2020-what-was-once-old-is-new-again-domain-squatting-in-2020/#respond Thu, 27 Feb 2020 17:00:10 +0000 /?p=6938 Despite investment in DDoS mitigation, testing solutions is seldom on the agenda of most vulnerability management programs that focus on vulnerability scanning and pen testing. This presentation delivers an effective approach to validate your defenses against all forms of DDoS including the ability to simulate attacks, measure your response and determine if your operational practices are working.

The post Presentation: RSA USA 2020 – What Was Once Old Is New Again: Domain Squatting in 2020 appeared first on Sense of Security.

]]>
Our Practice Manager Jeremy du Bruyn and our Head of Research Willem Mouton held a presentation at RSA USA 2020 on the topic of What Was Once Old Is New Again: Domain Squatting in 2020

A common cyber-attack technique is to lure a victim to browse to an attacker controlled website that is hosting malware or the like. One way to lure a victim is to register a DNS domain that resembles that of a major brand, and then either entice the victim to visit the website, for instance via an email message, or to simply wait for the victim to mistype or misspell the major brand’s website address. This registering of a similar DNS domain is commonly referred to as domain squatting. People are encouraged to be suspicious of emails received from unknown senders, but what happens when an email appears to come from a known person or organization, and the emails and its attachments are in line with the expected content. Again, research into similar topics isn’t new. However, by utilizing domain squatting the registering of DNS domains can be extracted by examining email flows, and the email content categorized by applying topic modelling on their contents. This allows for specifically crafted spear-phishing emails that match both the expected email sender and the topics of correspondence, which drastically increases the chances of a successful phish.

In this session, it will be demonstrated how old school domain squatting can be modernized to include OSINT gathering and the delivery of weaponized documents using email messages. The result is scarily accurate corporate relationship and supply chain mappings, as well as re-purposing actual business documents into spear-phishing attacks.

To learn more download our presentation here. For more information call us on 1300 922 933.

The post Presentation: RSA USA 2020 – What Was Once Old Is New Again: Domain Squatting in 2020 appeared first on Sense of Security.

]]>
/presentation-rsa-usa-2020-what-was-once-old-is-new-again-domain-squatting-in-2020/feed/ 0
Presentation: RMIA National Conference – The Business Case for Dynamic Risk Assessments /rmia-national-conference-key-note-presentation-the-business-case-for-dynamic-risk-assessments/ /rmia-national-conference-key-note-presentation-the-business-case-for-dynamic-risk-assessments/#respond Wed, 13 Nov 2019 05:51:56 +0000 https://pingpongpang.senseofsecurity.com/?p=6559 ...we call these Dynamic Risk Assessments (DRA). This type of assessment is based on the premise that we are not stifled by prescriptive rules, a spreadsheet listing the methods we must use, or having meetings with any number of stakeholders who may not disclose the true state of affairs for fear of losing credibility or possibly their job.

The post Presentation: RMIA National Conference – The Business Case for Dynamic Risk Assessments appeared first on Sense of Security.

]]>
Our COO Murray Goldschmidt held a key note presentation on the topic of Dynamic Risk Assessments at the RMIA conference.

Risk Management is a discipline with an extensive heritage. Moving forward we need to adopt assessment methods that are going to give a higher degree of assurance that we are identifying realistic vectors through which the business may be subjected to attack. At Sense of Security (SOS) we call these Dynamic Risk Assessments (DRA). This type of assessment is based on the premise that we are not stifled by prescriptive rules, a spreadsheet listing the methods we must use, or having meetings with any number of stakeholders who may not disclose the true state of affairs for fear of losing credibility or possibly their job.

To learn more download our The Business Case for Dynamic Risk Assessments here. For more information call us on 1300 922 933.

The post Presentation: RMIA National Conference – The Business Case for Dynamic Risk Assessments appeared first on Sense of Security.

]]>
/rmia-national-conference-key-note-presentation-the-business-case-for-dynamic-risk-assessments/feed/ 0
Presentation: A snapshot into current Web Application vulnerabilities – Lunch N Learn /a-snapshot-into-current-web-application-vulnerabilities-lunch-n-learn-presentation/ /a-snapshot-into-current-web-application-vulnerabilities-lunch-n-learn-presentation/#respond Thu, 12 Sep 2019 00:01:57 +0000 https://pingpongpang.senseofsecurity.com/?p=6656 Our Chief Data Wrangler Willem Mouton presented at our Lunch N Learn event the findings of our Web Application report, provided some insight and risk context as to how your organisation compared to others in the market, what the top issues are, and why web application security still needs to be a core focus of security initiatives.  

The post Presentation: A snapshot into current Web Application vulnerabilities – Lunch N Learn appeared first on Sense of Security.

]]>
During 2018 Sense of Security (SOS) issued 175 web application penetration test reports. Each of those reports contained the assessment of either a single or multiple web applications. SOS has released this data to help improve security awareness of the state of web application security in Australia.

Our Chief Data Wrangler Willem Mouton presented at our Lunch N Learn event the findings of our State of Web Application Security in Australia report, provided some insight and risk context as to how your organisation compared to others in the market, what the top issues are, and why web application security still needs to be a core focus of security initiatives.

To learn more, download our A snap shot into current Web Application Vulnerabilities Lunch N Learn presentation slides. For more information call us on 1300 922 933.

The post Presentation: A snapshot into current Web Application vulnerabilities – Lunch N Learn appeared first on Sense of Security.

]]>
/a-snapshot-into-current-web-application-vulnerabilities-lunch-n-learn-presentation/feed/ 0
Presentation: Meet the Chiefs industry briefings – Cyber Resilience: Understanding Supply Chain Risks /meet-the-chiefs-industry-briefings-cyber-resilience-understanding-supply-chain-risks/ /meet-the-chiefs-industry-briefings-cyber-resilience-understanding-supply-chain-risks/#respond Thu, 18 Jul 2019 00:16:10 +0000 https://pingpongpang.senseofsecurity.com/?p=6657 Our COO Murray Goldschmidt was invited to present at the Meet the Chiefs industry briefings: Defence Watch Cyber Security event. He presented on the topic of Cyber Resilience - Understanding Supply Chain Risks. The main points addressed were: Exploring Supply Chain Attack Vectors, Understanding your Customer Requirements and Improving Cyber Resilience

The post Presentation: Meet the Chiefs industry briefings – Cyber Resilience: Understanding Supply Chain Risks appeared first on Sense of Security.

]]>
Our COO Murray Goldschmidt was invited to present at the Meet the Chiefs industry briefings: Defence Watch Cyber Security event.

He presented on the topic of Cyber Resilience – Understanding Supply Chain Risks.

The main points addressed were:

  • Exploring Supply Chain Attack Vectors
  • Understanding your Customer Requirements
  • Improving Cyber Resilience

To learn more, download our Cyber Resilience: Understanding Supply Chain Risks presentation here. For more information call us on 1300 922 933.

The post Presentation: Meet the Chiefs industry briefings – Cyber Resilience: Understanding Supply Chain Risks appeared first on Sense of Security.

]]>
/meet-the-chiefs-industry-briefings-cyber-resilience-understanding-supply-chain-risks/feed/ 0
Presentation: Lunch N Learn – How to Operate a DDoS Testing Program /lunch-n-learn-presentation-how-to-operate-a-ddos-testing-program/ /lunch-n-learn-presentation-how-to-operate-a-ddos-testing-program/#respond Tue, 19 Mar 2019 00:41:50 +0000 https://pingpongpang.senseofsecurity.com/?p=6658 For the motivated attacker and cyber-criminal, DDoS is becoming a common tool in their arsenal, consequently resulting in expensive downtime and disruption to legitimate business. Our COO Murray Goldschmidt presented at our Lunch N Learn event on the topic of How to Operate a DDoS Testing Program where he discussed: DDoS in 2019, Examples of Attacks and How to Operate a Testing Program.

The post Presentation: Lunch N Learn – How to Operate a DDoS Testing Program appeared first on Sense of Security.

]]>
Organisations are susceptible to outages across the stack from web applications to the networks delivering them. As a result, attackers are now using an array of changing attack methods, continually recalibrating attacks dynamically based on responsiveness of target systems and can also launch attacks from a range of sources distributed across the globe. For the motivated attacker and cyber-criminal, DDoS is becoming a common tool in their arsenal, consequently resulting in expensive downtime and disruption to legitimate business.

Our COO Murray Goldschmidt presented at our Lunch N Learn event on the topic of How to Operate a DDoS Testing Program where he discussed:

  • DDoS in 2019
  • Examples of Attacks
  • How to Operate a Testing Program

To learn more download our presentation slides here. For more information call us on 1300 922 933.

The post Presentation: Lunch N Learn – How to Operate a DDoS Testing Program appeared first on Sense of Security.

]]>
/lunch-n-learn-presentation-how-to-operate-a-ddos-testing-program/feed/ 0
Presentation: RSA USA 2019 – How to design and operate a DDoS testing program /rsa-usa-2019-how-to-design-and-operate-a-ddos-testing-program-presentation/ /rsa-usa-2019-how-to-design-and-operate-a-ddos-testing-program-presentation/#respond Thu, 07 Mar 2019 02:30:03 +0000 https://pingpongpang.senseofsecurity.com/?p=6659 Despite investment in DDoS mitigation, testing solutions is seldom on the agenda of most vulnerability management programs that focus on vulnerability scanning and pen testing. This presentation delivers an effective approach to validate your defenses against all forms of DDoS including the ability to simulate attacks, measure your response and determine if your operational practices are working.

The post Presentation: RSA USA 2019 – How to design and operate a DDoS testing program appeared first on Sense of Security.

]]>
Our COO Murray Goldschmidt, together with Redwolf have presented at the RSA Conference in San Francisco. The topic was How to design and operate a DDoS testing program.

Despite investment in DDoS mitigation, testing solutions is seldom on the agenda of most vulnerability management programs that focus on vulnerability scanning and pen testing. This presentation delivers an effective approach to validate your defenses against all forms of DDoS including the ability to simulate attacks, measure your response and determine if your operational practices are working.

To learn more download our presentation slides here. For more information call us on 1300 922 933.

The post Presentation: RSA USA 2019 – How to design and operate a DDoS testing program appeared first on Sense of Security.

]]>
/rsa-usa-2019-how-to-design-and-operate-a-ddos-testing-program-presentation/feed/ 0
Presentation: RSA USA 2019 – Securely Deploying Micro Services, Containers & Serverless PaaS Web Apps /rsa-usa-2019-securely-deploying-micro-services-containers-serverless-paas-web-apps/ /rsa-usa-2019-securely-deploying-micro-services-containers-serverless-paas-web-apps/#respond Thu, 07 Mar 2019 01:04:03 +0000 https://pingpongpang.senseofsecurity.com/?p=6660 While containerisation focuses on abstraction of the app from the OS (generally a lower layer of abstraction), modern app development itself has tended towards higher levels of abstraction. Given the speed at which apps need to be delivered, developers leverage frameworks and development environments that offer a higher level of abstraction, making it easier to develop without coding to cater for the lower levels of the stack (the framework takes care of that). Our COO Murray Goldschmidt’s presented at RSA USA 2019 on Securely Deploying Micro Services, Containers & Serverless PaaS Web Apps

The post Presentation: RSA USA 2019 – Securely Deploying Micro Services, Containers & Serverless PaaS Web Apps appeared first on Sense of Security.

]]>
While containerisation focuses on abstraction of the app from the OS (generally a lower layer of abstraction), modern app development itself has tended towards higher levels of abstraction. Given the speed at which apps need to be delivered, developers leverage frameworks and development environments that offer a higher level of abstraction, making it easier to develop without coding to cater for the lower levels of the stack (the framework takes care of that).

Containerisation is on the rise and many decision makers are starting to implement it within their organisation. To learn more download our COO Murray Goldschmidt’s presentation from RSA USA 2019 on Securely Deploying Micro Services, Containers & Serverless PaaS Web Apps here. For more information call us on 1300 922 933.

The post Presentation: RSA USA 2019 – Securely Deploying Micro Services, Containers & Serverless PaaS Web Apps appeared first on Sense of Security.

]]>
/rsa-usa-2019-securely-deploying-micro-services-containers-serverless-paas-web-apps/feed/ 0
Presentation: Making Sense of Office 365 Email (In)Security /office-365-email-security/ /office-365-email-security/#respond Thu, 22 Nov 2018 04:23:24 +0000 /?p=4615 Organisations need to understand that Office 365 (O365) is a cloud-based business system used for email, productivity, and collaboration. This platform and its data are a popular breach target for key threat actors who wish to extract data, elevate their privileges, abuse resources, or delete data.

The post Presentation: Making Sense of Office 365 Email (In)Security appeared first on Sense of Security.

]]>
Office 365 is ubiquitous throughout the digital landscape. With email being one of the most common forms of attack, the need for vigilance has never been greater.

Organisations need to understand that Office 365 (O365) is a cloud-based business system used for email, productivity, and collaboration. This platform and its data are a popular breach target for key threat actors who wish to extract data, elevate their privileges, abuse resources, or delete data.  There is also an insider risk whereby so called ‘trusted employees’ take steps to exfiltrate/spill or delete sensitive data or obtain persistent access by building in backdoor accounts.

Targeted email attacks such as Business Email Compromise, spear phishing, and ransomware are on the rise. Cybercriminals know employees are the weakest link in an organisation and need only to convince these targets they are someone who should be trusted to achieve success. Attackers always follow the money and choose the easiest routes, and O365 generally meets this criteria.

Email is trusted communication by many. People often trust an email hasn’t been spoofed, or that a sender is who they say they are. If you regularly communicate with a party from a particular email address, why would you suddenly assume it is not legitimate? According to a Osterman Research white paper in April this yr, 44% of organisations were victims of targeted email attacks launched via a compromised account in the last 12 months.

To find out why mail is a good target and O365 Context, the anatomy of a typical O365 hack, what are the indicators of compromise and lastly what are the regulatory impacts and countermeasures check out the presentation our CTO Jason Edelstein conducted on the topic Making Sense of Office 365 Email (In)Security

The post Presentation: Making Sense of Office 365 Email (In)Security appeared first on Sense of Security.

]]>
/office-365-email-security/feed/ 0
Presentation: APIG NSW – Cyber in Focus – Outsourcing IT Services and Managed Services – Are you secure? /apig-nsw-outsourcing-it-services-and-managed-services-are-you-secure/ /apig-nsw-outsourcing-it-services-and-managed-services-are-you-secure/#respond Fri, 19 Oct 2018 01:15:51 +0000 https://pingpongpang.senseofsecurity.com/?p=6688 This year Sense of Security presented at APIG NSW on the topic of Outsourcing IT Services and Managed Services – Are you secure? The main points that were discussed included: Key Activities to Secure Business, Managed Security Services, Compliance & Information Security Management and MSSP’s - Key Aspects to Assess.

The post Presentation: APIG NSW – Cyber in Focus – Outsourcing IT Services and Managed Services – Are you secure? appeared first on Sense of Security.

]]>
This year Sense of Security presented at APIG NSW on the topic of Outsourcing IT Services and Managed Services – Are you secure?

The main points that were discussed included:

  • Key Activities to Secure Business
  • Managed Security Services
  • Compliance & Information Security Management
  • MSSP’s – Key Aspects to Assess

For more information download our presentation: APIG NSW – Outsourcing IT Services and Managed Services – Are you Secure?

The post Presentation: APIG NSW – Cyber in Focus – Outsourcing IT Services and Managed Services – Are you secure? appeared first on Sense of Security.

]]>
/apig-nsw-outsourcing-it-services-and-managed-services-are-you-secure/feed/ 0