2015-02-26 securing your network perimeter

Post on 14-Jul-2015

93 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Thrive. Grow. Achieve.

Securing Your IT Perimeter

Nate Solloway and Jeffrey Mullenix February 26 , 2015

WHAT’S ON TAP?

• What is my Perimeter?

• Common Vulnerabilities

• How do I protect myself?

• Routers and Firewalls

• Wireless and Guest Access

• Remote Access

• Q&A

2

WHAT IS MY PERIMETER?

3

OR DOES IT LOOK LIKE THIS?

4

COMMON VULNERABILITIES

5

OPEN PORTS

PEOPLE

LAZY SOFTWARE PATCHING

PEOPLE

OUT DATE AV/IDS

PEOPLE

LAZY PROCESSES FOR CRITICAL AUTHENTICATION (BANKS, TRANSFERS)

PEOPLE

HOW THE BAD GUYS EXPLOIT THEM

6

HOW DO I PROTECT MYSELF?

7

8

MINIMIZING OPEN PORTS

- FEWER SERVICES?

- MAYBE THE CLOUD

PEOPLE

- LET’S GET BACK TO THIS ONE

AGGRESSIVE SOFTWARE PATCHING

- SERVERS

- WORKSTATIONS

- APPS

AV VS IDS

AUTHENTICATION

PEOPLE

SELECTING A FIREWALL/ROUTER

9

10

CUSTOM ADDRESS OBJECTS

11

CUSTOM SERVICES

12

CUSTOM SERVICES

13

WIRELESS: STAFF VS GUESTS

14

REMOTE DESKTOP VS VPN

15

QUESTIONS?

1

Seth Zarny – Partner

szarny@raffa.com

Nate Solloway – Manager

nsolloway@raffa.com

Jeffrey Mullenix – Network Engineer

jmullenix@raffa.com

top related