spo1 t19

59
Session ID: Session Classification:

Upload: selectedpresentations

Post on 08-Aug-2015

14 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Spo1 t19

Session ID:

Session Classification:

Page 2: Spo1 t19

2011 – the Year of Data Breaches

Page 3: Spo1 t19

2012 – proceeded almost the same

Page 4: Spo1 t19

2013 – started in a similar Way

Page 5: Spo1 t19

Page 6: Spo1 t19

Page 7: Spo1 t19

Page 8: Spo1 t19

Page 9: Spo1 t19

Page 10: Spo1 t19

Page 11: Spo1 t19

Page 12: Spo1 t19

Page 13: Spo1 t19

Page 14: Spo1 t19

Page 15: Spo1 t19

Page 16: Spo1 t19
Page 17: Spo1 t19

Page 18: Spo1 t19

Page 19: Spo1 t19

Page 20: Spo1 t19

Page 21: Spo1 t19

Page 22: Spo1 t19

Page 23: Spo1 t19

Page 24: Spo1 t19

Page 25: Spo1 t19

••

Page 26: Spo1 t19

Page 27: Spo1 t19

••

Page 28: Spo1 t19

Page 29: Spo1 t19

••

Page 30: Spo1 t19

••

Page 31: Spo1 t19

Page 32: Spo1 t19

Page 33: Spo1 t19

Page 34: Spo1 t19

Page 35: Spo1 t19

Page 36: Spo1 t19

Page 37: Spo1 t19

Page 38: Spo1 t19

Page 39: Spo1 t19

Page 40: Spo1 t19

Page 41: Spo1 t19

• Weekly/Daily Scheduled Vulnerability Scanning

Page 42: Spo1 t19

Page 43: Spo1 t19

Page 44: Spo1 t19

Page 45: Spo1 t19

Page 46: Spo1 t19

Page 47: Spo1 t19

Page 48: Spo1 t19

Page 49: Spo1 t19

Page 50: Spo1 t19

Page 51: Spo1 t19

Page 52: Spo1 t19

Page 53: Spo1 t19

Page 54: Spo1 t19

• Mitigated by use of EMET

Page 55: Spo1 t19

Page 56: Spo1 t19

• Ability to add tactical controls

• Example: Recent Internet Explorer Vulnerabilities CVE-2012-4969

• Mitigated by use of EMET

• Audit the Deployment

Page 57: Spo1 t19

Page 58: Spo1 t19

Page 59: Spo1 t19