10
© 2017 SecurityMetrics John Bartholomew, Sr. VP of Sales Security Metrics Cybersecurity, Live Hacking demo, and PCI Compliance Protecting your organization from cyber threats

Cybersecurity, Live Hacking demo, and PCI Compliance · Questions? Title: CCS III-IV - Cybersecurity, Live Hacking demo, and PCI Compliance for GFOASC 2017 Created Date: 10/12/2017

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cybersecurity, Live Hacking demo, and PCI Compliance · Questions? Title: CCS III-IV - Cybersecurity, Live Hacking demo, and PCI Compliance for GFOASC 2017 Created Date: 10/12/2017

© 2017 SecurityMetrics

John Bartholomew, Sr. VP of SalesSecurity Metrics

Cybersecurity, Live Hacking demo, and PCI ComplianceProtecting your organization from cyber threats

Page 2: Cybersecurity, Live Hacking demo, and PCI Compliance · Questions? Title: CCS III-IV - Cybersecurity, Live Hacking demo, and PCI Compliance for GFOASC 2017 Created Date: 10/12/2017

Today’s Hacking

• Malware– Stealing Credentials– Ransomware

• Remote Access• X-site scripting (application vulnerabilities)

• Vulnerability exploitation (network services)

• …

Page 3: Cybersecurity, Live Hacking demo, and PCI Compliance · Questions? Title: CCS III-IV - Cybersecurity, Live Hacking demo, and PCI Compliance for GFOASC 2017 Created Date: 10/12/2017

Insecure Remote Access• Compromise pathway of

today’s hackers • Common applications

– RDP (port 3389)– LogMeIn– RemotePC– pcAnywhere– GoToMyPC– VPN

5

Page 4: Cybersecurity, Live Hacking demo, and PCI Compliance · Questions? Title: CCS III-IV - Cybersecurity, Live Hacking demo, and PCI Compliance for GFOASC 2017 Created Date: 10/12/2017

• Commonly installed through “other” methods (not directly related to POS malware)

• Malware vectors– Inside job (USB)– Phishing/social engineering– Vulnerabilities exploitation– Weakly configured remote access

POS Malware Installation

Page 5: Cybersecurity, Live Hacking demo, and PCI Compliance · Questions? Title: CCS III-IV - Cybersecurity, Live Hacking demo, and PCI Compliance for GFOASC 2017 Created Date: 10/12/2017

Today’s Hack

Page 6: Cybersecurity, Live Hacking demo, and PCI Compliance · Questions? Title: CCS III-IV - Cybersecurity, Live Hacking demo, and PCI Compliance for GFOASC 2017 Created Date: 10/12/2017

Attack Fundamentals

Scan for port 3389 to identify potential targets

Dictionary/brute force 3389 on potential targets

Test access(where credentials

validated)

Go exploring Install malware

Page 7: Cybersecurity, Live Hacking demo, and PCI Compliance · Questions? Title: CCS III-IV - Cybersecurity, Live Hacking demo, and PCI Compliance for GFOASC 2017 Created Date: 10/12/2017

PCI DSSExamples of Security Helpfulness

• Change Default Credentials (2.1)

• Lock Out Limits (8.1.6)

• Guest Account Removal (2.1)

• Multi-factor Authentication (8.3)

• VA Scanning (11.2)

• File Integrity Monitoring (11.5)

• Anti-virus (5)

• Penetration Testing (11.3)

Page 8: Cybersecurity, Live Hacking demo, and PCI Compliance · Questions? Title: CCS III-IV - Cybersecurity, Live Hacking demo, and PCI Compliance for GFOASC 2017 Created Date: 10/12/2017

PCI DSSSecure Simplicity

• P2PE Certified (certified encryption solution)

Page 9: Cybersecurity, Live Hacking demo, and PCI Compliance · Questions? Title: CCS III-IV - Cybersecurity, Live Hacking demo, and PCI Compliance for GFOASC 2017 Created Date: 10/12/2017

SecurityMetrics 2017 PCI Guide http://info.securitymetrics.com/pci-guide

“Whether it’s to answer questions from your merchants, complete your own PCI compliance validation, or keep up with current data breach trends, this guide is a great resource.”

-Jean Gerritsen, AVP Card Services, NCMIC Group, Inc.

Page 10: Cybersecurity, Live Hacking demo, and PCI Compliance · Questions? Title: CCS III-IV - Cybersecurity, Live Hacking demo, and PCI Compliance for GFOASC 2017 Created Date: 10/12/2017

www.securitymetrics.com

Questions?