Advanced Persistent Threats in Cybersecurity

advanced persistent threat apt against n.w
1 / 9
Embed
Share

Exploring insights shared by Tom Madden, a seasoned cybersecurity expert, on advanced persistent threats (APTs) impacting U.S. organizations. Learn about different attack models, such as the European and Asian models, and discover key strategies to enhance IT security against such threats, including education, application scanning, and two-factor authentication. Uncover the significance of social engineering tactics that cyber attackers leverage to infiltrate systems.

  • Cybersecurity
  • APT
  • IT Security
  • Attack Models
  • Social Engineering

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. ADVANCED PERSISTENT THREAT (APT) against U. S. Business, Education and Government IT Installations By Tom Madden, Chief Information Security Officer, Centers for Disease Control and Prevention

  2. BACKGROUND 34 years with the federal government 27 years involved in cyber security (was cyber security when cyber security wasn t cool) 18 years in the nuclear weapons program Became CDC s first CISO in 2003 Entered the Senior Executive Service in 2008 Most memorable quote from a JSU Professor in 1983 Proud double alum of Jacksonville State University

  3. Participated in the National Critical Infrastructure Intelligence Committee with DNI, CIA, DIA, and FBI among others to determine national threat priorities

  4. TWO MODELS Two fundamental models of attack after very different data A third model encompasses the conventional hacker who has different motives than the APT model o Rarely coordinated o Generally small in scope o Cannot be ignored

  5. EUROPEAN MODEL Resembles a crime syndicate Targets financial institutions and other movers of money Extreme Stealth Leave very little behind Not well understood

  6. ASIAN MODEL Extremely well organized Not after money after data any data Appears to be state sponsored Uses K-12 and large university systems as drops If not caught in the act (.rar 443) almost impossible to detect (needle in haystack)

  7. WHAT CAN YOU (WE) DO Education education education Teach developers security (cross site scripting and sql injection almost always present) Scan apps in development Harden domain controllers Two factor authentication for all elevated actions

  8. SOCIAL ENGINEERING THAT WORKS The conference approach use hospitality The birthday approach Common interests Visitor out smoking at the back door Service and repair

  9. QUESTIONS and DISCUSSION A word about jobs!!! ADVANCED PERSISTENT THREAT (APT) against U. S. Business, Education and Government IT Installations Tom Madden 770-488-8666 aqt6@cdc.gov

More Related Content