Explore defense-in-depth strategies for enhancing your organization's security posture in this 44-minute conference talk from BSides Cleveland 2015. Learn how to optimize existing controls, implement effective network segmentation, and leverage tools like firewalls, intrusion detection systems, and web proxies. Discover the importance of outbound filtering, vulnerability management, and application layer protection. Gain insights on balancing security investments and recognizing that not all threats are equal. Acquire practical knowledge to build a comprehensive, multi-layered security approach that protects your digital assets like a well-fortified castle.
Overview
Syllabus
DEFENSE
EXISTING CONTROLS NOT OPTIMIZED
SPENDING MORE ON SECURITY
FIREWALLS
OUTBOUND FILTERING
INTRUSION DETECTION / PREVENTION
NOT EVERYONE IS A THREAT
NETWORK SEGMENTATION
FIX VULNERABILITIES
WEB PROXY
APPLICATION LAYER FIREWALL
CLIENT PROTECTION STILL IMPORTANT
BRINGING IT ALL