Practical CyberDefense
By Paul Dutot
About me
● Co Founder of the CIISF
Practical CyberDefense
● Employed as an Ethical Security
Consultant @ Logicalis Jersey
● Practice Offensive & Defensive Security for
businesses at all verticals
Agenda
● Concepts I and II
Practical CyberDefense
● Stages 1-5 of a practical Cyber Defense
with more demo's
● Resources
Questions at the end please
● Reverse & Bind Shells Demo
Concepts I
“Attackers have
months to prepare,
defenders have
minutes to react”
Practical CyberDefense
“This is not a security
control !!!!”
vs
Concepts II
“Security is a journey”
Practical CyberDefense
“What are the bad guys
trying to achieve?
Reverse & Bind Shells
Practical CyberDefense
Demo
Stage 1 – Buy In
● Appoint a 'Cyber'
champion
● 'C' level Buy In
● Maintain a 'Cyber'
risk register
Practical CyberDefense
● Do Security
Awareness
Stage 2 - Reconnaisance
Some Forgotten Ones
Practical CyberDefense
Demo
Reconnaisance Aims
Practical CyberDefense
● To profile your organsiation
● In preparation for social enginering attacks and or
email phishing
Reconnaisance - Mitigation
Practical CyberDefense
● Undertake reconnaisance to find public
information
● Mitigate risk by takedown and creating contray
information
● Test your defenses and train your users
Phishing is a big deal !!!
Practical CyberDefense
Stage 3 – Understanding AV
Is AV really protecting us - the case for and
against
Practical CyberDefense
Stage 3 – AV Bypass
Demo - The case against
Practical CyberDefense
Stage 3 – The case for
We still need AV to protect us !
Practical CyberDefense
Stage 4 – Think outside the box
● Databases – They are the end game
Practical CyberDefense
● Web applications – Owasp Top 10
● UC Communications – TDos / Toll Fraud
● Data Encryption – Laptops / Desktops / Databases
Stage 5 – It's not if but when
SIEM – Security, Information& Event Monitoring
Practical CyberDefense
Stage 5 – SIEM
OSSIM SIEM – Free open Source SIEM Demo
Practical CyberDefense
Resources
Florida State
● http://www.cs.fsu.edu/~redwood/OffensiveSecurity/
Practical CyberDefense
SANS Institute
● http://www.sans.org/critical-security-controls/controls/
OWASP Top 10 - 2013
● https://www.owasp.org/index.php/Top_10_2013-Top_10
Thank you – Any Questions?
Blog – http://cyberkryption.com
Practical CyberDefense
@cyberkryption
paul.dutot@je.logicalis.com

More Related Content

PDF
The Risks of YOLOing-2.pdf
PPTX
Incident response : the good the bad and the ugly or how to keep your face af...
PPTX
Staying Safe Online for HR Professionals
PDF
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
ODP
A journey through an INFOSEC labyrinth
PPT
Virus Precautions
PPT
How you can become a hacker with no security experience
ZIP
Protecting Public Hotspots
The Risks of YOLOing-2.pdf
Incident response : the good the bad and the ugly or how to keep your face af...
Staying Safe Online for HR Professionals
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
A journey through an INFOSEC labyrinth
Virus Precautions
How you can become a hacker with no security experience
Protecting Public Hotspots

Viewers also liked (20)

PDF
A Threat Hunter Himself
PPTX
44CON London 2015: NTFS Analysis with PowerForensics
PPTX
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
PDF
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
PPTX
Hunting on the cheap
PPTX
Building a Successful Threat Hunting Program
PDF
CrowdCasts Monthly: Going Beyond the Indicator
PDF
Blue team reboot - HackFest
PPTX
BSidesDC - **** it, Do It Live (PowerShell Digital Forensics)
PDF
Workshop threat-hunting
PPTX
SOC2016 - The Investigation Labyrinth
PDF
Building an Analytics Enables SOC
PDF
Threat Hunting Workshop
PPTX
PowerShell for Penetration Testers
PPTX
I hunt sys admins 2.0
PPTX
Building an Empire with PowerShell
PPTX
Lateral Movement with PowerShell
PPTX
The Travelling Pentester: Diaries of the Shortest Path to Compromise
PDF
Threat Hunting with Splunk
PPTX
Abstract Tools for Effective Threat Hunting
A Threat Hunter Himself
44CON London 2015: NTFS Analysis with PowerForensics
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Hunting on the cheap
Building a Successful Threat Hunting Program
CrowdCasts Monthly: Going Beyond the Indicator
Blue team reboot - HackFest
BSidesDC - **** it, Do It Live (PowerShell Digital Forensics)
Workshop threat-hunting
SOC2016 - The Investigation Labyrinth
Building an Analytics Enables SOC
Threat Hunting Workshop
PowerShell for Penetration Testers
I hunt sys admins 2.0
Building an Empire with PowerShell
Lateral Movement with PowerShell
The Travelling Pentester: Diaries of the Shortest Path to Compromise
Threat Hunting with Splunk
Abstract Tools for Effective Threat Hunting

Similar to Practical Cyber Defense (20)

PDF
Cyber War, Cyber Peace, Stones and Glass Houses
PPSX
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
PPTX
Webinar cybersecurity presentation-6-2018 (final)
PDF
MT 117 Key Innovations in Cybersecurity
PPTX
Cyber 101 for smb execs v1
PPTX
Presentation infra and_datacentrre_dialogue_v2
PPTX
Emerging Threats to Infrastructure
PDF
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
PPTX
Cyber War, Cyber Peace, Stones, and Glass Houses
PDF
A Cyber Security Review
PPTX
Cybersecurity Awareness Overview.pptx
PPT
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
PPTX
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
PPTX
Cyber terrorism
PPTX
An An Exploration Into the Cyber Security
PPTX
Blitzing with your defense bea con
PPTX
SCADA Security Webinar
PPT
FBI And Cyber Crime | Crime Stoppers International
PDF
Protecting Your Business From Cybercrime
PDF
Basic Cybersecurity Services for Every Business presentation
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Webinar cybersecurity presentation-6-2018 (final)
MT 117 Key Innovations in Cybersecurity
Cyber 101 for smb execs v1
Presentation infra and_datacentrre_dialogue_v2
Emerging Threats to Infrastructure
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
Cyber War, Cyber Peace, Stones, and Glass Houses
A Cyber Security Review
Cybersecurity Awareness Overview.pptx
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber terrorism
An An Exploration Into the Cyber Security
Blitzing with your defense bea con
SCADA Security Webinar
FBI And Cyber Crime | Crime Stoppers International
Protecting Your Business From Cybercrime
Basic Cybersecurity Services for Every Business presentation

More from Paul Dutot IEng MIET MBCS CITP OSCP CSTM (10)

PPTX
Welcome to the #WannaCry Wine Club
PPTX
Scanning Channel Islands Cyberspace
PPTX
Incident Response in the wake of Dear CEO
PDF
Logicalis Security Conference
ODP
Exploiting buffer overflows
ODP
A Letter from Anonymous to the Jersey Finance Industry
PDF
WI-FI Security in Jersey 2011
Welcome to the #WannaCry Wine Club
Scanning Channel Islands Cyberspace
Incident Response in the wake of Dear CEO
Logicalis Security Conference
Exploiting buffer overflows
A Letter from Anonymous to the Jersey Finance Industry
WI-FI Security in Jersey 2011

Recently uploaded (20)

PPTX
weathering-final for grade 12 students in any kind of school
PPTX
DAY 1 - Introduction to Git.pptxttttttttttttttttttttttttttttt
PPTX
c_languagew_structure_and_functions.pptx
PPTX
Blue And White Modern Business Presentation.pptx
PPTX
Talking Baby AI Video Generator by Revid AI
PDF
B2B Marketing mba class material for study
PDF
Technical SEO Explained: How To Make Your Website Search-Friendly
PDF
Salesforce-Proxy-Statement-Supplement-May-2025.pdf
PPTX
DAT602-Database Design and Development-AT4).pptx
DOCX
Audio to Video AI Technology Revolutiona
PDF
Role of Data & Analytics in Modern Shopify App Development.pdf
PDF
THE UNTOLD STORY OF SWAMI VIJAY KUMAR DURAI BUILDING PRS INTERNATIONAL Contac...
PPTX
Information and Network Security types of cipher
PPTX
REE IN CARBONATITE EEPOSIT AND INCLUDE CASE STUDY ON AMBADUNGAR
PPTX
Network wired & wireless network ppt for
PPTX
Internet_Addiction_Presentation_2025.pptx
PPTX
日本横滨国立大学毕业证书文凭定制YNU成绩单硕士文凭学历认证
PPTX
Going_to_Greece presentation Greek mythology
PPTX
امنية شبكات منهج (cisco networking).pptx
PPT
Expect The Impossiblesssssssssssssss.ppt
weathering-final for grade 12 students in any kind of school
DAY 1 - Introduction to Git.pptxttttttttttttttttttttttttttttt
c_languagew_structure_and_functions.pptx
Blue And White Modern Business Presentation.pptx
Talking Baby AI Video Generator by Revid AI
B2B Marketing mba class material for study
Technical SEO Explained: How To Make Your Website Search-Friendly
Salesforce-Proxy-Statement-Supplement-May-2025.pdf
DAT602-Database Design and Development-AT4).pptx
Audio to Video AI Technology Revolutiona
Role of Data & Analytics in Modern Shopify App Development.pdf
THE UNTOLD STORY OF SWAMI VIJAY KUMAR DURAI BUILDING PRS INTERNATIONAL Contac...
Information and Network Security types of cipher
REE IN CARBONATITE EEPOSIT AND INCLUDE CASE STUDY ON AMBADUNGAR
Network wired & wireless network ppt for
Internet_Addiction_Presentation_2025.pptx
日本横滨国立大学毕业证书文凭定制YNU成绩单硕士文凭学历认证
Going_to_Greece presentation Greek mythology
امنية شبكات منهج (cisco networking).pptx
Expect The Impossiblesssssssssssssss.ppt

Practical Cyber Defense

  • 2. About me ● Co Founder of the CIISF Practical CyberDefense ● Employed as an Ethical Security Consultant @ Logicalis Jersey ● Practice Offensive & Defensive Security for businesses at all verticals
  • 3. Agenda ● Concepts I and II Practical CyberDefense ● Stages 1-5 of a practical Cyber Defense with more demo's ● Resources Questions at the end please ● Reverse & Bind Shells Demo
  • 4. Concepts I “Attackers have months to prepare, defenders have minutes to react” Practical CyberDefense “This is not a security control !!!!” vs
  • 5. Concepts II “Security is a journey” Practical CyberDefense “What are the bad guys trying to achieve?
  • 6. Reverse & Bind Shells Practical CyberDefense Demo
  • 7. Stage 1 – Buy In ● Appoint a 'Cyber' champion ● 'C' level Buy In ● Maintain a 'Cyber' risk register Practical CyberDefense ● Do Security Awareness
  • 8. Stage 2 - Reconnaisance Some Forgotten Ones Practical CyberDefense Demo
  • 9. Reconnaisance Aims Practical CyberDefense ● To profile your organsiation ● In preparation for social enginering attacks and or email phishing
  • 10. Reconnaisance - Mitigation Practical CyberDefense ● Undertake reconnaisance to find public information ● Mitigate risk by takedown and creating contray information ● Test your defenses and train your users
  • 11. Phishing is a big deal !!! Practical CyberDefense
  • 12. Stage 3 – Understanding AV Is AV really protecting us - the case for and against Practical CyberDefense
  • 13. Stage 3 – AV Bypass Demo - The case against Practical CyberDefense
  • 14. Stage 3 – The case for We still need AV to protect us ! Practical CyberDefense
  • 15. Stage 4 – Think outside the box ● Databases – They are the end game Practical CyberDefense ● Web applications – Owasp Top 10 ● UC Communications – TDos / Toll Fraud ● Data Encryption – Laptops / Desktops / Databases
  • 16. Stage 5 – It's not if but when SIEM – Security, Information& Event Monitoring Practical CyberDefense
  • 17. Stage 5 – SIEM OSSIM SIEM – Free open Source SIEM Demo Practical CyberDefense
  • 18. Resources Florida State ● http://www.cs.fsu.edu/~redwood/OffensiveSecurity/ Practical CyberDefense SANS Institute ● http://www.sans.org/critical-security-controls/controls/ OWASP Top 10 - 2013 ● https://www.owasp.org/index.php/Top_10_2013-Top_10
  • 19. Thank you – Any Questions? Blog – http://cyberkryption.com Practical CyberDefense @cyberkryption [email protected]