際際滷

際際滷Share a Scribd company logo
Thrive. Grow. Achieve.
Securing Your IT
Perimeter
Nate Solloway and Jeffrey Mullenix
February 26 , 2015
WHATS ON TAP?
 What is my Perimeter?
 Common Vulnerabilities
 How do I protect myself?
 Routers and Firewalls
 Wireless and Guest Access
 Remote Access
 Q&A
2
WHAT IS MY PERIMETER?
3
OR DOES IT LOOK LIKE THIS?
4
COMMON VULNERABILITIES
5
OPEN PORTS
PEOPLE
LAZY SOFTWARE PATCHING
PEOPLE
OUT DATE AV/IDS
PEOPLE
LAZY PROCESSES FOR CRITICAL AUTHENTICATION (BANKS,
TRANSFERS)
PEOPLE
HOW THE BAD GUYS EXPLOIT THEM
6
HOW DO I PROTECT MYSELF?
7
8
MINIMIZING OPEN PORTS
- FEWER SERVICES?
- MAYBE THE CLOUD
PEOPLE
- LETS GET BACK TO THIS ONE
AGGRESSIVE SOFTWARE PATCHING
- SERVERS
- WORKSTATIONS
- APPS
AV VS IDS
AUTHENTICATION
PEOPLE
SELECTING A FIREWALL/ROUTER
9
10
CUSTOM ADDRESS OBJECTS
11
CUSTOM SERVICES
12
CUSTOM SERVICES
13
WIRELESS: STAFF VS GUESTS
14
REMOTE DESKTOP VS VPN
15
QUESTIONS?
Seth Zarny  Partner
szarny@raffa.com
Nate Solloway  Manager
nsolloway@raffa.com
Jeffrey Mullenix  Network Engineer
jmullenix@raffa.com

More Related Content

2015-02-26 Securing Your Network Perimeter