Monthly Archives: March 2013

BSides Detroit 13 Episode 12

Kevin Poniatowski joins the podcast to talk about the value of good information security training and his talk, How I Learned to Stop Worrying and Love BYOD. Kevin is with Safelight and has a unique and well-informed view of training and BYOD.

Abstract:

“Tweeting from the pub using my work Twitter account seemed like a good idea at the time.”

“How could our customer data be stolen? No one knows my iPhone pin except me.”

“After I send off this email to sales, I’m going to download Angry Chinese Birds. It’s free!”

It’s becoming more and more common for staff to bring their own devices to work, and blending their personal data with sensitive organizational data. What could possibly go wrong? Lack of user education concerning both physical and cyber threats to mobile devices and the sensitive data stored within them is creating an epidemic of embarrassment to organizations. This presentation will highlight the dangers of an untrained staff bringing their own devices to work and the steps that could be taken to mitigate the risk of lost data, compromised devices, and embarrassing Twitter posts.

For more information about BSides Detroit 13, please see:

BSides Detroit 13 Episode 11

Matt Johnson (@mwjcomputing) is this week’s podcast guest. Matt discusses the #MiSec BSides Detroit dinner, the value of blue team defenses, and, of course, PowerShell. Matt is the founder of the Michigan PowerShell User Group and has submitted a talk to BSides Detroit 13 titled Incident Management with PowerShell.

Abstract. Have you seen the latest scare? The Java 0-day exploit that allows attackers to execute code on your computer? Now scares come and scares go. But let’s suppose for a moment your servers were infected using this exploit. How could your administrators detect the attack? How do you recover? Even better, what could have been done beforehand and how could you prevent this from happening again?

Incident Management , of course, is the security practice that seeks to answer these questions. In Windows server environments, PowerShell is the way Incident Management gets put into practice. This session will introduce InfoSec professionals and systems administrators to PowerShell’s security features. Using the Java 0-day exploit as a driver, we will walk through the lifecycle of an incident. The audience will leave with information on the policy and practice of Incident Management with PowerShell.

For more information about BSides Detroit 13, please see:

BSides Detroit 13 Episode 10

Steve Aiello joins the BSides podcast to chat about his talk, Building Securable Infrastructures. A return to first principles, Steve looks into how designing security from the beginning and considering security holistically leads to lower costs and stronger security postures. It may not be sexy but it works. And as Wolfgang Goerlich says, “Working is the new sexy.”

Abstract. This session asks the question: “How do I design my environment to be securable?” Until computing systems are designed and built with security and in mind we will be trapped in a cycle of post implementation Band-Aid style fixes. Without designing infrastructures from the ground up with security in mind and real attempt to defend against directed attacks will be largely unsuccessful.

  • How do we evaluate products in a systematic manor to eliminate vulnerabilities we invite into our environments?
  • Where is money more wisely spent: on developing quality security policies and guidelines? Or on buying, configuring, and maintaining security products?
  • What are critical questions that we should be asking our vendors when we are evaluating new products for our environments?

For more information about BSides Detroit 13, please see:

BSides Detroit 13 Episode 09

This week’s guest, James Siegel (WolfFlight), joins Wolfgang to chat about CCDC, the value of hallway con, and building security awareness in the “Bring Your Own” age. James also previews his talk on OSSEC and host-based intrusion detection, titled: Looking Through the Peephole.

Abstract. Many professionals simply rely on AV and other similar solutions to let them know if they are being digitally assaulted. Those tools rely on heuristics and signatures. OSSEC will be used to demonstrate Host-based Intrusion Detection. The act of actively monitoring the systems behavior to determine if something outside of normal activity or the baseline is occurring and to alert the user or designated personnel.

For more information about BSides Detroit 13, please see: