Manage episode 170672458 series 58350
In your environment, you deal with threats from all over the world. Many groups out there pool resources to help everyone deal with those #threats. Some come in the form of threat #intelligence from various intelligence companies, like #Carbon #Black, #FireEye, and #Crowdstrike.
But what if your company cannot afford such products, or are not ready to engage those types of companies, and still need need protections? Never fear, there are open source options available (see show notes below). These products aren't perfect, but they will provide a modicum of protection from 'known' bad actors, SSH trolls, etc.
We discuss some of the issues using them, discuss how to use them in your #environment.
Lastly, we discuss #mentorship. Having a good mentor/mentee relationship can be mutally beneficial to both parties. We discuss what it takes to be a good mentee, as well as a good mentor...
“Tickets are on sale, And entering special code 'brakeingsecurity' at checkout gets you a 10% discount". Brakeing Down Security thanks #Sebastian Paul #Avarvarei and all the organizers of #Hack In The Box (#HITB) for this opportunity! You can follow them on Twitter @HITBSecConf. Hack In the Box will be held from 10-14 April 2017. Find out more information here: http://conference.hitb.org/hitbsecconf2017ams/
Join our #Slack Channel! Sign up at https://brakesec.signup.team #RSS: http://www.brakeingsecurity.com/rss #Google Play Store: https://play.google.com/music/m/Ifp5boyverbo4yywxnbydtzljcy?t=Brakeing_Down_Security_podcast #SoundCloud: https://www.soundcloud.com/bryan-brake Comments, Questions, Feedback, or Suggestions? Contact us via Email: email@example.com #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Facebook: https://www.facebook.com/BrakeingDownSec/ #Tumblr: http://brakeingdownsecurity.tumblr.com/ #Player.FM : https://player.fm/series/brakeing-down-security-podcast #Stitcher Network: http://www.stitcher.com/s?fid=80546&refid=stpr #TuneIn Radio App: http://tunein.com/radio/Brakeing-Down-Security-Podcast-p801582
2017-002-Threat Lists, IDS/IPS rulesets, and infosec mentoring
- Threat Lists (didn’t have much time to research :/)
- THIS EXACTLY - http://blogs.gartner.com/anton-chuvakin/2014/01/28/threat-intelligence-is-not-signatures/
- Don’t use threat list feeds (by IP/domain) as threat intelligence
- Can use them for aggressively blocking, don’t use for alerting
- Spamhaus: https://www.spamhaus.org/
- Open rulesets - You can always depend on the kindness of strangers
- Advantage is that these are created by companies that have worldwide reach
- Updated daily
- Good accompanying documentation
- You can buy large rulesets to use in your own IDS implementation
- Depends on your situation if you want to go managed or do yourself
- Regardless you need to test them
- Managed security services will do this for you
- I don’t recommend unless you have a team of dedicated people or you don’t care about getting hacked- signatures are way too dynamic, like trying to do AV sigs all by yourself
- Only a good idea for one-off, targeted attacks
- IDS/IPS rulesets
- Yara rules
- For Mentors
- Set expectations & boundaries
- Find a good fit
- Be an active listener
- Keep open communication
- Schedule time
- Create homework
- Don’t assume technical level
- Ask questions
- Do your own research
- Find a good fit
- Put forth effort
- It’s not the Mentor’s job to handhold, take responsibility for own learning
- Value their time
- Come to each meeting with an agenda
- For Mentees
- Mentoring frameworks?
- InfoSec Mentoring
- Podcasts (Courtesy of Ms. Hannelore)
241 episodes available. A new episode about every 7 days averaging 56 mins duration .