FYIF: Infrastructure Security -The Backbone of the Digital World
Resumen
TLDRCisco Security provides solutions to protect businesses against cyber threats by emphasizing the principle that 'if it's connected, it's protected.' The content covers the importance of cyber resilience, the threat landscape, and the upcoming 'find yourself in the future' cybersecurity series with expert insights. Training opportunities for aspiring cybersecurity professionals are highlighted, including the growing job market and essential skills to develop for careers in cybersecurity. Key sessions focus on infrastructure security, compliance, and attack prevention strategies.
Para llevar
- 🔒 Cisco Security keeps your business safeguarded from cyber threats.
- 💡 Cybersecurity is becoming critical across all sectors, including healthcare and retail.
- 🛡️ Understanding the threat landscape enhances cybersecurity measures.
- 📚 Many free resources and courses are available for those entering the cybersecurity field.
- 🌐 Collaboration and knowledge sharing are vital in responding to cyber threats.
- 🚀 A wide range of job roles in cybersecurity caters to both technical and non-technical skills.
- 🧑💻 Continuous learning and upskilling are crucial for success in cybersecurity careers.
Cronología
- 00:00:00 - 00:05:00
This segment introduces the importance of cybersecurity in protecting businesses from cyberattacks, highlighting that with Cisco's solutions, if it's connected, it's protected. Hackers come in various forms and can operate independently or as teams. Cisco aims to build resilience in businesses facing cyber threats, emphasizing a culture of learning and inclusivity in their approach to cybersecurity solutions.
- 00:05:00 - 00:10:00
In the second segment, the focus is on the launch of the 'Find Yourself in the Future' series, a 10-part tech talk series on cybersecurity. Mike Bard discusses infrastructure security and compliance standards, followed by a presentation from Joseph, who introduces Cisco Networking Academy's cybersecurity curriculum, aiming to fill the gap in cybersecurity job roles and educate newcomers about career opportunities.
- 00:10:00 - 00:15:00
Joseph elaborates on the cybersecurity job market, stressing the urgent need for skilled professionals in various sectors, such as healthcare and food industries. He outlines potential job roles within cybersecurity, including blue team and red team positions, and encourages individuals to start their journey through introductory courses offered by Cisco.
- 00:15:00 - 00:20:00
Joseph explains the various pathways for those interested in cybersecurity, including the Junior Cyber Security Analyst Career Path and certification programs. He emphasizes the importance of continuous learning and provides suggestions for starting points, such as awareness courses and ethical hacking courses, to build a solid foundation in cybersecurity.
- 00:20:00 - 00:25:00
Mike Bard begins the infrastructure security talk, defining it as the combination of hardware, software, and network resources essential for enterprise IT environments. He compares infrastructure security to vehicles dependent on roads and support systems, setting the stage for discussing specific domains and controls within infrastructure security.
- 00:25:00 - 00:30:00
Mike highlights key security practices essential in infrastructure security, including information security policies, device inventories, logging practices, vulnerability management, and compliance monitoring. These controls form a fundamental part of securing an enterprise's infrastructure and managing security incidents efficiently.
- 00:30:00 - 00:35:00
The segment flows into detailed discussions on various domains within infrastructure security. Mike covers device security, identity and access management, server platforms, and network security. He emphasizes common vulnerabilities, management practices, and vital cybersecurity skills required in each domain to mitigate potential threats effectively.
- 00:35:00 - 00:44:34
In the final segment, with a Q&A session, Mike addresses audience questions about essential skills for junior cybersecurity analysts and effective strategies for monitoring network activity. He suggests relevant certification and training opportunities, including Cisco certifications, and underscores the value of continuous learning and curiosity in a cybersecurity career.
Mapa mental
Vídeo de preguntas y respuestas
What is Cisco Security?
Cisco Security is a platform that offers cybersecurity solutions to protect interconnected systems from attacks.
How does Cisco Security protect businesses?
It offers integrated security solutions that help businesses anticipate threats and enhance resilience.
What is the purpose of the 'find yourself in the future' series?
This series aims to educate newcomers and professionals in cybersecurity through expert-led tech talks.
What skills are essential for a junior cybersecurity analyst?
Curiosity, understanding hardening techniques, and familiarity with security policies and CIS benchmarks.
What certifications are recommended for a career in cybersecurity?
Cisco Certified Support Technician (CCST), CISSP, CCSP, and SANS Security Essentials.
What are some common cyber threats that businesses face?
Phishing, unauthorized access, and data breaches are prevalent threats businesses must mitigate.
Ver más resúmenes de vídeos
History of Palaeontology, Video 4 - EART22101 - Palaeobiology and Evolution - 2024
25 de marzo de 2024
Gaming Showdown: Powkiddy RGB30 vs TrimUI Smart Pro vs Anbernic RG35XX H
History of Palaeontology, Video 3 - EART22101 - Palaeobiology and Evolution - 2024
Delta Surge Free Indicator for NinjaTrader 8 Order Flow Analysis NT8
5 Days to Your Best Year Ever - DAY 2
- 00:00:20a Cyber attack can grind everything to a
- 00:00:22halt Cisco security keeps your company
- 00:00:25moving forward because if it's connected
- 00:00:28it's protected Cisco
- 00:00:33a hacker doesn't always look like a
- 00:00:39[Music]
- 00:00:42hacker the Hacker's at home everywhere
- 00:00:48[Music]
- 00:01:00coms in many
- 00:01:01[Music]
- 00:01:05forms he's interested in
- 00:01:07[Music]
- 00:01:10everything he can work
- 00:01:12alone but with a crew so much
- 00:01:20[Music]
- 00:01:24better a hacker is free
- 00:01:31with Cisco protecting your business from
- 00:01:34cyber attackers is simple if it's
- 00:01:36connected you're
- 00:01:40protected at Cisco we provide cyber
- 00:01:43Security Solutions and experties we help
- 00:01:47the world navigate an uncertain present
- 00:01:50and enable a protected future word
- 00:01:53driven by the duty to help our customers
- 00:01:55become more resilient see more threats
- 00:01:58anticipate what's next and take the
- 00:02:00right action when the stakes are at the
- 00:02:03highest behind our Innovation you'll
- 00:02:06find a shared passion for solving
- 00:02:08problems for making a real life impact
- 00:02:11cultivating a culture of learning and
- 00:02:14championing a People First philosophy
- 00:02:17being inclusive and encouraging you to
- 00:02:19show up as your authentic self isn't
- 00:02:22simply welcomed it inspires us to build
- 00:02:25and learn together we also believe that
- 00:02:28taking care of our customers starts with
- 00:02:30being Kinder than necessary to each
- 00:02:32other that's why we make an ongoing
- 00:02:35investment to level up your skill set
- 00:02:37provide paid time off to give back to
- 00:02:40your community and celebrate our wins
- 00:02:43together whether safeguarding data
- 00:02:45helping keep critical Services running
- 00:02:48or providing threat intelligence cyber
- 00:02:50security at Cisco empowers the world to
- 00:02:53reach its full potential
- 00:02:55securely creating an inclusive future
- 00:02:59for all
- 00:03:00a secure future starts with
- 00:03:07you here's what security looks like
- 00:03:10today too many threats too many fixes
- 00:03:14too many controls across too many clouds
- 00:03:17you end up with a patchwork of brilliant
- 00:03:19protections that's well complicated and
- 00:03:22complicated is a problem because it's
- 00:03:25harder to manage which means easier to
- 00:03:28attack so would would it just be better
- 00:03:30if security could be simple like a
- 00:03:34single security platform integrated
- 00:03:37centrally managed powered by AI
- 00:03:40accelerated by automation delivering
- 00:03:43Telemetry and visibility across your
- 00:03:45entire multicloud
- 00:03:47infrastructure so everything that's
- 00:03:49connected is
- 00:03:51protected that's Cisco security Cloud a
- 00:03:55cloud-based security platform that makes
- 00:03:57it easier for your users to access their
- 00:03:59apps no matter where they are securely
- 00:04:03for your it administrators to manage
- 00:04:05policy consistently across their entire
- 00:04:07environment for your security team to
- 00:04:10detect and remediate breaches anywhere
- 00:04:12they're happening and for your
- 00:04:14developers to create apps that are from
- 00:04:16day one already
- 00:04:19secure Cisco security Cloud better for
- 00:04:22users easier for it optimized for
- 00:04:26developers safer for everyone
- 00:04:50a Cyber attack can grind everything to a
- 00:04:52halt Cisco security keeps your company
- 00:04:55moving forward because if it's connected
- 00:04:58it's protected Cisco
- 00:05:03[Applause]
- 00:05:08hello and welcome to the launch of our
- 00:05:10new find yourself in the future series
- 00:05:12of cyber security this exciting 10p part
- 00:05:16series of tech talks delivered by Cisco
- 00:05:18experts will span from today until May
- 00:05:222025 throughout these sessions we'll
- 00:05:25dive deep into every facet of cyber
- 00:05:28security catering to both newcomers
- 00:05:30curious about a career in cyber security
- 00:05:32and those already on their Journey who
- 00:05:34are eager to deepen their knowledge with
- 00:05:37insights from our season experts here at
- 00:05:40Cisco today we are focusing on
- 00:05:43infrastructure security examining the
- 00:05:46essential areas from a security
- 00:05:48perspective we'll explore compliance
- 00:05:50standards and discuss the metrics needed
- 00:05:53to continuous realtime compliance
- 00:05:58monitoring we are privilege to have Mike
- 00:06:00Bard as our speaker for this session
- 00:06:03with over 25 years of experience in
- 00:06:06Enterprise it and information security
- 00:06:09Mike currently leads the infrastructure
- 00:06:11security architecture team within
- 00:06:13Cisco's information security
- 00:06:16organization Mike's team is instrumental
- 00:06:20in shaping Enterprise security
- 00:06:21architecture across various domains
- 00:06:24including identity device server Network
- 00:06:28and the Cloud but first we will hear
- 00:06:32from Joseph jenit Cisco networking
- 00:06:34Academy's learning experience product
- 00:06:37manager who will provide details about
- 00:06:39our cyber security learning portfolio
- 00:06:42hey welcome Joseph and thanks for
- 00:06:44joining us today thank you Emma hello
- 00:06:47everyone let me briefly introduce our
- 00:06:49cyber security curriculum at Cisco
- 00:06:51Network Academy which lets you start
- 00:06:53your cyber security care Journey today
- 00:06:56and for
- 00:06:58free there are already 4 million
- 00:07:00unfilled jobs in the cyber security
- 00:07:02space today and organizations are
- 00:07:05government are seeking new Cyber
- 00:07:07Security Professionals to make sure
- 00:07:08their own but also your personal data is
- 00:07:11secure and they might be looking just
- 00:07:13for you the next cyber security
- 00:07:16professional and these jobs are
- 00:07:18literally everywhere think about the
- 00:07:20bakery down the street today that Bakery
- 00:07:23is a digital business for they have
- 00:07:26their own online website and then also
- 00:07:29they are doing doing credit card
- 00:07:30transactions they might have their
- 00:07:31online ordering system and so on and so
- 00:07:34on and hence they really need to be
- 00:07:36cyber security resilient so they can
- 00:07:38protect their own data but also maybe
- 00:07:41your data that might be stored in their
- 00:07:43systems and if you think about it Health
- 00:07:46Care Transportation energy food
- 00:07:49utilities and all these other Industries
- 00:07:51are super critical but they might fall
- 00:07:54victim of cyber attacks from cyber
- 00:07:56threat actors and criminals so so what
- 00:08:00can we do join us become a cyber
- 00:08:02security Defender to protect
- 00:08:03organizations governments and your
- 00:08:06personal information and data at this
- 00:08:09point you might be asking so what type
- 00:08:11of job roles could I advance to in the
- 00:08:13cyber security field and there are
- 00:08:16various jobs in cyber security ranging
- 00:08:18from the technical to even non-technical
- 00:08:20jobs but focusing here on the technical
- 00:08:23jobs you might be working in a so-called
- 00:08:25blue team the defensive security team
- 00:08:28this team implements security control
- 00:08:30such as for example firewalls multiactor
- 00:08:33authentication encryption and so on and
- 00:08:35so on and this thing also monitors for
- 00:08:38malicious behavior or malicious type of
- 00:08:40activities in the it
- 00:08:42infrastructure you might be also part of
- 00:08:44the red team the so-called offensive
- 00:08:46security team and you might be working
- 00:08:48there as a penetration tester or an
- 00:08:50ethical heer and in these job roles you
- 00:08:53will be discovering vulnerabilities and
- 00:08:55weaknesses before the Trad actors do so
- 00:08:58that your organization again can be more
- 00:09:01cyber
- 00:09:02secure and now that you are hopefully
- 00:09:04really excited about these Target job
- 00:09:06roles the most important thing is to
- 00:09:09start your
- 00:09:11journey and you can start at the
- 00:09:13awareness level and we recommend to all
- 00:09:16your friends digital citizens that you
- 00:09:17start with the inaction to cyber
- 00:09:19security course there's really a short
- 00:09:22six-hour course that will give you an
- 00:09:23overview into the domain of cyber
- 00:09:25security the various type of job rols
- 00:09:28but it will also teach teach you how to
- 00:09:30become cyber secure in this digital
- 00:09:33world and then if you are interested in
- 00:09:36kickstarting your career the first
- 00:09:38stepping stone that we recommend that
- 00:09:39you take is our Junior cyber security
- 00:09:42analyst carry po this carry PA is is
- 00:09:46equi with courses that will take you
- 00:09:48from zero to this entry level job rooll
- 00:09:51and by the way this job role and this
- 00:09:53carry part is also aligned with our new
- 00:09:56Cisco certified support technician CCSD
- 00:09:59certification in cyber security and
- 00:10:01putting that on your resume well that
- 00:10:03can give you an advantage when you are
- 00:10:05looking for a job in the cyber security
- 00:10:08space but my recommendation is never
- 00:10:11stop learning in the cyber security
- 00:10:13space and therefore continue even even
- 00:10:15here you can continue to become an
- 00:10:17ethical heer or penetration tester using
- 00:10:20our brand new ethical heer course that
- 00:10:22you can take for free or you can
- 00:10:24continue your journey in the defensive
- 00:10:26security side with our cops associated
- 00:10:29course aligned with a Cisco cyber
- 00:10:31associate certification or you can take
- 00:10:33the network security course at one of
- 00:10:36our Cisco academies that are available
- 00:10:38worldwide and if you're asking okay so
- 00:10:40where can I actually find these courses
- 00:10:41where can I start my journey well simply
- 00:10:44just visit our website click on the
- 00:10:46catalog select the cyber security filter
- 00:10:48and you are good to go start your
- 00:10:50journey and that brings me to the very
- 00:10:52end of my presentation and I wish will
- 00:10:55hope that we really manag to inspire you
- 00:10:58to join cyber security defensive forces
- 00:11:01and with that with your help we can make
- 00:11:04the digital world a much more secure
- 00:11:06place thank you very much and good luck
- 00:11:08on your journey and with that back to
- 00:11:10you Emma thanks Joseph we'll cross over
- 00:11:13now to Mike welcome Mike and thanks for
- 00:11:15joining us today thanks for having me I
- 00:11:19I'm excited to be here uh it's great to
- 00:11:21have an opportunity to talk about
- 00:11:23infrastructure security um welcome
- 00:11:26everybody and thanks for joining the
- 00:11:27session today um this is infrastructure
- 00:11:30security the backbone of the Digital
- 00:11:32World um as Emma mentioned I'm Mike
- 00:11:34Bullard and I work in uh information
- 00:11:37security for
- 00:11:38Cisco the session today is going to
- 00:11:41focus on really the domains and controls
- 00:11:44um associated with infrastructure
- 00:11:46security and we'll cover some of the
- 00:11:49security fundamentals in that area but
- 00:11:52infrastructure security is a really
- 00:11:53large area it's a big space so this
- 00:11:56won't hit every aspect but we're going
- 00:11:58to look at some of the pr primary
- 00:11:59domains and we're going to talk about
- 00:12:01some of the security controls that are
- 00:12:03applicable to those domains
- 00:12:06specifically um we'll also um really
- 00:12:10cover some of the controls that apply
- 00:12:13across all of those domains so there's a
- 00:12:16set of controls um that are really
- 00:12:19applicable to all of infrastructure
- 00:12:21security as a whole so we'll go through
- 00:12:22those as well I think it's going to be a
- 00:12:24really exciting conversation so uh let's
- 00:12:26let's jump right into it
- 00:12:29um first to start us off um let's talk
- 00:12:32about what infrastructure security
- 00:12:34actually is what do we mean by
- 00:12:36infrastructure security uh well
- 00:12:38infrastructure security uh and
- 00:12:40infrastructure really is it's the
- 00:12:43hardware the software uh the network
- 00:12:46resources the services those things that
- 00:12:48are required to operate an Enterprise it
- 00:12:51environment so this is these are the
- 00:12:54things that support all of the
- 00:12:56applications all of the data that's
- 00:12:58needed to run
- 00:12:59business uh if we think about um you
- 00:13:02know that being a foundational area um
- 00:13:06that infrastructure security really ends
- 00:13:08up being key to securing all of the
- 00:13:11applications and data that sits on top
- 00:13:13of it so an analogy that I think of is
- 00:13:17you know if we think about uh Vehicles
- 00:13:20automobiles uh we think about really the
- 00:13:23the roads the fuel stations the repair
- 00:13:26shops all those things that are in
- 00:13:27support of us being being able to drive
- 00:13:29our cars uh that's a lot like
- 00:13:31infrastructure security those roads and
- 00:13:33fuel stations and repair shops that's
- 00:13:35the infrastructure so uh that's really
- 00:13:37what we're going to get into
- 00:13:40today so before we get into the
- 00:13:44individual
- 00:13:46domains um what we wanted to go through
- 00:13:49are some of those controls like we were
- 00:13:52saying that apply across all of
- 00:13:54infrastructure security so some of these
- 00:13:56common practices that are really
- 00:13:59important in securing your your
- 00:14:01infrastructure
- 00:14:02environments so starting off there we've
- 00:14:04got uh an information security policy so
- 00:14:08information security policy you know we
- 00:14:10might think oh that's maybe that's not
- 00:14:12as not as cool that's not as exciting
- 00:14:15but it really is a key element in um in
- 00:14:19securing your
- 00:14:20Enterprise so these policies are really
- 00:14:22what define the risk appetite for the
- 00:14:24company so they kind of set the rules of
- 00:14:27the road they really tell us what what
- 00:14:29are the what are the things that we must
- 00:14:30do and what are the things that we
- 00:14:31should not do so those those information
- 00:14:34security policies those being clear and
- 00:14:37really consumable uh that's a really
- 00:14:38important aspect when you're talking
- 00:14:40about uh infrastructure security
- 00:14:42security as a whole
- 00:14:44really um device inventory is another
- 00:14:48really just fundamental uh fundamental
- 00:14:50area so you know there's that there's
- 00:14:52that uh saying that you really can't
- 00:14:55secure um what you can't see so things
- 00:14:58that you don't know about it's very
- 00:15:00difficult to secure so having a device
- 00:15:02inventory and understanding all of the
- 00:15:05really metadata or attributes about
- 00:15:07those devices is really key so what are
- 00:15:11the things that we need to know about
- 00:15:12those devices well we want to know uh
- 00:15:15what operating system it is what
- 00:15:17firmware it
- 00:15:18is uh what what versions of applications
- 00:15:22does it run what applications does it
- 00:15:24support um who owns it who operates it
- 00:15:27all those types of things uh really
- 00:15:29important and go along with the device
- 00:15:31inventory those are all things that are
- 00:15:32really key for um security Incident
- 00:15:36Management security incident
- 00:15:38investigations so all our incident
- 00:15:39response teams uh that's really
- 00:15:41important data for all of
- 00:15:44them uh logging is another critical area
- 00:15:47again something that's uh really
- 00:15:48important and key for incident
- 00:15:50responders whether it's a system log or
- 00:15:53an access log um something that's
- 00:15:55logging commands on systems uh those
- 00:15:58logs are really really really critical
- 00:16:00to understand what's happened
- 00:16:01historically on a device what have we
- 00:16:03seen what happened to it um again in
- 00:16:06support of the the incident response
- 00:16:08incident remediation
- 00:16:10efforts uh vulnerability management is
- 00:16:13another key area uh something that
- 00:16:16really very ubiquitous across the
- 00:16:19industry everybody talks about
- 00:16:20vulnerability management the importance
- 00:16:21of patching um so you know that's a
- 00:16:24that's a really key control really
- 00:16:26having having a a process that covers
- 00:16:30scanning for vulnerabilities triage uh
- 00:16:34remediating vulnerabilities validating
- 00:16:36that they're remediated U and even
- 00:16:38metrics in reporting how how many did we
- 00:16:40fix how many new ones did we find all of
- 00:16:42that stuff really important Concepts
- 00:16:44around vulnerability
- 00:16:46management um DNS compliance and
- 00:16:50monitoring uh so with DNS it's really is
- 00:16:53a key control for again the incident
- 00:16:56response side of the house as well um
- 00:16:58all of our DNS records end up being uh
- 00:17:02really interesting kind of indicators of
- 00:17:04compromise so if the system gets
- 00:17:08compromised many times it'll reach out
- 00:17:10to a command and control server it does
- 00:17:11that typically via DNS so that's a
- 00:17:14really interesting way to pick up uh
- 00:17:16that something's been that something's
- 00:17:17been compromised so those DNS logs are
- 00:17:20really important also pointing all of
- 00:17:23our systems to DNS servers that we know
- 00:17:26are trustworthy uh and even DNS systems
- 00:17:29that maybe have a security policy that
- 00:17:32we can Implement around DNS so Cisco
- 00:17:35umbrella uh does this so you can you can
- 00:17:37configure in Cisco umbrella a policy
- 00:17:40that says hey I I these things are okay
- 00:17:42these things are not okay and we can
- 00:17:44Implement that across our Enterprise so
- 00:17:46those kinds of enss policies can be
- 00:17:48really
- 00:17:50important and then finally here in the
- 00:17:52common security controls um this idea of
- 00:17:55continuous compliance validation uh is
- 00:17:58really key
- 00:17:59so one of the things that we want to
- 00:18:01make sure is you know based on the
- 00:18:02controls that we Define in our
- 00:18:04information security
- 00:18:06policy are those controls actually
- 00:18:09implemented in our systems so are our
- 00:18:11servers or network devices um are those
- 00:18:14things configured in compliance with our
- 00:18:16security policy and how do we how do we
- 00:18:19continually validate that they are uh
- 00:18:22configured correctly how do we
- 00:18:24continually get data about how they're
- 00:18:27configured and where the gaps are I
- 00:18:28didn't realize this server no longer has
- 00:18:31this control on it how did how quickly
- 00:18:33can I determine that and then go
- 00:18:35remediate it so um that compliance
- 00:18:38validation uh again another important
- 00:18:42aspect so now let's take a look at some
- 00:18:45of the specific domains that make up
- 00:18:47infrastructure security um let's let's
- 00:18:50kind of walk through some of those we'll
- 00:18:52start with the the device
- 00:18:54space so in the device space u things
- 00:18:57you would commonly see here laptops and
- 00:19:00desktops um mobiles tablets so all of
- 00:19:04those devices that employees use to
- 00:19:07access corporate resources um all of
- 00:19:10those things are are in this device
- 00:19:13space so uh as we're talking about key
- 00:19:16security controls here um a device
- 00:19:20management system um is really is really
- 00:19:24a an important control that device
- 00:19:26management system is really what
- 00:19:28ultimately
- 00:19:29gets all of your devices in compliance
- 00:19:31with your secur security policy because
- 00:19:34that device management system or DM
- 00:19:36Suite that's what pushes all of the
- 00:19:39configurations and controls down to all
- 00:19:41the devices that it manages so whether
- 00:19:43it's a Windows Windows device a Linux
- 00:19:46device an apple a Mac um a mobile phone
- 00:19:50the the DM Suite is really what um
- 00:19:52ultimately lets you control the
- 00:19:55configuration and the security controls
- 00:19:58that are applied to all those
- 00:20:00devices so some of those security
- 00:20:02controls might include anti-malware so
- 00:20:04uh something like a Cisco amp um you
- 00:20:08know that's an anti-malware solution
- 00:20:10that uh is really important to make sure
- 00:20:13that we don't have files getting onto
- 00:20:15systems that are U allowing attackers to
- 00:20:19uh to to do things that we wouldn't want
- 00:20:22there uh Drive encryption is another
- 00:20:24another key control along with minimum
- 00:20:27OS version uh and passwords and screen
- 00:20:30locks so you know the combination of
- 00:20:32these things what are the controls that
- 00:20:33we want to use to harden all of our
- 00:20:35device infrastructure uh just a really
- 00:20:37really uh important
- 00:20:39area um one of the things that this then
- 00:20:43kind of goes into is uh is some of the
- 00:20:47um cyber security skills that you might
- 00:20:50want to develop if you were going into
- 00:20:53the device and in client compute
- 00:20:55space so understanding how to evaluate
- 00:20:59how well a device has been hardened
- 00:21:01there's tools that are available to be
- 00:21:03able to give us some idea about uh the
- 00:21:05hardening of a particular set of
- 00:21:07devices and also understanding uh device
- 00:21:11management Concepts so understanding uh
- 00:21:13what device management Suites there are
- 00:21:15what tools are there out there that we
- 00:21:16can use and how to apply those to your
- 00:21:20environment and how to enforce those
- 00:21:21controls that are required by your
- 00:21:23organization uh into that environment so
- 00:21:26those are those are some cyber security
- 00:21:27skills that are really out applicable um
- 00:21:30in this case to the device in the incli
- 00:21:32compute
- 00:21:34domain um another thing we want to go
- 00:21:37into in these domains are are some
- 00:21:40attack
- 00:21:41scenarios so uh in the device and in
- 00:21:44client compute space um a thread actor
- 00:21:47in this case we're talking about fishing
- 00:21:50so send some fishing emails and that
- 00:21:52ultimately lures employees to a
- 00:21:55malicious
- 00:21:56website so you know we see that all the
- 00:21:58time it's very common in the
- 00:22:00industry and running anti- malware
- 00:22:03software as well as the DNS controls
- 00:22:05that we talked about those are things
- 00:22:07that can help prevent a threat actor uh
- 00:22:10ultimately from being able to gain
- 00:22:11access and compromise a system so those
- 00:22:13are some controls that would uh that
- 00:22:15would fight back and prevent that type
- 00:22:17of an
- 00:22:19attack um the next area that we wanted
- 00:22:21to get into is uh identity and access
- 00:22:25management so um in the identity space
- 00:22:29really what we're talking about are all
- 00:22:31of those systems and platforms that we
- 00:22:34use for access management so whether
- 00:22:36that's active directory it could be
- 00:22:39Azure ad uh here we're looking at
- 00:22:42salepoint and cyber Arc maybe it's a an
- 00:22:45IDP like
- 00:22:47OCTA um Duo uh so Cisco makes some
- 00:22:50identity Services uh identity Services
- 00:22:53engine products ice so all of those are
- 00:22:56things that are in the identity and
- 00:22:57access management space
- 00:22:59one of the key controls there is
- 00:23:01platform
- 00:23:02hardening so let's take ad for instance
- 00:23:05obviously ad is always a Target by
- 00:23:07attackers so we really want to make sure
- 00:23:10that ad is something that's hardened
- 00:23:12very well so we want to be able to run
- 00:23:15scans against active directory or
- 00:23:17against any identity platform and
- 00:23:19identify where we might have
- 00:23:21vulnerabilities where we might have gaps
- 00:23:23and make sure we've got a process to
- 00:23:24remediate
- 00:23:26those some other controls the identity
- 00:23:29and access management space are U
- 00:23:31minimum password requirements so for the
- 00:23:33accounts that are managed in that space
- 00:23:35What are the what are the requirements
- 00:23:37around
- 00:23:38passwords multiactor authentication
- 00:23:40obviously uh a really again a ubiquitous
- 00:23:43control multiactor authentication really
- 00:23:45you see just about everywhere these days
- 00:23:48uh it is a really it's a really good
- 00:23:50control as part of a layered approach to
- 00:23:54security there's also authorization
- 00:23:56controls that you can uh that you you
- 00:23:58can apply to an environment so an
- 00:24:00example of an authorization control
- 00:24:02might be something like um only allowing
- 00:24:05a particular device type to access a
- 00:24:09particular application so maybe only my
- 00:24:12um active directory administrators
- 00:24:14should be able to SSH into my active
- 00:24:17directory domain controller so that's an
- 00:24:19authorization control so authorization
- 00:24:21controls are something that uh certainly
- 00:24:23are important in a layered security
- 00:24:27model another area on the identity space
- 00:24:30is offboarding and termination
- 00:24:32automation so it's kind of part of
- 00:24:34grooming your account infrastructure you
- 00:24:36want to be able to uh deactivate
- 00:24:39accounts anytime someone no longer works
- 00:24:41for the company or no longer has
- 00:24:43responsibilities in a particular area no
- 00:24:45longer needs those accounts so doing
- 00:24:47that in a really timely manner is really
- 00:24:49important that's just security risk that
- 00:24:52you expose yourself to if we don't
- 00:24:54deactivate accounts in a timely manner
- 00:24:56if you leave those accounts open for you
- 00:24:58know days or weeks or months um that
- 00:25:00just opens you to attack not necessarily
- 00:25:03even from the employee that's no longer
- 00:25:05there but from someone who maybe
- 00:25:07potentially stole that password or uh
- 00:25:10somehow compromised that account so just
- 00:25:13another practice it's that really good
- 00:25:15in the identity and access management
- 00:25:20space one of the cyber security skills
- 00:25:23uh in the identity access management
- 00:25:25area is really looking at multiactor
- 00:25:28authentication and understanding how
- 00:25:30multiactor off Works um how it relates
- 00:25:33to single sign on and really the
- 00:25:35importance of authentication logging so
- 00:25:38one of the logs that we talked about
- 00:25:40earlier were authentication logs access
- 00:25:42logs so being able to have all of your
- 00:25:46access logs uh fed to your incident
- 00:25:48response teams and allow them to look
- 00:25:51for any suspicious activity and generate
- 00:25:54uh alerts or investigations based on
- 00:25:57anything that they find in there that's
- 00:26:00interesting one of the attack scenarios
- 00:26:02for identity and access um and this is
- 00:26:05something that's really prevalent in the
- 00:26:07industry is uh is credentials
- 00:26:09mismanagement so when a threat actor
- 00:26:11finds privileged credentials and let's
- 00:26:14say this in this case it's a public
- 00:26:16publicly exposed git
- 00:26:18repository um that gives them a key into
- 00:26:21your network that gives you a key gives
- 00:26:23them a key into your system so a lot of
- 00:26:26a lot of times will find credentials
- 00:26:29that are exposed in a repo someplace so
- 00:26:32having some credential storage system
- 00:26:34that's required um that's an important
- 00:26:37control as well as having some ability
- 00:26:39to do scanning of repos so we want to do
- 00:26:42scanning to see if we find any
- 00:26:45credentials that are exposed in a repo
- 00:26:47and when we find them having a process
- 00:26:49to then go remediate them let's log what
- 00:26:51we found and let's go remediate the
- 00:26:53issue let's remove that credential from
- 00:26:55that repo reset the password and make
- 00:26:58sure that we store those credentials in
- 00:27:00a uh in a safe SP in a safe
- 00:27:06place so moving on to to the third
- 00:27:08domain um server and platform so this is
- 00:27:13a really uh a really big space as well
- 00:27:16so not only are we talking about all the
- 00:27:19Enterprise servers so uh windows and
- 00:27:22Linux Prim primarily um but we're also
- 00:27:25talking about all the platforms and
- 00:27:27virtualization envir ments that go along
- 00:27:28with those so whether that's on the
- 00:27:31container side uh kubernetes or an open
- 00:27:33shift it also could just be on the VM
- 00:27:36side the virtual machine side with open
- 00:27:38stack or
- 00:27:39VMware so all those platforms and
- 00:27:42systems uh all need to be hardened so
- 00:27:45that's a really uh that's a really um
- 00:27:48important thing to make sure it's done
- 00:27:50consistently across your
- 00:27:52environment you also want to make sure
- 00:27:54that you've got really good
- 00:27:55administrative access control so how do
- 00:27:57pro pred users get into those systems
- 00:28:00how do they access um really all of
- 00:28:03these platforms to do their
- 00:28:05administrative functions and do they do
- 00:28:06that securely so are they using
- 00:28:09multiactor off are they using a jump
- 00:28:12server to get in um you know there's a
- 00:28:13number of of key controls from an
- 00:28:16administ administrative access control
- 00:28:18um that are that are really important to
- 00:28:20make sure that you're enforcing for all
- 00:28:22of your server and platform
- 00:28:25environments uh similarly to the device
- 00:28:28anti-malware is also a key control here
- 00:28:29so making sure that you're running
- 00:28:30anti-malware on your servers uh whether
- 00:28:33that's amp or something
- 00:28:36else and then server inventory so this
- 00:28:39is not just an inventory of what servers
- 00:28:41you have but an inventory really of the
- 00:28:44applications that are running on those
- 00:28:45servers what services what binaries even
- 00:28:49are installed on those servers so that
- 00:28:51you really have a good inventory to work
- 00:28:53off of if there ends up being some
- 00:28:55vulnerability in a binary then you're
- 00:28:56able to use this inventory system to
- 00:28:59really see exactly what servers that
- 00:29:03affects another area that's really
- 00:29:05interesting is server Telemetry of
- 00:29:07network traffic so you know on the
- 00:29:10network and we'll talk about Network
- 00:29:11next but on the network we we typically
- 00:29:14use netf flow but on the server side you
- 00:29:16can do something very similar so you can
- 00:29:18look at all of the Telemetry that's
- 00:29:20coming out of a server all the network
- 00:29:21traffic that's coming out of a
- 00:29:23server so if you use something like a
- 00:29:26network visibility module
- 00:29:28um it's a Cisco product you can also
- 00:29:30look at that same Telemetry for a server
- 00:29:33and really then be able to look at
- 00:29:35interesting things that might trigger a
- 00:29:38an incident response
- 00:29:42investigation so on the server and
- 00:29:44platform side some key cyber security
- 00:29:47skills um are really how do we look at
- 00:29:50how to harden a Windows Server a Linux
- 00:29:53server uh an open stack platform Etc how
- 00:29:56do we how do we evaluate how to harden
- 00:29:58those
- 00:29:59appropriately so hardening really key
- 00:30:02control because that's really what keeps
- 00:30:04attackers um to have a much more
- 00:30:07difficult job of getting into our
- 00:30:09infrastructure let's not make it easy
- 00:30:11for them so we want them want it to be
- 00:30:12hardened appropriately and we want it to
- 00:30:14be assessed really often so we don't
- 00:30:17want to just do a once a year assessment
- 00:30:18we really want an assessment that kind
- 00:30:20of run all the time so whether that's
- 00:30:22daily or weekly running those hardening
- 00:30:25assessments to make sure you know if
- 00:30:27something changes that we able to pick
- 00:30:30that up really quickly and then
- 00:30:31remediate
- 00:30:33it and for an attack
- 00:30:36scenario you know uh discovering a
- 00:30:39vulnerability in an unpatched system
- 00:30:41something that uh is very common right
- 00:30:44it uh it really allows an attacker to
- 00:30:46then potentially gain access to the
- 00:30:48server Elevate privilege and then use
- 00:30:50that as a pivot point to then go into
- 00:30:53other areas of your network so it's that
- 00:30:55entry point for an attacker and again
- 00:30:58why we said at the at the top that you
- 00:31:00know vulnerability Management program is
- 00:31:02really key so that we don't have these
- 00:31:04vulnerabilities sitting out there that
- 00:31:06might allow an attacker to compromise a
- 00:31:08system a server in this case and then
- 00:31:10gain access to you know be able to
- 00:31:12penetrate your network more
- 00:31:19deeply so the network space um is the is
- 00:31:23the final area that we'll go into the
- 00:31:25final domain that we'll review today uh
- 00:31:27and then Network space you know we're
- 00:31:29talking about things like routers and
- 00:31:30switches certainly but we're also
- 00:31:32talking about uh access points wireless
- 00:31:36controllers uh certainly things like
- 00:31:37firewalls data center Fabrics load
- 00:31:40balancers VPN headends so there's a lot
- 00:31:43of network infrastructure uh that's
- 00:31:45covered in this
- 00:31:46one things that are also covered here
- 00:31:48would be uh some of the network
- 00:31:50controllers like a DNA Center for
- 00:31:52instance so those controllers that then
- 00:31:54manage uh routers and switches Etc so
- 00:31:58those are all part of this
- 00:32:00domain so some of the key controls for
- 00:32:03the network domain uh zoning and
- 00:32:05segmentation so you know historically
- 00:32:08Enterprises have really just had kind of
- 00:32:11maybe two major zones we've got the
- 00:32:12internal Zone and the D andz Zone those
- 00:32:15are separated by firewalls typically and
- 00:32:17so we get Telemetry off of those
- 00:32:19firewalls for the traffic that's passing
- 00:32:20between the
- 00:32:22zones however in this in this area of
- 00:32:25zero trust zoning and segmentation is a
- 00:32:28key uh security strategy so really being
- 00:32:31able to segment those internal spaces
- 00:32:33and even the DMZ spaces into smaller
- 00:32:35zones smaller segments and being able to
- 00:32:38pick up Telemetry as traffic uh
- 00:32:41traverses those segments so that we can
- 00:32:43get a lot more visibility into kind of
- 00:32:45the east west traffic as it Transit
- 00:32:47transits different zones we can also uh
- 00:32:50have firewall rulesets and security
- 00:32:53policies that really restrict the
- 00:32:55traffic that goes between those
- 00:32:56different zones so gives us a lot more
- 00:32:58granularity a lot more flexibility with
- 00:33:01uh how we Implement our access
- 00:33:03policies uh device hardening um showing
- 00:33:06up again here for sure it's important on
- 00:33:08the network side how do you harden your
- 00:33:11devices so are we using things like uh
- 00:33:14snv
- 00:33:16snmpv3 which is uh has an authentication
- 00:33:18control versus an snmpv2 which does
- 00:33:21not and there's a long list of of
- 00:33:24hardening guidelines uh that we can use
- 00:33:26for
- 00:33:28uh routers and switches and different
- 00:33:29type of network
- 00:33:32devices uh administrative access
- 00:33:34controls uh again an important uh an
- 00:33:36important control so being able to
- 00:33:39ensure that we've got the right controls
- 00:33:41for administrators to access network
- 00:33:43infrastructure whether that's limiting
- 00:33:45where they can access it from you can
- 00:33:46only get in for for administrative
- 00:33:49access from um uh from a jump
- 00:33:53server uh the ability to use MFA or even
- 00:33:56alternate credentials for administrative
- 00:33:58access so you can't use your regular
- 00:34:00user account you have to use a special
- 00:34:01admin account so all of those things
- 00:34:03that are part of administrative access
- 00:34:06controls and making sure that we've got
- 00:34:07a really high level of security around
- 00:34:10our admins and privileged access to
- 00:34:12network
- 00:34:14infrastructure so we mentioned net flow
- 00:34:16a little bit earlier that's definitely a
- 00:34:17great control here so netf flow and
- 00:34:20traffic analysis being able to uh really
- 00:34:23pull net flow and network Telemetry off
- 00:34:25the network to understand what kind of
- 00:34:27traffic is traversing your network and
- 00:34:30then being able to do traffic analysis
- 00:34:31on that so you know whether we're using
- 00:34:34something like um like some of the tools
- 00:34:37that we use for uh analyzing net flow or
- 00:34:42um you know what whatever whatever tools
- 00:34:45it might be that you use there uh those
- 00:34:47are really important to find the
- 00:34:49interesting controls uh find the
- 00:34:51interesting data inside netflow to be
- 00:34:55able to then open investigation and say
- 00:34:57oh hey we saw
- 00:34:58this this interesting thing um happen
- 00:35:01and we want our incident response team
- 00:35:02to go
- 00:35:08investigate so one one thing from a
- 00:35:11cyber security skill set that's really
- 00:35:14that would be really interesting to uh
- 00:35:16to learn and I think really valuable to
- 00:35:18learn is is how do we use netf flow to
- 00:35:21gain insights into those security issues
- 00:35:23so kind of like we were just talking
- 00:35:24about how do we get visibility into the
- 00:35:26packets that are on the network and what
- 00:35:28tools enable us to do that how do we how
- 00:35:30do we go Analyze That netf Flow data and
- 00:35:32pull out interesting interesting
- 00:35:35things and then the attack scenario for
- 00:35:38the networking uh domain um you know
- 00:35:41when a threat actor is able to brute
- 00:35:43force a week
- 00:35:44password that that then gives them
- 00:35:47administrative access we're making it
- 00:35:49really easy for them so when they get
- 00:35:52that administrative access many times
- 00:35:54they'll use that to sniff Network
- 00:35:55traffic and really do a lot of the same
- 00:35:58things we were just talking about with
- 00:35:59Neto let's look at that Network traffic
- 00:36:01and see if there's interesting things in
- 00:36:02there that they can use uh in an attack
- 00:36:06scenario now enforcing some of these
- 00:36:09administrative security measures that we
- 00:36:10talked about um whether it's alternate
- 00:36:13accounts or MFA or coming in from a jump
- 00:36:15post some of those are things that
- 00:36:17really can limit what accounts can get
- 00:36:20admin access so it makes it much more
- 00:36:22difficult uh for to have the risk of
- 00:36:24just a Brute Force allowing someone to
- 00:36:26have uh ad and access into your network
- 00:36:33devices so that's really a walk through
- 00:36:35some of the main infrastructure domains
- 00:36:37one of the things that I also wanted to
- 00:36:39just touch on was that I'm including
- 00:36:40some references here for some support
- 00:36:42material for some of the content that we
- 00:36:45went through today uh I hope you find
- 00:36:47hope that everybody finds those
- 00:36:49helpful in summary you know that's
- 00:36:52really a tour through the major areas of
- 00:36:55infrastructure security so talked about
- 00:36:58some of the key controls we talked about
- 00:37:00some relevant cyber security skills that
- 00:37:03really support a career path in this
- 00:37:06space and we also talked some about uh
- 00:37:08different attack scenarios that are
- 00:37:10commonly seen in the industry um I hope
- 00:37:12that everybody enjoyed the session today
- 00:37:14and uh now I will hand it back to Emma
- 00:37:17hey thanks Mike for providing us with a
- 00:37:19good understanding of maintaining robus
- 00:37:21Network and data center compliance your
- 00:37:24insights really demonstrate the pivotal
- 00:37:27role of continuous compliance and
- 00:37:29advanced security architecture in
- 00:37:32protecting our digital
- 00:37:34Landscapes we are going to take
- 00:37:36questions now from our live audience and
- 00:37:39our first question
- 00:37:42is and what are the essential skills
- 00:37:45needed to be successful as a junior
- 00:37:48cyber security analyst and Engineering o
- 00:37:52with a focus on infrastructure
- 00:37:55security that's a great question
- 00:37:57question um you know I think the number
- 00:37:59one thing for me is curiosity really um
- 00:38:03wanting to understand how things work
- 00:38:06whether it's you know how do I how do I
- 00:38:08configure security controls on a network
- 00:38:11device or uh how do I harden a server
- 00:38:14there's so much in the infrastructure
- 00:38:16security domain that uh is just
- 00:38:19interesting to learn about so that
- 00:38:21Curiosity I think is the probably the
- 00:38:22main thing that I'd say would be the um
- 00:38:25one of the essential skills I think also
- 00:38:29um understanding
- 00:38:31hardening um the CIS benchmarks are a
- 00:38:33great place to go look at how to harden
- 00:38:35various types of devices whether it's
- 00:38:37you know Windows servers or firewalls or
- 00:38:40other endpoints uh so having a look at
- 00:38:42the CIS benchmarks for hardening and
- 00:38:44understanding hardening controls uh
- 00:38:46that's a that's another really good one
- 00:38:48an essential skill I think hey thanks
- 00:38:50Mike our next question from one of our
- 00:38:53viewers is how is network activity
- 00:38:57monitored effectively and what
- 00:38:59strategies should be employed to analyze
- 00:39:02these activities for potential cyber
- 00:39:04threats oh yeah yeah that's a good one
- 00:39:07too so uh you know I think number one
- 00:39:10would be really comprehensive logging so
- 00:39:13we talked about kind of the different
- 00:39:15kinds of loggings there are lots of
- 00:39:16kinds of logs so number one making sure
- 00:39:18that those logs are getting sent to your
- 00:39:20incident response teams um validating
- 00:39:23that they are you know constantly
- 00:39:25getting sent and that we don't lose logs
- 00:39:27someplace but also identifying in those
- 00:39:30logs what's normal and what's not normal
- 00:39:34so we we have to be able to let our
- 00:39:35incident response teams know that this
- 00:39:38is kind of Baseline Behavior this is how
- 00:39:41our application performs and you know
- 00:39:43when I get a hundred failed login
- 00:39:46attempts well that's that's anomalous
- 00:39:48Behavior so really being able to
- 00:39:49identify that for our IR teams is
- 00:39:52important I I think one other would be
- 00:39:55um some of the some of the Telemetry
- 00:39:58aspects of it so whether it's from
- 00:39:59networks or from devices really being
- 00:40:02able to get that kind of net flow type
- 00:40:05Telemetry and using a tool that gives
- 00:40:08you insights into that so whether that's
- 00:40:10uh the security network analytics
- 00:40:12product The Cisco Mi those was
- 00:40:14previously called stealth watch um you
- 00:40:17know that certainly does a great job at
- 00:40:18looking at that data there's others as
- 00:40:20well but having some ability to pull
- 00:40:22that Telemetry in and analyze that
- 00:40:25Telemetry for again things that are
- 00:40:26interesting things that might want to
- 00:40:27drive an incident investigation um I
- 00:40:30think another you know key thing as far
- 00:40:32as monitoring Network
- 00:40:34activities hey thanks so much Mike we
- 00:40:37have time for just one more question
- 00:40:38today and this one has come from Steve
- 00:40:41in our audience um so Steve has asked
- 00:40:44what are some of the certification and
- 00:40:46training
- 00:40:47opportunities um that would set us up
- 00:40:49for a career in cyber security yeah
- 00:40:52that's a great question too um so the
- 00:40:55first one that I would uh that I would
- 00:40:57say would be um Cisco has a ccst
- 00:41:00certification so a Cisco certified
- 00:41:03support technician in cyber security so
- 00:41:07that'd be a great one I think that's
- 00:41:09really relevant and really covers all
- 00:41:11the infrastructure domains that we just
- 00:41:12talked about uh so that would be really
- 00:41:15interesting I think the there are some
- 00:41:17others um that ISC squared offers so
- 00:41:21there's a
- 00:41:23cissp and a ccsp so there's certified
- 00:41:27information system security
- 00:41:29professional and certified Cloud
- 00:41:32security professional um so again those
- 00:41:35are both ISC Sears those are both good
- 00:41:37they're very broad so you know they
- 00:41:40cover uh similarly uh the all the
- 00:41:43domains of infrastructure security as
- 00:41:45well as others application security
- 00:41:47physical security so things we didn't
- 00:41:48even get into today um and you know Sans
- 00:41:53also has some great certifications so
- 00:41:55they've got a Gia Security
- 00:41:58Essentials which um again really
- 00:42:01relevant very technical getting into the
- 00:42:03domain uh get different domains in
- 00:42:06infrastructure security uh and really
- 00:42:08looking at all the different security
- 00:42:09controls that you would really need to
- 00:42:12be able to fend off attackers across
- 00:42:14your infrastructure so I think I think
- 00:42:16all of those would really be great
- 00:42:18starts you know I'll tell you there's a
- 00:42:20lot of certifications out there and I
- 00:42:21think that um you probably can't go
- 00:42:23wrong uh you know you just really want
- 00:42:26to look at something that you're
- 00:42:27passionate about that you're really
- 00:42:29interested in that has uh you know some
- 00:42:32some real interest for you and uh really
- 00:42:36learn about that domain and then go go
- 00:42:39see if you can get a um go see if you
- 00:42:41can uh get a certification in that area
- 00:42:44there's a lot to choose from so I think
- 00:42:46those would probably be kind of my top
- 00:42:48three or four though fantastic thanks so
- 00:42:51much Mike and sadly that's all we have
- 00:42:53time for today a big thank you to our
- 00:42:56speakers Joseph and Mike for diving in
- 00:42:58to the depths of cyber security with us
- 00:43:00today we appreciate you taking the time
- 00:43:02out of your busy schedules to be with us
- 00:43:05on our virtual stage today sharing your
- 00:43:08invaluable
- 00:43:09insights your feedback is important to
- 00:43:12us please complete the survey by
- 00:43:14scanning the QR code on the screen and
- 00:43:16you will receive a certificate of
- 00:43:21participation join our next session in
- 00:43:24the find yourself in the future series
- 00:43:26and we'll explore threat monitoring the
- 00:43:29art of cyber vigilance with Daniella
- 00:43:32Splunk senior technical content
- 00:43:35developer to register scan the QR code
- 00:43:39on the screen so we can't wait to see
- 00:43:42you there and continue our journey into
- 00:43:44the world of cyber security thanks for
- 00:43:46joining us today stay safe and we will
- 00:43:49look forward to seeing you at our next
- 00:43:51event enjoy the rest of your day bye for
- 00:43:53now
- 00:43:55[Applause]
- Cisco Security
- Cybersecurity
- Infrastructure Security
- Threat Prevention
- Cyber Resilience
- Cybersecurity Training
- Job Market
- Security Solutions
- Tech Talks
- Security Certifications