Part 2 - The Achilles Systems Hack Assessment Series: Revisiting Enterprise Controls

  Рет қаралды 380

SANS Institute

SANS Institute

Күн бұрын

Part 2 of 4
In this webcast, we will review the attack at Achilles Systems, their previous security capabilities, and why their existing controls were insufficient to help them resist the attack. Then we will dive deep into what could have been done to better tailor and augment those controls to reduce or eliminate the impacts from the attack. Finally, we will talk about what should be done in the wake of the attack to build a more lasting and effective catalog of security controls. We will dive into topics such as:
- What are the CIS Critical Security Controls
- How Achilles should have prioritized and implemented the controls
- A better approach for selecting, implementing, managing, and monitoring controls to mitigate future attacks
Background Information:
Achilles Systems, a fictitious IT service provider to human resources teams in medium and large businesses, has fallen victim to an attack in which sensitive customer data and, potentially, customer networks, have been compromised. Achilles has a small security team who has historically focused on basic controls and compliance. However, it seems clear this attack was the work of a sophisticated adversary capable of circumventing the controls in place.
Much of Achilles’ security has not been maintained since an initial push many years ago, and newer controls were bypassed or disabled by the attacker. Some examples of these are multi-factor authentication, which the attacker bypassed in part by impersonating a Achilles executive in a call to the Service Desk. Later in the intrusion, the attacker disabled Achilles’ endpoint detection and response agents while moving through the internal network. Once the attacker achieved access, they quickly moved to systems containing sensitive data and parts of the network where direct customer access was possible.
As Achilles works to recover from the attack and regain customer trust, it seeks to invest in a more advanced defense able to withstand a more capable and determined attacker. Achilles management is committed to revisiting its security controls, devising better ways to proactively identify and remediate vulnerabilities, and investing in ongoing efforts to identify and respond to attacks before the damage is done.
This webcast supports concepts from SEC566: Implementing and Auditing Security Frameworks and Controls. Learn more: www.sans.org/c...
Learn more about the Operational Triad: www.sans.org/c...
Watch Part 3 here: www.sans.org/w...
Register for Part 4: www.sans.org/w...
#cybersecurity #leadership #SEC566

Пікірлер: 1
@kns6132
@kns6132 Ай бұрын
very good webinar series. I loved the way you took the Archillies case study to delve deeper around prioritizing and implementing controls. Walk through ofthe CIS controls was very helpful. Great one. thanks.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
NIST CSF 2.0 Framework Training - IT/Cybersecurity Audit and Compliance Training
1:11:05
when you have plan B 😂
00:11
Andrey Grechka
Рет қаралды 59 МЛН
Will A Guitar Boat Hold My Weight?
00:20
MrBeast
Рет қаралды 189 МЛН
Information Security Controls
21:06
Prabh Nair
Рет қаралды 24 М.
AI Security: Understanding the Threat Landscape
57:22
Robust Intelligence
Рет қаралды 1,9 М.
The Cycle of Cyber Threat Intelligence
1:00:27
SANS Digital Forensics and Incident Response
Рет қаралды 114 М.
Cybersecurity Architecture: Who Are You? Identity and Access Management
31:15
Antivirus vs EPP vs EDR vs XDR
19:50
Relative Security
Рет қаралды 15 М.
Network Security - Deep Dive Replay
3:08:19
Kevin Wallace Training, LLC
Рет қаралды 153 М.
CISSP Cram Session | SANS Webcast Series
1:00:18
SANS Cyber Defense
Рет қаралды 66 М.
when you have plan B 😂
00:11
Andrey Grechka
Рет қаралды 59 МЛН