Silicon Valley ISSA meeting May 19,2015 Topics Chapter Business President’s Report RSA Social Ratify new members VP Brian Kennedy Recording Director – James Carr Both candidates were nominated, seconded, and approved by the membership present at the meeting. Cornerstones of Trust meeting status June 16 in Foster City Members were urged to register as soon as possible. Board members present provided a status Discussion on moving the SV ISSA future meetings closer to the center of SV. Bill Danigelis has offered to sponsor at his company, Cyphort Inc, at intersection of 237 and Great American Parkway Speakers for July and August set. Looking for speakers for Sept and onward. There is no meeting in June because of Cornerstones of Trust July Meeting: Integrity Verification Trumps Signature–based Solutions in Detecting Malware on Linux Systems August meeting: Legal Concepts in Cybersecurity Jim Carr invited DeAnza students in his security classes to the meeting and seven were able to attend. Speaker CyberArk founded in 1999. The speaker, Barak Feldman, has been with the company since 2001. Title of the presentation: Protecting And Monitoring The Privileged Pathway - A New Layer Of Security To Protect The Heart Of The Enterprise From Advanced Cyber Threats Speaker: Barak Feldman is West Coast Director for the Privileged Account Security solution portfolio at CyberArk Software. Barak Feldman discussed best practices that focus on proactively protecting and monitoring all privileged account activity inside the network, covering all IT assets within the data center. We will discuss this new dimension modern attackers are focusing on the keys to the kingdom and the most power they can achieve within an organization infrastructure. Privileged accounts create a huge attack surface. Privileged accounts exist in every connected device, DB, application, industrial controller, etc. Typically 3x ration of privileged accounts to employees Privileged access System Admins 3rd party and services providers Applications Select business users Social network account managers Barak provided a comment that most executives: “would rather be breached than have an application break.” Other topics Social engineer to get password of twitter account, then send out messages signed by the user. External attackers assume privilege account so it looks like an insider Anthem system admin went on vacation and when he returned, found there was activity using my accounts and passwords, when he was gone Use “jump servers” Manage devices in a separate security zone. Managing a host in a DMZ from a trusted network, for example. RSA SecurID breach. Ukrainian election breach Carbanak/Anunak Sands casino attack Steps to stop advanced threats Discover all your privileged accounts Protect and manage privileged account credentials Control, isolate, and monitor privileged access and activity on servers and DBs