SlideShare a Scribd company logo
Life as an enterprise security geek
from underground
(What enterprises want security researcher to do at work?)
SeungJin Lee (GrayHash)
@beist
About me
• CEO of GRAYHASH (Information security consulting company)
• Entered in information security field in 2000
• Advisor for SAMSUNG SDS and Cyber Command previously
• Speaking at popular security conferences in USA, CANADA,
GERMANY
• Review board member of BLACKHAT and CODEBLUE
• Hunter x hunter, nama-biru lover
TEAM GRAYHASH
• Grayhash has been working at LINE as a special partner since April
• Currently 8 members from Grayhash involved with LINE projects
• Job duties
• Product security, infra pen-testing, security design
• Skillset
• Programming, network, operating systems, hacking/security
About this talk
• Sharing experience of working for big companies as a consultant team
• Hard part as a security engineer at big firm
• Very common and general issues when you work for big firms
• No single line of code but some technical background covered
• What things you need to know to be a good security engineer
• And why enterprise security is usually harder..
Why it is harder
• Because you have too many attack points to protect at big firms
• Servers, laptops, mobiles, embedded systems, IoT
• The big number of employees
• A lot of software
• And 3rd parties (Supply chain attack things)
• Plus, big infrastructure
More specifically
• Development side
• “I can’t code on a laptop which is not connected to the internet”
• However, not everyone knows how to protect oneself
• “I can’t always code without a break”
• And people easily go surf the malicious websites without notice
• Believe or not, developers have every sensitive information
• Also, hacking people is much easier than hacking servers
nowadays
More specifically
• Infrastructure side
• “I want to access the wiki, mail, git server of our company at home”
• “I also need to access the live server so that i can maintain at home”
• “I need to put my module on servers so that I can monitor everything”
• … And once any single person gets hacked, everything will be hacked
• VPN, 2FA don’t perfectly save your computer
More specifically
• Spaghetti business services
• “We started our company with this awesome service!”
• “Let’s do make more services to get more customers”
• “Make more and more API, use one single database, big data wins!”
• You will realize you don’t know how you securely isolate each service
• Complexity went too far
More specifically
• 3rd party products
• “We focus on our service, if we need other features, just buy, there
are a ton of useful products already. Don’t re-invent.”
• Then, companies buy security, network, accounting, business logic
products without any concern of security
• You don’t know how much one is secure/insecure because you
didn’t make it
• Hacking concern because of vulnerable 3rd party products is what
every big company is facing, no exception
Development and deployment
• Let’s have some practical examples
• Let’s think that there is one perfect developer who makes secure code, but
• What if the developer’s laptop gets hacked
• What if the code on git he/she uploaded is manipulated after the upload
• What if the build server gets hacked - Code can be modified before build
• What if the compiled .jar gets maliciously modified
Dedicated network for servers
• Another example, you make dedicated network for servers for security
• Only 100 people who have VPN credentials can access the network, but
• You’re not sure if the VPN product is truly secure
• You may protect well 99 of 100, but can’t protect 50/50
• Your git enterprise server is not in the dedicated network
• And the server pulls out the code from it to build
• Every server in the dedicated network has installed 3rd party AV client
• And where is the master server of the AV clients?
Public server security
• Last example, there are 500,000 servers that have public IP
• The whole security team spends one year to pen-testing those
• Not likely, but, let’s assume here 500,000 servers are totally safe now
• Tremendous job, however, you can’t do this everyday / forever
• And the next day, one programmer leaves ‘phpmyadmin’ with default
credential on public web server
• Or test code - <?php system($_GET[“cmd”]); ?>
Security at small firm
• We used to work at small firms for years as well
• Much easier and simpler
• A few of external software used
• No strong access control needed for every server
• A small number of main asset to protect
• Everyone used 2FA and never visited malicious websites
• Easier to educate about information security
• Hard to hack even for skilled hackers
Security at enterprise
• We should say that we can’t protect everything
• But there are still things that you can make your company safer
• What are important things for enterprise security?
Infrastructure tools security
• Most of big companies have infra-tools widely used at work
• Like, most of servers installed the tool to monitor the server status
• Or, PMS, up to date software version
• And assume that if the tool has a *backdoor-like* bug
• Then, all your company servers could get hacked
• Review the code very actively and put through QA test
• One of the most priorities of our job
Controllable products
• Anything can’t be 100% secure
• Assume that hackers will find 0 days of things one day
• If you can’t make an action in time, you’ll have much trouble
• Every service and product that your company is using should be in your hand
• Update the software, make hot fixes
• Not every 3rd party vendor makes patches in time
• What can you do?
Hacked employees
• Even highly skilled hackers get hacked sometimes
• Big companies have multiple jobs
• Many of them are not engineers
• It’s reasonable to think that some employees are already hacked or soon
• Which means there is no “private-network”
• Your “private-network” is almost like the Internet
• Almost no big company is doing perfectly on internal security
Defense in depth
• Defense in depth should be everywhere
• Especially, for highly confidential servers
• Your back-end should be safe even though the front-end got hacked
• Example: Springframework 0day comes out, what can you do?
• For this, very simple but deeply considered ACL rules needed
Continuous red-teaming
• Your team may find 100 security bugs at a night
• But your team can’t do this for years everyday
• Sustainable red-teaming is needed
• Since new service / product out everyday
• Automated systems make your life much easier but they’re not perfect
• One of top priorities: Always ready to hire highly talented engineers
Difficult part at work
• As an enterprise security geek
• Do I hate to talk with others?
• Do I love only cyber avatars?
• Very nice try, but wrong
Hikikomori at work
• What is one of most important things for a security engineer at firm?
• Most of non security engineers may think
• Top notch programming, kernel, assembly, geeky mindset
• Actually, communication skill
• Because we find problems that others make
• Which means we always need to talk to them to fix
Being an evil for good
• Also, we need to know how to convince people
• As we always need others to do things that they don’t like
• Example: “You must code on this laptop, only and no internet.”
• (Yes, a bit extreme example)
• To persuade them, we first need to understand them and their work
Pretend to be a genius
• Multiple code languages, web frameworks, databases, operating systems
• Each team may prefer different development environment
• C, C++, PHP, Go, Swift, Java, Python, Erlang, Apache, nginx, tomcat, …
• But the security team is relatively smaller
• And we should enough know about the things to review the code
• Like, learn about swift today and review swift code tomorrow
Want to be rich
• Keeping strong motivation is not easy
• Because we basically work on others’ work
• Which means not having the ownership of the product / service
• This is why skilled security engineers sometimes fall into
mannerism
Final note
• But, nonetheless, we’re trying to be better
• Doing good security != Finding hardcore 0-days
• Finding typical 10 bugs might be 10 times better than one awesome bug
• Most important things
• Knowing how to work with others
• Having good communication skill
• Following release schedule of product in time
Final note
• Doing good security is difficult
• Luckily, LINE engineers catch up really fast
• This talk is not specifically talking about the situation of LINE
• But more about general security issues that big firms are having
If you have questions
• Shoot me an email: beist@grayhash.com
• Twitter: @beist
• Or in person after this stage!
• There is a Q/A room
• If you’re looking for a security engineer job, we’re hiring.

More Related Content

PPTX
The Teams Behind DevSecOps
PPTX
Overcoming Security Challenges in DevOps
PDF
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
PPT
Give Me Three Things: Anti-Virus Bypass Made Easy
PDF
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
PDF
Shmoocon 2015 - httpscreenshot
PDF
The Internet of Insecure Things: 10 Most Wanted List
KEY
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
The Teams Behind DevSecOps
Overcoming Security Challenges in DevOps
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
Give Me Three Things: Anti-Virus Bypass Made Easy
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Shmoocon 2015 - httpscreenshot
The Internet of Insecure Things: 10 Most Wanted List
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012

What's hot (20)

PPTX
The Journey to DevSecOps
PPTX
Pwn phone2014 jrs
PPTX
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
PPTX
Integrating Security into DevOps
PPTX
Security and DevOps Overview
PPTX
Finding Security a Home in a DevOps World
PPTX
Securing the continuous integration
PPTX
Introduction to LavaPasswordFactory
PPTX
Security as Code owasp
PPTX
Keynote at the Cyber Security Summit Prague 2015
PDF
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
PPTX
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
PPTX
Passwords are passé. WebAuthn is simpler, stronger and ready to go
PPTX
'SecureMe - Droid' Android Security Application by Vishal Asthana
PPTX
Shifting left – embedding security into the devops pipeline by Mike d. Kail
PPTX
Top 3 tips for security documentation
PDF
AusCERT - Developing Secure iOS Applications
PPTX
How to secure a safe teleworking environment
PDF
AppSec is Eating Security
PPTX
DevSecCon KeyNote London 2015
The Journey to DevSecOps
Pwn phone2014 jrs
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Integrating Security into DevOps
Security and DevOps Overview
Finding Security a Home in a DevOps World
Securing the continuous integration
Introduction to LavaPasswordFactory
Security as Code owasp
Keynote at the Cyber Security Summit Prague 2015
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
Passwords are passé. WebAuthn is simpler, stronger and ready to go
'SecureMe - Droid' Android Security Application by Vishal Asthana
Shifting left – embedding security into the devops pipeline by Mike d. Kail
Top 3 tips for security documentation
AusCERT - Developing Secure iOS Applications
How to secure a safe teleworking environment
AppSec is Eating Security
DevSecCon KeyNote London 2015
Ad

Similar to Life as an enterprise security geek from underground. (What enterprises want security researcher to do at work? -- How to survive) (20)

PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PDF
So... you want to be a security consultant
PPT
Security communication
PPTX
Presentation 10.pptx
PPTX
How To Start Your InfoSec Career
PDF
Secure webdev 3.0
PDF
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
PDF
Host-based Security
PPTX
Securing the Development Supply Chain
PPTX
"make secure" securing the development supply chain All Things Open 2019
DOCX
Project Quality-SIPOCSelect a process of your choice and creat.docx
PDF
The Thing That Should Not Be
PDF
Elastix network security guide
PDF
Cybersecurity Interview Questions and Answers.pdf
PDF
How to Destroy a Database
PDF
Top Cyber Security Interview Questions and Answers 2022.pdf
PDF
The Principles of Secure Development - BSides Las Vegas 2009
DOCX
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
PDF
JavaOne2013: Secure Engineering Practices for Java
PDF
What Every Developer And Tester Should Know About Software Security
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
So... you want to be a security consultant
Security communication
Presentation 10.pptx
How To Start Your InfoSec Career
Secure webdev 3.0
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Host-based Security
Securing the Development Supply Chain
"make secure" securing the development supply chain All Things Open 2019
Project Quality-SIPOCSelect a process of your choice and creat.docx
The Thing That Should Not Be
Elastix network security guide
Cybersecurity Interview Questions and Answers.pdf
How to Destroy a Database
Top Cyber Security Interview Questions and Answers 2022.pdf
The Principles of Secure Development - BSides Las Vegas 2009
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
JavaOne2013: Secure Engineering Practices for Java
What Every Developer And Tester Should Know About Software Security
Ad

More from LINE Corporation (20)

PDF
JJUG CCC 2018 Fall 懇親会LT
PDF
Reduce dependency on Rx with Kotlin Coroutines
PDF
Kotlin/NativeでAndroidのNativeメソッドを実装してみた
PDF
Use Kotlin scripts and Clova SDK to build your Clova extension
PDF
The Magic of LINE 購物 Testing
PPTX
GA Test Automation
PDF
UI Automation Test with JUnit5
PDF
Feature Detection for UI Testing
PDF
LINE 新星計劃介紹與新創團隊分享
PDF
​LINE 技術合作夥伴與應用分享
PDF
LINE 開發者社群經營與技術推廣
PDF
日本開發者大會短講分享
PDF
LINE Chatbot - 活動報名報到設計分享
PDF
在 LINE 私有雲中使用 Managed Kubernetes
PDF
LINE TODAY高效率的敏捷測試開發技巧
PDF
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
PDF
LINE Things - LINE IoT平台新技術分享
PDF
LINE Pay - 一卡通支付新體驗
PDF
LINE Platform API Update - 打造一個更好的Chatbot服務
PDF
Keynote - ​LINE 的技術策略佈局與跨國產品開發
JJUG CCC 2018 Fall 懇親会LT
Reduce dependency on Rx with Kotlin Coroutines
Kotlin/NativeでAndroidのNativeメソッドを実装してみた
Use Kotlin scripts and Clova SDK to build your Clova extension
The Magic of LINE 購物 Testing
GA Test Automation
UI Automation Test with JUnit5
Feature Detection for UI Testing
LINE 新星計劃介紹與新創團隊分享
​LINE 技術合作夥伴與應用分享
LINE 開發者社群經營與技術推廣
日本開發者大會短講分享
LINE Chatbot - 活動報名報到設計分享
在 LINE 私有雲中使用 Managed Kubernetes
LINE TODAY高效率的敏捷測試開發技巧
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
LINE Things - LINE IoT平台新技術分享
LINE Pay - 一卡通支付新體驗
LINE Platform API Update - 打造一個更好的Chatbot服務
Keynote - ​LINE 的技術策略佈局與跨國產品開發

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
PDF
Top Generative AI Tools for Patent Drafting in 2025.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Google’s NotebookLM Unveils Video Overviews
PDF
creating-agentic-ai-solutions-leveraging-aws.pdf
PPTX
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
PDF
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
PDF
How AI Agents Improve Data Accuracy and Consistency in Due Diligence.pdf
PDF
Chapter 2 Digital Image Fundamentals.pdf
PDF
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
PPTX
CroxyProxy Instagram Access id login.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Transforming Manufacturing operations through Intelligent Integrations
PDF
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
How to Build Crypto Derivative Exchanges from Scratch.pptx
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
Top Generative AI Tools for Patent Drafting in 2025.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Google’s NotebookLM Unveils Video Overviews
creating-agentic-ai-solutions-leveraging-aws.pdf
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
How AI Agents Improve Data Accuracy and Consistency in Due Diligence.pdf
Chapter 2 Digital Image Fundamentals.pdf
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CroxyProxy Instagram Access id login.pptx
Understanding_Digital_Forensics_Presentation.pptx
Transforming Manufacturing operations through Intelligent Integrations
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
NewMind AI Monthly Chronicles - July 2025
How to Build Crypto Derivative Exchanges from Scratch.pptx
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Automating ArcGIS Content Discovery with FME: A Real World Use Case
GamePlan Trading System Review: Professional Trader's Honest Take

Life as an enterprise security geek from underground. (What enterprises want security researcher to do at work? -- How to survive)

  • 1. Life as an enterprise security geek from underground (What enterprises want security researcher to do at work?) SeungJin Lee (GrayHash) @beist
  • 2. About me • CEO of GRAYHASH (Information security consulting company) • Entered in information security field in 2000 • Advisor for SAMSUNG SDS and Cyber Command previously • Speaking at popular security conferences in USA, CANADA, GERMANY • Review board member of BLACKHAT and CODEBLUE • Hunter x hunter, nama-biru lover
  • 3. TEAM GRAYHASH • Grayhash has been working at LINE as a special partner since April • Currently 8 members from Grayhash involved with LINE projects • Job duties • Product security, infra pen-testing, security design • Skillset • Programming, network, operating systems, hacking/security
  • 4. About this talk • Sharing experience of working for big companies as a consultant team • Hard part as a security engineer at big firm • Very common and general issues when you work for big firms • No single line of code but some technical background covered • What things you need to know to be a good security engineer • And why enterprise security is usually harder..
  • 5. Why it is harder • Because you have too many attack points to protect at big firms • Servers, laptops, mobiles, embedded systems, IoT • The big number of employees • A lot of software • And 3rd parties (Supply chain attack things) • Plus, big infrastructure
  • 6. More specifically • Development side • “I can’t code on a laptop which is not connected to the internet” • However, not everyone knows how to protect oneself • “I can’t always code without a break” • And people easily go surf the malicious websites without notice • Believe or not, developers have every sensitive information • Also, hacking people is much easier than hacking servers nowadays
  • 7. More specifically • Infrastructure side • “I want to access the wiki, mail, git server of our company at home” • “I also need to access the live server so that i can maintain at home” • “I need to put my module on servers so that I can monitor everything” • … And once any single person gets hacked, everything will be hacked • VPN, 2FA don’t perfectly save your computer
  • 8. More specifically • Spaghetti business services • “We started our company with this awesome service!” • “Let’s do make more services to get more customers” • “Make more and more API, use one single database, big data wins!” • You will realize you don’t know how you securely isolate each service • Complexity went too far
  • 9. More specifically • 3rd party products • “We focus on our service, if we need other features, just buy, there are a ton of useful products already. Don’t re-invent.” • Then, companies buy security, network, accounting, business logic products without any concern of security • You don’t know how much one is secure/insecure because you didn’t make it • Hacking concern because of vulnerable 3rd party products is what every big company is facing, no exception
  • 10. Development and deployment • Let’s have some practical examples • Let’s think that there is one perfect developer who makes secure code, but • What if the developer’s laptop gets hacked • What if the code on git he/she uploaded is manipulated after the upload • What if the build server gets hacked - Code can be modified before build • What if the compiled .jar gets maliciously modified
  • 11. Dedicated network for servers • Another example, you make dedicated network for servers for security • Only 100 people who have VPN credentials can access the network, but • You’re not sure if the VPN product is truly secure • You may protect well 99 of 100, but can’t protect 50/50 • Your git enterprise server is not in the dedicated network • And the server pulls out the code from it to build • Every server in the dedicated network has installed 3rd party AV client • And where is the master server of the AV clients?
  • 12. Public server security • Last example, there are 500,000 servers that have public IP • The whole security team spends one year to pen-testing those • Not likely, but, let’s assume here 500,000 servers are totally safe now • Tremendous job, however, you can’t do this everyday / forever • And the next day, one programmer leaves ‘phpmyadmin’ with default credential on public web server • Or test code - <?php system($_GET[“cmd”]); ?>
  • 13. Security at small firm • We used to work at small firms for years as well • Much easier and simpler • A few of external software used • No strong access control needed for every server • A small number of main asset to protect • Everyone used 2FA and never visited malicious websites • Easier to educate about information security • Hard to hack even for skilled hackers
  • 14. Security at enterprise • We should say that we can’t protect everything • But there are still things that you can make your company safer • What are important things for enterprise security?
  • 15. Infrastructure tools security • Most of big companies have infra-tools widely used at work • Like, most of servers installed the tool to monitor the server status • Or, PMS, up to date software version • And assume that if the tool has a *backdoor-like* bug • Then, all your company servers could get hacked • Review the code very actively and put through QA test • One of the most priorities of our job
  • 16. Controllable products • Anything can’t be 100% secure • Assume that hackers will find 0 days of things one day • If you can’t make an action in time, you’ll have much trouble • Every service and product that your company is using should be in your hand • Update the software, make hot fixes • Not every 3rd party vendor makes patches in time • What can you do?
  • 17. Hacked employees • Even highly skilled hackers get hacked sometimes • Big companies have multiple jobs • Many of them are not engineers • It’s reasonable to think that some employees are already hacked or soon • Which means there is no “private-network” • Your “private-network” is almost like the Internet • Almost no big company is doing perfectly on internal security
  • 18. Defense in depth • Defense in depth should be everywhere • Especially, for highly confidential servers • Your back-end should be safe even though the front-end got hacked • Example: Springframework 0day comes out, what can you do? • For this, very simple but deeply considered ACL rules needed
  • 19. Continuous red-teaming • Your team may find 100 security bugs at a night • But your team can’t do this for years everyday • Sustainable red-teaming is needed • Since new service / product out everyday • Automated systems make your life much easier but they’re not perfect • One of top priorities: Always ready to hire highly talented engineers
  • 20. Difficult part at work • As an enterprise security geek • Do I hate to talk with others? • Do I love only cyber avatars? • Very nice try, but wrong
  • 21. Hikikomori at work • What is one of most important things for a security engineer at firm? • Most of non security engineers may think • Top notch programming, kernel, assembly, geeky mindset • Actually, communication skill • Because we find problems that others make • Which means we always need to talk to them to fix
  • 22. Being an evil for good • Also, we need to know how to convince people • As we always need others to do things that they don’t like • Example: “You must code on this laptop, only and no internet.” • (Yes, a bit extreme example) • To persuade them, we first need to understand them and their work
  • 23. Pretend to be a genius • Multiple code languages, web frameworks, databases, operating systems • Each team may prefer different development environment • C, C++, PHP, Go, Swift, Java, Python, Erlang, Apache, nginx, tomcat, … • But the security team is relatively smaller • And we should enough know about the things to review the code • Like, learn about swift today and review swift code tomorrow
  • 24. Want to be rich • Keeping strong motivation is not easy • Because we basically work on others’ work • Which means not having the ownership of the product / service • This is why skilled security engineers sometimes fall into mannerism
  • 25. Final note • But, nonetheless, we’re trying to be better • Doing good security != Finding hardcore 0-days • Finding typical 10 bugs might be 10 times better than one awesome bug • Most important things • Knowing how to work with others • Having good communication skill • Following release schedule of product in time
  • 26. Final note • Doing good security is difficult • Luckily, LINE engineers catch up really fast • This talk is not specifically talking about the situation of LINE • But more about general security issues that big firms are having
  • 27. If you have questions • Shoot me an email: [email protected] • Twitter: @beist • Or in person after this stage! • There is a Q/A room • If you’re looking for a security engineer job, we’re hiring.