Penetration Testing Profile
- My first steps into penetration testing started with UNRESTRICTED, SIMULATED attack testing with an elite team in APAC in 2000. This position lasted 5 years before Verizon Business acquired Trusecure’s Asia Pacific professional services. I contributed significantly in finding quite often exotic vulnerabilities in customer networks. The Monetary Authority of Singapore mandated our team as penetration testing service providers for any financial institution wishing to do business in Singapore.
- I was the native English speaker in the team and so took on the task of communicating findings to stakeholders of different levels of IT experience.
- My publication (Security De-Engineering Taylor-Francis Publications - ISBN-10: 1439868344) included 3 chapters on penetration testing and the work received rave reviews from some of the most influential people in the field.
- PwC in 2007 was my first step into application security with blind OWASP testing (DAST) for 8 clients in banking and there was one telco. Since that time blind Appsec has featured heavily in internal and external engagements.
- Through the next 15 years, I performed external and internal appsec and vulnerability assessments, developed vulnerability management capabilities (full risk treatment cycles) at the HLD and LLD phases, leading into Security Operations and service management integration.
- The technologies I worked with: multiple assessment tools, many of which are integrated into Kali Linux today. Symantec CCS. Rapid 7 Insight VM, Tenable SC, Qualys, OpenVAS, Nessus (unauthneicated VA scans), Mcafee VM (formerly Foundstone).
- I developed a tool for Oracle Database 10g, 11g, 12c vulnerability assessment with DBA credentials which was used in several larger organisations in Indonesia.
- In small consultancies I was seen as the go-to resource for penetration testing because of good reviews from their clients.
- Of all the security capabilities, vulnerability management is the one with which I had most exposure in 20 years.
- Various public sector agencies - performed pre-cursor tests in lieu of independent 3rd party penetration tests
Latest Blog Post
SIEM - Windows Events Quick Win
June 21, 2021, 7:08 p.m.
There has been a modicum of interest in a Windows spreadsheet I shared on social media recently, that if absorbed and acted upon, can be a early no-brainer win with SIEM products that are licensed based on volume or Events Per Second (EPS).
Its no big secret that Windows machines, virtual or real, are noisy. Clients I worked with - I would estimate 90%, for various reasonsdon't act on the noise from Windows devices and it's costing them a fortune (right or wrong, approx 50% of those prioritise other tasks).
In Splunk, one can use searches to estimate the benefit of removing noisy Windows events, and what I found was quite a broad range of results. It makes little sense to give the full breakdown because the result depends heavily on the spread and amount of Windows to other Operating Systems (OS). But there were a couple of cases where logging events volume was reduced by 70%.
Security De-engineering, published by Taylor Francis, covers ubiquitous problems in information security and offers a solution in the final chapter
Areas covered: Penetration testing, Hackers, CASEs (Checklists and Standards Evangelists), IDS, Cloud Security, jobs in security, Identity Management, and organisational elements.