SlideShare uma empresa Scribd logo
1 de 19
Real World Security
                                       Maximizing the Value of Your Security Investments


© 2012 nCircle. All rights reserved.
Meet Your Presenters




                     Bill Rudiak                                        Seth Bromberger
           Director, Professional Services                                  Principal
                       nCircle                                            NCI Security




© 2012 nCircle. All rights reserved.     nCircle Company Confidential
As a Security Professional responsible for your
  organization’s VM and/or Compliance Program



                        You have

                                                       fundamental
                                                          tasks…
© 2012 nCircle. All rights reserved.   nCircle Company Confidential
DO
                                       SOMETHING

  to improve your organization’s security

© 2012 nCircle. All rights reserved.      nCircle Company Confidential
and


                   PROVE IT!
© 2012 nCircle. All rights reserved.   nCircle Company Confidential
But First, Let’s Get Back to Basics (Some Key Questions)
    • Why did your organization establish
      a VM and compliance program in
      the first place?
    • What are (were) the specific goals
      of your program?
    • Do all stakeholders understand the
      program and their role in it?
    • Do your tools and processes support effective measurement
      of program performance? How are you doing?
    • What’s happening in your organization now (or soon) that will
      impact your program?
© 2012 nCircle. All rights reserved.   nCircle Company Confidential
A CMM for Assessing Your Program’s Effectiveness
                                        coverage




                         currency                                     depth




                remediation                                           frequency




                                        reporting
© 2012 nCircle. All rights reserved.   nCircle Company Confidential
Do Something – Your Scanning Regimen

                                                        • Coverage
                                                                 – Scan everything
                                                                 – Scan white space to
                                                                      discover new assets
                                                        • Depth
                                                                 – Scan with Credentials

                                                        • Frequency
                                                                 – Scan critical assets more
                                                                   frequently
                                                                 – Align scan frequency
                                                                   with regular change
                                                                   management windows
© 2012 nCircle. All rights reserved.   nCircle Company Confidential
Do Something – Closed Loop Process
                                           New Threats

           CISO/                         Internal Policies                                     • Vulnerability and
           CSO
                                       Regulatory Standards                                      Compliance Management
                                                                                      IT         is a closed loop process
                                                                                  Operations     and requires continuous
                                                                                                 refinement
                                                                                               • Participants in the process
                                                                                                 have different spans of
                                                                                                 control or concern
                                          Vulnerabilities/
                                         Compliance Tests                                      • Infosec Operations often
                                                                                                 lacks direct visibility
                                                                                                 to Remediation
                                                                                   Infosec
                                                                                  Operations   • Communication among
                                                                                                 stakeholders is essential to
  Audit &
Compliance                                                                                       present a common picture
                                                                                                 of the organization’s risk
                                                                                                 and compliance posture

© 2012 nCircle. All rights reserved.                          nCircle Company Confidential
Do Something – Equip & Support Your Team

    • Position your Infosec team
      as Security Analysts who
      provide a valuable service to
      the organization
    • Provide C-level reinforcement and support for
      Infosec’s mandate — improving compliance and
      reducing risk
    • Build and maintain collaborative relationships with
      system owners
    • Leave the data munging to the computers
© 2012 nCircle. All rights reserved.   nCircle Company Confidential
Do Something – Automate via Integration
                                                                                         Remember — more tools
                            Identity and
                                                                IT Service               mean…
                               Access
                                                               Management
                            Management
                                                                                         • More integration points
                                                Asset
                                             Management                                  • More possibly conflicting data
                              Intrusion                          Security
                                                                                           and information
                           Prevention and                      Performance               • More overlaps or gaps in
                              Detection                        Management
  Real-Time                                                                                solution functionality
                                             Vulnerability /
   Security
                                              Compliance                                 • More overall impact when
    Event
                                             Management
  Monitoring                                                                               your environment changes
                            Anti-Virus and
                                                                  Patch
                              Malware
                                                               Management                Glue can be VERY expensive!
                             Prevention
                                               Network
                                              Engineering




© 2012 nCircle. All rights reserved.                      nCircle Company Confidential
Prove It (First, More Questions about “It”)

    • What is it?
           (There are different flavors of it depending on your audience)

    • Is it believable?

    • Can you explain and defend it?

    • Can your audience easily acquire it?

    • Is it useful to its intended audience?

    • Does it support the goals of your program?

© 2012 nCircle. All rights reserved.    nCircle Company Confidential
Prove It – to Executives
                                                                      Program Maturity
                                                                      (trailing 2 quarters)

                                                                      n Q4 2011
                                                                      n Q1 2012




© 2012 nCircle. All rights reserved.   nCircle Company Confidential
Prove It – to Business Management

                                 5,791,465     Vulnerability Risk by Network                               Key Messages
                                                       Q1 2011 - Present

                                                                                                   • 59.3% vulnerability risk
Enterprise Vulnerability Risk




                                                                                                     reduction in past 18 months

                                                                                                   • Focus on patching the
                                                                                                     operations network resulted
                                                                                                     in majority of risk reduction
                                                                   2,357,126                         in the past 6 months
                                       Operations
                                                                                                   • Business network risk
                                                                                                     decreased despite
                                                                                                     deployment of over 200 new
                                       Business                                                      servers and 800 new end-
                                                                                                     user devices in 2011
                                2011   2011     2011   2011      2012         2012
                                 Q1     Q2       Q3     Q4        Q1           Q2

        © 2012 nCircle. All rights reserved.                        nCircle Company Confidential
Prove It – to IT Management

                                250
                                                                                Average Host Score
                                                                               by device type/location
    Average Host Score (000s)




                                200
                                                                                     San Francisco
                                                                                     Toronto
                                150
                                                                                     Munich

                                100


                                50


                                 0
                                      Win Server   UNIX                    Clients            Mobile     Other


© 2012 nCircle. All rights reserved.                      nCircle Company Confidential
Prove It – to IT Staff
              Top 10 Enterprise Vulnerabilities
                                  by % of total risk
                                                                                                    Key Messages
                                                                   % of
Vulnerability                           Hosts   Score   Total      Total                    • The top 10 vulnerabilities
Easily Guessed SSH                                                                            represent 71.2% of the total
                                           45   54748   2463660       42.5%
Credentials                                                                                   risk score
IP360 Default Login
                                            8   48315    386520         6.7%
Enabled
MS06-035: Mailslot Heap
                                            6   33151    198906         3.4%
                                                                                            • Application of 4 Microsoft
Overflow
                                                                                              patches would immediately
Weak SNMP Community
String 'public' Found
                                           24    8052    193248         3.3%                  reduce the score by 11.5%
MS05-043: Print Spooler
                                            5   35681    178405         3.1%
Service Buffer Overflow
                                                                                            • Enforcement of strong
MS06-040: Server Service
Remote Code Execution
                                            5   32931    164655         2.8%                  credentials would reduce the
SSHv1 Protocol Man-In-                                                                        score by 54.4%
                                           20    7702    154040         2.7%
The-Middle Vulnerability

SSHv1 Protocol Available                   20    7522    150440         2.6%
MS08-067: Server Service
RPC Handling Remote                         5   25809    129045         2.2%
Code Execution
Easily Guessed Telnet
                                            2   54748    109496         1.9%
Credentials
 © 2012 nCircle. All rights reserved.                        nCircle Company Confidential
In Conclusion…

    • Sustainability of your VM/Compliance Program requires
      continuous refinement — re-commit to it!
    • Revisit your goals and revise them if necessary
    • Measure and manage security program performance — tie
      output to risk reduction and compliance goals
    • Make intelligent decisions about your toolset
    • Use the Maturity Model to assess your program and track
      improvement over time
    • Maintain visibility of your program by getting the right
      information to stakeholders and other outreach activities
© 2012 nCircle. All rights reserved.   nCircle Company Confidential
nCircle Whitepaper




© 2012 nCircle. All rights reserved.   nCircle Company Confidential
Questions from the Audience…




© 2012 nCircle. All rights reserved.   nCircle Company Confidential

Mais conteúdo relacionado

Mais procurados

Juniper Operate Specialist Market Value
Juniper Operate Specialist Market ValueJuniper Operate Specialist Market Value
Juniper Operate Specialist Market ValueJuniper Networks
 
Cloud Service Provider
Cloud Service ProviderCloud Service Provider
Cloud Service ProviderBill Winkler
 
Va Field Ops And It Governance
Va Field Ops And It GovernanceVa Field Ops And It Governance
Va Field Ops And It Governancejbreeling
 
02 design new_it_service_dept_apendix_industrialexpertise_feb12.pptx
02 design new_it_service_dept_apendix_industrialexpertise_feb12.pptx02 design new_it_service_dept_apendix_industrialexpertise_feb12.pptx
02 design new_it_service_dept_apendix_industrialexpertise_feb12.pptxTraitet Thepbandansuk
 
Open Agile Romania 2011/Johan Lybaert - Agile Open Romania the Ventouris Case
Open Agile Romania 2011/Johan Lybaert - Agile Open Romania the Ventouris CaseOpen Agile Romania 2011/Johan Lybaert - Agile Open Romania the Ventouris Case
Open Agile Romania 2011/Johan Lybaert - Agile Open Romania the Ventouris CaseMozaic Works
 
G7 tech solutions corporate profile
G7 tech solutions corporate profileG7 tech solutions corporate profile
G7 tech solutions corporate profileG7TechSolutons
 
2.0 Adoption in the Enterprise - The Before
2.0 Adoption in the Enterprise - The Before2.0 Adoption in the Enterprise - The Before
2.0 Adoption in the Enterprise - The BeforeSoCo Partners
 
Speed and Flow
Speed and Flow Speed and Flow
Speed and Flow William Yu
 
Adesh.jain
Adesh.jainAdesh.jain
Adesh.jainNASAPMC
 
solving problems
solving problemssolving problems
solving problemsnhok maruko
 
Video Conferencing Architecture
Video Conferencing ArchitectureVideo Conferencing Architecture
Video Conferencing ArchitectureVideoguy
 
Resiliency Solutions From Essi Systems
Resiliency Solutions From Essi SystemsResiliency Solutions From Essi Systems
Resiliency Solutions From Essi SystemsEorioli
 
James Taylor Decision Services S O A Symposium
James  Taylor    Decision  Services  S O A  SymposiumJames  Taylor    Decision  Services  S O A  Symposium
James Taylor Decision Services S O A SymposiumSOA Symposium
 
Systar - Check Image Exchange Monitoring Brochure
Systar - Check Image Exchange Monitoring BrochureSystar - Check Image Exchange Monitoring Brochure
Systar - Check Image Exchange Monitoring BrochureVivastream
 

Mais procurados (19)

Guidon And RBFCU Lean For Credit Unions Webinar
Guidon And RBFCU Lean For Credit Unions WebinarGuidon And RBFCU Lean For Credit Unions Webinar
Guidon And RBFCU Lean For Credit Unions Webinar
 
Juniper Operate Specialist Market Value
Juniper Operate Specialist Market ValueJuniper Operate Specialist Market Value
Juniper Operate Specialist Market Value
 
Cloud Service Provider
Cloud Service ProviderCloud Service Provider
Cloud Service Provider
 
Va Field Ops And It Governance
Va Field Ops And It GovernanceVa Field Ops And It Governance
Va Field Ops And It Governance
 
02 design new_it_service_dept_apendix_industrialexpertise_feb12.pptx
02 design new_it_service_dept_apendix_industrialexpertise_feb12.pptx02 design new_it_service_dept_apendix_industrialexpertise_feb12.pptx
02 design new_it_service_dept_apendix_industrialexpertise_feb12.pptx
 
Telcom Offshoring
Telcom OffshoringTelcom Offshoring
Telcom Offshoring
 
Open Agile Romania 2011/Johan Lybaert - Agile Open Romania the Ventouris Case
Open Agile Romania 2011/Johan Lybaert - Agile Open Romania the Ventouris CaseOpen Agile Romania 2011/Johan Lybaert - Agile Open Romania the Ventouris Case
Open Agile Romania 2011/Johan Lybaert - Agile Open Romania the Ventouris Case
 
G7 tech solutions corporate profile
G7 tech solutions corporate profileG7 tech solutions corporate profile
G7 tech solutions corporate profile
 
2.0 Adoption in the Enterprise - The Before
2.0 Adoption in the Enterprise - The Before2.0 Adoption in the Enterprise - The Before
2.0 Adoption in the Enterprise - The Before
 
Speed and Flow
Speed and Flow Speed and Flow
Speed and Flow
 
Adesh.jain
Adesh.jainAdesh.jain
Adesh.jain
 
solving problems
solving problemssolving problems
solving problems
 
Video Conferencing Architecture
Video Conferencing ArchitectureVideo Conferencing Architecture
Video Conferencing Architecture
 
Junwoo Park
Junwoo ParkJunwoo Park
Junwoo Park
 
Resiliency Solutions From Essi Systems
Resiliency Solutions From Essi SystemsResiliency Solutions From Essi Systems
Resiliency Solutions From Essi Systems
 
James Taylor Decision Services S O A Symposium
James  Taylor    Decision  Services  S O A  SymposiumJames  Taylor    Decision  Services  S O A  Symposium
James Taylor Decision Services S O A Symposium
 
Case Study: Pita Pit
Case Study: Pita PitCase Study: Pita Pit
Case Study: Pita Pit
 
Transformational Leadership
Transformational LeadershipTransformational Leadership
Transformational Leadership
 
Systar - Check Image Exchange Monitoring Brochure
Systar - Check Image Exchange Monitoring BrochureSystar - Check Image Exchange Monitoring Brochure
Systar - Check Image Exchange Monitoring Brochure
 

Semelhante a Real world security webinar (v2012-05-30)

RAMS 2013 Calculating roi when implementing a dfr program by mike silverman
RAMS 2013 Calculating roi when implementing a dfr program by mike silvermanRAMS 2013 Calculating roi when implementing a dfr program by mike silverman
RAMS 2013 Calculating roi when implementing a dfr program by mike silvermanAccendo Reliability
 
ETIS11 - Agile Business Intelligence - Presentation
ETIS11 -  Agile Business Intelligence - PresentationETIS11 -  Agile Business Intelligence - Presentation
ETIS11 - Agile Business Intelligence - PresentationDavid Walker
 
Business and IT Compliance Strategy
Business and IT Compliance StrategyBusiness and IT Compliance Strategy
Business and IT Compliance StrategyAllyn McGillicuddy
 
Secure Delivery Center, Eclipse Open Source
Secure Delivery Center, Eclipse Open SourceSecure Delivery Center, Eclipse Open Source
Secure Delivery Center, Eclipse Open SourceGenuitec, LLC
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...Skoda Minotti
 
It's the organisation, Stupid
It's the organisation, StupidIt's the organisation, Stupid
It's the organisation, StupidJohn M Walsh
 
Is an agile SDLC an oxymoron?
Is an agile SDLC an oxymoron? Is an agile SDLC an oxymoron?
Is an agile SDLC an oxymoron? Dave Sharrock
 
Interactive Intelligence Sales Brief
Interactive Intelligence Sales BriefInteractive Intelligence Sales Brief
Interactive Intelligence Sales BriefInova Solutions
 
Integrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerIntegrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerNovell
 
Dean.david
Dean.davidDean.david
Dean.davidNASAPMC
 
Amazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportAmazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportPaul Muller
 
Elisit Solutions Overview
Elisit Solutions OverviewElisit Solutions Overview
Elisit Solutions Overviewdavidladams71
 
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...Turja Narayan Chaudhuri
 
The quality attribute of upgradability
The quality attribute of upgradabilityThe quality attribute of upgradability
The quality attribute of upgradabilityLen Bass
 
The Coming Age of Continuous Auditing
The Coming Age of Continuous AuditingThe Coming Age of Continuous Auditing
The Coming Age of Continuous Auditingcarlabrut
 

Semelhante a Real world security webinar (v2012-05-30) (20)

RAMS 2013 Calculating roi when implementing a dfr program by mike silverman
RAMS 2013 Calculating roi when implementing a dfr program by mike silvermanRAMS 2013 Calculating roi when implementing a dfr program by mike silverman
RAMS 2013 Calculating roi when implementing a dfr program by mike silverman
 
Workshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environmentWorkshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environment
 
Tata Kelola Keamanan Informasi
Tata Kelola Keamanan InformasiTata Kelola Keamanan Informasi
Tata Kelola Keamanan Informasi
 
Compliance what does security have to do with it
Compliance what does security have to do with it Compliance what does security have to do with it
Compliance what does security have to do with it
 
Why physical security just isn’t enough, Sending the heavies into virtualized...
Why physical security just isn’t enough, Sending the heavies into virtualized...Why physical security just isn’t enough, Sending the heavies into virtualized...
Why physical security just isn’t enough, Sending the heavies into virtualized...
 
ETIS11 - Agile Business Intelligence - Presentation
ETIS11 -  Agile Business Intelligence - PresentationETIS11 -  Agile Business Intelligence - Presentation
ETIS11 - Agile Business Intelligence - Presentation
 
Continuous Monitoring 2.0
Continuous Monitoring 2.0Continuous Monitoring 2.0
Continuous Monitoring 2.0
 
Business and IT Compliance Strategy
Business and IT Compliance StrategyBusiness and IT Compliance Strategy
Business and IT Compliance Strategy
 
Secure Delivery Center, Eclipse Open Source
Secure Delivery Center, Eclipse Open SourceSecure Delivery Center, Eclipse Open Source
Secure Delivery Center, Eclipse Open Source
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
 
It's the organisation, Stupid
It's the organisation, StupidIt's the organisation, Stupid
It's the organisation, Stupid
 
Is an agile SDLC an oxymoron?
Is an agile SDLC an oxymoron? Is an agile SDLC an oxymoron?
Is an agile SDLC an oxymoron?
 
Interactive Intelligence Sales Brief
Interactive Intelligence Sales BriefInteractive Intelligence Sales Brief
Interactive Intelligence Sales Brief
 
Integrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerIntegrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity Manager
 
Dean.david
Dean.davidDean.david
Dean.david
 
Amazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportAmazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team Sport
 
Elisit Solutions Overview
Elisit Solutions OverviewElisit Solutions Overview
Elisit Solutions Overview
 
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
 
The quality attribute of upgradability
The quality attribute of upgradabilityThe quality attribute of upgradability
The quality attribute of upgradability
 
The Coming Age of Continuous Auditing
The Coming Age of Continuous AuditingThe Coming Age of Continuous Auditing
The Coming Age of Continuous Auditing
 

Mais de nCircle - a Tripwire Company

Mais de nCircle - a Tripwire Company (7)

Computer Forensics Bootcamp
Computer Forensics BootcampComputer Forensics Bootcamp
Computer Forensics Bootcamp
 
Google-Jacking: A Review of Google 2-Factor Authentication
Google-Jacking: A Review of Google 2-Factor AuthenticationGoogle-Jacking: A Review of Google 2-Factor Authentication
Google-Jacking: A Review of Google 2-Factor Authentication
 
Password War Games Webinar
Password War Games Webinar Password War Games Webinar
Password War Games Webinar
 
2012 nCircle Federal Security and Compliance Trends Survey
2012 nCircle Federal Security and Compliance Trends Survey 2012 nCircle Federal Security and Compliance Trends Survey
2012 nCircle Federal Security and Compliance Trends Survey
 
Applying Boyd's OODA Loop Strategy to Drive IT Security Decision and Action
Applying Boyd's OODA Loop Strategy to Drive IT Security Decision and ActionApplying Boyd's OODA Loop Strategy to Drive IT Security Decision and Action
Applying Boyd's OODA Loop Strategy to Drive IT Security Decision and Action
 
Security on a budget
Security on a budget Security on a budget
Security on a budget
 
nCircle Webinar: Get your Black Belt
nCircle Webinar: Get your Black Belt nCircle Webinar: Get your Black Belt
nCircle Webinar: Get your Black Belt
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 

Real world security webinar (v2012-05-30)

  • 1. Real World Security Maximizing the Value of Your Security Investments © 2012 nCircle. All rights reserved.
  • 2. Meet Your Presenters Bill Rudiak Seth Bromberger Director, Professional Services Principal nCircle NCI Security © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 3. As a Security Professional responsible for your organization’s VM and/or Compliance Program You have fundamental tasks… © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 4. DO SOMETHING to improve your organization’s security © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 5. and PROVE IT! © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 6. But First, Let’s Get Back to Basics (Some Key Questions) • Why did your organization establish a VM and compliance program in the first place? • What are (were) the specific goals of your program? • Do all stakeholders understand the program and their role in it? • Do your tools and processes support effective measurement of program performance? How are you doing? • What’s happening in your organization now (or soon) that will impact your program? © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 7. A CMM for Assessing Your Program’s Effectiveness coverage currency depth remediation frequency reporting © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 8. Do Something – Your Scanning Regimen • Coverage – Scan everything – Scan white space to discover new assets • Depth – Scan with Credentials • Frequency – Scan critical assets more frequently – Align scan frequency with regular change management windows © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 9. Do Something – Closed Loop Process New Threats CISO/ Internal Policies • Vulnerability and CSO Regulatory Standards Compliance Management IT is a closed loop process Operations and requires continuous refinement • Participants in the process have different spans of control or concern Vulnerabilities/ Compliance Tests • Infosec Operations often lacks direct visibility to Remediation Infosec Operations • Communication among stakeholders is essential to Audit & Compliance present a common picture of the organization’s risk and compliance posture © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 10. Do Something – Equip & Support Your Team • Position your Infosec team as Security Analysts who provide a valuable service to the organization • Provide C-level reinforcement and support for Infosec’s mandate — improving compliance and reducing risk • Build and maintain collaborative relationships with system owners • Leave the data munging to the computers © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 11. Do Something – Automate via Integration Remember — more tools Identity and IT Service mean… Access Management Management • More integration points Asset Management • More possibly conflicting data Intrusion Security and information Prevention and Performance • More overlaps or gaps in Detection Management Real-Time solution functionality Vulnerability / Security Compliance • More overall impact when Event Management Monitoring your environment changes Anti-Virus and Patch Malware Management Glue can be VERY expensive! Prevention Network Engineering © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 12. Prove It (First, More Questions about “It”) • What is it? (There are different flavors of it depending on your audience) • Is it believable? • Can you explain and defend it? • Can your audience easily acquire it? • Is it useful to its intended audience? • Does it support the goals of your program? © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 13. Prove It – to Executives Program Maturity (trailing 2 quarters) n Q4 2011 n Q1 2012 © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 14. Prove It – to Business Management 5,791,465 Vulnerability Risk by Network Key Messages Q1 2011 - Present • 59.3% vulnerability risk Enterprise Vulnerability Risk reduction in past 18 months • Focus on patching the operations network resulted in majority of risk reduction 2,357,126 in the past 6 months Operations • Business network risk decreased despite deployment of over 200 new Business servers and 800 new end- user devices in 2011 2011 2011 2011 2011 2012 2012 Q1 Q2 Q3 Q4 Q1 Q2 © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 15. Prove It – to IT Management 250 Average Host Score by device type/location Average Host Score (000s) 200 San Francisco Toronto 150 Munich 100 50 0 Win Server UNIX Clients Mobile Other © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 16. Prove It – to IT Staff Top 10 Enterprise Vulnerabilities by % of total risk Key Messages % of Vulnerability Hosts Score Total Total • The top 10 vulnerabilities Easily Guessed SSH represent 71.2% of the total 45 54748 2463660 42.5% Credentials risk score IP360 Default Login 8 48315 386520 6.7% Enabled MS06-035: Mailslot Heap 6 33151 198906 3.4% • Application of 4 Microsoft Overflow patches would immediately Weak SNMP Community String 'public' Found 24 8052 193248 3.3% reduce the score by 11.5% MS05-043: Print Spooler 5 35681 178405 3.1% Service Buffer Overflow • Enforcement of strong MS06-040: Server Service Remote Code Execution 5 32931 164655 2.8% credentials would reduce the SSHv1 Protocol Man-In- score by 54.4% 20 7702 154040 2.7% The-Middle Vulnerability SSHv1 Protocol Available 20 7522 150440 2.6% MS08-067: Server Service RPC Handling Remote 5 25809 129045 2.2% Code Execution Easily Guessed Telnet 2 54748 109496 1.9% Credentials © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 17. In Conclusion… • Sustainability of your VM/Compliance Program requires continuous refinement — re-commit to it! • Revisit your goals and revise them if necessary • Measure and manage security program performance — tie output to risk reduction and compliance goals • Make intelligent decisions about your toolset • Use the Maturity Model to assess your program and track improvement over time • Maintain visibility of your program by getting the right information to stakeholders and other outreach activities © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 18. nCircle Whitepaper © 2012 nCircle. All rights reserved. nCircle Company Confidential
  • 19. Questions from the Audience… © 2012 nCircle. All rights reserved. nCircle Company Confidential

Notas do Editor

  1. [Seth]
  2. [Seth] “The journey of a thousand miles begins with a single step.” “Beginning is half of the whole.” You can’t wish improvements to security; you have to take action. Whether that’s making a plan or taking the next step in the plan, the important thing is to do something.Some things are more easily accomplished than others. In vulnerability and compliance management, is there ONE THING you can do this week to improve your security program? If you gave it some thought you could probably come up with a half-dozen near-term accomplishments.
  3. [Seth]But it’s not enough to take some action. You have to demonstrate not only that you’ve done something, but that what you’ve done has the desired effect. Whether this is a report to the executive committee or a chart for the technical staffs, you have to demonstrate that the work being performed is worthwhile, effective, and important to folks who are paying for it and folks who are performing it.In the context of vulnerability and compliance management, this means reporting. What data are you collecting about your program, and what information are you communicating to the program’s stakeholders? What improvements can you make in the reporting process so that it will be easier for you to show future successes?
  4. [Bill] Refresh your memory: why did you implement a vulnerability and compliance program in the first place? Is your current process meeting your needs? If not, it’s time to change the game. Where are you on the maturity model? Are there improvements you can make to any one of the six components that will drive you towards the original goals?
  5. [Bill] This represents a capability maturity process area focused on vulnerability and compliance management. There are six general categories that should be monitored. Moving clockwise around the spider graph:Coverage: are all your assets being scanned for vulnerabilities and compliance? Are there segments of your network environment that are off limits or otherwise outside your view? Do new networks and new devices get added to scan profiles promptly?Scan Depth: are you using credentialed scanning to get an “inside look” at the assets? This is advantageous to determine the actual security posture of the device.Frequency: how often are you scanning? More frequently = better intelligence.Reporting: are your reports provided to all levels of management and across your lines of business? Do they convey accurate information that will promote the desired response?Remediation: is your organization prepared to remediate the vulnerabilities and noncompliances found by the assessments? How responsive are the groups tasked with this mission?Currency: do you keep the scanning profiles and vulnerabilities databases up to date to ensure you’re scanning for the latest vulnerabilities?
  6. [Bill]
  7. [Bill] This is the vulnerability / compliance process wheel. It starts with a design, goes through planning and execution, and then reporting and remediation of found vulnerabilities and noncompliances. Based on the lessons learned during one cycle, the design is refined, new capabilities are introduced, and the cycle begins again.Key to the success is appropriate communication at all stages.
  8. [Bill]
  9. [Bill]
  10. [Seth]Your work as a security professional can seem invisible – especially when you have no crises. It’s important to ensure that you’ve got the appropriate level of visibility – and for the right reasons – at all times. Reporting can be an effective way to communicate your goals and the performance of your security program – whether it’s to highlight successes and share praise, or to focus on an opportunity for improvement and areas that need attention. It is vital that the reports both reach and are target to specific audiences – an overly-technical report may not be suitable for inclusion at an executive board meeting, for example. Likewise, a high-level report will not give your security practitioners and other technical staff actionable information that will help them achieve your security program goals.
  11. [Seth]This is an example of a maturity model report covering two quarters. It is appropriate for senior management and will show both progress towards some of the maturity goals you’ve set as well as the gaps where you might need some help from other stakeholders.In this example, the program has seen great progress in remediation, currency, and coverage, but needs to improve scan depth – perhaps by using credentialed scans. Frequency of scans has actually decreased in effectiveness from the previous quarter, so some analysis would probably be of benefit there. Reporting continues to be ok but improvements are certainly possible.
  12. This is a high level representation of total vulnerability score – called the “Waher index” after its creator, AlexWaher. Here, it provides feedback on the relative vulnerability risk and remediation effects across two networks within the company: the business side and the operations network. Key messages are provided at the right, but the conclusion is clear: the effort spent remediating vulnerabilities in the operations network since September has resulted in a huge decrease in the vulnerability score (and, by implication, the associated risk on that network).This report is good to provide a quick snapshot of activity and progress to peers who have staff members involved in scanning and remediation activities.
  13. This report breaks out average vulnerability scores by technology and by location, and is intended for use by IT management. At a glance, it is clear that Toronto needs some help reducing vulnerabilities in its Windows server environment, while San Francisco and Munich need to concentrate on both Windows and UNIX. In addition, it appears that the endpoint security program in San Francisco is not as effective as it is in Toronto and Munich.Reports like this can help get resources aligned across location and business/technology functions.
  14. This report is intended for IT staff – both security and operations. It provides a quick list of the most significant vulnerabilities within an environment based on the relative weighted risk (vulnerability score multiplied by the number of hosts, as a percentage of the total vulnerability score across all hosts and vulnerabilities). It is intended to help prioritize remediation resources to focus on the most critical issues first, and will allow security analysts to take a “macro” view as suggested by the key messages; in particular, that strong credentials represent 4 of the top 10 and almost 55% of the total vulnerability score, and that applying 4 Windows patches would provide an immediate score reduction of almost 12%.
  15. [Bill] 3-4 takeaways. (Seth to do)
  16. [Bill]