Building a Cyber Security Emergency Response Team for the NREN Community The case of KENET CERT
|
|
|
- Sandra Maxwell
- 10 years ago
- Views:
Transcription
1 Building a Cyber Security Emergency Response Team for the NREN Community The case of KENET CERT Presentation at UbuntuNet-Connect November 2015, Maputo, Mozambique By Peter Muia, Senior Systems Administrator - KENET Transforming research &
2 Co-authors 1. Martin Njau 2. Prof. Meoli Kashorda 3. Kennedy Aseda 4. Peter Muia 5. Ronald Osure
3 Agenda KENET as an NREN The KENET CERT Motivation Services Methodology Impact QA
4 KENET is the National Research and Education Network ( NREN) of Kenya Aggregates Demand for Connectivity, Internet bandwidth and Cloud Services of member institutions Aggregates Internet traffic from Higher Education and research institutions Develops High-end ICT talent technical + project management Capacity building for KENET and member institutions Builds and operates advanced research infrastructures for the R &E community of Kenya in different areas Africa Science Gateway and federated services (KENET CA, idp, EDUROAM) Special Interest Groups (SIGs) in Educational technology and Engineering Education constituted in FY SIGs in Medicine, Agriculture and ICT shall be constituted in FY KENET focus is support for STEM education and research! Cyber Security
5 KENET Operates a Broadband Network for Members Primary fiber links Backup fiber links. Lokichoggio Ethiopia Mander a KENET POP Furthest connected campus JKUAT Kitale Kitale Lodwar Marsabit Girls 91 2 Marsabit Moyale Wajiir POP Nairobi POP 72 Connected Campuses Uganda 12 9 Kisumu POP Eldoret POP Weybuye 70 Kakameg a 350KM Kisumu 400KM Eldoret Nyahururu Nakuru POP Nakuru 150KM Kericho Kisii Bomet Rong Rongo o UC 400KM Isebania Narok UoN POP Nanyuki Nyeri Nairobi Kaljiado Meru POP Isielo 31 8 Emb u Muranga 350KM Thika USIU DC Tala Meru Mwingi Kitui Garissa UC Garissa Somalia Kisumu POP 21 Mombasa POP 10 Eldoret POP 15 Nakuru POP 11 Meru POP 17 Tanzania KM Namanga 500KM Mombasa POP Kilifi Mombasa Garse n Italian Space Agency -Luigi Broglio Space Centre- Malindi Malindi INDIAN OCEAN Total Campuses connected 170+ Google Confidential and Proprietary
6 What is a CERT Computer/Cyber Security Emergency Response Teams (CERT) Expert groups that handle computer security incidents. Alternative names include computer emergency readiness team and computer security incident response team (CSIRT).
7 The KENET CERT The KENET CERT is a team within KENET formed to study Internet security, discover vulnerabilities, and to provide assistance on security matters to the KENET community. It strives for a safer, stronger Internet for the education and research community in Kenya by:- Responding to major incidents Analyzing threats Exchanging critical cyber security information within the community and also with other CERTs.
8 Why setup a CERT at KENET Increase in cyber threats ISPs in Kenya: spamming, phishing and poor reputation scores Malware Threat: viruses, trojans, botnets and worms Insider threats Global Vulnerabilities and Threats sponse/publications/threatreport.jsp
9 Why setup a CERT at KENET Cont... High uptake of Internet and online applications Need to secure these applications KENET is distributing 9 Gb/s bandwidth to its members. 4.5 Gb/s International traffic 4 Gb/s Google Cache 0.5 Gb/s Akamai traffic KENET Shared services need to be secured web hosting backup services data recovery sites DNS services cloud services and virtual servers. Computer security incidents response
10 KENET CERT Services Facilitate the centralized reporting of incidents Perform training and raise the security awareness of users Resolving security related tickets as part of the KENET help desk Promote computer security policies within the KENET community by creating policies such as the web hosting policy, business continuity plan etc Alerts and Announcements Collaboration Incident Tracing Securing the KENET infrastructure by ensuring that network devices and systems are hardened before they go live.
11 CERT Development Methodology 1. Requirement Analysis and Specifications understanding KENET as an NREN and the community it serves Identify threats 2. Planning services to be provided by the CERT to mitigate threats identified Benchmark with other CERTs e.g. DFN-CERT, US-CERT, FIRST 3. Implementation Assembly of a team within KENET with both personal and technical skills of running a CERT tools for vulnerability scanning were identified Setup of a honeypot Development of the CERT portal Hardening of existing systems Modsecurity, Mod_evasive, Host Firewalls, Maldetect
12 CERT Development Methodology Cont 4. Operational phase Services implemented were launched to the community and a mailing list created ( and SMS) Cyber security training curriculum for systems administrators and a computer security awareness training for users were developed Policies and procedures for operationalization of the CERT were developed and communicated to the community CERT portal was put on line ( 5. Peer collaboration
13 KENET CERT Organization Model Internal Distributed CERT model proposed by the European Union Agency for Network and Information Security (ENISA) An organization utilizes existing staff to provide a virtual distributed CERT The distributed team members perform CERT duties in addition to their regular responsibilities Low cost incurred Processes Incident Reporting Incident Handling Communication
14 CERT Implementation Challenges People who are trained and experienced in incident response techniques and practices are difficult to find. There is no established education path for professional incident handling staff in existence as of today. There was a lack of publicly available sample templates for policies and procedures for use in the day-to-day operations of a CERT. There were few tools such as tailored help desk or trouble ticket solutions addressing the specific needs of the KENET CERT.
15 Impact & Conclusion Four Training have been conducted. Better awareness, better setup of systems and a better knowledge of security threats and ways of mitigating these threats. A session on security has been included in all other KENET trainings. Information is disseminated in a timely manner. Quick resolution of security related tickets because best practices have been identified, procedures developed and documented for the CERT team to follow during resolution. Reduction in the number of cyber security tickets Awareness and Discussion within the KENET community on cyber security is stronger now KENET has established Cyber security champions in each of its member institutions.
16 References 1.Communications Authority of Kenya CA - Communications Authority of Kenya. [ONLINE] Available at: [Accessed 07 November 2015]. 2.DFN-CERT DFN-CERT. [ONLINE] Available at: [Accessed 07 November 2015]. 3.FIRST - Improving security together FIRST.org / FIRST - Improving security together. [ONLINE] Available at: [Accessed 07 November 2015]. 4.Kali Linux Kali Linux. [ONLINE] Available at: [Accessed 08 November 15]. 5.Kenya Education Network Kenya Education Network. [ONLINE] Available at: [Accessed 07 November 2015]. 6.Kenya Education Network- CERT Kenya Education Network- CERT. [ONLINE] Available at: [Accessed 07 November 2015]. 7.Killcrece, G, Organizational Models for Computer Security Incident Response Teams (CSIRTs). 1st ed. USA: Carnegie Mellon University. 8.Tf-Csirt Tf-Csirt. [ONLINE] Available at: [Accessed 07 November 2015]. 9.US-CERT US-CERT. [ONLINE] Available at: [Accessed 07 November 15].
17 Thank You Jomo Kenyatta Memorial Library, University of Nairobi P. O Box , Nairobi /
KENET Network Status Update and Outlook 2012
KENET Network Status Update and Outlook 2012 Presenta)ons at the Internet2 Spring 2012 Mee)ng Meoli Kashorda, PhD, MIEEE, MIET ExecuBve Director, KENET and Professor of InformaBon Systems, USIU 1 Kenya
Building a Cyber Security Emergency Response Team (CERT) for the NREN Community The case of KENET CERT
Building a Cyber Security Emergency Response Team (CERT) for the NREN Community The case of KENET CERT Peter MUIA 1, Meoli KASHORDA 1, Kennedy ASEDA 1, Ronald OSURE 1, Martin NJAU 1 1 Kenya Education Network,
By Prof. Meoli Kashorda, PhD, MIET, MIEEE Executive Director, Kenya Education Network (KENET)
7 th Annual Forum of Heads Members Institutions 2015 Sustainability Models for Higher Education and Research Institutions By Prof. Meoli Kashorda, PhD, MIET, MIEEE Executive Director, Kenya Education Network
CERTIFICATION PROGRAMMES. Developing Professionals for Enhanced Institutional Effectiveness and Performance
CERTIFICATION PROGRAMMES Developing Professionals for Enhanced Institutional Effectiveness and Performance A New Bouquet of KIM Certification Courses For over 60 years, the Kenya Institute of Management
Ubuntu Connect 2014. Technical Capacity Building at KENET
Ubuntu Connect 2014 Technical Capacity Building at KENET Maureen Wanja Njue Senior Systems Administrator KENET [email protected] Kennedy Aseda Lead Network Engineer, Operations KENET [email protected]
KENET NETWORK INFRASTUCTURE. KENNEDY ASEDA [email protected]
KENET NETWORK INFRASTUCTURE KENNEDY ASEDA [email protected] Country of marathon winners? 2 Google Confidential and Proprietary Contents Network Infrastructure Network Operations Achievements & Challenges
KENET & REGIONAL COLLABORATION NETWORKS:
KENET & REGIONAL COLLABORATION NETWORKS: A critique of KENET's readiness by Kennedy Aseda Senior Network Engineer KENET Introduction The growth of a society is highly pegged on the growth and quality of
AfyaImara Seniors. Kenya. Uganda. Southern Sudan INPATIENT HEALTH INSURANCE
Kenya HEAD OFFICE UAP Insurance Company Ltd Bishops Garden Towers, Bishops Road PO Box 43013, Nairobi, KENYA Tel +254-020 - 2850000, Cell 0711 065000 Fax +254-020 - 2719030 Customer Care Centre - Queensway
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected] Framework
A BRAINSTORMING ON SECURITY FIRE DRILLS
A BRAINSTORMING ON SECURITY FIRE DRILLS Classification, Feasibility, Usefulness and Implications Maurizio Molina, DANTE Nino Jogun, CARNET on behalf of GÉANT3 project, SA2/T4 TF-CSIRT, Tallin, 25 th Sep.
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
DANCERT RFC2350 Description Date: 10-10-2014 Dissemination Level:
10-10-2014 Date: 10-10-2014 Dissemination Level: Owner: Authors: Public DANCERT DANTE Document Revision History Version Date Description of change Person 1.0 10-10-14 First version issued Jan Kohlrausch
UNDERGRADUATE ACADEMIC PROGRAMMES: JANUARY 2016 INTAKE
JOMO KENYATTA UNIVERSITY OF AGRICULTURE AND TECHNOLOGY P.O Box 62000, Nairobi, 00200, Kenya Telephone 067-52181-4, 52711. Fax 52446, THIKA Office of the Registrar (Academic Affairs) E-mail: [email protected],
AfyaImara. Kenya. Uganda. Southern Sudan INPATIENT/OUTPATIENT HEALTH INSURANCE
AfyaImara Kenya HEAD OFFICE UAP Insurance Company Ltd Bishops Garden Towers, Bishops Road PO Box 43013, Nairobi, KENYA Tel +254-020 - 2850000 Fax +254-020 - 2719030 Customer Care Centre - Queensway House
ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency
ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The
About Botnet, and the influence that Botnet gives to broadband ISP
About net, and the influence that net gives to broadband ISP Masaru AKAI BB Technology / SBB-SIRT Agenda Who are we? What is net? About Telecom-ISAC-Japan Analyzing code How does net work? BB Technology
Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected]
Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected] Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.
Patching & Malicious Software Prevention CIP-007 R3 & R4
Patching & Malicious Software Prevention CIP-007 R3 & R4 Scope Compliance Assessment Summary Introspection & Analysis Program-In Review Maturity Model review Control Design review Process Components of
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Department of Information Technology Ministry of Communications & Information Technology
A Strategy for Developing High-end ICT talent for Emerging African NRENs The case of KENET
A Strategy for Developing High-end ICT talent for Emerging African NRENs The case of KENET Meoli KASHORDA Kenya Education Network Tel: +254 732150500 E-mail: [email protected] Abstract Emerging African
Michuki Mwangi! Regional Development Manager - Africa! ISOC! European Peering Forum (EPF) 7! Malta! 17 19 Sept 2012!
Michuki Mwangi! Regional Development Manager - Africa! ISOC! European Peering Forum (EPF) 7! Malta! 17 19 Sept 2012! Agenda! African Fiber Infrastructure! Status of Peering in Africa! The African Peering
JAMII TELECOMMUNICATIONS LTD COMPANYPROFILE
YOUR TRUSTED BUSINESS PARTN E R JAMII TELECOMMUNICATIONS LTD COMPANYPROFILE Table of Contents 1. Introduction 2. Our Vision 3. Our Mission 4. Our Core Values 5. Our Customer Service Vision 6. The Company
At the national forum, all counties in country were clustered as follows: 1 Baringo, Elgeyo/Marakwet,Taita/Taveta,West Pokot,Tana River
MINISTRY OF EDUCATION, SCIENCE AND TECHNOLOGY PRESS STATEMENT: ISSUED UNDER ARTICLE 35(3)-that provides that the state shall publish and publicize any important information affecting the nation. FEES GUIDELINES
The Faculty of Science in Kenya constitutes of eight academic
SCIENCE IN KENYA Scientific institutions in Kenya include the UNESCO Regional Office for Science and Technology for Africa, in Nairobi; coffee and tea research foundations; grasslands and plant-breeding
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
Course Content: Session 1. Ethics & Hacking
Course Content: Session 1 Ethics & Hacking Hacking history : How it all begin Why is security needed? What is ethical hacking? Ethical Hacker Vs Malicious hacker Types of Hackers Building an approach for
Cyber security Indian perspective & Collaboration With EU
Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of
UNIVERSITY OF NAIROBI
UNIVERSITY OF NAIROBI COLLEGE OF EDUCATION AND EXTENAL STUDIES SCHOOL OF EDUCATION DEPARTMENT OF EDUCATIONAL COMMUNICATION AND TECHNOLOGY The Department of Educational Communication and Technology offers
Cyber Security and Critical Information Infrastructure
Cyber Security and Critical Information Infrastructure Dr. Gulshan Rai Director General Indian Computer Emergency Response Team (CERT- In) grai [at] cert-in.org.in The Complexity of Today s Network Changes
Romanian National Computer Security Incident Response Team CERT-RO. [email protected] http://www.cert-ro.eu
Romanian National Computer Security Incident Response Team CERT-RO [email protected] http://www.cert-ro.eu About A Digital Agenda for Europe, Pillar : Trust and Security, Action 38 Member States to
G I T H I N J I W. P A U L I N E BIO DATA
G I T H I N J I W. P A U L I N E BIO DATA MARITAL STATUS: Married D.O.B: 30 TH July 1960 NUMBER OF CHILDREN: Three (33years, 26Years, 23 Years) CONTACT ADDRESS: P.O BOX 3900 Eldoret. E-MAIL: [email protected]
Security Officer: An NREN Secondee Perspective
Security Officer: An NREN Secondee Perspective Jan Kohlrausch, DANTE TF-CSIRT Meeting 18/19 September 2014 Rome Background About me: Senior Incident Handler and Researcher with DFN-CERT Currently member
Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow
Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned
IMPACT OF rhris ON REGULATION OF MEDICAL AND DENTAL PRACTICE
IMPACT OF rhris ON REGULATION OF MEDICAL AND DENTAL PRACTICE Emory University Kenya Project Presentation Summary of Emory KHW Project Sponsored by PEPFAR through CDC and implemented by Emory University
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
IMPACT OF UNDERSEA CAPACITY IN EAST AFRICA
IMPACT OF UNDERSEA CAPACITY IN EAST AFRICA By Kevin G. Chege Network Manager KENET http://www.kenet.or.ke What I'll cover... Regional undersea connectivity before 2009 and as at the end of 2009 What connectivity
Automated Protection on UCS with Trend Micro Deep Security
Copyright 2014 Trend Micro Inc. Automated Protection on UCS with Trend Micro Deep Security Chris Van Den Abbeele Senior presales Engineer Agenda 1. Industrialization of Cyber threats The boomerang of Project
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Business Banking Products
Bank on better Business Banking Products OUR BUSINESS IS ABOUT COMMITMENTS 1 Reliable banking products for smart businesses At National Bank, we believe that you need a reliable banking solution to help
Does Information Lead to More Active Citizenship? Evidence from an Education Information Intervention in Rural Kenya
Does Information Lead to More Active Citizenship? Evidence from an Education Information Intervention in Rural Kenya Evan S. Lieberman Princeton Daniel N. Posner MIT Lily L. Tsai MIT The World Bank 24
Modular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
Cybersecurity and Incident Response Initiatives: Brazil and Americas
Cybersecurity and Incident Response Initiatives: Brazil and Americas Cristine Hoepers [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Lith Networking and Network Marketing Safety
DIRECTION TO SUCCESS. PUBLIC AND PRIVATE SECTORS PARTNERSHIP WSIS Action Line Facilitation Meeting: Building confidence and security in the use of ICTs (C5) Partnerships for Global Cybersecurity ITU Geneva,
Why Eurotux? Expertise and skill Market proven Innovative and competitive solutions Strong research and development Policy of continuous improvement Complete, flexible and scalable service Service quality
Best Practices for Building a Security Operations Center
OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,
Current counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol [email protected] April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
Whitepaper: Cloud Computing for Credit Unions
Whitepaper: Cloud Computing for Credit Unions A new twist on an old strategy MYCU SERVICES December 29, 2011 Authored by: Lingle, Linda Table of Contents Introduction... 2 Cloud Providers... 3 Cloud Components...
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
PART D NETWORK SERVICES
CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security
Cyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority
Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA
Emerging Network Security Threats and what they mean for internal auditors December 11, 2013 John Gagne, CISSP, CISA 0 Objectives Emerging Risks Distributed Denial of Service (DDoS) Attacks Social Engineering
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Opportunities Availed by Increased Bandwidth Capacity in Africa. James Wekesa Chief Commercial Officer
Opportunities Availed by Increased Bandwidth Capacity in Africa 1 James Wekesa Chief Commercial Officer Presentation Agenda Broadband in Africa.Now Broadband Access Enablers The Power of Broadband, from
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
On and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information
SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
A Cyber Security Integrator s perspective and approach
A Cyber Security Integrator s perspective and approach Presentation to Saudi Arabian Monetary Agency March 2014 What is a Cyber Integrator? Security system requirements - Finance Building a specific response
Open Source Incident Management Tool for CSIRTs
An Agency Under MOSTI Open Source Incident Management Tool for CSIRTs Adli Wahid Head, Malaysia CERT (MyCERT) CyberSecurity Malaysia Copyright 2008 CyberSecurity Malaysia Agenda About MyCERT Where do incidents
Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc
Tunisia s experience in building an ISAC Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc 1 Agenda Introduction ISAC objectives and benefits Tunisian approach SAHER system
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
UCS Level 2 Report Issued to
UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs [email protected] Welcome to the UCS report which stands for Unified Certification
Report on Cyber Security Alerts Processed by CERT-RO in 2014
Section III - Cyber-Attacks Evolution and Cybercrime Trends Report on Cyber Security Alerts Processed by CERT-RO in 2014 Romanian National Computer Security Incident Response Team [email protected] The
Keyfort Cloud Services (KCS)
Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Thales Service Definition for NOC Services for Cloud
Thales Service Definition for UK NOC Services Thales Service Definition for NOC Services for Cloud April 2014 Page 1 of 13 Thales Service Definition for UK NOC Services CONTENT Page No. Introduction...
Service Level Agreement
Service Level Agreement Addendum Dedicated Server Managed Server Service Versie 1.0 6/08/2012 Telenet N.V.-S.A., Liersesteenweg 4, 2800 Mechelen, Belgium l BTW-TVA BE0473.416.418 RPR-RPM Mechelen l IBAN
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what
