Build yourself a risk assessment tool
|
|
|
- Madlyn McDaniel
- 9 years ago
- Views:
Transcription
1 1 Build yourself a risk assessment tool The plan: 25 min theory 20 min practice 5 min questions Vlado Luknar CISSP, CISM, CISA, CSSLP, BSI ISO Lead Implementer di-sec.com
2 Do you need your own tool? short answer - maybe not - if you re happy with what existing methodologies & tools offer long answer - maybe you do - if you re left alone with it and don t know where to start and feel like you might want to have more freedom disadvantages of ready-made tools (many) single user, single assessment case, not integrated those sophisticated ones, based on web, for multiple users may be expensive, suited for full-time experts (OCTAVE, Proteus) those coded in java or using desktop db runtimes - very much static you might depend on provider for any design and maybe also content changes 2
3 Advantage of own, custom-made tool you have the full control over the functionality and the content you can truly shape the tool around your own needs it can become more than just a risk tool: it can be part of an overall ISMS combining all internal knowledge about status of information security in your company if created with accessible technologies (HTML, CSS, javascript, PHP) - chances are you will not get stuck with it - never obsolete since everything is under your nose 3
4 What this presentation is not about breakthrough in information security risk assessment (RA) it is not about rightfulness of any methodology there are tons of scientific papers to read unfortunately, what one can do with them is quite limited although research is very interesting it is of little help when doing RA in a real company, e.g. if you cannot agree who is responsible for an asset... or, who has to approve the access.. the real everyday security struggle is rather different from books it takes place in your own, specific company - with different set of conditions, limitations and skill-sets 4
5 What this presentation is about there is no problem with understanding methodologies, yet it is really not that easy to start with any of them there is no single best approach to RA for everyone for RA to be practical we need to simplify things as much as we can the pragmatic approach is the one which is good-enough, meaning quick - can be performed by non-ra specialists focuses only on what really makes-or-breaks the security in a given case repeatable, reproducible and stable over time 5
6 The journey or the results? exaggerating a little we could say the real purpose of the RA is not the result but the journey itself the journey during which we learn what didn t know: about our environment (people, process, technology) that instead of relying on few key assumptions, like people are following standards and procedures, or vendors are patching our systems sometimes it is worth investigating deeper by repeating the process, performing RA consistently we learn which security measures make sense which to embed into ISMS and which keep out for specific cases 6
7 Setting the ground a risk assessment can be performed at several levels of details business (high) - to map business or organizational risks process (medium) - compliance with best practices or international standards for info security management technical (low) - aiming at threat modeling (such as STRIDE) some opinion-making methodologies (NIST SP ) assume that the technical level deals both process and technical risks (selecting technical controls, setting actions) when we need to stick to known compliance frameworks, such as ISO/IEC 27001, COBIT, PCI DSS or SOX most likely we end up working with people, process and technical risks 7
8 List of best known tools For those still looking for the ultimate tool COBRA, CORAS, CRAMM, EBIOS, FAIR, FRAP, GSTool, MEHARI, CORA, ISACA COBIT 5, ISRAM, ISF IRAM, MAGERIT-PILAR, OCTAVE, Proteus Enterprise, RiskSafe, RiskWatch, Verinice In 2014 Gartner compared the following methodologies/tools: FAIR, ISACA COBIT 5, ISF IRAM, ISO/IEC 31000:2009, MAGERIT, NIST SP , OCTAVE Allegro, and RiskSafe by Platinum Squared Technologies (which is a SaaS-based approach) Gartner s summary: "choose the risk assessment methods that are the best cultural fit for your organization." 8
9 Key definitions despite all that scholars know about risk it remains a vague and somewhat confusing concept. Prediction is very difficult, especially about the future. Niels Bohr The idea that the future is unpredictable is undermined every day by the ease with which the past is explained. Daniel Kahneman most of our past experience (incidents, checks, audits) demonstrates that even the simplest assumptions in RA can be wrong the expected (routine) controls and measures are ineffective or inefficient a RA is about best collective judgment "Managing information security risk, like risk management in general, is not an exact science. It brings together the best collective judgments of individuals and groups within organization." (NIST SP ) 9
10 What we need to build our tool approach - we might follow a known methodology ISO is considered a top-down, technology-neutral most people know it, we can compare and benchmark against others completely own risk methodology - should have a reason minimal functionality catalogue of assets catalogue of threats vulnerabilities linked to threats controls linked to vulnerabilities nice-to-have features list of risks with linked RTPs live repository of security references (policies, procedures) incidents and audits stats reporting, charts, exports 10
11 Sources of information on TVCs 1/3 Books Information Security Risk Assessment Toolkit, Practical Assessments through Data Collection and Data Analysis M.R.M.Talabis, J.L.Martin, 2013 Elsevier Source of assets your own (automated) inventory system business architecture systems (such as ARIS-BP) Source of threats OSA compared threat catalogues in 2008 ( BITS Kalculator (600 Ts), ISF IRAM (39 Ts), NIST SP BSI (Bundesamt für Sicherheit in der Informationstechnik) (370 Ts), ISO (43 Ts) simplicable.com - The Big List of Information Security Threats, John Spacey, Simplicable, December 08,
12 Sources of information on TVCs 2/3 Source of vulnerabilities some good generic examples which can be adapted or expanded from are ISO Information Security Forum (ISF IRAM tool) NIST SP other (internal) sources vulnerability assessments, penetration testing, audit reports, security incidents maybe one can get inspired also by technical vulnerabilities as maintained via CVE (MITRE, DHS U.S.) +bypass&search_type=all&cves=on 12
13 Sources of information on TVCs 2/3 Source of controls ISO (114 Cs), BITS (219 Cs) NIST SP r4 (163 Cs) catalog of security and privacy controls to protect organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations NIST say the controls are intentionally technology-neutral and policyneutral OSA - OWASP (web) application controls (11 subcategories, 45 controls) OWASP ISO/IEC Application Security Controls Project (only starting) 13
14 Which open-source to use? any one that is really open source code made available with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose allowing to see how things are done from inside and not limiting what you can do with your own data supports scripting, public repositories and rapid deployment has a huge installed base (with forums, groups) mastering it does not require a MIT degree two of many possible directions for a home-made risk tool - a wiki variant (twiki, dokuwiki, mediawiki, tiddlywiki) - CMS system (Drupal, Joomla, Alfresco, ocportal, tiki) 14
15 Why tiddlywiki? "the simplest online database that could possibly work" Ward Cunningham (on wiki concept) free, low footprint and easy operability user needs only a web browser and a username (to sign posts or to login where needed) dynamics of data from the user side: end-user himself creates logical relationships between pieces of data the way he/she wants it all done from within a web browser no need to work with database schemas, entities, relationships records can contain other records or even scripts 15
16 About the live demo of the tool one important question is how much automated calculation do we want in the tool? even the most sophisticated formulas do not make risk calculation better because the key is knowledge of context, make-or-break points, history: incidents, findings, and actual status of controls my experience (e.g. with IRAM tool by ISF, done in Excel) if everything is auto calculated w/o possibility of a (collective) human verdict people tend to "play" with the tool until the issues disappear the live demo is an experimental version of the tool, a mix of (mostly) real and (some) random data 16
17 The engine behind 17
18 RISSCON - printscreens 1/3 18
19 RISSCON - printscreens 2/3 19
20 RISSCON - printscreens 3/3 20
21 GSTool (Bundesamt für Sicherheit in der Informationstechnik, Ger) 21
22 Magerit-Pilar (National Intelligence Centre, Spain) 22
23 NIST SP
Auditing Data Access Without Bringing Your Database To Its Knees
Auditing Data Access Without Bringing Your Database To Its Knees Black Hat USA 2006 August 1-3 Kimber Spradlin, CISA, CISSP, CPA Sr. Manager Security Solutions Dale Brocklehurst Sr. Sales Consultant Agenda
The Importance of Defining and Documenting Information Security Roles and Responsibilities By Charles Cresson Wood, CISSP, CISA, CISM
The Importance of Defining and Documenting Information Security Roles and Responsibilities By Charles Cresson Wood, CISSP, CISA, CISM Many organization's information security efforts are characterized
COMPARISON OF TOOLS FOR INFORMATION SECURITY MANAGEMENT SYSTEM
COMPARISON OF TOOLS FOR INFORMATION SECURITY MANAGEMENT SYSTEM Štefan Antolík Abstract: The article deals with the analysis of risks in information security management system, briefly describes the current
IT Governance: The benefits of an Information Security Management System
IT Governance: The benefits of an Information Security Management System Katerina Cai, CISSP Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to
IT Audit in the Cloud
IT Audit in the Cloud Pavlina Ivanova, CISM ISACA-Sofia Chapter Content: o 1. Introduction o 2. Cloud Computing o 3. IT Audit in the Cloud o 4. Residual Risks o Used Resources o Questions 1. ISACA Trust
Managing Web & Application Security with OWASP bringing it all together. Tobias Gondrom (OWASP Project Leader)
Managing Web & Application Security with OWASP bringing it all together Tobias Gondrom (OWASP Project Leader) OWASP World OWASP is a worldwide free and open community focused on improving the security
Risk Management: Implementation principles and Inventories for Risk Management/Risk Assessment methods and tools
Risk Management: Implementation principles and Inventories for Risk Management/Risk Assessment methods and tools (Parts of this report constitute the deliverable defined in the ENISA Work Programme 2006
SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR
SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR Michael de Crespigny, CEO Information Security Forum Session ID: GRC R02B Session Classification: General Interest KEY ISSUE Our
Maintaining PCI-DSS compliance. Daniele Bertolotti [email protected] Antonio Ricci [email protected]
Maintaining PCI-DSS compliance Daniele Bertolotti [email protected] Antonio Ricci [email protected] Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance
Cybernetic Global Intelligence. Service Information Package
Cybernetic Global Intelligence Service Information Package / 2015 Content Who we are Our mission Message from the CEO Our services 01 02 02 03 Managed Security Services Penetration Testing Security Audit
PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1
PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman
Choosing a Content Management System (CMS)
Choosing a Content Management System (CMS) Document Version Revision History Date Document Version Description Created By: 10/Oct/2013 First draft Laraib Saad Table of Contents 1. Introduction
Building Security In:
#CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me
Leveraging Expertise: What Every Project Manager Really Needs to Know about Risk Management
Leveraging Expertise: What Every Project Manager Really Needs to Know about Risk Management Laszlo A. Retfalvi P.Eng. PMP PMI-RMP Principal 25 November 2014 1 Proprietary Notice This presentation contains
Information Security Risk Management
Information Security Risk Management June 11, 2013 Patrick Perreault Daniel Gaudreau Agenda Current State of Affairs Why Information Security? The Role of Risk Management Information Security Threats,
IBM Rational AppScan: enhancing Web application security and regulatory compliance.
Strategic protection for Web applications To support your business objectives IBM Rational AppScan: enhancing Web application security and regulatory compliance. Are untested Web applications putting your
Cybersecurity@RTD Program Overview and 2015 Outlook
Cybersecurity@RTD Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD Information Technology Department of Finance & Administration
PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution
PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution 1. The Challenge Large enterprises are experiencing an ever increasing burden of regulation and legislation against which they
Tobias Gondrom (OWASP Global Board Member)
Tobias Gondrom (OWASP Global Board Member) OWASP World OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
Fall June S o f t w a r e I m p r o v e m e n t G r o u p ( S I G )
June 2014 4 A lightweight, flexible evaluation framework to measure the ISO 27002 information security controls Karin Huijben Master Computing Science Radboud University, Nijmegen, The Netherlands Software
Mobile web apps: The best option for business? A whitepaper from mrc
Mobile web apps: The best option for business? A whitepaper from mrc Introduction Mobile apps have finally reached the point where businesses can no longer afford to ignore them. Recent surveys and studies
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers
White Paper Guide to PCI Application Security Compliance for Merchants and Service Providers Contents Overview... 3 I. The PCI DSS Requirements... 3 II. Compliance and Validation Requirements... 4 III.
BUILD YOUR CYBERSECURITY SKILLS WITH NRB
BUILD YOUR CYBERSECURITY SKILLS WITH NRB BECOME A PECB CERTIFIED ISO 27001 AUDITOR OR INSTRUCTOR NRB established a partnership with the Professional Evaluation and Certification Board (PECB) to enrich
A Structured Comparison of Security Standards
A Structured Comparison of Security Standards Kristian Beckers 1, Isabelle Côté 3, Stefan Fenz 2, Denis Hatebur 1,3, and Maritta Heisel 1 1 paluno - The Ruhr Institute for Software Technology - University
alchemy webapp framework Introduction What is alchemy?
Cut to the Chase Series More Walk Less Talk alchemy webapp framework Introduction What is alchemy? Copyright 2010 by Eric Matthews. This document is licensed under Creative Commons 3.0 alchemy webapp framework
Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32
Security, Compliance & Risk Management for Cloud Relationships Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Introductions & Poll Organization is leveraging the Cloud? Organization
SAVMDS: A Software Application Vulnerability Management Dashboard System
, July 2-4, 2014, London, U.K. SAVMDS: A Software Application Vulnerability Management Dashboard System Mauranda Elliott, Huiming Yu, Xiaohong Yuan and Justin Zhan Abstract-A vulnerability management tool,
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise 1. Introduction Information security means protecting information
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
Information Security @ Blue Valley Schools FEBRUARY 2015
Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
CYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
Security Risk Management Strategy in a Mobile and Consumerised World
Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key
The new OWASP standard for the Web Application Penetration Testing
Application Security: internet, mobile ed oltre The new OWASP standard for the Web Application Penetration Testing Matteo Meucci Venezia, 3 October 2014 1 Application Security: internet, mobile ed oltre
Current Established Risk Assessment Methodologies and Tools
MASTER THESIS Current Established Risk Assessment Methodologies and Tools Dan Ionita Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS) Department of Computer Science - Information
Ed McMurray, CISA, CISSP, CTGA CoNetrix
Ed McMurray, CISA, CISSP, CTGA CoNetrix AGENDA Introduction Cybersecurity Recent News Regulatory Statements NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Questions Information Security Stats
The Influence of Software Vulnerabilities on Business Risks 1
The Influence of Software Vulnerabilities on Business Risks 1 Four sources of risk relevant for evaluating the influence of software vulnerabilities on business risks Authors Hilbrand Kramer, MSc (Royal
COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30
COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30 Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP [email protected]
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
CLASSIFICATION SPECIFICATION FORM
www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information
Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013
Enterprise Security Architecture for Cyber Security M.M.Veeraragaloo 5 th September 2013 Outline Cyber Security Overview TOGAF and Sherwood Applied Business Security Architecture (SABSA) o o Overview of
NIST National Institute of Standards and Technology
NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are
Performing Effective Risk Assessments Dos and Don ts
Performing Effective Risk Assessments Dos and Don ts % Gary Braglia Security Specialist GreyCastle Security TCTC March 18, 2013 Introduction Who am I? Why Risk Management? Because you have to Because
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza
Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank
Managing SSL Certificates with Ease
WHITE PAPER: MANAGING SSL CERTIFICATES WITH EASE White Paper Managing SSL Certificates with Ease Best Practices for Maintaining the Security of Sensitive Enterprise Transactions Managing SSL Certificates
Compliance & information security A (bit of a) rant. Jodie Siganto
Compliance & information security A (bit of a) rant Jodie Siganto Compliance Definition of compliance : the act of conforming, acquiescing, or yielding. conformity; accordance: in compliance with orders.
Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
Application Backdoor Assessment. Complete securing of your applications
Application Backdoor Assessment Complete securing of your applications Company brief BMS Consulting is established as IT system integrator since 1997 Leading positons in Eastern Europe country Product
EXIN Information Security Management Advanced
Preparation Guide EXIN Information Security Management Advanced based on ISO/IEC 27002 Edition 201601 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced,
InfoSec Academy Application & Secure Code Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
The 2011 Standard of Good Practice for Information Security. June 2011
The 2011 Standard of Good Practice for Information Security June 2011 Published by Information Security Forum Limited Tel: +44 (0)20 7213 1745 Fax: +44 (0)20 7213 4813 Email: [email protected] Web:
COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.
COBIT 5 for Risk CS 3-7: Monday, July 6 4:00-5:00 Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP [email protected] Disclaimer of Use and Association Note: It is understood that
Inventory of risk assessment and risk management methods
ENISA ad hoc working group on risk assessment and risk management Inventory of risk assessment and risk management methods Deliverable 1 Final version Version 1.0 30/03/2006 Content Preamble...4 1. Executive
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
Customer-Facing Information Security Policy
Customer-Facing Information Security Policy Global Security Office (GSO) Version 2.6 Last Updated: 03/23/2015 Symantec Corporation Table of Contents Compliance Framework... 1 High-Level Information Security
Benchmark of controls over IT activities. 2011 Report. ABC Ltd
www.pwc.com/cy Benchmark of controls over IT activities 2011 Report ABC Ltd... 2012 Scope and approach We wish to provide you with our IT Benchmarking report over IT activities at ABC Ltd (the Company)
KEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
FDCC & SCAP Content Challenges. Kent Landfield Director, Risk and Compliance Security Research McAfee Labs
FDCC & SCAP Content Challenges Kent Landfield Director, Risk and Compliance Security Research McAfee Labs Where we have been 1 st Security Automation Workshop nearly 20 people in a small room for the day
Achieving Governance, Risk and Compliance Requirements with HISP Certification Course
Achieving Governance, Risk and Compliance Requirements with HISP Certification Course in corporation with A unique information security and regulatory compliance certification course that provides IT security
Risk Assessment and Security Testing Johannes Viehmann 2015 of Large Scale Networked Systems with RACOMAT
Risk Assessment and Security Testing Johannes Viehmann 2015 of Large Scale Networked Systems with RACOMAT Overview Risk Assessment and Security Testing of Large Scale Networked Systems with RACOMAT Table
White Paper. IT Security in Higher Education
White Paper IT Security in Higher Education 3BIntroduction: The Growing Need for Improved IT Security on Campuses IT security is a hot topic these days, especially at colleges and universities. An April
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals November 13, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer
How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant
How Security Testing can ensure Your Mobile Application Security Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant Once More Consulting & Advisory Services IT Governance IT Strategic
Key Speculations & Problems faced by Cloud service user s in Today s time. Wipro Recommendation: GRC Framework for Cloud Computing
Contents Introduction Why GRC Assessment Benefits of Cloud computing and Problem Statement Key Speculations & Problems faced by Cloud service user s in Today s time Threats, Vulnerabilities and related
Web Application Security
Web Application Security Ng Wee Kai Senior Security Consultant PulseSecure Pte Ltd About PulseSecure IT Security Consulting Company Part of Consortium in IDA (T) 606 Term Tender Cover most of the IT Security
Native mobile apps: The wrong choice for business?
Native mobile apps: The wrong choice for business? Why businesses should think twice before building native mobile applications A white paper from Introduction Native mobile applications are popular with
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
SQuAD: Application Security Testing
SQuAD: Application Security Testing Terry Morreale Ben Whaley June 8, 2010 Why talk about security? There has been exponential growth of networked digital systems in the past 15 years The great things
Director, IT Security District Office Kern Community College District JOB DESCRIPTION
Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,
Welcome to Modulo Risk Manager Next Generation. Solutions for GRC
Welcome to Modulo Risk Manager Next Generation Solutions for GRC THE COMPLETE SOLUTION FOR GRC MANAGEMENT GRC MANAGEMENT AUTOMATION EASILY IDENTIFY AND ADDRESS RISK AND COMPLIANCE GAPS INTEGRATED GRC SOLUTIONS
White Paper. Understanding NIST 800 37 FISMA Requirements
White Paper Understanding NIST 800 37 FISMA Requirements Contents Overview... 3 I. The Role of NIST in FISMA Compliance... 3 II. NIST Risk Management Framework for FISMA... 4 III. Application Security
Domain 5 Information Security Governance and Risk Management
Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association
ISO 27000 Information Security Management Systems Foundation
ISO 27000 Information Security Management Systems Foundation Professional Certifications Sample Questions Sample Questions 1. is one of the industry standards/best practices in Service Management and Quality
CSF Support for HIPAA and NIST Implementation and Compliance
CSF Support for HIPAA and NIST Implementation and Compliance Presented By Bryan S. Cline, Ph.D. Presented For HITRUST Why does HITRUST exist? Multitude of challenges Significant government oversight Evolving
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Professional Services Overview
Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded
Project Management Software Buyer s Guide: What You Need To Know Before Evaluating
Project Management Software Buyer s Guide: What You Need To Know Before Evaluating EnterPlicity Project Management Software Buyer s Guide 2 Copyright holder is licensing this under the Creative Commons
Are You Prepared to Successfully Pass a PCI-DSS and/or a FISMA Certification Assessment? Fiona Pattinson, SHARE: Seattle 2010
Are You Prepared to Successfully Pass a PCI-DSS and/or a FISMA Certification Assessment? Fiona Pattinson, SHARE: Seattle 2010 atsec information security, 2010 About This Presentation About PCI assessment
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA
EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA Paul R. Lazarr, CISSP, CISA, CIPP, CRISK Sr. Managing Consultant, IBM Cybersecurity and Biometrics January 21, 2016 PERSONAL BACKGROUND
IMPLEMENTATION OF HIGH-PERFORMANCE SECURITY MANAGEMENT PROCESSES
IMPLEMENTATION OF HIGH-PERFORMANCE SECURITY MANAGEMENT PROCESSES OBJECTIVES This course is specifically designed to improve your skills as an information security manager. Using O-ISM3 as a framework,
Understanding the NIST Cybersecurity Framework September 30, 2014
Understanding the NIST Cybersecurity Framework September 30, 2014 Earlier this year the National Institute of Standard and Technology released the Framework for Improving Critical Infrastructure Cybersecurity
