Security Vulnerability Management. Mark J Cox
|
|
|
- Peregrine Malone
- 10 years ago
- Views:
Transcription
1 Security Vulnerability Management Mark J Cox
2 Responsibility & Accountability Unique challenges Many vendors all ship the same thing The vulnerabilities are there. The fact that somebody in the middle of the night in China who you don't know, quote, "patched" it and you don't know the quality of that, I mean, there's nothing per se that says that there should be integrity that come out of that process. Steve Ballmer October 2003 But not exactly the same thing sometimes not even close and then they backport security fixes too Press and researchers often get the facts wrong or deliberately over-sensationalize
3 Managing vulnerabilities Bugs occur across all software applications Some subset have security implications the number and type of vulnerabilities is pretty similar some code is well written and designed for security and some code isn t The role of vendors is to add accountability to the process a layer of insulation to provide a stable, secure, platform based on open source technologies Whilst the ability to react is essential, we have
4 Apache
5 Apache web server Mature project, over 10 years old Managed under the legal framework of the Apache Software Foundation Powers over half of the Internet web server edge infrastructure (around two-thirds according to Netcraft) (that s over 53 million web sites) A critical security flaw would have a significant impact on critical infrastructure at least an impact on consumer confidence
6 a loose confederation of programmers working in their spare time over gin and tonics at home -- Wall Street Journal
7 Apache quality Engineers for security You don't find buffer overflow vulnerabilities Manages over 1000 contributors Standard accountability processes Many vendors ship Apache OEM Peer review, Contribution Licenses, release teams, code signing, automated testing and regression tools Apple, HP, IBM, Red Hat, Debian... increases testing coverage by adding diversity Dedicated Security Response Team
8 Policy
9 Role of vendors An open source architecture is built around a number of applications Red Hat Enterprise Linux provides a complete open source operating environment with web servers, mail servers and client applications such as Open Office (A secure web server is more than just Apache) A single point of contact for the security issues affecting every part of that environment Accountability for fixing vulnerabilities that are found with a clear and established response process A single update mechanism for the operating system kernel and applications A single source of advisories
10 Red Hat Enterprise Linux Errata Life cycle 7 years of security errata Asynchronous updates for the highest severity issues Update releases capture lower severity issues Each package gets an individual security advisory Asynchronous updates may fix multiple Red Hat Enterprise Linux versions
11 Backporting Apache httpd Apache httpd NEW! Enterprise Linux 4 httpd ent httpd ent RHSA-2005:582 httpd ent RHSA-2005:608
12 Fedora Policy A policy of moving upstream, not backporting Might affect the days of risk a little Still need some backports for issues not fixed upstream Fedora Core 5 for vulnerabilities Jan 2003 to release (1361 CVE) Upstream 90% Upstream 90% Backport 9% 122 Backport 9% Unfixed 1% 14 Unfixed 1%
13 Severity Rating
14 Setting a severity rating Based on a technical assessment of the flaw, not the threat Unique to each Red Hat Enterprise Linux distribution Sets the priority through Engineering and QA Trend tracking (source, reported, public) Public in bugzilla whiteboard status line Used by internal and external status tools Compatible with ranking used by Microsoft and Apache
15 Severity Rating Critical A vulnerability whose exploitation could allow the propagation of an Internet worm without user action.
16 Severity Rating Important easily compromise the Confidentiality, Integrity or Availability of resources
17 Severity Rating Moderate harder or more unlikely to be exploitable
18 Severity Rating Low unlikely circumstances.. or where a successful exploit would lead to minimal consequences
19 Critical Vulnerabilities We don t get many Those that we get have the potential to create significant risk for customers We aim to respond within one working day Sometimes this is hard But we are accountable Lots of metrics on how many issues and how fast we fixed them in the next session
20 Where to find our severity ratings For advisories In the advisory, Red Hat Network notifications For individual vulnerabilities In bugzilla
21
22 How to get notifications Red Hat Network will notify you of updates needed to packages installed on your systems By By the up2date applet By logging in Subscribing to From the web RSS feed
23 Security Response Team
24 Security Response Team Accountable for vulnerabilities that affect Red Hat products and services Monitoring Triage Escalation and troubleshooting through life cycle Communication with other affected vendors Internal communication, documentation, advisory Responsible for errata release Metrics and feedback to Engineering
25 Monitoring for vulnerabilities We find out about security issues in a number of ways (%, March 05-March 06) other peer FLOSS distributors via vendor-sec relationship with upstream package developers monitoring of public mailing lists relationship with Mitre CVE project Red Hat internal an individual (issuetracker, bugzilla, secalert) other OSS distributors via their bugzilla external security research company (idefense...) vulnerability clearing centers (CERT, NISCC...)
26 Address used for internal and external customers to ask security vulnerability related questions Reporting new vulnerabilities Asking how we addressed various vulnerabilities Charter to respond within 3 business days For fiscal year 2006 (ending March 2006) 92% responded within one business day 99% by two business days
27 Triage Separate out those issues that matter the most Used to prioritize Engineering, QA, documentation... Figure out what we ship that is affected Across all product lines, across all supported products and architectures (and including Fedora). Investigate if any of our security innovations help mitigate Issues then have individual bugs generated in bugzilla for tracking ~18 incoming vulnerabilities per month
28 Release Policy For critical vulnerabilities Will be pushed immediately an embargo is lifted, or when passed QE Will be pushed at any time or day For important vulnerabilities May be held until reasonable time or day For moderate or low vulnerabilities May be held until other issues come up in the same package, or the next Update release
29 Outreach Help Open Source projects deal with vulnerabilities Promote the use of intermediates like NISCC Involvement in industry threat assessment bodies Improve quality of projects Working with groups on testing and auditing tools Protocol testing, prioritizing for critical infrastructure Red Hat worked with NISCC and Codenomicon in testing and fixing OpenSSL To work with our competitors for common good
30 Misleading messaging Year-to-date for 2005, Microsoft has fixed 15 vulnerabilities affecting Windows Server In the same time period, for just this year, [Red Hat] Enterprise Linux 3 users have had to patch over 34 vulnerabilities and SuSE Enterprise Linux 9 users have had to patch over 78 vulnerabilities -- Mike Nash, Microsoft, Feb However, using the Microsoft severity scale: Windows Server 2003 had three critical vulnerabilities In Red Hat Enterprise Linux 3 full install had zero critical vulnerabilities And this only counts their vulnerabilities that actually got disclosed
31 CVE and OVAL
32 Review: Backporting Apache httpd Apache httpd NEW! CVE CVE CVE CVE Enterprise Linux 4 httpd ent httpd ent RHSA-2005:582 httpd ent RHSA-2005:608
33
34
35 Auditing Red Hat Network takes care of figuring out what updates you need But sometimes you need to use third party tools Local version number comparisons don't work httpd vs httpd Remote version comparisons are worse Screen-scraping our advisories isn't a complete solution
36 A machine-readable, standard way to express how to detect vulnerabilities and patch issues Definitions contain details of how to test for the presence of vulnerable software can also look for vulnerable uses or configuration XML based standard Modular Designed to deal with heterogeneous environments Interoperability testing of tools and processes
37 OVAL Compatibility From today Red Hat is producing OVAL 5 definitions for all Red Hat Enterprise Linux 3 and 4 security advisories includes definitions for all security advisories to date uses latest (OVAL 5, June ) schema available on the same day as the advisory (hours) Working with MITRE on official compatibility
38 OVAL example
39 More information This is just the reactive side. For proactive How well did we do? See the papers from Ulrich Drepper and Dan Walsh from this summit and on the web Metrics on our performance, exploits, where the critical flaws were, compromises, and worms in my next presentation in 15 minutes.
JBoss security: penetration, protection and patching. David Jorm [email protected]
JBoss security: penetration, protection and patching David Jorm [email protected] Contents The problem Background Historical vulnerabilities JBoss worm Security response for products The solution The Problem
Intro to Patching. Thomas Cameron, Chief Architect, Western US, Red Hat [email protected] twitter: thomasdcameron IRC: choirboy on Freenode
Intro to Patching Thomas Cameron, Chief Architect, Western US, Red Hat [email protected] twitter: thomasdcameron IRC: choirboy on Freenode RHCA, RHCSS, RHCDS, RHCVA, RHCX Agenda 2 Who am I? Who are you?
Red Hat. www.redhat.com. By Karl Wirth
Red Hat Enterprise Linux 5 Security By Karl Wirth Abstract Red Hat Enterprise Linux has been designed by, and for, the most security-conscious organizations in the world. Accordingly, security has always
Open Source Software Project Management A Case Study Red Hat Enterprise Linux. Bob Johnson, Red Hat
Open Source Software Project Management A Case Study Red Hat Enterprise Linux Bob Johnson, Red Hat Goals for this talk Red Hat Enterprise Development Model From the community perspective Red Hat Process
APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING
APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING Katie Moussouris Senior Security Strategist Microsoft Security Response Center http://twitter.com/k8em0 (that s a zero) Session ID: ASEC-T18
Achieving PCI Compliance: How Red Hat Can Help. Akash Chandrashekar, RHCE. Red Hat Daniel Kinon, RHCE. Choice Hotels Intl.
Achieving PCI Compliance: How Red Hat Can Help Akash Chandrashekar, RHCE. Red Hat Daniel Kinon, RHCE. Choice Hotels Intl. Agenda Understanding Compliance Security Features within Red Hat Backporting Choice
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks
TECHNICAL NOTE 08/04 IINTRODUCTION TO VULNERABILITY ASSESSMENT TOOLS
TECHNICAL NOTE 08/04 IINTRODUCTION TO VULNERABILITY ASSESSMENT TOOLS 1 OCTOBER 2004 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor
How To Use A Policy Auditor 6.2.2 (Macafee) To Check For Security Issues
Vendor Provided Validation Details - McAfee Policy Auditor 6.2 The following text was provided by the vendor during testing to describe how the product implements the specific capabilities. Statement of
Status Update. Jon Baker September 28, 2010
Status Update Jon Baker September 28, 2010 HS SEDI is a trademark of the U.S. Department of Homeland Security (DHS). OVAL Overview An international, information security, community standard to promote
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES
REQUIREMENT 6.1 TO 6.2 SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES 6.1 TO 6.2 OVERVIEW In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, [company
Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member
PCI Vulnerability Validation Report
Friday, March 9, 013 PCI Vulnerability Validation Report Introduction This report shows the results of a vulnerability validation tests conducted by CORE Impact Professional Professional in support of
The Security Development Lifecycle
The Security Development Lifecycle Steven B. Lipner Director of Security Engineering Strategy Security Business and Technology Unit Microsoft Corporation Context and History 1960s penetrate and patch 1970s
BMC Client Management - SCAP Implementation Statement. Version 12.0
BMC Client Management - SCAP Implementation Statement Version 12.0 BMC Client Management - SCAP Implementation Statement TOC 3 Contents SCAP Implementation Statement... 4 4 BMC Client Management - SCAP
SUSE + IBM: The perfect combination for your Linux environment
SUSE + IBM: The perfect combination for your Linux environment Candy McClean and Hector Luna, IBM Linux Business Development Execs 2013 SUSECon 1 Agenda Business Challenges faced by Clients IBM Technical
Vulnerabilities from the outside. Common Vulnerabilities and Exposures (CVEs) Building Security In with BSIMM
Outline Introduction Secure Programming Lecture 2: Landscape David Aspinall, Informatics @ Edinburgh 16th January 2014 Vulnerabilities from the outside Common Vulnerabilities and Exposures (CVEs) Building
Common Platform Enumeration (CPE) Technical Use Case Analysis
Common Platform Enumeration (CPE) Technical Use Case Analysis The MITRE Corporation November, 2008 Executive Summary A common theme taken from discussions at the Common Platform Enumeration (CPE) Developer
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Red Hat The Importance of the ISV Partner Ecosystem
Red Hat The Importance of the ISV Partner Ecosystem Vito Asta, Senior ISV Business Development Manager, SW-Europe + MEA [email protected] Roma, 6th October 2011 1 Agenda Red Hat: The Company The Production
ARE YOU RUNING LINUX RIGHT?
ARE YOU RUNING LINUX RIGHT? Linux is widely deployed today in the modern datacenter. However, in the face of modern security threats, are you running it right? INTRODUCTION Enterprise Linux has become
Integrigy Corporate Overview
mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
Managing Application Performance with JBoss Operations Network and OC Systems RTI
Managing Application Performance with JBoss Operations Network and OC Systems RTI Joe Fernandes - Sr. Product Marketing Manager, Red Hat Steve Sturtevant - Product Manager, OC Systems March 21, 2012 Agenda
Role Comparison Security Report Database Server Role
Role Comparison Security Report Database Server Role Herbert H. Thompson, Ph.D. Fabien Casteran, M.Sc. June 2005 1990 W. New Haven Ave., Melbourne, FL 32904 Tel: (321) 308-0557 Fax (321) 308-0552 [email protected]
PHP in RPM distribution
PHP in RPM distribution Why things get better Presented by Remi Collet Senior Software Engineer, Red Hat Inc. License Licensed under Creative Commons Attribution Share Alike CC-BY-SA Today's Topics 1.
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005 13 DECEMBER 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
MCAFEE FOUNDSTONE FSL UPDATE
MCAFEE FOUNDSTONE FSL UPDATE 2014-JUL-16 To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and
Closing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
OPEN CLOUD INFRASTRUCTURE BUILT FOR THE ENTERPRISE
RED HAT ENTERPRISE LINUX OPENSTACK PLATFORM OPEN CLOUD INFRASTRUCTURE BUILT FOR THE ENTERPRISE Arthur Enright Principal Product Manager Virtulization Business Unit I.T. CHALLENGES WORKLOADS ARE EVOLVING
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Complete Patch Management
Complete Management Targeted, Reliable and Cost-efficient In- Depth CSI Corporate Software Inspector Empower your IT-Operations and Security Teams with the most reliable Vulnerability & Management solution
6. Exercise: Writing Security Advisories
CERT Exercises Toolset 49 49 6. Exercise: Writing Security Advisories Main Objective Targeted Audience Total Duration Time Schedule Frequency The objective of the exercise is to provide a practical overview
How To Manage A Patch Management Program
Patch Management Best Practices What is Patch Management? Patch management is the practice of reviewing, understanding, testing, deploying and reconciling the deployment state for software product updates.
Five ways to simplify the vulnerability management lifecycle. Scott Sidel, CISSP, CEH, ETC May 2005
Five ways to simplify the vulnerability management lifecycle Scott Sidel, CISSP, CEH, ETC May 2005 Why do we patch? No system is perfect. Vulnerabilities ship out-of-the-box Threats on the wire Even while
Red Hat Enterprise Linux open-source software services and support. Support solutions for an agile Linux industry-standard server environment
Red Hat Enterprise Linux open-source software services and support Support solutions for an agile Linux industry-standard server environment Linux is on the move. Linux has emerged as a powerful, flexible
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Linux Distributions. What they are, how they work, which one to choose. [email protected]> +55-11-2132-2327. Avi Alkalay <[email protected].
Linux Distributions What they are, how they work, which one to choose Avi Alkalay +55-11-2132-2327 Linux, Open Standards Consultant IBM Corporation Before You Start...
CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY
CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY Akash Chandrashekar - Solution Architect, Red Hat Renaud Deraison - Tenable Network Security, Inc. / Nessus.org Compliance Issues
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
Introduction to OVAL: A new language to determine the presence of software vulnerabilities
Introduction to OVAL: A new language to determine the presence of software vulnerabilities Matthew Wojcik / Tiffany Bergeron / Robert Roberge November 2003 The MITRE Corporation Table of Contents Introduction
The Red Hat Enterprise Linux advantages over Oracle Linux
The Red Hat Enterprise Linux advantages over Oracle Linux 1 RED HAT CONTINUES TO LEAD THE LINUX MARKET WORLDWIDE LINUX SERVER OPERATING ENVIRONMENT NEW LICENSE PAID SHIPMENTS/SUBSCRIPTIONS AND NONPAID
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION
VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION copyright 2003 securitymetrics Security Vulnerabilities of Computers & Servers Security Risks Change Daily New
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
GSAW 2015 Session 11B: Frameworks in Action A Foundation for Service Based Architectures
National Aeronautics and Space Administration GSAW 2015 Session 11B: Frameworks in Action A Foundation for Service Based Architectures s Open Architecture Framework March 4, 2015 Los Angeles, California
Making software from the open source community ready for the enterprise
JBoss Enterprise Middleware Making software from the open source community ready for the enterprise 2 Executive summary 2 JBoss Community projects 3 JBoss Enterprise Middleware Recommended for production
D6.1: Service management tools implementation and maturity baseline assessment framework
D6.1: Service management tools implementation and maturity baseline assessment framework Deliverable Document ID Status Version Author(s) Due FedSM- D6.1 Final 1.1 Tomasz Szepieniec, All M10 (31 June 2013)
Complete Patch Management
Complete Patch Management Targeted, Reliable and Cost-efficient Brief Secunia CSI Corporate Software Inspector Empower your organisation to take control of the vulnerability threat & optimize your ITsecurity
Secunia Vulnerability Intelligence Manager
TECHNOLOGY AUDIT Secunia Vulnerability Intelligence Manager Secunia Reference Code: OI00070-076 Publication Date: July 2011 Author: Andy Kellett SUMMARY Catalyst Secunia Vulnerability Intelligence Manager
PCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
flex support Service Overview
NTS Technology Partners introduce NTS FLEX a unique portfolio of Managed Services, Cloud and Support solutions for any business size. flex support Service Overview Version 1.1 For Further Information see
Specific recommendations
Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It
Systems Programmer/Analyst (12203) (31002632)
GENERAL DESCRIPTION OF WORK Positions in this banded class perform specialized work in supporting information technology equipment and systems for the business, research, and instructional functions of
Issues update to SUSE Linux Enterprise Distribution (SLES) with regards to OFS
Issues update to SUSE Linux Enterprise Distribution (SLES) with regards to OFS #OFADevWorkshop John Jolly SUSE Linux Kernel Engineer [email protected] Agenda Explain SUSE and Our Enterprise Product Describe
Security Information Management (SIM)
1. A few general security slides 2. What is a SIM and why is it needed 3. What are the features and functions of a SIM 4. SIM evaluation criteria 5. First Q&A 6. SIM Case Studies 7. Final Q&A Brian T.
Complete Patch Management
Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia
Building and Managing a Standard Operating Environment
Building and Managing a Standard Operating Environment Dirk Herrmann Head of Strategic Consulting Central Europe, Red Hat Todd Warner Satellite Product Manager, Red Hat Milan Zázrivec Satellite Software
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
Oracle Linux Strategy and Roadmap
Oracle Linux Strategy and Roadmap Michele Resta, Director Alliances, Oracle 1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from
Information and Communication Technology. Patch Management Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
FDCC & SCAP Content Challenges. Kent Landfield Director, Risk and Compliance Security Research McAfee Labs
FDCC & SCAP Content Challenges Kent Landfield Director, Risk and Compliance Security Research McAfee Labs Where we have been 1 st Security Automation Workshop nearly 20 people in a small room for the day
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Taking a Proactive Approach to Linux Server Patch Management Linux server patching
Taking a Proactive Approach to Linux Server Patch Management Linux server patching In years past, Linux server patch management was often thought of in terms of we don t patch our servers unless there
Attackers are reusing attacks (because they work)
The Problem Attackers are reusing attacks (because they work) Defenders are collecting and/or sharing information, but Often a manual process (copy-paste from a PDF) Different sources provide different
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
JBoss Enterprise MIDDLEWARE
JBoss Enterprise MIDDLEWARE WHAT IS IT? JBoss Enterprise Middleware integrates and hardens the latest enterprise-ready features from JBoss community projects into supported, stable, enterprise-class middleware
Information Technology Services
Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,
QuickSpecs HP Data Protector Express 4.0 Service Pack 1
Overview HP Data Protector Express is easy to install, easy to use and easy to manage backup and recovery software designed specifically for smaller organizations. It robustly, yet simply, protects single
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS
Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS Acknowledgements Ed Barlow Technical Director EMEA Ed sends his apologies. The following presentation is based on the talk
QuickSpecs HP Data Protector Express 4.0 Service Pack 1
Overview HP Data Protector Express is easy to install, easy to use and easy to manage backup and recovery software designed specifically for smaller organizations. It robustly, yet simply, protects single
Product Documentation. Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1)
Product Documentation Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1) Contents Contents Copyright... 3 Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1)...
Network Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
Patch Management Policy
Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
Federal Desktop Core Configuration (FDCC)
Federal Desktop Core Configuration (FDCC) Presented by: Saji Ranasinghe Date: October, 2007 FDCC Federal Desktop Core Configuration (FDCC) Standardized Configuration with Hardened Security Settings to
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
