SAN ANTONIO WATER SYSTEM PURCHASING DEPARTMENT

Size: px
Start display at page:

Download "SAN ANTONIO WATER SYSTEM PURCHASING DEPARTMENT"

Transcription

1 SAN ANTONIO WATER SYSTEM PURCHASING DEPARTMENT Issued By: Angeline C. Peralez Date Issued: July 24, 2014 BID NO.: FORMAL INVITATION FOR BEST VALUE BID (BVB) FOR THE ONE TIME PURCHASE OF NETWORK SECURITY ASSESSMENT SERVICES ADDENDUM 1 Sealed bids, one (1) Original and seven (7) copies, addressed to the Purchasing Director, San Antonio Water System, 2800 US Hwy 281 North, Administration Bldg., 5 th Floor, San Antonio, TX will be received until 3:00 p.m., July 30, 2014 and then publicly opened and read aloud for furnishing materials or services as described herein below, The San Antonio Water System Purchasing Department is willing to assist any bidder(s) in the interpretation of bid provisions or explanation of how bid forms are to be completed. Assistance may be received by visiting the Purchasing Office in the SAWS Main Office, 2800 US Hwy 281 North, San Antonio, TX 78212, or by calling (210) This invitation includes the following: Invitation for Best Value Bids Terms and Conditions of Invitation for Bids Specifications and General Requirements Price Schedule The undersigned, by his/her signature, represents that he/she is authorized to bind the Bidder to fully comply with the Specifications and General Requirements for the amount(s) shown on the accompanying bid sheet(s). By signing below, Bidder has read the entire document and agreed to the terms therein. Signer s Name: Firm Name: (Please Print or Type) Address: Signature of Person Authorized to Sign Bid City, State, Zip Code: Address: Telephone No.: Fax No.: Please complete the following: Prompt Payment Discount: % days. (If no discount is offered, Net 30 will apply.) Please check the following blanks which apply to your company: Ownership of firm (51% or more): Non-minority Hispanic African-American Other Minority (specify) Female Owned Handicapped Owned Small Business (less than $1 million annual receipts or 100 employees) Indicate Status: Partnership Corporation Sole Proprietorship Other (specify) Tax Identification Number: To report suspected ethics violations impacting the San Antonio Water System, please call Page 1 of 6

2 ***** This Addendum 1 is issued to answer the following questions related to the bid sent to you on July 9, All other terms and conditions of the original bid document remain unchanged. *********************************************************************************************************** Question 1: What is the primary business driver behind your desire for an assessment? Answer: SAWS would like to discover and mitigate against any potential security vulnerabilities. This assessment will be used to help re-enforce security policies and may be used to determine what security projects are critical to sustain our business. Question 2: Are there particular questions you are trying to answer by way of having an assessment performed? Answer: SAWS is interested in learning what applications and network infrastructure could be vulnerable from an internal or external attack. This includes the corporate infrastructure as well as closed-loop SCADA network. Question 3: How many externally-facing IP addresses or targets should we expect to encounter or that you would like to include in the scope of the assessment? Are any of these hosted or managed by a third-party? Answer: Expect to see responses from around 85 external and DMZ IP address all of which are hosted and managed by SAWS. Question 4: How many servers do you operate on your internal network? Answer: Approximately 550 Question 5: Can you estimate the number of users you support internally? Answer: Approximately 2000 Question 6: Who is the intended audience for the results of the assessment? Answer: SAWS Information Systems: Network Engineering, System Admins, and Management, Internal Audit, Operations Question 7: If there are there multiple geographic sites, is there one from which the others are accessible across the network? Answer: There are multiple locations around the City of San Antonio; however they are all accessible from the HQ location. Question 8: Are there systems on the network that do not belong to you? Answer: Yes, there may be Kiosk or other network endpoints that we do not own. Question 9: How many sites will need to be visited for the wireless assessment? What are these sites like and where are they? Answer: SAWS has a variety of wireless infrastructure that we would like to be assessed. This includes Cisco wireless APs, Cambium PtMP radios, Redline PtMP radios, and Trio IP radios. Three site visits would be needed to assess all platforms. Question 10: Is your policy documentation organized around a particular framework? (e.g., NIST, COBIT, ISO, etc.) Answer: No although we use NIST and others as our reference model. Question 11: Roughly how many documents and pages constitute your information security policy compendium? Answer: Four documents, 23 pages. Question 12: For the review of the security controls and mechanisms, is your desire to have a detailed review of specific device configurations? If so, how many devices will be included in the scope and can you categorize them? Answer: Yes, we would like a detailed review of a representative sample. For example; 2 ASA firewalls, 3 Catalyst switches, 3 Cisco border routers, and so on. Page 2 of 6

3 Question 13: Is your IT department centralized? How many people are in IT? Answer: Yes, approximately 40 people in the IT department. Question 14: Is there a deadline for completing the work? Answer: By the end of Question 15: Are there business cycles or time windows we ll need to work around? Answer: Yes, any intrusive work that may be disruptive should be scheduled for a window outside of business hours. Question 16: On Activity 1 - External Vulnerability and Penetration Testing, how many live hosts are estimated to be within these ranges? Can testing be performed 24 hours a day or are there testing windows that must be adhered to? Answer: Approximately 45. Any testing that may be service disrupting should be performed after hours. Question 17: Can we print page 23, add our company information to the Remarks and affix that page to the sealed envelope to cover the RFP labeling requirements? Answer: Yes. Just please make sure that all information are included as per bid requirements and instruction. Question 18: Under, VI. Scope of Services, C. Requirements Outline, list p where in the Best Value Bid Submission Requirements outline do we include this information in our response? Some of these items pertain to the specific services, some (in particular #4, 5 and 7) appear to be additional information requested outside of the specific services. Answer: Best Value Bid Submission Requirements are listed on the bid pages These are the different sections needed to be submitted in responding on this RFP. Pages 28 onward also provides each section s requirements. Question 19: Under Attachment I, J and K at the bottom reads Please check if pricing response is included on a separate enclosed envelope. Should they all read Please check if response is included as a separate document. instead like the other non-pricing attachments? Answer: Yes. These are typographical errors. Please change it to Please check if response is included as a separate document. Question 20: On page 3 of 44, you request samples. Report formats may be provided upon release of the clients. Federal, State and local governmental analysis are under non-disclosure for security reasons. Answer: We are open to examples of work products which demonstrate an understanding of the requirements but do not provide sensitive client information. Question 21: On page 38 of 44, you state the small business must submit non audited financial reports. What safeguards are ensured by your agency that our sensitive financial information will not be subjected to the general public via Freedom of Information Act? Answer: SAWS is a public utility entity and is subject to Texas Public Information Act and Open Records. All bid documents submitted may be subject to open records when requested. Question 22: Will bank and CPA written documents / comments exhibiting financial stability without financial statement disclosure be acceptable? Answer: No. This is part of the required documents to be submitted. The requirement is part of the evaluation criteria. Question 23: The RFP indicates in Section I, under items a, b, and c (External and Internal, SCADA, and Wireless) that our proposal should include services to Review Security Architecture, Policies and Procedures, and Technical Security controls. To what level of detail would you expect us to review these areas? Are you asking for a gap assessment against industry best practices, or a more high-level review? Is this considered part of the reconnaissance for the vulnerability and penetration testing process, or an independent assessment? Should we review the architecture and Page 3 of 6

4 P&Ps in the context of the external testing, or evaluate them on their own against an external standard or industry best practices? Answer: SAWS would like a gap assessment against industry best practices. The focus should be concentrated on the specific items being tested (External, Internal, SCADA, Wireless). Question 24: What portions of this work will need to be completed at SAWS facilities? We anticipate onsite work for Wireless and also potentially for the Internal Network testing. What portions of the overall project can be done remotely (external testing?) How many sites should we plan to visit to complete this work, and where are those sites located please? Answer: SAWS has a variety of wireless infrastructure we would like to be assessed. This includes Cisco Wireless APs, Cambium PtMP radios, Redline PtMP radios, and Trio IP radios. Three site visits would be needed to assess all platforms. Additionally, any work performed to assess the SCADA and internal network would need to be performed onsite. All facilities within the scope of this project are within the greater San Antonio area. Question 25: Section IV subpoint C Requirements Outline, indicates three external network ranges to be tested (/22, /21, /23). In order to properly help scope this work, can you provide the number of live hosts within each network range? Or if the total number of live hosts is not available, can you give us a sense of how full those ranges are (10% of addresses used, 25% of addresses used?) Answer: SAWS estimates that the number of live hosts on the external network is 45. Question 26: Section IV subpoint C Requirements Outline lists 2 Misc devices for Wireless testing. Can you tell us anything more about these devices? Are they a type of switch? An endpoint device (radio base station)? Answer: SAWS would like to determine if there are elements on the network that could be compromised and cause a service disruption. Those elements could include; automatic transfer switches, UPS devices, power deliver units (PDU), and generators. Question 27: For Item 3.5, Provide follow up procedure after the assessment can you please provide more clarification? Would you like us to conduct another technical evaluation of the entire environment? Or to conduct targeted retesting of specific vulnerabilities? Should this work be scheduled after SAWS has completed remediation of the identified vulnerabilities? Approximately how long after the initial testing will SAWS require before the environment is ready for follow up procedures? Is the follow up procedure limited to technical re-testing only? Answer: SAWS would like the follow up procedure to include a detailed technical discussion of findings and suggested remediation to correct any deficiencies discovered during the assessment. Question 28: Section VI Point 4 includes Social Engineering as a testing technique. What types of SE would be acceptable? Phishing s? Phone calls to users or to SAWS service desk? Physical intrusion into office or plant facilities, to try and gain unauthorized access? Can you please provide more detail about the potential goals and methodologies that would be allowed? Do we need to pre-approve SE contexts or specific targets with SAWS project POCs before testing? Are any targets (employees, systems, processes) excluded from the SE procedures? Answer: SAWS would like to understand the security risk as it relates to social engineering. What impact is there to the network, control system applications, and mission critical infrastructure if a social engineering attack was successful? How informed and educated are employees when it comes to social engineering? SAWS shall pre-approve any SE contexts and targets before beginning the assessment. Question 29: Section VI Point 4 includes Information Security Education and Training should be included in the proposal. What types of training are you looking for? Should we include any classroom training for management? Computerbased training for all employees? Targeted training based on the results of our assessment and the weaknesses identified? Should we plan to deliver specific training for high-risk groups including IT administration, application administration, and senior management? What is the approximate number of users to be trained? Answer: SAWS would like the training and education to be focused on any deficiencies found during the assessment. Training would help IT staff gain knowledge needed to rectify and secure the infrastructure. An estimated number of employees that may require training are 15. Additionally, SAWS has developed an all employee Information Security training class and we would like feedback on the composition and content of that training class. Page 4 of 6

5 Question 30: Which regulators are specifically relevant for this assessment? We anticipate TAC 202, NERC-CIP, and compliance with industry best practices including NIST and ISO27001/ Are there any other regulatory frameworks that should be considered? Answer: The NIST , revision 4 set of guidelines is the most relevant set of guidelines for this assessment. Question 31: For the Penetration Testing components of this assessment, should we perform Covert or Overt testing? Covert testing (Black Box) is designed to measure the organization s detection and response capability in a real world scenario, and means more silent and passive tools will be used. This type of testing simulates a more sophisticated attacker, however the testing is also more expensive because tools must be run at slower speeds to try and evade detection. Overt testing (Grey/White Box) means that the organization s IT and incident response staff is informed about testing, and the testers will not make specific attempts to evade detection. This simulates a less sophisticated attacker but the testing is more cost-effective because the testers can be informed about the target environment, and therefore testing takes less time to identify vulnerabilities. Answer: Penetration testing shall be overt. Note for SCADA - non-intrusive testing should be used to assess the security controls along with detailed device configuration audits. Question 32: For the Penetration Testing, should we attempt to manually validate vulnerabilities or to actually penetrate systems and obtain sensitive artifacts? Manual validation means that we will determine if vulnerabilities are exploitable, without actually stealing information. As an example, if a tester obtained root access on a Unix system, then the tester would document that fact and conclude the test on the basis that root access will allow other more dangerous forms of attack. Penetrating systems means that a tester would break in and try to obtain sensitive artifacts (admin credentials, databases, and other artifacts). As an example, if a tester obtained root access on a Unix system, then the tester would continue exploiting the network or systems until another artifact (admin password, other) is obtained. Which type of testing would you like us to conduct? Our recommendation would be to conduct manual validation, which presents similar results with much less risk to the client s environment. Answer: Manual validation is sufficient. Question 33: For the Penetration Testing, should we attempt denial of service? DoS exploits could knock systems or services offline, and may require remediation by the client IT to restore services. Group 3 (Outdoor Wireless) indicates that DoS exploits are included in that phase. Should we plan to conduct DoS type testing or exploits for External, Internal, or Control System testing? Our recommendation would be to attempt DoS on Outdoor Wireless only, as the risk to other operational systems could be significant. If SAWS would like to conduct DoS testing on External, Internal, and Control System networks then Denim Group can support that requirement with additional coordination and monitoring by SAWS IT and security personnel Answer: DoS attacks should only be performed on group 3 (Outdoor Wireless). Question 34: Section IV subpoint C Requirements Outline lists the SAWS.org applications and secure.saws.org as the two applications to be tested. For these applications, please provide the following information: What platform(s) are the applications built on? Java? C++, C#?.NET? Other? Answer: Cold Fusion Does SAWS.org handle sensitive data? What types? (Credit Card, PII, HIPAA, Financial, other) Answer: No Does Secure.SAWS.org handle sensitive data? What types? (Credit Card, PII, HIPAA, Financial, other) Answer: Transfers credit card info to PayPal and does not store Should we conduct static testing? (Source Code Analysis)? Answer: No Should we conduct dynamic testing? (Application Security Scanning Tools)? Answer: No, SAWS does this. Should we conduct manual testing (Targeted manual testing based on the results of static and automated testing)? Answer: No Question 35: Have any previous security assessments been conducted on these two applications? Could we review the results? Page 5 of 6

6 Answer: Yes quarterly PCI compliance results can be provided. Question 36: Section IV subpoint C Requirements Outline lists 325 application servers for Internal testing. Do these servers support SAWS.org and Secure.SAWS.org? Do they support other applications? Would you like us to perform penetration testing against any other applications within the environment? Answer: Not at this time. Question 37: Section IV subpoint C Requirements Outline lists 9 application servers for Control Systems testing. What applications are running on these servers? Would you like us to perform penetration testing against any other applications within the Control System environment? Answer: Three SCADA Top End Systems and not at this time for any other applications. Question 38: Work examples invariably include sensitive client information that would enable knowledgeable person to identify the client. Would SAWS be amenable to example deliverables? Answer: We are open to examples of work products which demonstrate an understanding of the requirements but do not provide sensitive client information. Question 39: What is the anticipated threat for SAWS outside radios (e.g., microwave radio relay)? Answer: SAWS would like to understand what vulnerabilities exist in the outdoor wireless infrastructure and if they could be compromised allowing an attacker access to the network. Question 40: Can we conduct manual web application testing for and the payment gateway (maybe value add service?) Answer: Not at this time Question 41: Do you have CIPS compliance requirements? Answer: SAWS is not governed by NERC or FERC. Question 42: Are you primarily concerned about threat modeling and security development lifecycle in your SCADA environment or is your vision to have an active penetration test performed on your SCADA network? Answer: SAWS would like to discover and mitigate against any potential security vulnerabilities that may exist in the SCADA environment. Non-intrusive testing should be used to assess the security controls along with detailed device configuration audits. Question 43: How many CCAs (Critical Cyber Assets) and EADs (Electronic Access Devices) make up your SCADA environment? Answer: SAWS has 3 control systems that are deemed CCAs along with all the respective servers, networks, and firewalls used to secure them. We also have the end points (PLCs) at our pumps, valves, lift stations, facilities which the control systems operate/monitor. Question 44: Do you have a SCADA lab or test environment? Answer: SAWS has a SCADA test environment. Question 45: Please provide the personnel names, social security numbers, federal security clearance documentation and need to know explanation. Answer: SAWS does not provide this. * * * * * * All other terms and conditions of the original bid document remain unchanged. Page 6 of 6

SAN ANTONIO WATER SYSTEM PURCHASING DEPARTMENT

SAN ANTONIO WATER SYSTEM PURCHASING DEPARTMENT SAN ANTONIO WATER SYSTEM PURCHASING DEPARTMENT Issued By: Clifford Gorman Date Issued: July 6, 2015 BID NO.: 15-15060 FORMAL INVITATION FOR BEST VALUE BID (BVB) FOR THE ONE TIME PURCHASE OF SCADA NETWORK

More information

SAN ANTONIO WATER SYSTEM PURCHASING DEPARTMENT FORMAL INVITATION FOR BEST VALUE BID (BVB) FOR PRESCRIPTION SAFETY EYEWEAR PROGRAM ADDENDUM NO.

SAN ANTONIO WATER SYSTEM PURCHASING DEPARTMENT FORMAL INVITATION FOR BEST VALUE BID (BVB) FOR PRESCRIPTION SAFETY EYEWEAR PROGRAM ADDENDUM NO. SAN ANTONIO WATER SYSTEM PURCHASING DEPARTMENT Issued By: Joseph Ramon Date Issued: June 15, 2015 BID NO.: 15-0118 FORMAL INVITATION FOR BEST VALUE BID (BVB) FOR PRESCRIPTION SAFETY EYEWEAR PROGRAM ADDENDUM

More information

Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014

Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014 QUESTIONS ANSWERS Q1 How many locations and can all locations be tested from a A1 5 locations and not all tests can be performed from a central location? central location. Q2 Connection type between location

More information

Vendor Questions and Answers

Vendor Questions and Answers OHIO DEFERRED COMPENSATION REQUEST FOR PROPOSALS (RFP) FOR COMPREHENSIVE SECURITY ASSESSMENT CONSULTANT Issue Date: December 7, 2016 Written Question Deadline: January 11, 2016 Proposal Deadline: RFP Contact:

More information

Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients

Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients Network Test Labs Inc. Head Office 170 422 Richards Street, Vancouver BC, V6B 2Z4 E-mail: info@networktestlabs.com

More information

SECURITY. Risk & Compliance Services

SECURITY. Risk & Compliance Services SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize

More information

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015 QUESTIONS ANSWERS Q1 What is the goal of testing? A1 We engage in this type of testing to promote our own best practices and ensure our security posture is as it should be. Q2 No of active IP s (internal):

More information

RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST

RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST Questions and Answers Notice: Questions may have been edited for clarity and relevance. 1. How many desktops,

More information

Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015

Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015 Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015 UPDATE HISTORY: 10/21/2015 10/30/2015 11/5/2015 Questions submitted by Proposers All proposers should reference the following

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Penetration Testing. Request for Proposal

Penetration Testing. Request for Proposal Penetration Testing Request for Proposal Head Office: 24 - The Mall, Peshawar Cantt, 25000 Khyber Pakhtunkhwa, Islamic Republic of Pakistan UAN: +92-91-111-265-265, Fax: +92-91-5278146 Website: www.bok.com.pk

More information

UNIVERSITY OF CENTRAL ARKANSAS PURCHASING OFFICE 2125 COLLEGE AVENUE SUITE 2 CONWAY, AR 72034

UNIVERSITY OF CENTRAL ARKANSAS PURCHASING OFFICE 2125 COLLEGE AVENUE SUITE 2 CONWAY, AR 72034 UNIVERSITY OF CENTRAL ARKANSAS PURCHASING OFFICE 2125 COLLEGE AVENUE SUITE 2 CONWAY, AR 72034 REQUEST FOR PROPOSAL Information Technology Security Audit RFP#UCA-15-072 PROPOSALS MUST BE RECEIVED BEFORE:

More information

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance

More information

SUPPLIER SECURITY STANDARD

SUPPLIER SECURITY STANDARD SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed

More information

About This Document. Response to Questions. Security Sytems Assessment RFQ

About This Document. Response to Questions. Security Sytems Assessment RFQ Response to Questions Security Sytems Assessment RFQ Posted October 1, 2015 Q: Which specific security assessment processes are sought for this engagement? The RFQ mentions several kinds of analysis and

More information

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology A comprehensive approach

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Presented by Evan Sylvester, CISSP

Presented by Evan Sylvester, CISSP Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning

More information

After reviewing all the questions, the most common and relevant questions were chosen and the answers are below:

After reviewing all the questions, the most common and relevant questions were chosen and the answers are below: 2015 007 After reviewing all the questions, the most common and relevant questions were chosen and the answers are below: 1. Is there a proposed budget for this RFP? No 2. What is the expect duration for

More information

Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon

Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon Request for Proposal P a g e 2 Table of Contents 1.

More information

Digital Pathways. Penetration Testing

Digital Pathways. Penetration Testing Penetration Testing inftouch@digitalpathwyas.co.uk Penetration testing, vulnerability tests, assurance projects, ethical hacking it all means broadly the same thing; testing a corporate network to determine

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

Information Technology Security Review April 16, 2012

Information Technology Security Review April 16, 2012 Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

Department of Management Services. Request for Information

Department of Management Services. Request for Information Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley

More information

Goals. Understanding security testing

Goals. Understanding security testing Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Solution for Retail: Addressing Compliance and Security Best Practices PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment

More information

QUESTIONS & RESPONSES #2

QUESTIONS & RESPONSES #2 QUESTIONS & RESPONSES #2 RFP / TITLE 070076 IT Cybersecurity Assessment and Plan CONTACT Michael Keim, CPPB, Sr. Contract Adminstrator EMAIL procurement@portoftacoma.com PHONE NUMBER 253-428-8608 SUBMITTAL

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

CounselorMax and ORS Managed Hosting RFP 15-NW-0016 CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting

More information

The ICS Approach to Security-Focused IT Solutions

The ICS Approach to Security-Focused IT Solutions The ICS Approach to Security-Focused IT Solutions for the State of Mississippi ICS offers a dynamic and comprehensive portfolio of security-driven IT solutions for the State of Mississippi. Taking a proactive

More information

FIREWALL POLICY November 2006 TNS POL - 008

FIREWALL POLICY November 2006 TNS POL - 008 FIREWALL POLICY November 2006 TNS POL - 008 Introduction Network Security Services (NSS), a department of Technology and Network Services, operates a firewall to enhance security between the Internet and

More information

Addendum #2 Date: March 10, 2014. City of Memphis Network Penetration Services. RFQ # SAIC CoM 2014 RG R85393. Issue Date: January 31, 2014

Addendum #2 Date: March 10, 2014. City of Memphis Network Penetration Services. RFQ # SAIC CoM 2014 RG R85393. Issue Date: January 31, 2014 Addendum #2 Date: March 10, 2014 City of Memphis Network Penetration Services Issue Date: January 31, 2014 Original Response Date: February 21, 2014 New Response Date: March 21, 2014 This addendum has

More information

Leader Dogs for the Blind 1039 South Rochester Road Rochester Hills, MI 48307

Leader Dogs for the Blind 1039 South Rochester Road Rochester Hills, MI 48307 Leader Dogs for the Blind 1039 South Rochester Road Rochester Hills, MI 48307 REQUEST FOR PROPOSAL Information Security Assessment/External Penetration Testing PROPOSALS MUST BE RECEIVED VIA EMAIL BEFORE:

More information

Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology l Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology Overview The final privacy rules for securing electronic health care became effective April 14th, 2003. These regulations require

More information

Course Title: Penetration Testing: Network & Perimeter Testing

Course Title: Penetration Testing: Network & Perimeter Testing Course Title: Penetration Testing: Network & Perimeter Testing Page 1 of 7 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics

More information

REQUEST FOR PROPOSAL INFORMATION SECURITY PROGRAM PROVIDER

REQUEST FOR PROPOSAL INFORMATION SECURITY PROGRAM PROVIDER REQUEST FOR PROPOSAL INFORMATION SECURITY PROGRAM PROVIDER OCTOBER 18, 2013 1 Table of Contents I. EXECUTIVE OVERVIEW... 3 II. BACKGROUND... 3 A. Goals & Objective of Request... 3 B. Project Scope... 4

More information

2015 Security Training Schedule

2015 Security Training Schedule 2015 Security Training Schedule Risk Management Framework Course (RMF) / $1,950.00 Per Student Dates June 1-4 Location 4775 Centennial Blvd., Suite 103 / Colorado Springs, CO 80919 July 20 23 444 W. Third

More information

Information Security and Risk Management

Information Security and Risk Management Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

PENETRATION TESTING GUIDE. www.tbgsecurity.com 1

PENETRATION TESTING GUIDE. www.tbgsecurity.com 1 PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a

More information

State of South Carolina Policy Guidance and Training

State of South Carolina Policy Guidance and Training State of South Carolina Policy Guidance and Training Policy Workshop Small Agency Threat and Vulnerability Management Policy May 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy

More information

11th AMC Conference on Securely Connecting Communities for Improved Health

11th AMC Conference on Securely Connecting Communities for Improved Health 11th AMC Conference on Securely Connecting Communities for Improved Health Information Security Testing How Do AMCs Ensure Your Networks are Secure June 22, 2015 Ray Hillen, Dennis Schmidt, Adam Bennett

More information

Verve Security Center

Verve Security Center Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015 NEXPOSE ENTERPRISE METASPLOIT PRO Effective Vulnerability Management and validation March 2015 KEY SECURITY CHALLENGES Common Challenges Organizations Experience Key Security Challenges Visibility gaps

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Payment Card Industry (PCI) Penetration Testing Standard

Payment Card Industry (PCI) Penetration Testing Standard Payment Card Industry (PCI) Penetration Testing Standard Issued Date: 14 May 2015 Effective Date: 14 May 2015 Purpose This standard outlines penetration-testing requirements for the university's Payment

More information

White Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks

White Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks White Paper April 2006 Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks According to a recent Harris Interactive survey, the country s leading business executives consider

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

Response to Questions CML 15-018 Managed Information Security

Response to Questions CML 15-018 Managed Information Security Response to Questions CML 15-018 Managed Information Security 1. What are the most critical aspects that need to be provided for this RFP, in light of the comment that multiple awards might be provided?

More information

Looking at the SANS 20 Critical Security Controls

Looking at the SANS 20 Critical Security Controls Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department

More information

Delivering IT Security and Compliance as a Service

Delivering IT Security and Compliance as a Service Delivering IT Security and Compliance as a Service Jason Falciola GCIH, GAWN Technical Account Manager, Northeast Qualys, Inc. www.qualys.com Agenda Technology Overview h The Problem: Delivering IT Security

More information

Delivering IT Security and Compliance as a Service

Delivering IT Security and Compliance as a Service Delivering IT Security and Compliance as a Service Matthew Clancy Technical Account Manager Qualys, Inc. www.qualys.com Agenda Technology Overview The Problem: Delivering IT Security & Compliance Key differentiator:

More information

ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151

ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151 ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151 HIPAA/HITECH/OMNIBUS Act Compliance Consulting Services TO: FROM: CLOSING DATE: SUBJECT: All Potential Responders Angie Williams, RFP Coordinator September 24,

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

PCI Security Scan Procedures. Version 1.0 December 2004

PCI Security Scan Procedures. Version 1.0 December 2004 PCI Security Scan Procedures Version 1.0 December 2004 Disclaimer The Payment Card Industry (PCI) is to be used as a guideline for all entities that store, process, or transmit Visa cardholder data conducting

More information

How To Audit The Mint'S Information Technology

How To Audit The Mint'S Information Technology Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit

More information

Penetration Testing. Presented by

Penetration Testing. Presented by Penetration Testing Presented by Roadmap Introduction to Pen Testing Types of Pen Testing Approach and Methodology Side Effects Demonstration Questions Introduction and Fundamentals Penetration Testing

More information

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts SAP Cybersecurity Solution Brief Objectives Solution Benefits Quick Facts Secure your SAP landscapes from cyber attack Identify and remove cyber risks in SAP landscapes Perform gap analysis against compliance

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology WHITE PAPER Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology Table of Contents Overview 3 HIPAA & Retina Enterprise Edition 3 Six Steps of Vulnerability Assessment & Remediation

More information

ESKISP6055.01 Manage security testing

ESKISP6055.01 Manage security testing Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting

More information

III. Services Required The following details the services to be provided to the Town of North Haven in the area of information services:

III. Services Required The following details the services to be provided to the Town of North Haven in the area of information services: TOWN OF NORTH HAVEN REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY NETWORK SUPPORT SERVICES Issue Date: March 7, 2016 Due Date: 10:00 AM, Monday, March 28, 2016 I. Introduction The Town of North Haven is

More information

Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering

Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering Cyber Controls : A Critical Discipline of Systems 14 th Annual NDIA Systems San Diego, CA October 24-28, 2011 Bharat Shah Lockheed Martin IS&GS bharat.shah@lmco.com Purpose Provide an overview on integrating

More information

UIT Security is responsible for developing security best practices, promoting security awareness, coordinating security issues, and conducting

UIT Security is responsible for developing security best practices, promoting security awareness, coordinating security issues, and conducting SECURITY HANDBOOK Mission Statement: UIT Security is responsible for developing security best practices, promoting security awareness, coordinating security issues, and conducting investigations. UIT Security

More information

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2 Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls

More information

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008 U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October

More information

ADDENDUM TO STATE OF MARYLAND PURCHASES ISSUED UNDER STATE CONTRACT NO. 060B2490021-2015.

ADDENDUM TO STATE OF MARYLAND PURCHASES ISSUED UNDER STATE CONTRACT NO. 060B2490021-2015. ADDENDUM TO STATE OF MARYLAND PURCHASES ISSUED UNDER STATE CONTRACT NO. 060B2490021-2015. This addendum is applicable to each purchase order that is subject to the State of Maryland s contract number 060B2490021-2015.

More information

Response to Queries Received for RFP of Security Integrator - Tender No. 63

Response to Queries Received for RFP of Security Integrator - Tender No. 63 Sr.N RFP Clause Original Query Reply/Remark o. 1. Perform Incident Management with respect to the following: For Forensic Analysis of logs Please clarify the systems/devices Contain attacks through for

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons

More information

JMH User Access Request Form

JMH User Access Request Form The JMH UAR (User Access Request) Form is a multi-page agreement for attesting you will comply with the requirements set forth herein and a form for requesting the provisioning of access to John Muir Health

More information

How To Ensure The C.E.A.S.A

How To Ensure The C.E.A.S.A APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

Is your business prepared for Cyber Risks in 2016

Is your business prepared for Cyber Risks in 2016 Is your business prepared for Cyber Risks in 2016 The 2016 GSS Find out Security with the Assessment Excellus BCBS customers hurt by security breach Hackers Access 80 Mn Medical Records At Anthem Hackers

More information

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments. Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

IBM Managed Security Services (Cloud Computing) hosted mobile device security management

IBM Managed Security Services (Cloud Computing) hosted mobile device security management IBM Managed Security Services (Cloud Computing) hosted mobile device security management Z125-8855-00 11-2011 Page 1 of 15 Table of Contents 1. Scope of Services... 3 2. Definitions... 3 3. Services...

More information

AUTOMATED PENETRATION TESTING PRODUCTS

AUTOMATED PENETRATION TESTING PRODUCTS AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for automated penetration testing software and demonstrate

More information

Maintaining PCI-DSS compliance. Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com

Maintaining PCI-DSS compliance. Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com Maintaining PCI-DSS compliance Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance

More information

211 LA County. Technology Infrastructure Assessment. Request for Proposals. August 2012 Request for Proposals- 211 LA County 1

211 LA County. Technology Infrastructure Assessment. Request for Proposals. August 2012 Request for Proposals- 211 LA County 1 211 LA County Technology Infrastructure Assessment Request for Proposals August 2012 Request for Proposals- 211 LA County 1 1. General conditions and proposers directions 1.1. Overview 1.1.1. 211 LA County

More information

REQUEST FOR PROPOSAL #R13004 INFORMATION SECURITY PENETRATION ASSESSMENT

REQUEST FOR PROPOSAL #R13004 INFORMATION SECURITY PENETRATION ASSESSMENT REQUEST FOR PROPOSAL #R13004 INFORMATION SECURITY PENETRATION ASSESSMENT Joliet Junior College Request for Proposal INFORMATION SECURITY PENETRATION ASSESSMENT RFP Opening MAY 22, 2013 @ 2:00P.M. Background

More information

Request for Proposals on Security Audit Services

Request for Proposals on Security Audit Services Request for Proposals on Security Audit Services Version 1.0 Date: 16 December 2011 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F ING Tower, 308 Des Voeux Road Central, Sheung

More information

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM Common Gaps in Security Programs Outsourcing highly skilled security resources can be cost prohibitive. Annual assessments don t provide the coverage necessary. Software

More information

GEARS Cyber-Security Services

GEARS Cyber-Security Services Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments

More information

PCI-DSS Compliance. Ron Dinwiddie Chief Technology Officer J. Spargo & Associates

PCI-DSS Compliance. Ron Dinwiddie Chief Technology Officer J. Spargo & Associates PCI-DSS Compliance Ron Dinwiddie Chief Technology Officer J. Spargo & Associates Agenda What is PCI Compliance Why is PCI Important How does this impact me? Becoming PCI Compliant JSA PCI Strategy Risk

More information

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA

More information

Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP #12-680-004. Addendum 1.0

Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP #12-680-004. Addendum 1.0 Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP #12-680-004 Addendum 1.0 ISSUE DATE: February 23, 2012 Receipt of this addendum should be acknowledged on the Proposal Form. Inquiries

More information

Request for Information RFI #15/16-300 for Enterprise Password Management Software

Request for Information RFI #15/16-300 for Enterprise Password Management Software Company Name: This RFI response has been submitted by: Address: (Street, Su. # City, State, Zip) Request for Information RFI #15/16-300 for Enterprise Password Management Software Contact Name: Telephone

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information