Penetration Testing Is A Bad Idea. Anton Aylward, CISSP, CISA System Integrity
|
|
|
- Barbra York
- 10 years ago
- Views:
Transcription
1 Penetration Testing Is A Bad Idea Anton Aylward, CISSP, CISA System Integrity
2 What are you trying to test? Can hackers break in? You can t prove a -ve Your firewall works? But is it configured? Your IDS works? Your response system? You ve shown due diligence?
3 Penetration Testing There s no such thing as Ethical Hacking Would you employ an ethical arsonist to test your home smoke detector? Ethical burglar to test your home security Ethical murderer as a bodyguard Ethical terrorist as an airport guard
4 Penetration Testing It doesn t simulate a hacker It doesn t simulate their motives It doesn t simulate their timescales It may not simulate their methods A hacker can spend weeks at $0/hr in the intellectual challenge of writing an exploit, positioning it and deploying it. For this, he gets viewed as a security guru! Knowing how to break-in doesn t mean you know how to defend.
5 Attack Taxonomy Internal structured or unstructured External structured or unstructured Network based Application based Social based Natural/Man-made disasters fire, flood, wind, power, impact, theft
6 Penetration Testing It addresses less than 5% of security risks It only looks at external interfaces Most security problems are internal Errors and omissions Lack of policy & procedure Disaster Recovery and Business Continuity Insider Threats Fragile Architecture
7 Penetration Testing It should be the last thing you do After making the changes recommenced by an audit of the perimeter configuration After making the changes recommenced by an audit of the internal configuration Because you need defense in depth Because you DON T want to find any vulnerabilities Because its less risky this way Because its less expensive this way
8 Penetration Testing It s not cost effective A conventional audit will tell you more for less Use a well established methodology... CobIT SSE-CMM that matches your business processes And audit will tell you about Your internal risks Your IT processes Good Governance & Practices Better ROI
9 Penetration Testing It focuses on the Technical, not the Business The drama appeals to the media Techies like to show off Most of your security problems aren t technical People Legal and IP DRP/BCP Rights Management Spam Viruses & Worrms problems OS Problems Patches & Updates
10 Penetration Testing Technical or Business? Losses at Enron, WorldCom, Parmlait, Nortel, Royal Dutch Shell, Royal Plastics etc had nothing to do with hackers breaking in Disclosures at XXX YYY ZZZ had nothing to do with hackers breaking in Most of your security problems aren t technical
11 Penetration Testing It only addresses the known, not the unknown or future exploits Its impossible to predict future InfoSec incidents based on past events Pen-testing doesn t test your processes, only your defenses and only your external, static, boundary defenses
12 Other Shortcomings Doesn t test forensics needed for possible follow-up (e.g. prosecution of hackers) Doesn t validate that the successful defenses follow the business requirements Doesn t test your hiring, training, dismissal and other human factors procedures Its not a continuous/feedback process
13 Why is Pen-Testing Popular? The Media Hackers make Headlines Its Dramatic Its Fascinating Its Fun! - techies like it It Opens Doors - salesmen like it Its easy to sell to people who don t understand the real issues Fear Uncertainty Doubt
14 The Big Downside Penetration testing is avoidance behavior. By focusing attention on outside threats the real and more complex problems, the internal problems of IT governance, business needs and processes, internal controls and oversight, problem, change and configuration management are all avoided.
15 What Should You Do? Perform a simplified Risk Assessment WHY? Dealing with higher risk issues has better ROI Identifies YOUR real vulnerabilities Puts YOU in control of what gets fixed first Avoid One Size Fits All
16 What Should You Do First? Identify your assets Computing assets including the ones you didn t know you had Communication assets including the ones you didn t know you had Data Assets Assign Values Monetary Business Process Criticality
17 What Should You Do Next? Identify your business processes rate them by criticality various metrics Cross correlate assets & processes matrix Identify what can go wrong What is the impact? What is the likelihood? How can it be mitigated? Define a baseline So you can show & measure improvements
18 Now you have the information Plan Do What controls to put in place? Put them in place Check Do they work? What is missing? Correct Keep doing it
19 Now you have the information
20 Things to Consider You only have control over your inside Most security problems are on the inside Configuration Change management Awareness of the issues of events of what action to take
21 Inside or Outside Attacks
22 Inside Risks & Threats Finger Trouble Typos Too hurried to check Other Distractions Ignorance Miscommunication Frustration Malice Espionage Ames, Walker, Hansen
23 Insiders: Advantages Insiders have many advantages over outsiders They are already behind the firewall They know where everything is They can cover their tracks better They may have very personal motives They are already trusted Penetration Testing Doesn t Test Your Highest Risks
24 Insiders: Hidden Threats Management Lack of commitment Lack of demonstration of commitment Poor communication Ignorance of risks and issues Users Subverting security controls to get the job done The IT Department Obsession with technology Lack of understanding/respect for Business Issues End Users
25 Insiders: The BIG problem Security? That s not my job OH YES IT IS! Board of Directors Executive management Line management Planners Auditors Financiers Project managers Supervisors Programmers Clerks Cleaners Janitors
26 How to Approach Security Assurance Understand what you mean by Security Focus on Business not on Technology Think in terms of Processes & Controls Decide what Risks you can live with
27 What do we mean by Security Its important to have a clear understanding of the objectives We DON T Mean Keep the hackers out Install firewalls and IDS and biometrics Run risk assessments Don t Confuse Motion With Action - Hemmingway
28 What do we mean by Security We DO Mean Preserve the INTEGRITY of the resources & assets of the enterprise. Keeping key resources & assets CONFIDENTIAL Ensuring the resources & assets are AVAILABLE for the business functions of the enterprise and be able to show we have done this to the Auditors.. Peace, Order and Good Governance
29 The Business of Security Baseline Things to put in place to start with High Risk Situations Things that need heightened awareness How to Manage for Security Making it work day by day How to Hire For Security The right people These are all management issues
30 Management: Baseline You must have a baseline in place Good Practice and Due Diligence Policy & Procedures define expectations define escalation procedures define remedial action (rewards/punishment) Communication, Awareness & Training Is Ignorance an excuse? Yes. Reinforcement Attitude People matter Quality matters
31 Why Policies & Procedures are Important Define what is: Expected behaviour Acceptable and unacceptable behaviour Consistency of Action Basis for Budget Disciplinary Action Avoiding liability/negligence Economy of scale Measuring progress Demonstrate Compliance Quality Don t wait until an incident occurs and try to figure out how to deal with it on the fly
32 Why Policies & Procedures are Important Policies and Procedures are the basis for all processes and controls that determine that short and medium term operation of the organization
33 Management: High Risk Situations Employee Termination Exit Interview Recover property - physical and intellectual Change Access Codes Mergers Disputes Creativity For some people, ideas matter most!
34 Management: How to Manage for Security Security is a Management issue Without commitment from the board and executive there is no belief that security matters Security is NOT an IT issue Training & Orientation Monitoring Enforcement All this means BUDGETING for security
35 Management: How to Hire For Security DO s Check references Check reputation Have all the legal documents NDA Sign-off on understanding P&P DON T s Hire hackers Ethical Hacker = Ethical Thief or Ethical Joyrider
36 Management: How to Fire for Security Have a formal termination procedure Exit Interview Recover property - Physical & Intellectual Change access codes, passwords Building, parking, voic , alarm Cancel outside accounts and memberships Gartner, health-club, credit reports Sign Non Disclosure and other releases
37 Solutions: POLICIES Yes, you MUST have Policies! Yes, you MUST communicate the policies & promote understanding of them Yes, you MUST enforce the policies. Don t Confuse Motion With Action - Hemmingway
38 Solutions: POLICIES Yes, you MUST have Policies! Yes, you MUST communicate the policies & promote understanding of them Yes, you MUST enforce the policies. You MUST conduct security awareness training BUT.
39 Recommended Reading Fighting Computer Crime - Donn Parker ISBN If I have to recommend just one book on Information Security it is this one.
40 Recommended Reading Trust & Betrayal in the Workplace ISBN Managing expectations & boundaries Practical exercises
41 Who do you Trust? Web sites
42 Who do you Trust? Professional Certification Recognition Professional Ethics Accountability Methodology
43 Who do you Trust? Professional Certification Recognition By Community of Peers By Means of Process Professional Ethics Accountability Methodology Professional Process Communication
44 Contact Information Security is not something that comes in a self-contained box. It requires a conscientious an continuous commitment that permeates every aspect of your enterprise and strategies. It is about understanding risks and managing them Anton J Aylward, CISSP CISA [email protected] (416)
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
LINUX / INFORMATION SECURITY
LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
Security Threat Risk Assessment: the final key piece of the PIA puzzle
Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
INFORMATION SECURITY STRATEGIC PLAN
INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 14 Risk Mitigation Objectives Explain how to control risk List the types of security policies Describe how awareness and training
Information Security. Incident Management Program. What is an Incident Management Program? Why is it needed?
Information Security Incident Management Program What is an Incident Management Program? It is a coordinated program of people, processes, tools and technology, which prevents and manages information security
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
Managed Security Monitoring: Network Security for the 21st Century
Managed Security Monitoring: Network Security for the 21st Century Introduction The importance of Security The Internet is critical to business. Companies have no choice but to connect their internal networks
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
SECURITY CONSIDERATIONS FOR LAW FIRMS
SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Network Security Audit. Vulnerability Assessment (VA)
Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Information Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
New Zealand Company Six full time technical staff Offices in Auckland and Wellington
INCREASING THE VALUE OF PENETRATION TESTING ABOUT YOUR PRESENTER Brett Moore Insomnia Security New Zealand Company Six full time technical staff Offices in Auckland and Wellington Penetration Testing Web
Presented by Frederick J. Santarsiere
http://cinoltd.com/ Presented by Frederick J. Santarsiere CHFI, CISSP, CISM, CISA, CEH, CEI, CAP, SSCP Sec+, Net+, A+, MCSA, MCSE, MCITP, MCT CCENT, CCNA, CCNA Wireless, CCNA Voice CISCO SMBEN, SMBAM,
PENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
From the Lab to the Boardroom:
From the Lab to the Boardroom: How to perform a Security Risk Assessment Like a Professional Doug Landoll, CISSP, CISA General Manager, Security Services En Pointe Technologies [email protected] (512)
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
Security Information Management (SIM)
1. A few general security slides 2. What is a SIM and why is it needed 3. What are the features and functions of a SIM 4. SIM evaluation criteria 5. First Q&A 6. SIM Case Studies 7. Final Q&A Brian T.
Maintaining PCI-DSS compliance. Daniele Bertolotti [email protected] Antonio Ricci [email protected]
Maintaining PCI-DSS compliance Daniele Bertolotti [email protected] Antonio Ricci [email protected] Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
Security aspects of e-tailing. Chapter 7
Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing
Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy
Presentation for : The New England Board of Higher Education Hot Topics in IT Security and Data Privacy October 22, 2010 Rocco Grillo, CISSP Managing Director Protiviti Inc. Quote of the Day "It takes
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber
Penetration testing & Ethical Hacking. Security Week 2014
Penetration testing & Ethical Hacking Security Week 2014 Agenda Penetration Testing Vulnerability Scanning Social engineering Security Services offered by Endava 2 3 Who I am Catanoi Maxim Information
Unit 3 Cyber security
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:
Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle
Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not
Information Security for the Rest of Us
Secure Your Way Forward. AuditWest.com Information Security for the Rest of Us Practical Advice for Small Businesses Brian Morkert President and Chief Consultant 1 Introduction President Audit West IT
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
Digital War in e-business
Digital War in e-business Ricci Ieong, Secretary of ISFS, Senior Security Consultant, PrivyLink (HK) Ltd. Trend in Internet Commerce Market More Internet Commerce Market G Increase in Business to Commerce
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
UoB Risk Assessment Methodology
[Type here] UoB Risk Assessment Methodology The Risk Assessment Methodology describes how information security risk will be managed, including guidance for assessing, scoring, choosing acceptance or treatment
5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS
5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 1 Introduction As small and mid-sized companies rely more heavily on their computer networks to
Information Security Risk Management
Information Security Risk Management June 11, 2013 Patrick Perreault Daniel Gaudreau Agenda Current State of Affairs Why Information Security? The Role of Risk Management Information Security Threats,
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA
Emerging Network Security Threats and what they mean for internal auditors December 11, 2013 John Gagne, CISSP, CISA 0 Objectives Emerging Risks Distributed Denial of Service (DDoS) Attacks Social Engineering
Operational Risk Publication Date: May 2015. 1. Operational Risk... 3
OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for
Corporate Incident Response. Why You Can t Afford to Ignore It
Corporate Incident Response Why You Can t Afford to Ignore It Whether your company needs to comply with new legislation, defend against financial loss, protect its corporate reputation or a combination
Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:
Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services
Network Segmentation
Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or
FALSE ALARM? Incident Management Case Study. Carlos Villalba [email protected]
FALSE ALARM? Incident Management Case Study Carlos Villalba [email protected] Initial Discovery The panic sets in: You think your company has been breached! So, what do you do? First steps First things
Professional Services Overview
Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Risk Assessment Guide
KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
NETWORK SECURITY. 3 Key Elements
NETWORK SECURITY 3 Key Elements OVERVIEW Network is fast becoming critical and required infrastructure in organizations or even in our live nowadays. Human networking is important in many aspects especially
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Case Study: Hiring a licensed Security Provider
Case Study: Hiring a licensed Security Provider Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer forensics
Penetration Testing in Romania
Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum Agenda About penetration testing Examples Q & A 2 What is penetration testing? Method for evaluating the
How To Secure Your Information Systems
isec Securing the Insecure Securing The Insecure e Security Rapid development of information technology has increased the use of open systems spanning local and remote sites. Great effort has gone into
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
Canadian ISO 17799 User Group Conference. Sun Life Financial s Experience with Security Governance & ISO 17799
Canadian ISO 17799 User Group Conference Sun Life Financial s Experience with Security Governance & ISO 17799 Deloitte & Touche, 79 Wellington West, 20th Floor Toronto, ON 30 January 2004 D.A. Stolovitch,
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Computer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
