Enterprise Information Technology Security Assessment RFP Answers to Questions
|
|
|
- Abraham Rose
- 10 years ago
- Views:
Transcription
1 Enterprise Information Technology Security Assessment RFP Answers to Questions GENERAL QUESTIONS Q: How do the goals of the security assessment relate to improving the way VEIC does business? A: Security of our and our customer s data is of critical importance to VEIC. We expect to leverage this point-in-time assessment to help inform improvements to our ongoing security-related projects and plans. Q: Please specify any previous experience receiving 3rd party assessments and whether reports and findings from those assessments will be provided to the selected vendor. A: Starting in 2013, VEIC began conducting annual security assessments s assessment focused on system and application penetration and vulnerability testing with a scope similar to the scope defined in our current RFP. VEIC does not expect to provide results from prior assessments to our selected vendor. Q: What are the expected project dates for this work? A: VEIC s goal is for the assessment to be completed by the end of September. Q: The evaluation points add to more than is this your intention? A:. Q: Can the VEIC share its budget for this project? A: This project is budgeted with funding available immediately. VEIC assumes that the received proposals will exceed the $20,000 level for which we require a formal RFP to be conducted. Q: Please clarify on-site expectations for the five physical sites. A: VEIC expects the work to be conducted either remotely or from VEIC s principle office in Burlington Vermont. Internal Penetration testing of VEIC s systems is expected to be performed from our principle offices in Burlington Vermont. Q: In reference to the below contractual requirement, will VEIC consider bi-weekly status reports and a draft report of each deliverable in lieu of interim and working documents? "CONTRACTOR will provide VEIC with intermediate work products as they are completed, including interim analyses, working drafts, and memoranda prepared for the Services." A:. Q: Are assessment activities to be executed within production environments? Vermont Energy Investment Corporation, 7/25/2014 Page 1 of 5
2 A: Both network and external app penetration and vulnerability tests are intended to be performed on our production environment. The vendor is expected to raise any concerns about negative impacts to VEIC s production systems which may be caused by planned testing. Q: Will the assessment be conducted during normal business hours? A:, unless the Vendor requests otherwise. Q: Does VEIC maintain a systems inventory? A:. PENETRATION AND VULNERABILITY TESTING Q: What are the goals for the internal and external penetration test? A: Point-in-time assessment of VEIC s current vulnerability levels. Q: Are the key decision makers and influencers partial to any particular kind of technology direction, industry recognized certifications, and/or penetration testing methodologies? A: For external application testing we assume the use of OWASP testing. Beyond that, VEIC expects to work with the vendor to select testing protocols and tools which are mutually agreeable. Q: Are the key decision makers and influencers partial to any particular kind of penetration testing software? Q: Are there any pre-approved penetration tools? A: No, our expectation is that we will discuss tools and determine timing based on any risk to business operations. Q: Is there an internal target or is the perimeter breach of VEIC the objective of the external penetration test? A: No, there is no specific internal target. Q: Can you please clarify the number of devices you expect to have tested both internally and externally? A: VEIC expects vulnerability and penetration tests to occur on up to 65 public IPs and less than 1000 internal IP addresses. Internal IP addresses scanned will include all types of physical infrastructure such as server, desktops, switches, and printers. VEIC s expectation is that automated testing would be run across all IP addresses. Q: Will penetration and vulnerability testing exclude home offices and remote workers? A:. Q: Is it possible to perform the Internal Network Penetration Testing via VPN? If not, is it possible to conduct the whole exercise from a single location? Vermont Energy Investment Corporation, 7/25/2014 Page 2 of 5
3 A: VEIC expects Internal Network Penetration Testing to be conducted from VEIC s main office in Burlington Vermont. Q: In page 1 of the RFP, under section 3 in Penetration and Vulnerability Testing, are there web applications hosted on the 100 external IP addresses and if so, do we need to test the pre-login pages for vulnerabilities? A: VEIC has no special requirements related to web application testing in relation to the internal or external Penetration and Vulnerability Testing. All special web application testing requirements are covered by the requirements stated in the External Application Penetration and Vulnerability Testing section of the RFP. Q: For internal vulnerability assessments, will scanning be executed with or without credentials? A: VEIC is expecting internal vulnerability and penetration testing to occur without credentials but would like to discuss this with the selected vendor. Q: Will network diagrams be provided for reference in the assessments? EMPLOYEE TRAINING AND SOCIAL ENGINEERING THREAT PREVENTION PROGRAM Q: Please describe what type of social engineering test is desired by VEIC, how many staff would be involved, and if this testing must occur from a specific location. A: VEIC would like to work with the selected Vendor to select the most appropriate type of social engineering test, although we have as a starting assumption that an solicitation test to VEIC staff will be performed remotely or from VEIC main office. If the vendor is able, VEIC would like to receive a list of the Vendor s standard social engineering services with the associated fee. Q: Regarding: Assist in the design of a social engineering threat prevention program to be delivered by VEIC, would this be similar to designing an incident response program and developing procedures to respond and contain social engineering incidents? A: No, VEIC would like to work with the Vendor to improve our employee awareness educational programs to include social engineering prevention training, possibly to include a regular cycle of social engineering tests. Q: Would the evaluation of the Social Engineering program be covered under the next requirement, Security Program Consulting? SECURITY PROGRAM CONSULTING SERVICE Q: Please provide additional information about the documentation available to support the security program consulting activities. Vermont Energy Investment Corporation, 7/25/2014 Page 3 of 5
4 A: VEIC expects to support the Vendor in the Security Program Consulting Service task by providing a mixture of finalized, drafted, and framework documentation which would be augmented by interviews and discussions with members of VEIC s Cyber Security Team. Q: Has a Security-related staffing plan been developed and formalized by VEIC? A: A staffing plan has been presented to VEIC s executive management team for review. Q: What is meant by (or definition) of reference to a Security Gap Analysis and Project Identification Tool? A: VEIC developed a tool and system for helping to both identify and prioritize projects to be supported by the VEIC Cyber Security Team. Q: Please clarify, Existing security application and technologies". Is this a report or software to review configuration and usage? A: Both. Q: Will the documentation for review be available for review off-site as well as on-site? A:. Q: How many security-related policies and procedures are in use today by the VEIC? A: For the purpose of this evaluation VEIC has less than 10 active policies and another in development. EXTERNAL APPLICATION PENETRATION AND VULNERABILITY TESTING Q: For each application, can a brief description of the size and functionality be provided? A: : KITT Web + KITT API + Online Rebate applications: Public facing web application (partially integrated into SiteFinity CMS with additional standalone C# MVC4 code) that allows external users to create an account and apply for rebates online. Utilizes KITT (custom internal application for project management, rebate processing, and savings tracking) web services API. Data managed via KITT Web application (C# asp.net MVC 4 SQL Server). Backend application utilized by 100+ employees. Retail Account Management Mobile Application + KITT API: ios and Android mobile application that utilizes KITT API. Used by account managers in the field who call on retailers. Developed in C# using PhoneGap. Retail Account Management Mobile Application and Online Rebate Center testing is expected to include 2 roles, a standard user role and an administrative role. In the PhoneGap version of the Retail Account Management Mobile Application, the Administrative role is not available. Q: Are any web applications in scope? If yes, how many web applications are in scope? A: : KITT Web + KITT API + Online Rebate applications: Public facing web application (partially integrated into SiteFinity CMS with additional standalone C# MVC4 code) that allows external users to create an Vermont Energy Investment Corporation, 7/25/2014 Page 4 of 5
5 account and apply for rebates online. Utilizes KITT (custom internal application for project management, rebate processing, and savings tracking) web services API. Data managed via KITT Web application (C# asp.net MVC 4 SQL Server). Backend application utilized by 100+ employees. Q: Will there be mobile application testing? A: : Retail Account Management Mobile Application + KITT API: ios and Android mobile application that utilizes KITT API. Used by account managers in the field who call on retailers. Q: What are the key programming languages the two applications are written in? A: KITT Web + KITT API + Online Rebate applications: Public facing web application (partially integrated into SiteFinity CMS with additional standalone C# MVC4 code) that allows external users to create an account and apply for rebates online. Utilizes KITT (custom internal application for project management, rebate processing, and savings tracking) web services API. Data managed via KITT Web application (C# asp.net MVC 4 SQL Server). Backend application utilized by 100+ employees. Retail Account Management Mobile Application + KITT API: ios and Android mobile application that utilizes KITT API. Used by account managers in the field who call on retailers. Developed in C# using PhoneGap. Q: Please provide the following information about the web applications that will need to be tested: Do they have login pages? Do they have file access? Do they store or use sensitive information? Do they process or store financial data Do they have search functionality Do they have file upload functionality Do they have user profiles Do they have instant messaging functionality Do they have basic messaging functionality Do they have social networking functionality No No Application includes basic functions Limited only social network share/like links. Q: What is the approximate total number of pages and approximate number of input/dynamic pages (such as web forms where users input data) each external application under scope supports? A: CMS: Hundreds of static pages, approximately 10 dynamic. Vermont Energy Investment Corporation, 7/25/2014 Page 5 of 5
RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST
RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST Questions and Answers Notice: Questions may have been edited for clarity and relevance. 1. How many desktops,
Request for Proposal Enterprise Information Technology Security Assessment
Request for Proposal Enterprise Information Technology Security Assessment 1. Summary The Vermont Energy Investment Corporation (VEIC), a non-profit corporation, requests proposals for an Enterprise Information
Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015
Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015 UPDATE HISTORY: 10/21/2015 10/30/2015 11/5/2015 Questions submitted by Proposers All proposers should reference the following
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
About This Document. Response to Questions. Security Sytems Assessment RFQ
Response to Questions Security Sytems Assessment RFQ Posted October 1, 2015 Q: Which specific security assessment processes are sought for this engagement? The RFQ mentions several kinds of analysis and
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151
ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151 HIPAA/HITECH/OMNIBUS Act Compliance Consulting Services TO: FROM: CLOSING DATE: SUBJECT: All Potential Responders Angie Williams, RFP Coordinator September 24,
I.T. Assurance. Letting you do what you do best... run your business. www.sironasolutions.com 0161 850 1000
Letting you do what you do best... run your business www.sironasolutions.com 06 850 000 For years, IT companies and their clients have been working against each other. Something breaks, the IT company
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
QUESTIONS & RESPONSES #2
QUESTIONS & RESPONSES #2 RFP / TITLE 070076 IT Cybersecurity Assessment and Plan CONTACT Michael Keim, CPPB, Sr. Contract Adminstrator EMAIL [email protected] PHONE NUMBER 253-428-8608 SUBMITTAL
Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN
Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010 Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
After reviewing all the questions, the most common and relevant questions were chosen and the answers are below:
2015 007 After reviewing all the questions, the most common and relevant questions were chosen and the answers are below: 1. Is there a proposed budget for this RFP? No 2. What is the expect duration for
Request for Proposal for Project Server 2013, MS SharePoint 2013 Intranet Development and Mobile Application Development Services
Request for Proposal for Project Server 2013, MS SharePoint 2013 Intranet Development and Mobile Application Development Services Solicitation Number: DCRB-14-010 Questions 1. On page 4 of the RFP in the
1. How many user roles are to be tested in Web Application Penetration testing? 1. 2. Provide the approx. no. of input fields in the web application?
Below are all the questions that were submitted. This is the District s first security assessments and the District is looking to qualified firms to assess our systems. As it states in the RFQ, technical
PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015
QUESTIONS ANSWERS Q1 What is the goal of testing? A1 We engage in this type of testing to promote our own best practices and ensure our security posture is as it should be. Q2 No of active IP s (internal):
Spokane Airport Board (Spokane International Airport, Airport Business Park, Felts Field) Addendum #1 - Q&A
Spokane Airport Board (Spokane International Airport, Airport Business Park, Felts Field) Request for Proposals (RFP) for PCI DSS COMPLIANCE SERVICES Project # 15-49-9999-016 Addendum #1 - Q&A May 29,
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
Response to Questions CML 15-018 Managed Information Security
Response to Questions CML 15-018 Managed Information Security 1. What are the most critical aspects that need to be provided for this RFP, in light of the comment that multiple awards might be provided?
Department of Children and Families (DCF) Request for Information (RFQ) #01U013DS1 HIPAA Compliance Review DCF Answers to Vendor Questions
Department of Children and Families (DCF) Request for Information (RFQ) #01U013DS1 HIPAA Compliance Review s to Vendor Questions Questions as Submitted by Vendors (Duplicates omitted) 1. Have controls
HIPAA SECURITY RISK ANALYSIS FORMAL RFP
HIPAA SECURITY RISK ANALYSIS FORMAL RFP ADDENDUM NUMBER: (2) August 1, 2012 THIS ADDENDUM IS ISSUED PRIOR TO THE ACCEPTANCE OF THE FORMAL RFPS. THE FOLLOWING CLARIFICATIONS, AMENDMENTS, ADDITIONS, DELETIONS,
Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments
DATA SHEET Technical Testing Application, Network and Red Team Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance
Three Critical Success Factors for PCI Assessment. Seth Peter NetSPI April 21, 2010
Three Critical Success Factors for PCI Assessment Seth Peter NetSPI April 21, 2010 Introduction Seth Peter NetSPI Chief Technology Officer and Founder 15 year history of application, system, and network
Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
Penetration Testing. I.T. Security Specialists. Penetration Testing 1
Penetration I.T. Security Specialists ing 1 about us At Caretower, we help businesses to identify vulnerabilities within their security systems and provide an action plan to help prevent security breaches
Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE. Jimmie Parson Checkpoint Technologies
Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE Jimmie Parson Checkpoint Technologies Welcome, Introductions Agenda Checkpoint Technologies Quick Corporate Overview Why do
RFQ 12-21 IT Services. Questions and Answers
RFQ 12-21 IT Services Questions and Answers Question # 1: Just to clarify and I am more than certain that this is just a typo, but the due date for the submission of the IT Services RFP is January 7, 2013,
Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients
Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients Network Test Labs Inc. Head Office 170 422 Richards Street, Vancouver BC, V6B 2Z4 E-mail: [email protected]
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
REQUEST FOR PROPOSAL (RFP) #021-14 HIPAA SECURITY ASSESSMENT VENDOR QUESTIONS & ANSWERS ~ MAY 29, 2014
REQUEST FOR PROPOSAL (RFP) #021-14 HIPAA SECURITY ASSESSMENT VENDOR QUESTIONS & ANSWERS ~ MAY 29, 2014 Q1) Page 2, Section A and Page 5, Section H --- Does the County desire only an assessment of compliance
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Scalability in Log Management
Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com [email protected] Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Professional Services Overview
Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded
Response to Queries Received for RFP of Security Integrator - Tender No. 63
Sr.N RFP Clause Original Query Reply/Remark o. 1. Perform Incident Management with respect to the following: For Forensic Analysis of logs Please clarify the systems/devices Contain attacks through for
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
ACME Enterprises IT Infrastructure Assessment
Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3
CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016
CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 My name is Jacob Olcott and I am pleased to share some observations on
A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS
A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS Every day McCann Security helps business decision-makers and stakeholders solve cybersecurity issues and protect their critical data and
ecms Document Management Request for Proposal: Questions & Responses
The State Bar of California ecms Document Management Request for Proposal: Questions & Responses August 6, 2015 1. What do you consider to be the top three critical success factors for this project? i.e.,
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Request for Offers (RFO) Addendum
Request for Offers (RFO) Addendum RFO Number: RFO0095 Addendum Number: 1 Date of Addendum: _10/21/2015 Original Due Date, Time: 10/26/2015, 2:00pm Revised Date, Time: _10/26/2015, 2:00pm Title: _MNLARS
Department of Management Services. Request for Information
Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley
Request for Resume (RFR) CATS II Master Contract. Section 1 General Information R00B4400024
RFR Number: (Reference BPO Number) Functional Area (Enter One Only) Section 1 General Information R00B4400024 Functional Area 10 - IT Management Consulting Services Position Title/s or Service Type/s (Short
National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2. Exit Conference...
NEA OIG Report No. R-13-03 Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning to detect vulnerabilities... 2 Area
應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊
應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 HP Enterprise Security 林 傳 凱 (C. K. Lin) Senior Channel PreSales, North Asia HP ArcSight, Enterprise Security 1 Rise Of The Cyber Threat Enterprises and Governments are experiencing
Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014
QUESTIONS ANSWERS Q1 How many locations and can all locations be tested from a A1 5 locations and not all tests can be performed from a central location? central location. Q2 Connection type between location
IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 [email protected]
IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 SECURITY IS A PROCESS, NOT A STATE CARVE SYSTEMS LLC [email protected] Carve s Roots (tl;dr)
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Using a VPN with Niagara Systems. v0.3 6, July 2013
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel
Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited
Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics About Us Matt Halbleib CISSP, QSA, PA-QSA Manager PCI-DSS assessments With SecurityMetrics for 6+ years SecurityMetrics Security
RFP # 15-74 Provide Information Security Assessment and Penetration Testing Due August 11, 2015 at 2:00PM (CST)
August 6, 2015 McHenry County Government Center Purchasing Department Donald Gray, CPPB, Director of Purchasing 2200 N Seminary Avenue Administration Building Room 200 Woodstock, IL 60098 Phone: 815-334-4818
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
1. Why is the customer having the penetration test performed against their environment?
General Questions 1. Why is the customer having the penetration test performed against their environment? Assess vulnerabilities in order to improve security and protect client information. 2. Is the penetration
REQUEST FOR PROPOSAL INFORMATION SECURITY PROGRAM PROVIDER
REQUEST FOR PROPOSAL INFORMATION SECURITY PROGRAM PROVIDER OCTOBER 18, 2013 1 Table of Contents I. EXECUTIVE OVERVIEW... 3 II. BACKGROUND... 3 A. Goals & Objective of Request... 3 B. Project Scope... 4
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org
Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org IMPORTANT NOTICE All proposal question and inquiries must be sent by email to
PCI DSS Overview and Solutions. Anwar McEntee [email protected]
PCI DSS Overview and Solutions Anwar McEntee [email protected] Agenda Threat environment and risk PCI DSS overview Who we are Solutions and where we can help Market presence High Profile Hacks in
PCI Compliance 3.1. About Us
PCI Compliance 3.1 University of Hawaii About Us Helping organizations comply with mandates, recover from security breaches, and prevent data theft since 2000. Certified to conduct all major PCI compliance
STATE OF NEW JERSEY IT CIRCULAR
NJ Office of Information Technology P.O. Box 212 www.nj.gov/it/ps/ Chris Christie, Governor 300 River View E. Steven Emanuel, Chief Information Officer Trenton, NJ 08625-0212 STATE OF NEW JERSEY IT CIRCULAR
Q. How many instances may I run with a license of SBS 2011 Essentials?... 7. Q. How many users can use the SBS 2011 Essentials software?...
Licensing FAQ Table of Contents SBS 2011 Essentials... 7 Q. How many instances may I run with a license of SBS 2011 Essentials?... 7 Q. How many users can use the SBS 2011 Essentials software?... 7 Q.
User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts
DETAILED REPORT LIST Track which users, when and for how long they used an application on Remote Desktop Services (formerly Terminal Services) and Citrix XenApp (known as Citrix Presentation Server). These
PCI-DSS Penetration Testing
PCI-DSS Penetration Testing Adam Goslin, Co-Founder High Bit Security May 10, 2011 About High Bit Security High Bit helps companies obtain or maintain their PCI compliance (Level 1 through Level 4 compliance)
IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing
IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed
CYBER SECURITY: A REPORT FROM THE TRENCHES 2015 AGC NATIONAL & CHAPTER LEADERSHIP CONFERENCE [email protected]
CYBER SECURITY: A REPORT FROM THE TRENCHES 2015 AGC NATIONAL & CHAPTER LEADERSHIP CONFERENCE SECURITY IS A PROCESS, NOT A STATE CARVE SYSTEMS LLC [email protected] How did I get here? (short
Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
Exhibit B5b South Dakota. Vendor Questions COTS Software Set
Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event
Leader Dogs for the Blind 1039 South Rochester Road Rochester Hills, MI 48307
Leader Dogs for the Blind 1039 South Rochester Road Rochester Hills, MI 48307 REQUEST FOR PROPOSAL Information Security Assessment/External Penetration Testing PROPOSALS MUST BE RECEIVED VIA EMAIL BEFORE:
Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved
Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing
Q&A SOW for Mobile Strategy
1. Does the STATE expect the vendors to provide a Fixed Price quote or can the vendors provide a T&E quote with fixed hourly rates for each resource type? A. The State/MN.IT expects a fixed price for this
WEBSITE CONTENT MANAGEMENT SYSTEM RFP 2015-061 QUESTIONS AND ANSWERS
WEBSITE CONTENT MANAGEMENT SYSTEM RFP 2015-061 QUESTIONS AND ANSWERS 1. I noticed the questions regarding working with k-12. While we've worked with several school districts on marketing needs from developing
