"Advanced Vulnerability Management new approach to solve critical controls. Andrzej Kleśnicki Technical Account Manager Central Eastern Europe



Similar documents
AUTOMATING THE 20 CRITICAL SECURITY CONTROLS

Bringing Continuous Security to the Global Enterprise

Rozwiązanie SaaS w zakresie bezpieczeństwa teleinformatycznego i ochrony danych dla przedsiębiorstw

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Introduction to QualysGuard IT Risk SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

NE T GENERATION CLOUD SECURITY PLATFORM

IT Security & Compliance. On Time. On Budget. On Demand.

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

CDM Vulnerability Management (VUL) Capability

Top 20 Critical Security Controls

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Defending against Cyber Attacks

Vulnerability Management

Critical Security Controls

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

How to manage IT Risks and IT Compliance as a Service

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

SANS Top 20 Critical Controls for Effective Cyber Defense

BIG SHIFT TO CLOUD-BASED SECURITY

1 Introduction Product Description Strengths and Challenges Copyright... 5

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Critical Controls for Cyber Security.

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

IBM Endpoint Manager Product Introduction and Overview

The Top 10 Reports for Managing Vulnerabilities

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cenzic Product Guide. Cloud, Mobile and Web Application Security

THE TOP 4 CONTROLS.

Pragmatic Metrics for Building Security Dashboards

WRITTEN TESTIMONY OF

Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching, and Software Development

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Larry Wilson Version 1.0 November, University Cyber-security Program Controls Book

Integrated Threat & Security Management.

A New Approach to Assessing Advanced Threat Solutions

Continuous Network Monitoring

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

Continuous Diagnostics & Mitigation:

Program Overview and 2015 Outlook

Critical Controls for Effective Cyber Defense

IBM Security QRadar Vulnerability Manager

IBM Security Strategy

Windows Server 2003 End of Support. What does it mean? What are my options?

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

NERC CIP VERSION 5 COMPLIANCE

From the Bottom to the Top: The Evolution of Application Monitoring

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Attachment A. Identification of Risks/Cybersecurity Governance

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

The CAG An Earthquake in Security Compliance and How Security Is Measured ALAN PALLER DIRECTOR OF RESEARCH SANS INSTITUTE

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

Obtaining Enterprise Cybersituational

Leveraging SANS and NIST to Evaluate New Security Tools

OCIE CYBERSECURITY INITIATIVE

Enterprise Information Technology Security Assessment RFP Answers to Questions

Cybersecurity and internal audit. August 15, 2014

Is Penetration Testing recommended for Industrial Control Systems?

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Looking at the SANS 20 Critical Security Controls

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

The Next Generation Security Operations Center

Nine Steps to Smart Security for Small Businesses

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

Ben Hall Technical Pre-Sales Manager Barry Kew Pre-Sales Consultant

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Logging In: Auditing Cybersecurity in an Unsecure World

Criticial Need for Stronger Network Security. QualysGuard SaaS-based Vulnerability Management for Stronger Security and Verification of Compliance

Akamai Security Products

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

Information Security and Risk Management

Cybersecurity Awareness. Part 1

Extreme Networks Security Analytics G2 Vulnerability Manager

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING

20 Critical Security Controls

Transcription:

"Advanced new approach to solve critical controls Andrzej Kleśnicki Technical Account Manager Central Eastern Europe Warszawa, 9/10/2013

Before we start history lesson Dr Ignaz Philipp Semmelweis Born: 1st of June 1818, Buda Died: 13th of September 1865, Vienna

Lessons learned RouBne hygiene is important Simple measures can be quite effecbve Status quo is not always right approach Doing thing is not so imporbng as doing them right Wash your hands J

What about security? 96% of successful breaches can be avoided if the vicgm puts in place simple or intermediate control: According to report: James A. Lewis, Raising the Bar for Cybersecurity. Washington, DC: CSIS, 2013 To be more secure we just need to follow IS Security hygiene, that would be: ConBnuous EffecBve PrioriBsed That really works! Do we already have IS security hygiene guidelines? SANS TOP 20 CriGcal Controls for EffecGve Cyber Defense

SANS TOP- 20 CriBcal Security Controls Brief History of TOP-20 CSC In 2008, the Office of the Secretary of Defense asked the National Security Agency for help in prioritizing the myriad security controls that were available for cybersecurity with strong emphasis on "What really Works. The request went to NSA because NSA best understood how cyber attacks worked and which attacks were used most frequently. A consortium of U.S. and international cyberdefense agencies quickly grew, and was joined by experts from private industry and around the globe. Surprisingly, the clear consensus of the consortium was that there were only 20 Critical Controls that addressed the most prevalent attacks found in government and industry. This then became the focus for an initial draft document. The draft of the 20 Critical Controls was circulated in 2009 to several hundred IT and security organizations for further review and comment. Over 50 organizations commented on the draft. They endorsed the concept of a focused set of controls and the selection of the 20 Critical Controls. Last release - Version 4.1, March, 2013

SANS TOP- 20 CriBcal Security Controls 5 critical principles of effective cyber defense system as reflected in the Critical Controls are: 1. Offense informs defense: Use knowledge of actual attacks that have compromised systems to provide the foundation to build effective, practical defenses. Include only those controls that can be shown to stop known real-world attacks. 2. Prioritization: Invest first in controls that will provide the greatest risk reduction and protection against the most dangerous threat actors, and that can be feasibly implemented in your computing environment. 3. Metrics: Establish common metrics to provide a shared language for executives, IT specialists, auditors, and security officials to measure the effectiveness of security measures within an organization so that required adjustments can be identified and implemented quickly. 4. Continuous monitoring: Carry out continuous monitoring to test and validate the effectiveness of current security measures. 5. Automation: Automate defenses so that organizations can achieve reliable, scalable, and continuous measurements of their adherence to the controls and related metrics.

SANS TOP 20 CriBcal Controls

Qualys solubon for Very- High to Mid- High SANS CriBcal Controls Policy Policy I I I I P Po P Com Policy P Com Policy P Com Po WAS M Com WAS Ma M Web Application Scanning Detecti Web Application MaP Scanning Detecti Po Com P Policy P Com Policy Com

CC1: Inventory of Authorized and Unauthorized Devices Goal: EffecBve asset management ensures that assets are discovered, registered, classified, and protected from a_ackers who exploit vulnerable systems accessible via the Internet. How QualysGuard supports this: gives full asset visibility over live devices with network mapping: Size of Network Machine Types LocaBon detects authorized and unauthorised devices: Authorized Unauthorized offers full support for automabon Scans are scheduled (conbnuous, daily, weekly etc) Delta reports for changes AlerBng, BckeBng API for integrabon for example with Asset management tools

CC1: Inventory of Authorized and Unauthorized Devices

CC2: Inventory of Authorized and Unauthorized Socware Goal: EffecBve socware management ensures that socware are discovered, registered, classified, and protected from a_ackers who exploit vulnerable socware. How QualysGuard supports this: & POL gives full socware visibility with scanning: OperaBng Systems ApplicaBons Versions Patch Level & POL gives BlacklisBng of unauthorised socware and services & POL gives WhitelisBng of authorised socware and services provides InteracBve Search & POL offers full support for automabon Scheduled scans & reports Email reports AlerBng on excepbons TickeBng API for IntegraBon with Asset tools Policy

CC2: Inventory of Authorized and Unauthorized Socware Policy Policy

CC3: Secure Base ConfiguraBon Goal: EffecBve configurabon management ensures assets are configured based on industry standards and protected from a_ackers who find and exploit misconfigured systems. How QualysGuard supports this: ConfiguraBon validabon of each system Build in controls catalogue: CIS, SCAP, FDCC User Defined Controls Golden image policy ReporBng on deviabon from the baseline With full support for automabon Scheduled scans & reports Email reports AlerBng on excepbons TickeBng API for IntegraBon with GRC tools Policy

CC3: Secure Base ConfiguraBon Policy

CC4: ConBnuous Assessment/RemediaBon Goal: EffecBve vulnerability management will ensure that assets are monitored for vulnerabilibes and are patched, upgraded or services disabled to protect from exploit code. How QualysGuard supports this: Scheduled & On demand Scanning ConBnuous Assessment AuthenBcated Scanning Patch VerificaBon Report on Unauthorized Services With full support for automabon Scheduled scans & reports Email reports AlerBng on excepbons TickeBng with SLA metrics and confirmabon API for IntegraBon with IPS, SIEM etc

CC4: ConBnuous Assessment/RemediaBon C

CC5: Malware Defenses Goal: The processes and tools used to detect/prevent/correct installabon and execubon of malicious socware on all devices. How QualysGuard supports this: Scan can detect installed Malware by running malicious services AuthenBcated Scan can detect installed Malware in file- system and registries Report will report discovered Malware Web ApplicaBon Scan now contains Malware DetecBon Scan for web applicabons Policy StaBc signatures and Behavioural Analyses of HTML code I I Malware Scan of web apps prevent clients from being infected by corporate web sites WAS Web Application Scanning De

CC5: Malware Defenses Policy I I WAS Policy Web Application Scanning

CC6: ApplicaBon Socware Security Goal: EffecBve applicabon security ensures that developed and 3rd party delivered applicabons are protected from a_ackers who inject specific exploits to gain control over vulnerable machines. How QualysGuard supports this: Scheduled & On demand Web ApplicaBon Scanning OWASP TOP- 10 and WASC TOP- 10 VulnerabiliBes supported Web applicabon discovery (web crawling) User - AuthenBcaBon support Fully una_ended and automated Part of development lifecycle With full support for automabon Scheduled scans & reports TickeBng with SLA metrics and confirmabon API for IntegraBon with WAF Policy I I WAF provides acgve protecgon of corporate data and reputagon provided via web applicagon interface PrevenGon with WAS and ProtecGon with WAF available in the same UI and integrated security suite WAS Web Application Scanning Dete

CC6: ApplicaBon Socware Security I WAS MDS ulnerability anagement Policy I Web Application Scanning Malware Detection Service Web

SANS TOP 20 CriBcal Controls - REMINDER

Advance with QualysQuard delivers Very High and High effect on Cyber- A_ack MiBgaBon.

Qualys at a Glance A pioneer and leader in Cloud Security & QualysGuard Cloud Plamorm & Suite of Integrated SoluBons 6,000 + Customers 100 + Countries $95M LTM Revenues * The 12 months ended March 31 st 2013 23

Blue Chip Global Customer Base 63% F50 55% F100 40% F500 32% F1000-22% Forbes Global 2000 9 of top 10 in Socware 6,150 + Customers 8 of top 10 in Technology 8 of top 10 in Biotechnology 7 of top 10 in Retail 6 of top 10 in Chemical DAIMLER 6 of top 10 in Media 6 of top 10 in TelecommunicaBons 6 of top 10 in Car Manufacturing 6 of top 10 in Banking 5 of top 10 in Business Services Based on Forbes Global 2000 ClassificaBon 24

Free Services at your FingerBps www.qualys.com/secure 25

Thank You