OIT User Conference Security Team November 2014



Similar documents
IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IBM QRadar Security Intelligence April 2013

Cybersecurity Health Check At A Glance

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Q1 Labs Corporate Overview

What is Security Intelligence?

Current IBAT Endorsed Services

McAfee Server Security

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Security Information & Event Management (SIEM)

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

TCS Managed Security Services

Endpoint protection for physical and virtual desktops

The Protection Mission a constant endeavor

Data Protection McAfee s Endpoint and Network Data Loss Prevention

Critical Security Controls

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

Goals. Understanding security testing

FIVE PRACTICAL STEPS

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Modular Network Security. Tyler Carter, McAfee Network Security

Endpoint protection for physical and virtual desktops

Managed Security Services Portfolio

Ecom Infotech. Page 1 of 6

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

How To Manage Your Information Systems At Aerosoft.Com

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Worldwide Security and Vulnerability Management Forecast and 2013 Vendor Shares

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

RSA Security Analytics

Vulnerability. Management

A HELPING HAND TO PROTECT YOUR REPUTATION

Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Four Top Emagined Security Services

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Seven Strategies to Defend ICSs

End-user Security Analytics Strengthens Protection with ArcSight

McAfee Endpoint Protection Products

2012 Data Breach Investigations Report

RSA Security Anatomy of an Attack Lessons learned

The Benefits of an Integrated Approach to Security in the Cloud

Enabling Security Operations with RSA envision. August, 2009

NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES

Tivoli Security Information and Event Manager V1.0

Endpoint Security for DeltaV Systems

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

Peter Dulay, CISSP Senior Architect, Security BU

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Intel Security Certified Product Specialist Data Loss Prevention Endpoint (DLPe)

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

McAfee Security Architectures for the Public Sector

IBM Managed Security Services for Network Firewalls

CLOUD GUARD UNIFIED ENTERPRISE

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Supplier Information Security Addendum for GE Restricted Data

Nessus and Antivirus. January 31, 2014 (Revision 4)

IBM Global Technology Services Preemptive security products and services

IBM Security QRadar Vulnerability Manager

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Enterprise Security Solutions

SANS Top 20 Critical Controls for Effective Cyber Defense

Payment Card Industry Data Security Standard

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

The Role of Security Monitoring & SIEM in Risk Management

Securing the Service Desk in the Cloud

KEY STEPS FOLLOWING A DATA BREACH

Industrial Security for Process Automation

IBM Internet Security Systems products and services

PCI Requirements Coverage Summary Table

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Under the Hood of the IBM Threat Protection System

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

Patch and Vulnerability Management Program

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Overcoming PCI Compliance Challenges

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Extreme Networks Security Analytics G2 Vulnerability Manager

Transcription:

OIT User Conference Security Team November 2014

Welcome and Introductions What will we be covering today? Introductions Office of Information Security and Privacy (OISP) and the Transformation effort Staffing Model and Points of Contact Standup of New Enterprise Services Short and Long Term Roadmaps

Transition to Operations Enterprise Security Control Offerings Over the course of the IT Transformation planning effort, the IT Security working group determined a new direction for Information Security.

Transition to Operations Enterprise Security Control Offerings The OISP now offers managed security services for the enterprise in addition to its traditional role in security governance, coordination and consultation, which includes: Vulnerability Management Intrusion Prevention Endpoint Protection Monitoring and Incident Response

Security Operations Structure Note: This structure includes consulting resources which are onboard or in progress this FY which do not appear on the Optimization slide.

Key Points of Contact Customer Service Center 614.644.6860 OISP 614.644.9391 Bob Pardee, Deputy CISO 614.387.1632 Jillian Burner, CND Manager 614.387.0320 Russ Forsythe, Vulnerability Mgr. 614.995.1534 Senior Security Engineer Coming soon

Security Team

OISP Services OISP Services Includes: Vulnerability Management Security Engineering Enterprise Endpoint Protection Security Incident and Event Management Monitoring and Incident Response

Vulnerability Management Vulnerability Management Includes Vulnerability scanning and reporting services statewide Advice and consulting for vulnerability impact and remediation Web application scanning Penetration Testing

Vulnerability Management Current Status Vulnerability Scanning services using Qualys is currently being rolled out to all agencies. Limited resources are available for penetration testing, but contact us if your agency is interested. Qualys Vulnerability Scanning OISP Penetration Testing

Security Engineering Security Engineering Includes Intrusion Prevention Systems IBM XGS (former Proventia) IPS Security Incident and Event Management IBM Qradar Antivirus, Host Intrusion Prevention, Web Safety Checking McAfee Encryption McAfee (whole disk & file/folder) Scanning for indicators of compromise and other weaknesses McAfee RealTime

Security Engineering Current Status Security Engineering is currently staffing the team and will continue through the end of FY15.

Enterprise Endpoint Protection Enterprise Endpoint Protection Includes Deployment of a full suite of McAfee endpoint protection software to every workstation and server owned by the state: Antivirus Host Intrusion Prevention Host Firewall Endpoint Encryption File & Folder Encryption Port and Device Control Pre-boot scanning Software Whitelisting Compliance Measurement Optimized Scanning for VDI Data Loss Prevention Realtime

Enterprise Endpoint Protection Current Status All cabinet agencies to be engaged by the end of CY14 and the project completion is scheduled for the end of CY15.

Security Incident and Event Management Security Incident & Event Mgmt. Includes Collection and correlation of log and event information from devices throughout the state Proactive alerting and forensic capabilities Visible to customers Works in support of the Monitoring & Incident Response team

Security Incident and Event Management Current Status The Security Incident and Event Management service has been deployed and is in use within OIT. The sensors have been deployed in several agencies.

Monitoring and Incident Response Monitoring and Incident Response Includes 24x7 Monitoring of events from Qradar 24x7 Response to security tickets submitted to the Customer Service Center Advice on remediation Escalation path for security issues

Monitoring and Incident Response Current Status The consulting staff is in place and the first permanent Analyst is in the hiring process. We will gradually move to 24x7 by the end of the fiscal year.

Roadmap Near Term Web Application Firewall is integrated into the load balancers Advanced endpoint protections: Change Control Pre-boot scanning USB and CD/DVD write control Application whitelisting Compliance measurement Client-side vulnerability checks all parts of the McAfee suite

Roadmap Near Term Data Loss Prevention Will begin with McAfee client-side components and continue with the investigation of network DLP products.

Roadmap Long Term Several technologies under review: Review/refresh of DAM product Centrally managed web filtering solution Privileged credential management System to support user provisioning flow

Thank You! Thank you! We know all of this change can make for a challenging time, we would like to thank you and your agencies for the hard work your teams are putting into helping us improve the security posture of the State of Ohio.

Security Discussion What are your security challenges? How can we help you? We want to hear from you!

Questions or Suggestions?