National Cybersecurity Assessment and Technical Services: Capability Brief. Presented by: Sean McAfee Updated: May 5, 2014

Similar documents
National Cybersecurity Assessment and Technical Services

Department of Homeland Security

National Cybersecurity Assessment and Technical Services (NCATS) Year-End Engagement Report 2014

DHS Cyber Security & Resilience Resources: Cyber Preparedness, Risk Mitigation, & Incident Response

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

ESKISP Direct security testing

ESKISP Manage security testing

Homeland Security Lessons Learned: An Analysis from Cyber Security Evaluations

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Overview TECHIS Carry out security testing activities

Patch and Vulnerability Management Program

VULNERABILITY MANAGEMENT AND RESEARCH PENETRATION TESTING OVERVIEW

Payment Card Industry (PCI) Penetration Testing Standard

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

Department of Management Services. Request for Information

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Managed Service Solutions Catalogue. MANAGED SERVICES SOLUTIONS CATALOGUE MS Offering Overview June 2014

SECURITY. Risk & Compliance Services

Network Security Audit. Vulnerability Assessment (VA)

ESKISP Conduct security testing, under supervision

Minimizing Risk Through Vulnerability Management. Presentation for Rochester Security Summit 2015 Security Governance Track October 7, 2015

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Defending against modern threats Kruger National Park ICCWS 2015

US-CERT Year in Review. United States Computer Emergency Readiness Team

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Guideline on Vulnerability and Patch Management

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Critical Controls for Cyber Security.

Cybersecurity and internal audit. August 15, 2014

Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

IT Security Testing Services

Department of Homeland Security

White Paper. Information Security -- Network Assessment

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Cisco Advanced Services for Network Security

NASCIO 2015 State IT Recognition Awards

Information Security Services

CYBER SECURITY GUIDANCE

CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool

CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS

NERC CIP VERSION 5 COMPLIANCE

Cyber R &D Research Roundtable

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

White Paper The Dynamic Nature of Virtualization Security

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Technical Testing. Network Testing DATA SHEET

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Cloud Infrastructure Security Management

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Current IBAT Endorsed Services

A COMPLETE APPROACH TO SECURITY

Top 20 Critical Security Controls

Resources and Capabilities Guide

IoT & SCADA Cyber Security Services

Priority III: A National Cyberspace Security Awareness and Training Program

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Information Technology Security Review April 16, 2012

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

G-Cloud Definition of Services Security Penetration Testing

Access FedVTE online at: fedvte.usalearning.gov

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Concierge SIEM Reporting Overview

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

PUTTING NIST GUIDELINES FOR INFORMATION SECURITY CONTINUOUS MONITORING INTO PRACTICE

Security Risk Management For Health IT Systems and Networks

Cyber Security solutions

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

Cisco Security Optimization Service

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

Security Control Standard

How To Manage Security On A Networked Computer System

I n f o r m a t i o n S e c u r i t y

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

THE TOP 4 CONTROLS.

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Transcription:

National Cybersecurity Assessment and Technical Services: Capability Brief Presented by: Sean McAfee Updated: May 5, 2014

Program Overview Offer Full-Scope Red Team/Penetration Testing Capabilities Services are tailored to fit agency requirements Risk and Vulnerability Assessments (RVA) Cyber Hygiene (CH) Independent (third party) review; results of assessment will not be shared or disseminated Services provided at No-Cost to agencies 2

Objective and Benefits Proactive engagement to improve overall cyber security posture Identify risks, and provide risk mitigation and remediation strategies Provide access to high demand, limited supply expertise and resources at no cost Complement an agency s existing security program and capabilities Provide an objective view of an agency s security posture 3

RVA Services and Capabilities Service Description Internal/ External to Customer Network Vulnerability Scanning and Testing Penetration Testing Social Engineering Wireless Discovery & Identification Web Application Scanning and Testing Conduct Vulnerability Assessments Exploit weakness or test responses in systems, applications, network and security controls Crafted e-mail at targeted audience to test Security Awareness / Used as an attack vector to internal network Identify wireless signals (to include identification of rogue wireless devices) and exploit access points Identify web application vulnerabilities Both Both External Internal Database Scanning Security Scan of database settings and controls Internal Operating System Scanning Security Scan of Operating System to do Compliance Checks (ex. FDCC/USGCB) Both Internal 4

RVA Process Pre ROE Agency contacted Briefed on NCATS services Service is Requested Schedule Confirmed ROE Distributed/Agency signs ROE Pre Assessment (Minimum) 2 weeks Assessment 2 weeks Reporting 3 weeks Pre-Assessment Package Distributed Receive Completed Pre-Assessment Package Conduct Pre-Assessment Teleconference Receive Pre-Assessment Artifacts (1 week) Off-Site Assessment Activities On-Site Assessment Activities Draft Report Started/Completed Submit Draft Report to Agency Receive Draft Report with Agency Comments Q&A Process Started/Completed Post Assessment 1 week Final Draft Completed Final Report Delivered to Customer Assessment Out brief 5

RVA Report Snapshots 6

Cyber Hygiene (CH) Overview Cyber Hygiene activities focus on increasing the general health and wellness of the cyber perimeter by broadly assessing NCCIC stakeholders internet accessible systems for known vulnerabilities and configuration errors on a recurring basis. As potential issues are identified the NCATS team will work with impacted agencies to proactively mitigate threats and risks to their systems prior to their exploitation by malicious third parties. Agency specific data is for the agency s eyes only Objectives Establish an enterprise view of the FCEB, SLTT, and critical infrastructure public cybersecurity posture Understand how we appear to an attacker Benefits Complements an agency s existing security program and capabilities Provides an objective view of an agency s public security posture Reduced exposure to known threats 7

Cyber Hygiene Activities Network Mapping Identify a Department / Agency s public IP address space Identify hosts that are active on IP address space Determine the O/S and Services running on the active hosts Re-run scans to determine any changes on IP address space Graphically represent address space/system on geographical map Network Vulnerability & Configuration Scanning Identify network vulnerabilities and weaknesses Identify common configuration errors in scanned assets such as Improperly signed Domains (DNSSEC) 8

CH Sample Report Snapshots 9

Questions? NCATS_INFO@hq.dhs.gov 10