ETPG6 Five Low-Cost Security Takeaways 8/21 (Thursday) @ 3:30pm Governor s Ballroom CD. Presented by Jerry Askew, Eric Richards & Kevin Svec



Similar documents
Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Smart Business Architecture for Midsize Networks Network Management Deployment Guide

SANS Top 20 Critical Controls for Effective Cyber Defense

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Installing GFI LANguard Network Security Scanner

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

SAST, DAST and Vulnerability Assessments, = 4

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Secret Server Splunk Integration Guide

SapphireIMS 4.0 BSM Feature Specification

GFI White Paper PCI-DSS compliance and GFI Software products

How To Manage A Privileged Account Management

Data Stored on a Windows Computer Connected to a Network

SapphireIMS 4.0 Asset Management Feature Specification

Best Practices for Auditing Changes in Active Directory WHITE PAPER

Network Management Deployment Guide

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Symantec Client Management Suite 8.0

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Introduction to Network Discovery and Identity

Vistara Lifecycle Management

Endpoint protection for physical and virtual desktops

Pearl Echo Installation Checklist

5 REASONS START. why QuickBooks Enterprise Solutions is the right solution for you. Slide 1 of 9. ProTracksales.com

NetFlow Analytics for Splunk

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Protecting the Infrastructure: Symantec Web Gateway

SecureVue Product Brochure

The Comprehensive Guide to PCI Security Standards Compliance

Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures

FREQUENTLY ASKED QUESTIONS

SolarWinds Network Performance Monitor

How To Monitor Your Entire It Environment

Workflow Templates Library

SapphireIMS Business Service Monitoring Feature Specification

Addressing the United States CIO Office s Cybersecurity Sprint Directives

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Network Configuration Manager

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Computer networks - Administration 1DV202 Lab 2 Monitoring a small network

SolarWinds Network Performance Monitor NETWORK AVAILABILITY AND PERFORMANCE MANAGEMENT

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Active Directory Change Notifier Quick Start Guide

Concierge SIEM Reporting Overview

SolarWinds Network Performance Monitor

Table of Contents. Introduction...9. Installation Program Tour The Program Components...10 Main Program Features...11

How To Create Situational Awareness

Securing Remote Vendor Access with Privileged Account Security

NETWRIX FILE SERVER CHANGE REPORTER

Kaseya 2. User Guide. Version R8. English

<Insert Picture Here> Oracle Database Security Overview

What s New in Centrify DirectAudit 2.0

Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes!

WhatsUp Gold vs. Orion

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Complete Patch Management

Cisco Advanced Malware Protection for Endpoints

Key Considerations for Vulnerability Management: Audit and Compliance

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

CorreLog Alignment to PCI Security Standards Compliance

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Netwrix Auditor for Exchange

Privilege Gone Wild: The State of Privileged Account Management in 2015

Security issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers

Altiris Server Management Suite 7.1 from Symantec

HarePoint Password Change Manual

Complete Patch Management

TRIPWIRE NERC SOLUTION SUITE

BeyondInsight Version 5.6 New and Updated Features

McAfee Endpoint Protection Products

How To Achieve Pca Compliance With Redhat Enterprise Linux

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

NetWrix USB Blocker. Version 3.6 Administrator Guide

IBM Endpoint Manager Product Introduction and Overview

Server & Application Monitor

CloudPassage Halo Technical Overview

ICT Professional Optional Programmes

Buyer s Guide to Automated Layer 2 Discovery & Mapping Tools

LT Auditor+ for Windows

activecho Frequently Asked Questions

GFI Product Manual. Deployment Guide

Nine Network Considerations in the New HIPAA Landscape

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Secure Agent Quick Start for Windows

OBSERVEIT 6.0 WHAT S NEW

IPLocks Vulnerability Assessment: A Database Assessment Solution

Secret Server Qualys Integration Guide

Securing Data in Oracle Database 12c

Netwrix Auditor for SQL Server

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

Network device management solution

Enforcive / Enterprise Security

Providing a Enterprise File Share and Sync Solution for

SysPatrol - Server Security Monitor

Transcription:

ETPG6 Five Low-Cost Security Takeaways 8/21 (Thursday) @ 3:30pm Governor s Ballroom CD Presented by Jerry Askew, Eric Richards & Kevin Svec

Presenters: Jerry Askew, Eric Richards & Kevin Svec Five Low-Cost Security Takeaways Thank you for being here today August 21, 2014-3:30pm 4:30pm Governer s Ballroom CD

Five Low-Cost Security Takeaways With security being such a fundamental aspect of businesses survival, it s often forgotten that there are solutions available for minimal cost, that can offer a great deal of benefit to your organization.

KeePass Password Management Database

KeePass Password Management Database

KeePass Password Management Database Why use a Password Management Database Keep track of site registrations / when registered Generate truly secure passwords Use different passwords for each site Store Answers to secret questions Store key material, certificates, etc.

KeePass Password Management Database Why use KeePass Open Source offers auditing opportunity Multiplatform Windows, Linux, Android High Quality Application

KeePass Password Management Database KeePass Features Local Storage with Synchronization capability Multiple Export Options Auto-type with window recognition and macros Full text search File Attachments for key material, certs, etc.

KeePass Password Management Database Usage Tips Choose a strong master password or passphrase Not used anywhere else Back up frequently Key file can be used to supplement password

KeePass Password Management Database www.keepass.info

Splunk Log Correlation and Analysis

The Case for Log Correlation and Analysis Today s advanced attacks require more behavior-based analysis Detection abnormal user account activity Notification on escalation of privilege Detection of configuration changes on devices Unexplained process or file changes Forensics Quickly determining the extent of a compromise Lateral movement of attackers on the network Activity associated with compromised accounts Adhering to Security Frameworks or meeting compliance objectives HIPAA SOX GLBA Etc.

Log Management - Splunk Splunk allows you to aggregate, search, and visualize machine data Server runs on Windows, and most Linux distros Software installation is very simple Small deployments run easily on a single virtual machine Clients can send logs, text, or performance information using a variety of protocols and input methods Splunk offers a software Universal Forwarder agent that runs on Windows and Linux machines Splunk Apps and Add-ons extend the functionality of the base product The free version can index (collect) up to 500mb per day

Splunk Simple Free Form Search - SPL

Splunk Interesting Fields

Splunk Boolean Search

Splunk Data Statistics and Visualization

Splunk Data Statistics and Visualization

Splunk Security and Compliance Apps Over 180 security and compliance-related apps available for security Cisco, Microsoft, F5, Bluecoat, OSSEC, Juniper, Palo Alto, and many others. Free App for IP Reputation Leverages Project Honey Pot Threat Intelligence Database

Splunk Apps Splunk App for Enterprise Security Facilitate investigations Asset Investigator Threat Indicators Alerting

Splunk App for Windows Infrastructure

Splunk Online Sandbox

TrueCrypt Have reports of its death been exaggerated?

TrueCrypt Open Source Full Disk Encryption TrueCrypt On The Fly Full Disk Encryption (OTF FDE) Widely used and regarded as secure Original developers have stepped away as of May 28 th Despite the dramatic announcement: Independent audit is continuing Broad interest in continuing development Truecrypt.ch Watch Gibson Research www.grc.com/misc/truecrypt/truecrypt.htm

Lansweeper Asset Management

Asset Management Lansweeper Why Invest Resources In Asset Management? Most IT security-related efforts require a continuous inventory of what you are attempting to protect Ensure systems remain compliant with standard configurations Need a system of record with good intake and retirement process to reconcile other systems Detect theft and configuration changes

Asset Management Lansweeper What is Lansweeper Network Inventory? Runs on Windows XP SP3 to Windows Server 2012 Requires.NET Framework 4 SQL database is required 10 minute installation / configuration Price - $995 for one server and unlimited hosts Agentless scanning

Lansweeper Data Input via Discovery Automated Discovery of all types of network devices using Windows Credentials Active Directory Domains SSH Credentials SNMP Others

Lansweeper Manual Data Input Manual

Lansweeper Search

Lansweeper Asset Drill Down

Lansweeper Asset Drill Down

Asset Management Lansweeper Built In Reporting

Asset Management Lansweeper Custom Reports

Asset Management Lansweeper Sampling of Built-In Reports: New devices discovered All workstations/servers without anti-virus Automatic startup services currently stopped Shared folders (visible and hidden) Configuration changes Unauthorized administrators Custom Reports: Missing a software packages Computer uptime reports Uncategorized systems

Policies and Procedures Something Every Company Should Do Security isn t just about software: Application Policies Access Policies (Vendor Access) Social Engineering (Training the End-Users) Risk Assesments

Resources KeePass Password Database: http://www.keepass.info/ Lansweeper Network Inventory Installer File: http://lansweeper.com/getfile50.aspx Lansweeper Documentation: http://www.lansweeper.com/documentation.pdf Splunk Download: http://www.splunk.com/download Splunk Documentation: http://docs.splunk.com/documentation/splunk Splunk Search Commands Cheat Sheet: http://docs.splunk.com/images/a/a3/splunk_4.x_cheatsheet.pdf Splunk Apps for Security and Compliance: http://apps.splunk.com/apps/#/category/security_compliance TrueCrypt on Wikipedia: http://www.keepass.info/ Partnering for Cyber Resilience - http://www3.weforum.org/docs/wef_it_partneringcyberresilience_guidelines_2012.pdf SANS Critical Security Controls - http://www.sans.org/critical-security-controls

Questions We ll now open it up for questions

Thank You