Including Shadow IT in Your Vulnerability Management Program. Diane Garey Tenable Product Marketing



Similar documents
Managing Enterprise Devices and Apps using System Center Configuration Manager

Eliminating Cybersecurity Blind Spots

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

THE TOP 4 CONTROLS.

VULNERABILITY MANAGEMENT

Security Issues in Cloud Computing

Data In The Cloud: Who Owns It, and How Do You Get it Back?

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

IBM QRadar Security Intelligence April 2013

Attachment A. Identification of Risks/Cybersecurity Governance

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Cloud Courses Description

Security Inspection Inc. Solutions to secure your network

SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Continuous Network Monitoring

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Sarbanes-Oxley Compliance for Cloud Applications

Cloud Courses Description

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

THE BLUENOSE SECURITY FRAMEWORK

ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps

#ITtrends #ITTRENDS SYMANTEC VISION

Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses

Critical Security Controls

The Cloud App Visibility Blindspot

PCI Compliance for Cloud Applications

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Click to edit Master title style

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

Cybersecurity: What CFO s Need to Know

GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE

NE T GENERATION CLOUD SECURITY PLATFORM

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led

How To Manage Security On A Networked Computer System

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

The agile Cloud Brokerage approach. An innovative, business aligned and mature IT services delivery model!

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

2012 NCSA / Symantec. National Small Business Study

IT AUDIT WHO WE ARE. Current Trends and Top Risks of /9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

Westcon Presentation on Security Innovation, Opportunity, and Compromise

Cyber Security. John Leek Chief Strategist

Enterprise Cloud Backup of Cloud-Based Applications/Platforms

Nine Network Considerations in the New HIPAA Landscape

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

How to Grow and Transform your Security Program into the Cloud

AirWatch Solution Overview

How to Keep a Cloud Environment Current, Secure and Available October 16, 2014

The Incident Response Playbook for Android and ios

10 Hidden IT Risks That Might Threaten Your Law Firm

DATA BREACH RISK INTELLIGENCE FOR HIGHER ED. Financial prioritization of data breach risk in the language of the C-suite

Managing Mobility in the BYOD Era:

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

IT Security & Compliance. On Time. On Budget. On Demand.

20696B: Administering System Center Configuration Manager and Intune

Third Party Security: Are your vendors compromising the security of your Agency?

Ben Hall Technical Pre-Sales Manager

Cisco & Big Data Security

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Bringing Continuous Security to the Global Enterprise

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Microsoft Enterprise Mobility Suite

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

HIPAA and HITECH Compliance for Cloud Applications

Information Technology Security Review April 16, 2012

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Big Data and Security: At the Edge of Prediction

Copyright 11/1/2010 BMC Software, Inc 1

FFIEC Cybersecurity Assessment Tool

Introduction to QualysGuard IT Risk SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Information Technology General Controls And Best Practices

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

AUTOMATING THE 20 CRITICAL SECURITY CONTROLS

SNOW SOFTWARE. Fredrik Spolén Country Manager Sales Director. Norway Denmark Finland

Mobile Device Management for CFAES

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Transcription:

Including Shadow IT in Your Vulnerability Management Program Diane Garey Tenable Product Marketing dgarey@tenable.com

Today s Discussion What is Shadow IT Why make it part of your vulnerability management program How to include it

What is Shadow IT

Shadow IT Information-technology systems and solutions built and used inside organizations without explicit organizational approval. What Storage / files IaaS SaaS / Subscription Examples Dropbox, Box, Google Apps Amazon, Azure, Google Compute Engine Online chat, LMS Web survey, polling tools, Adobe

Shadow IT? You miss a lot of systems as you grow or if someone leaves. We had a web server that was set up by an outside vendor for our PR department. Web designers didn t manage the box; they just used the services on the machine.

Shadow IT? https://www.tenable.com/whitepapers/byod-and-mobile-security-2016-spotlight-report

Shadow IT by the Numbers 80% of survey respondents admitted to using non-approved SaaS applications in their job per Frost & Sullivan. 8%...companies that know the scope of shadow IT at their organizations, according to a survey by the Cloud Security Alliance. 742 37%...Unsure if mobile devices were involved in security breaches in their organization in the past...average number of cloud services used by government agencies in the USA and Canada; 10-20 times more than the IT department manages via a study of 800,000 by Skyhigh Networks

Why Make Shadow IT Part of Your Vulnerability Management Program

Security Frameworks The first step in most security frameworks is to inventory assets CIS Critical Security Controls CSC 1: Inventory of Authorized and Unauthorized Devices

Framework Core Categories Identify Protect Detect Respond Recover Asset Management Access Control Anomalies & Events Response Planning Recovery Planning Business Environment Awareness & Training Security Continuous Monitoring Communication Improvements Governance Data Security Detection Process Analysis Communications Risk Assessment Risk Management Strategy Information Protection & Procedures Maintenance Protective Technology Mitigation Improvements

Freemium -> Cost

Cloud Shadow IT Risk http://darkmatters.norsecorp.com/2015/06/09/security-vulnerabilities-take-average-of-103-days-to-remediate/ https://www.grahamcluley.com/2015/04/dropbox-leak-tax-return/

Mobile Shadow IT Risk

How to Include Shadow IT in Vulnerability Management

Vulnerability Management More than vulnerability scanning Process to find, rate, remediate, and track progress Should be about context, context and more context Find Prioritize Allows for the following: Meeting compliance or regulator goals Defined success factors Measurable Repeatable Fix

Including Shadow IT in Vulnerability Management

Continuous Visibility Responses: VM Visibility Challenge: Active scanning alone misses Shadow IT Use multiple discovery techniques: Active scanning Passive network scanning Log analysis Integrate Mobile Device Management (MDM) integration

Example: Mobile Device Management With Mobile Device Management, you set policies for devices to follow: Enable remote wipe Turn on encryption Set complex passcodes Integrate MDM auditing with your VM solution Automatically audit MDM results Flag devices that don t adhere to policy

Critical Context Meet the Challenge: VM Context Challenge: Difficult to know true risk Limit data access DRMs Control who has access ACLs Shadow IT <-> known asset relationships Passive monitoring Log data

Example: Using Google Drive for Sharing Files Risks: No control over what data is shared No control where shared data is going No control over who is able to share Responses Use DRM to limit access to data Use ACL to limit where data can go Evaluate alternatives. E.g., Google Enterprise Monitor cloud services and relationships

Decisive Action Responses: VM Action Challenge: Using limited resources most effectively Use all the data Passive monitoring Log data Threat intelligence Track progress Frameworks Analytics

Example: Cybersecurity Framework Challenge: Want to follow best practice advice How to evaluate and communicate? How to improve CSF conformance posture? How to use CSF to prioritize security investments? Responses: Automate assessment of controls Centralize data storage Track and communicate progress

About Tenable Network Security

Founders of Nessus

Pioneers of Continuous Monitoring INTELLIGENT CONNECTORS AGENT SCANNING PASSIVE LISTENING ACTIVE SCANNING SCCV HOST DATA INTEGRATED PLATFORM

Tenable by the Numbers Greater than $100M Revenue 650+ Employees Global Distribution 20 Countries (vs. <6 in 2014) 20,000 Customers Major Investments in Field, Sales, Channel $300M Invested 15-20% of Business is Federal Government

Thank You! More Info https://www.tenable.com/solutions /shadow-assets Thank You! dgarey@tenable.com @dianegarey