Introduction Jim Rowland, Senior System Architect and Project Manager Daly



Similar documents
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Continuous Network Monitoring

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

THE TOP 4 CONTROLS.

Metrics that Matter Security Risk Analytics

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Vulnerability Management

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

CA Vulnerability Manager r8.3

BYOD and Your Business

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

Hope is not a strategy. Jérôme Bei

Case Study: Security Implementation for a Non-Profit Hospital

How To Buy Nitro Security

Risk Analytics for Cyber Security

VULNERABILITY MANAGEMENT

Critical Controls for Cyber Security.

Bringing Continuous Security to the Global Enterprise

SANS Top 20 Critical Controls for Effective Cyber Defense

Extreme Networks Security Analytics G2 Risk Manager

Critical Security Controls

Cybersecurity and internal audit. August 15, 2014

Devising a Server Protection Strategy with Trend Micro

NE T GENERATION CLOUD SECURITY PLATFORM

INCIDENT RESPONSE CHECKLIST

Overcoming PCI Compliance Challenges

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Devising a Server Protection Strategy with Trend Micro

The Protection Mission a constant endeavor

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Cisco Security Optimization Service

Cyber Security Metrics Dashboards & Analytics

PCI-DSS Penetration Testing

Attachment A. Identification of Risks/Cybersecurity Governance

Cyber Security RFP Template

Achieving SOX Compliance with Masergy Security Professional Services

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Security Information & Event Management (SIEM)

Mitigating the Risks of Privilege-based Attacks in Federal Agencies

Payment Card Industry Data Security Standard

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

FIVE PRACTICAL STEPS

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

Integrated Threat & Security Management.

PCI 3.0 Making Payment Security Business As Usual

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

Proactive Vulnerability Management Using Rapid7 NeXpose

The Role of Security Monitoring & SIEM in Risk Management

McAfee Database Security. Dan Sarel, VP Database Security Products

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

Advanced Threats: The New World Order

IBM Security QRadar Risk Manager

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Clavister InSight TM. Protecting Values

Checklist for Vulnerability Assessment

Audit Capabilities: Beyond the Checklist. Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Cybersecurity: What CFO s Need to Know

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI

White Paper: Consensus Audit Guidelines and Symantec RAS

IT Security Strategy and Priorities. Stefan Lager CTO Services

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Is your SIEM ready.???

How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Recent Developments in PCI DSS. PCI in the Headlines Risks to Higher Education PCI DSS Version 1.2

FIREMON SECURITY MANAGER

Managed Security Services

Extreme Networks Security Analytics G2 Vulnerability Manager

Network Security. Intertech Associates, Inc.

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

Database Security & Auditing

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

PCI DSS Reporting WHITEPAPER

SECURITY RISK MANAGEMENT. FIRST 2007 Seville, Spain

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

A HELPING HAND TO PROTECT YOUR REPUTATION

Defending Against Data Beaches: Internal Controls for Cybersecurity

Information Technology Solutions

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Daly Computers Webinar for MEEC: Moving to a Virtualized Environment

Vulnerability management lifecycle: defining vulnerability management

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

IBM Security QRadar Risk Manager

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Enterprise Security. Moving from Chaos to Control with Integrated Security Management. Yanet Manzano. Florida State University.

Information Technology Security Review April 16, 2012

GFI White Paper PCI-DSS compliance and GFI Software products

Virtualization Impact on Compliance and Audit

REVOLUTIONIZING ADVANCED THREAT PROTECTION

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

Transcription:

Introduction Jim Rowland, Senior System Architect and Project Manager Daly Stepping Up to Enterprise Vulnerability Management Keren Cummins, Director, Federal and MidAtlantic Markets ncircle Presentation to MEEC, November 15, 2011 ncircle 2011. All rights reserved.

Daly Proven track record with 25 years experience in State, Local and Education in Maryland. Minority Business Enterprise (MBE). Ability to provide the complete solution as all of the hardware, software and services discussed today are available on the MEEC contract as well as other state contracts. Robust Professional Services Offerings delivered by our Project Management and Systems Engineering Team. 2 ncircle 2011 All rights reserved. ncircle Company Confidential

A Quick Definition A Vulnerability is a known mistake in software that can be directly used by a hacker to gain access to a system or network. Adapted from CVE FAQs at http://cve.mitre.org/about/faqs 3 3 ncircle 2011 All rights reserved. ncircle Company Confidential

Vulnerability Scans Networks should be scanned for vulnerabilities Scans should be conducted periodically Internal resources Outsourced services Scan results should be prioritized for remediation Reports can be.lengthy 4 4 ncircle 2011 All rights reserved. ncircle Company Confidential

Agenda How does Vulnerability Assessment fit in with what I know about Cybersecurity? What is Vulnerability Assessment, and how is it different from Vulnerability Management? WHY do Vulnerability Management? What are the Benefits of an Enterprise Approach to VM A few words on Continuous Monitoring 5 5 ncircle 2011 All rights reserved. ncircle Company Confidential

IT Security Landscape Reactive Active Proactive Forensics Reporting Monitoring/Alerting/Blocking Auditing/Risk Assessment Security Information Management Firewalls Vulnerability Assessment Security Event Management IDS/IPS Data Encryption Configuration Compliance Log Management Antivirus/ Data Monitoring/Auditing Spyware Web App Scanning Data Leakage (DLP) File Integrity Monitoring Network Activity Monitoring IT-GRC Network/Data Behavior Analysis Identity Access Management Network Access Control (NAC) Network/Asset Discovery Data Discovery Email/SPAM/Gateway Network Topology Assessment Identity/Access Auditing 6 6 ncircle 2011 All rights reserved. ncircle Company Confidential

What is Vulnerability Assessment Wikipedia: A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, nuclear power plants, information technology systems, energy supply systems, water supply systems, transportation systems, and communication systems. A vulnerability assessment is a one-off event: It s time for our quarterly vulnerability assessment And then what? 7 7 ncircle 2011 All rights reserved. ncircle Company Confidential

Vulnerability *MANAGEMENT* Wikipedia again: "Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities" [1] It s not enough run a scan and know what your risks are How are you going to act on that information? Vulnerability management is an on-going program, not a technology solution 8 8 ncircle 2011 All rights reserved. ncircle Company Confidential

WHY Vulnerability Management? 6% 4% Patch Available for more than 1 Year (71%) 19% Patch Available for 6 to 12 Months (19%) Patch Available for 3 to 6 Months (6%) 71% Patch Available for 1 to 3 Months (4%) 9 9 ncircle 2011 All rights reserved. ncircle Company Confidential

Data Breaches in 2010 96% of breaches were avoidable through simple or intermediate controls 92% of attacks were not highly difficult 89% of victims subject to PCI-DSS had not achieved compliance 86% were discovered by a third party 83% of victims were targets of opportunity 76% of all data was compromised from servers Source: Verizon Business 2011 Data Breach Investigations Report 10 ncircle 2011 All rights reserved. ncircle Company Confidential

Vulnerability Management: Moving to an Enterprise Model I already take a snapshot of my network four times a year: I run scans of every network, analyze them, and produce lists of tasks for my security or operations team to chisel away at. When they remediate, I even run another scan to confirm. What s wrong with this? Why should I do this differently? Why should I do it more often? How much more often??!! 11 ncircle 2011 All rights reserved. ncircle Company Confidential

A Basic Enterprise Vulnerability Management System Centrally administered Distributed scanners stay in place Scan scheduling Role-based access control Reports 12 12 ncircle 2011 All rights reserved. ncircle Company Confidential

What do the basics buy me? Automate the scanning function set it and forget it, eliminate the repetitive work of going to each network and running a scan Automate the prioritization eliminate repetitive analytical work of reviewing scans Ensure complete coverage of the entire environment (including things you didn t know were there) Produce actionable data for the security team Have the data available when you are ready for it 13 13 ncircle 2011 All rights reserved. ncircle Company Confidential

Benefits of Continuous Monitoring: I make a movie of my network: Scans run in the background on an automated schedule all the time, collecting asset and vuln/config data. When team members have time to work on remediation, they pull data from the previous most recent scan and work on highest priority tasks. When a zero-day event occurs, I can instantly find vulnerable apps/oses using the previous days scan data. When something unusual happens (new device found, specific vuln or configuration of concern) I can be proactively alerted Oh and by the way, I can output reports to auditors or management on the fly 14 14 ncircle 2011 All rights reserved. ncircle Company Confidential

Characteristics of Solutions that Meet the Security- Savvy Model Highly automated scanning (so I don t mind scanning all the time) Extremely gentle, non-intrusive and low bandwidth scanning (so my system owners don t mind me scanning all the time) Powerful prioritization (so we don t get buried in TMI) Trending supported by host correlation (i.e., dynamic host tracking) Easy-to-use query feature against all findings Configurable alerts Broad variety of reporting templates to support self-service reporting for auditors, executives, managers, security experts and asset owners 15 15 ncircle 2011 All rights reserved. ncircle Company Confidential

Case Study: First Impressions Patch management needs work Systems outside of patch management control Types of software not being patched (typically non-microsoft) Compliance picture is complex Legacy systems and exceptions Systems out of security control management 16 16 ncircle 2011 All rights reserved. ncircle Company Confidential

Case Study: Second Impressions Inventory! How many routers, switches, Linux systems, etc. Software license utilization System management technology improves Packages for non-microsoft software Business processes improve Patch management coverage Reduction of non-compliant software (change control boards, software removal packages) Reduction of non-compliant systems (standard software builds, port security ) 17 17 ncircle 2011 All rights reserved. ncircle Company Confidential

Case Study: Additional Uses Incident response How was it configured? Who was using the system? Was it vulnerable to a specific attack? Risk modeling Modeling the network and systems Measuring real risk with a consideration of: Threat source Vulnerability Exposure Asset Value 18 18 ncircle 2011 All rights reserved. ncircle Company Confidential

The Case for New Tools Measure vulnerabilities Prioritize response Reduce attack surface Measure configuration compliance Standardize configuration controls Develop compliance reports Our Mantra: Measure often Be accurate and fair Report consistently and clearly 19 19 ncircle 2011 All rights reserved. ncircle Company Confidential

ncircle at a Glance Corporate overview More than 5,500 customers worldwide Significant investment in R&D with 50% of employees in Engineering Ranked in Inc 5000 three years in a row Received highest rating of Strong Positive in Gartner's MarketScope for Vulnerability Assessment in 2010 and 2011 Ranked number one in Current Offering in Forrester Wave for Vulnerability Management in 2010 Continuous, consistent growth Three consecutive years of profitability through Q2 2011 ncircle s US Federal government business grew more than 65% year over year in 2010 Ranked in San Francisco Business Times Top 100 Fastest Growing Private Companies Teamed with Daly in the regional state/local/education market 20 ncircle 2011 All rights reserved. ncircle Company Confidential

ncircle Customers by Industry Financial Services & Insurance Government 21 ncircle 2011 All rights reserved. Healthcare & Pharmaceuticals Energy & Utilities Media & Leisure Retail & Consumer Goods ncircle Company Confidential

ncircle Analyst Reviews "ncircle The company's mixture of vulnerability scanning, Web application scanning, file-integrity monitoring and configuration management put it at the forefront of those trying to deliver risk-based security. " 451 Group, December 2009 Gartner Marketscope for Vulnerability Assessment With WebApp360, ncircle enhances the value of their enterprise-wide risk assessment to include on-going production scanning of these critical web-based applications, complementing the penetration testing that may have been done during development and enabling their ongoing security. As of February 2010 Source: Gartner Peter Christy, Internet Research Group ncircle addresses two of the most significant concerns of today s technology-dependent business: comprehensive risk control essential to security, risk and compliance efforts; and IT reliability improvement through more effective configuration management processes. Enterprise Management Associates Any organisation with a significantly sized IP infrastructure would benefit from using IP360, especially if heterogeneity is a feature, as this brings exposure to more threat types. Alan Rogers, Butler Group 22 ncircle 2011 All rights reserved. ncircle Company Confidential Source: Forrester Wave for Vulnerability Management, Q2 2010

Thank You Jim Rowland Senior System Architect and Project Manager Daly jwr@daly.com (301) 670-0381 ext. 335 Keren Cummins Director Federal and Midatlantic Markets ncircle kcummins@ncircle.com Phone: (301) 379-2493 23 ncircle 2011 All rights reserved. ncircle Company Confidential