i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.



Similar documents
CyberNEXS Global Services

Cisco Advanced Services for Network Security

The Protection Mission a constant endeavor

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Compliance Services CONSULTING. Gap Analysis. Internal Audit

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Intelligence Driven Security

Course: 10174B: Configuring and Administering Microsoft SharePoint 2010

Microsoft Services Premier Support. Security Services Catalogue

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

SINGLE COURSE. 136 Total Hours. After completing this course, students will be able to:

PENETRATION TESTING GUIDE. 1

John Essner, CISO Office of Information Technology State of New Jersey

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

spirent Test the security, performance and scalability of your app-aware infrastructure

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

NERC CIP VERSION 5 COMPLIANCE

IT Networking and Security

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

SECURITY. Risk & Compliance Services

MS 20413A: Designing and Implementing a Server Infrastructure

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Strategic Plan On-Demand Services April 2, 2015

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Course Outline: Course Designing and Implementing a Server Infrastructure

Cybersecurity Health Check At A Glance

ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Cybersecurity and internal audit. August 15, 2014

Securing Industrial Control Systems on a Virtual Platform

Designing and Implementing a Server Infrastructure

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Course 10174B: Configuring and Administering Microsoft SharePoint 2010

Streamlining Patch Testing and Deployment

Server-Virtualisierung mit Windows Server Hyper-V und System Center MOC 20409

DOBUS And SBL Cloud Services Brochure

Goals. Understanding security testing

Patch and Vulnerability Management Program

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Department of Management Services. Request for Information

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

Configuring and Administering Microsoft SharePoint 2010 Course 10174B; 5 Days, Instructor-led

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Critical Controls for Cyber Security.

Microsoft SharePoint 2010 Overview

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Sygate Secure Enterprise and Alcatel

Leveraging the Cloud. September 22, Digital Government Institute Cloud-Enabled Government Conference Washington, DC

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

Cyber Security Survey

Guideline on Auditing and Log Management

Library Systems Security: On Premises & Off Premises

SANS Top 20 Critical Controls for Effective Cyber Defense

Configuring and Deploying a Private Cloud

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

How can Cloud help your Security. Christophe Van Mollekot Solution Advisor Microsoft

Designing and Implementing a Server Infrastructure MOC 20413

Course 10174B: Configuring and Administering Microsoft SharePoint 2010

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

MS-10751: Configuring and Deploying a Private Cloud with System Center Required Exam(s) Course Objectives. Price. Duration. Methods of Delivery

Domain 1 The Process of Auditing Information Systems

Simplify Your Windows Server Migration

Server Virtualization with Windows Server Hyper-V and System Center

Cautela Labs Cloud Agile. Secured.

Information Technology Security Review April 16, 2012

"Charting the Course to Your Success!" MOC B Configuring and Administering Microsoft SharePoint Course Summary

Cost effective methods of test environment management. Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA

How To Protect A Virtual Desktop From Attack

2012 Honeywell Users Group Americas. Sustain.Ability. Rick Kaun - Honeywell. Cyber Security

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Configuring and Administering Microsoft SharePoint 2010

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Cyber R &D Research Roundtable

Private Cloud. One solution managed by Applied

Configuring and Administering Microsoft SharePoint 2013 Curso Personalizado en

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Vulnerability Management

Click to edit Master title style. How To Choose The Right MSSP

security changes with Orange focus on your business, we focus on your security

Course 20688A: Managing and Maintaining Windows 8

Autodesk PLM 360 Security Whitepaper

WORKSTATION MANAGEMENT STANDARD PROCEDURES

National Cyber Security Policy -2013

Protecting Organizations from Cyber Attack

Professional Services Overview

WORKSHOP Rethinking Cyber Security for Industrial Control Systems

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

STeP-IN SUMMIT June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)

Cisco Security Optimization Service

Carahsoft End-User Computing Solutions Services

Cloud Services Prevent Zero-day and Targeted Attacks Tom De Belie Security Engineer. [Restricted] ONLY for designated groups and individuals

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Cybersecurity The role of Internal Audit

Looking at the SANS 20 Critical Security Controls

CYBER SECURITY Audit, Test & Compliance

Transcription:

Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

2 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop

Product Overview inetwork, Inc. developed CLaaS, the Computer Lab as a Service, a product that provides companies with virtual computer lab environments. It also provides training organizations with the ability to deliver a hands on Cyber Security laboratory learning experience to their students. 4/3/2014 IEEE Cyber Security Workshop 3

CLaaS Computer Lab as a Service Virtual Computer Lab Replicate your entire environment Network (vlan, vwan) devices and IP addressing scheme Totally Isolated from corporate networks Both Physically and Electronically Ideal platform for Security Testing Patch and Upgrade Testing Practicing Event Response QA Testing

Think Hotel Services Rent a playground (virtual sandbox) Access Hotel Services (subject matter experts) Access to a library of operating systems Pay as you go - for just what you need Plan a party hire a banquet coordinator Our system engineers will set your table Replicate your network and computer systems Safe Testing in a secure environment

6 Mitigation Threats Patch testing is essential to mitigate malware Simulated Red Team attack scenarios ensure that response teams are well trained Rapid authentication testing Vulnerabilities Testing application versions for common vulnerabilities in a virtual environment reduces risk Deploy disruptive security tools in a virtual environment without destruction Test security settings in new OS versions 4/3/2014 IEEE Cyber Security Workshop

Security Testing Risk Assessment, Vulnerability Analysis Mitigate possible human error avoid affecting business operations Replicated network environment facilitates penetration testing, remediation and re-testing Replicated application servers perfect for complex OWASP testing patterns Perform disruptive and destructive testing in a secure and isolated environment Quickly restore baseline configurations

Cyber Gaps Built in application security security by design requires verification and validation testing Lack of Trained Workforce Safe playground for event management exercises Today s IT managers are being asked to do more with less (less resources, less budget and less time). inetwork s Computer Lab as a Service takes the testing lab to the next level and provides the infrastructure/support services necessary to host a virtual computer laboratory. Inside the CLaaS arenas, instructors can create their own networked environment and assign their on-site and remote students a variety of complex laboratory learning objectives 8 4/3/2014 IEEE Cyber Security Workshop

9 4/3/2014 IEEE Cyber Security Workshop

10 4/3/2014 IEEE Cyber Security Workshop

11 4/3/2014 IEEE Cyber Security Workshop

Patch and Upgrade Testing Automate Patch Testing Easily support multiple OS platforms Test new software/application releases Simulate large scale change management Exercise Roll-out plans before they cause problems Test new Operating Systems

Event Management Cyber Playground Simulate a variety of events Challenge IT Leaders - response skills Gauge IT Team - response and recovery times Preserve systems for Deep Dive forensics Red Team / Blue Team exercises

Software Application QA Testing Operating Expense vs. Capital Expense Rent vs. Buy Lower support costs Full Replication vs. Partial Simulation Use real IP addresses Software Application Testing Test rollout plans

Furnished Apartments Perfect for start-ups - No Long Term Commitments Custom, tailored, product testing environments Perform R&D in a private cloud environment Scalable for load testing Simulate various levels of security Test new software in a realistic playground environment Validate standards compliance

16 CLaaS from the CIO Perspective Pay as you go vs. capital expense Protect Production test in a simulated, replicated, isolated environment Train your staff run exercises to gauge and measure response team skills Resiliency quickly restore replicated environment after destructive testing 4/3/2014

17 CLaaS from the CIO Perspective Great for Startup companies Only pay for what you need when you need it Agile Testing Environment Resiliency quickly restore replicated environment after destructive testing Automate your security and patch testing 4/3/2014

18 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop