Kevin Watson and Ammar Ammar IT Asset Visibility.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

IT Asset Management Status Update 02/15/ Agenda What is Asset Management and What It Is Not Scope of Asset Management Status of Key Efforts Associated.
© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Networking with Windows Vista.. Vista’s New Tools and Features The Network and Sharing Center Network Discovery Network Map Network Diagnostics.
Jim Purcell – Senior IT Auditor, UT System
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
COEN 252: Computer Forensics Router Investigation.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Storage Security and Management: Security Framework
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
An Introduction to IBM Systems Director
NovaTech You Focus on Your Business & We Focus on Your IT Managed Services.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Module 7 Planning Server and Network Security. Module Overview Overview of Defense-in-Depth Planning for Windows Firewall with Advanced Security Planning.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Overview Managing a DHCP Database Monitoring DHCP
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
Configuring Network Access Protection
Chapter 2 Securing Network Server and User Workstations.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Information Security tools for records managers Frank Rankin.
Applying the CIS Critical Security Controls to the Cloud
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Eric Van Horn Cosc 356.  Nearly every organization in todays era uses computers and a network to send, receive, and store information  Very important.
“Enterprise Network Design and Implementation for Airports” Master’s Thesis - Ashraf Ali Department of Computing and Information Sciences This project.
Onsite CRM Security
Your Partner for Superior Cybersecurity
Chapter 7. Identifying Assets and Activities to Be Protected
Securing Network Servers
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Automating Security Frameworks
Security Standard: “reasonable security”
Implementing Network Access Protection
Vulnerability Scanning with Credentials
“Enterprise Network Design and Implementation for Airports” Master’s Thesis: By Ashraf Ali and advised by professor Nicholas Rosasco Introduction Practical.
Firewalls.
Extended Authentication Protocol (EAP) Vulnerabilities exploited through Rogue Access Points Stephen Cumella.
Implementing and Auditing the Critical Controls
ISMS Information Security Management System
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Intrusion Detection system
Network hardening Chapter 14.
Technology Convergence
Designing IIS Security (IIS – Internet Information Service)
Protection Mechanisms in Security Management
Presentation transcript:

Kevin Watson and Ammar Ammar IT Asset Visibility

The University of Tennessee Health Science Center What is Total Asset Visibility? Capability to provide users with timely and accurate information Capability to act upon that information to improve overall performance Location Movement Status Identity of units Personnel Equipment Material Supplies

The University of Tennessee Health Science Center Total Asset Visibility As applied to IT Hardware Software Endpoints Portable devices Servers Network/infrastructure devices “If it has an IP Address, it is an asset, and you need visibility into it.”

The University of Tennessee Health Science Center Why is it important? SANS 20 Critical Controls for an Effective Cyber Defense Without knowing what you have, you can’t effectively protect it Attackers continuously scan target organizations waiting on vulnerable systems to appear on the network Devices off and on the network Out of date devices New systems and applications

The University of Tennessee Health Science Center Foreign systems should be isolated to prevent compromises from affecting security Test systems Vender portables Personal assets Guest systems BYOD is becoming increasingly common

The University of Tennessee Health Science Center How do we do it? Managed control 1.Deploy and leverage asset discovery tool to build an inventory 2.Deploy dynamic host configuration protocol (DHCP) server logging 3.Ensure all IP enabled acquisitions update the inventory system as new, approved devices

The University of Tennessee Health Science Center 4.Inventory should include every system that has an Internet protocol (IP) address Network IP address(es) Hostname Function of system Asset owner, steward, and custodian Business units serviced Portable? Personal? 5.Use network level authentication via 802.1x and tie inventory data to determine authorized and unauthorized systems 6.Network Access Control (NAC) monitors authorized systems to facilitate remediation when necessary

The University of Tennessee Health Science Center How does this help the organization? Accounts for and manages inventory Network devices can be reconciled with the asset inventory Active scanning tools and passive listening tools can pair to improve detection of new or unauthorized devices Switches can be configured to implement 802.1x Only properly configured devices can connect to the network

The University of Tennessee Health Science Center Effectiveness Metrics Average time to detect a new devices Average time for scanners to alert the security administrators to unauthorized devices Average time to isolate/remove unauthorized devices Ability to identify location, department, and other critical details about the detected, unauthorized device SANS, controls/control/1

The University of Tennessee Health Science Center What tools can help?

The University of Tennessee Health Science Center Questions?

The University of Tennessee Health Science Center Contact information Kevin Watson Ammar