Edvinas Pranculis MM, CISA, CISM

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

StanSource Inc. is Information Technology services and solutions providing organization engaged in providing a full range of solutions and services to.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Managing A Secure Infrastructure – Tales From the Trenches November 6, 2003.
Introducing Computer and Network Security
Chapter 1 Introduction. Art of War  If you know the enemy and know yourself, you need not fear the result of a hundred battles.  If you know yourself.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Website Hardening HUIT IT Security | Sep
Vulnerability Management Dimension Data – Tom Gilis 24 November 2011.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Computer Crime and Information Technology Security
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
HIPAA COMPLIANCE WITH DELL
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
World Future Society Washington, DC Executive Office of the President of the United States: The Need for New Capabilities Lessons From Singapore and the.
Akamai Technologies - Overview RSA ® Conference 2013.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
CC3020N Fundamentals of Security Management CC3020N Fundamentals of Security Management Lecture 2 Risk Identification and Risk Assessment.
Lecture 31 Risk Management. Introduction Information security departments are created primarily to manage IT risk Managing risk is one of the key responsibilities.
Denial of Service (DoS) Attacks: A Nightmare for eCommerce Jearanai Muangsuwan Strayer University.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Engineering Essential Characteristics Security Engineering Process Overview.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Frontline Enterprise Security
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
OTM 6.1 / GTM Update and Agility China Case Sharing.
Risk Identification and Risk Assessment
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Servers in the Wild… …and the threats that lurk about. DePaul University Information Security Team TLT Presentation 08 May 2002.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
Defining your requirements for a successful security (and compliance
Risk management «Once we know our weaknesses, they cease to do us any harm.» G.C. Lichtenberg.
CompTIA Security+ Study Guide (SY0-401)
Risk management.
Chapter 8 – Administering Security
Cybersecurity - What’s Next? June 2017
Backdoor Attacks.
Secure Software Confidentiality Integrity Data Security Authentication
Steven Hartman State Information Security Officer State of Nebraska
Healthcare Cloud Security Stack for Microsoft Azure
Risk Management: Principles of risk, Types of risk and Risk strategies
Understanding your enemy!
National Cyber Security
Network Security Best Practices
Insuring Against Catastrophes
Cyber System-Centric Approach To Cyber Security and CIP
Must cost less than possible Impact
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
IS Risk Management Framework Overview
Test 3 review FTP & Cybersecurity
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Chapter 1 Key Security Terms.
In the attack index…what number is your Company?
Presentation transcript:

How to REDUCE BUSINESS RISK by Implementing VULNERBILITY MANAGEMENT Process? Edvinas Pranculis MM, CISA, CISM Regional Account Manager – Eastern Europe & Central Asia November 21, 2018November 21, 2018

“If you KNOW YOURSELF, but NOT THE ENEMY, for every victory gained, you will suffer a defeat.” Sun Tzu “Art of War”, 6th century BC It is duty of system administrators and network security professionals to guard their infrastructure against exploits by knowing the enemy – the malicious hacker, who seek to use that very infrastructure for illegal activities.

Risk Management How to treat risk? Transfer Accept Mitigate Avoid Contain AS/NZS 4360:2004

Level of Risk = f (BI, LoT, LoV) Risk mitigation How to mitigate risk? Reduce Level of Threats Reduce Level of Vulnerabilities Reduce Business Impact (Asset Value) Detect Recover EFFECTIVENESS Level of Risk = f (BI, LoT, LoV)

“The hacker is an interesting entity “The hacker is an interesting entity. Hackers seek knowledge and are not afraid of solving problems or tapping into their brainpower. Hackers are sometimes stubborn, always clever, curious and intelligent, and constantly learning. They are thinkers who like to be challenged. Most often good hackers are also good programmers… never use exploits unless they know exactly what the code they’re executing is doing. Most of the time they only use exploits which they have written themselves…” Quote from internet KNOW THE ENEMY

KNOW YOURSELF “the countermeasure that will protect you, should a hacker scan your machines with a scanner, is to scan your own systems first… …make sure to address any problems and then a scan by a hacker will give him no edgе” Hacking Linux Exposed KNOW YOURSELF

NO SOFTWARE TO INSTALL & MAINTAIN QualysGuard Suite Vulnerability Management Policy Compliance PCI Compliance Web Application Scanning Malware Detection Seal “GO SECURE” NO SOFTWARE TO INSTALL & MAINTAIN

NO SOFTWARE TO INSTALL & MAINTAIN Annual Volume of Scans 500+ million IP audits (scans & maps) 7 000+ scanner appliances worldwide 85+ countries World's largest deployment 700 000+ unique IP addresses 220+ scanner appliances 52 countries

Wall of Fame Health Care Media Energy/Utilities Manufacturing Education Transportation Government Consumer Products

Wall of Fame Financial Services Chemical Insurance Portals/Internet Retail Technology Consulting

Strategic Partners Media

Vulnerability Management Benefits It gives you control and visibility to proactively manage your network security effectively and document compliance

“If you KNOW THE ENEMY and KNOW YOURSELF, you need not fear the result of a hundred battles.” Sun Tzu “Art of War”, 6th century BC

Vulnerability Management