New Security Rates Deliver Additional and Improved Protections

Slides:



Advertisements
Similar presentations
SL21 Information Security Board Mission, Goals and Guiding Principles.
Advertisements

The State of Security Management By Jim Reavis January 2003.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Customer confidential 1 Privilege Management Sean Moore Solutions Specialist.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Information Security Update CTC 18 March 2015 Julianne Tolson.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Web Application Firewall (WAF) RSA ® Conference 2013.
Chapter 6 of the Executive Guide manual Technology.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Small Business Security Keith Slagle April 24, 2007.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Computer Security By Duncan Hall.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IS3220 Information Technology Infrastructure Security
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
LANDesk Software Confidential Data Analytics LANDESK Day 5. March 2014 Jan Pisarik Technical Presales Manager.
Proactive Incident Response
Protect your Digital Enterprise
Sophos Central for partners and customers: overview and new features
Your Partner for Superior Cybersecurity
OIT Security Operations
The time to address enterprise mobility is now
Deployment Planning Services
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Common Methods Used to Commit Computer Crimes
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Hybrid Management and Security
Configuring Windows Firewall with Advanced Security
Compliance with hardening standards
Security Insights: How Microsoft Secures IT
Leverage What’s Out There
Cybersecurity Reference Architecture
Information Security Board
Forensics Week 11.
IS4550 Security Policies and Implementation
Office 365 Security Assessment Workshop
Cybersecurity Strategy
Shifting from “Incident” to “Continuous” Response
Securing the Threats of Tomorrow, Today.
Secure once, run anywhere Simplify your security with Sophos
How to Mitigate the Consequences What are the Countermeasures?
Implementing Client Security on Windows 2000 and Windows XP Level 150
IT Development Initiative: Status & Next Steps
Designing IIS Security (IIS – Internet Information Service)
Microsoft Data Insights Summit
In the attack index…what number is your Company?
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

New Security Rates Deliver Additional and Improved Protections

A quick history of the rates Two new rates Baseline – $23.60 per server, workstation Confidential systems – $162.90 per server in confidential systems Not all new money – pulled out security costs from other rates, they were lowered

Projects address multiple threats As we go through each initiative, the threat(s) being addressed are among these: Hackers – garden variety, organized crime – identity thieves Malware/social engineering Malicious insiders Human error No single silver bullet protection, multiple layers

Building/ensuring security programs Agency NIST compliance Ensure each agency has a focused security program The most critical point of success for security is that there is a daily grind toward results, identifying and mitigating risks, working on the correct priorities, making the necessary commitments This project includes the rewriting of policy, adopting control standards, and measuring agency progress Archer is a key component in reaching our objectives, host policy, track agency compliance, enhance governance Complimentary to the risk assessment mentioned earlier Brian has spoken to the plans and milestones

Identity/Access management Microsoft Identity Management (MIM) Consistent provisioning, improvement toward objective of least privilege, self-service password reset lessens social engineering risk Milestones Tool selection 9/28/15 Build/Pilot MSFT Identity Management 2/26/16 Status: Project with MSFT to setup MIM in IOT for PROD. DEV sites are setup to test. Pilot Self Service Password Reset 4/15/16 52% of phone calls for the helpdesk are password resets Two factor for elevated privileges TBD

Identity/Access management Avecto Remove local admin privileges from laptops Milestones Procure software 9/1/15 Implement pilot agency 3/31/16 Enforce at all agencies 8/31/16

Access management Cisco Identity service engine (NAC) – device authorization VPN, wireless, then the campus network Absorbed new responsibilities with current staff Milestones Server setup 12/23/15 Client VPN migration 8/1/16 Statewide wireless 6/30/16 Wired pilot – IOT 12/21/16

Application protection This is for Extranet apps, not IN.gov NetScaler web application firewall – protection from code vulnerabilities A layer of protection inhibiting hackers from exploiting vulnerabilities in source code (e.g. – cross site scripting, SQL injection, etc.) Milestones Two positions created and filled 9/15/2015 All applications behind proxy and monitored Variable Protections studied, enabled as feasible 12/31/2016

Asset management Archer is the tool (4 use cases – SecOps, SOC; Policy – NIST compliance, Asset management, Audit) Procurement in process through MSP Relational system linking key attributes for systems (apps), servers, databases, and workstations (warranty info, software, vulnerabilities) Milestones Procured Archer 4/30/15 Operational prod, dev - SOC 10/08/15 Created and filled 2 administrative positions 11/1/15 Award asset management consulting, development work 3/25/16 Asset management implemented (est.) 6/25/16

Vulnerability management Lumension – improved patch management Patched systems less vulnerable to malware Milestones Created and filled support position 9/1/2015 Phase 1: Pilot IOT/IDOA 1/29/16 Phase 2: Rollout client to all agencies 2/29/16

Auditing McAfee database auditing software Defend from mistakes, malicious insiders, rights abuse Milestones McAfee database auditing software purchased 2015 Testing with DWD 2015 Positions created, filled 12/1/15 Tools training 3/7/16 Project planning 3/14/16

Network Monitoring Security Operations Center Handling network events, MS-ISAC notifications – Level 1 duties Nick has shared details

Network monitoring Microsoft Advanced Threat Analytics Part of the Enterprise Mobility Suite (MIM as well) Threat analytics is designed to identify pass the hash attacks, remote execution, bruteforce, lateral movement and other anomalous behavior from AD, SIEM and other log sources Milestones Contract finalized 12/2/15 Procurement of servers complete 3/10/16 Implementation services complete 4/15/16

Email and network monitoring FireEye – improved malware detection Uses sandbox and broad threat identification sources to build extensive database Milestones POC completed 5/6/15 Product procured 9/1/15 Email protection implemented 10/1/15 Network protection implemented 12/8/15 Note – More than 2300 malware infections stopped since implementation

Endpoint protection McAfee ATD – Advanced Threat Detection (Sandbox) McAfee TIE – Threat Intelligence Exchange (database) Automated updates of protection at the endpoint Milestones McAfee implementation assistance 12/21/15 Enterprise monitoring 3/4/16 Enterprise blocking enforced 4/1/16

Training and awareness Statewide program Mascot vs. gamification Reviewed several training programs Objective is to procure yet this fiscal year Hurdles once purchased include method of tracking – ELM or through vendor

Research and Development Proofs of Concept Researching products we think can fill gaps – Pondurance, Morphic, Varonis, Dark Trace, FireEye, Tanium Beginning a Dell SecureWorks POC in the next few weeks – Intrusion detection/protection services Only product purchased from the POC was FireEye. All had value but for lack of fit or cost, they have not been pursued thus far.