The Technology Tool Kit version 2.0 August 2014 Presenter: Deborah Watson InfraGard Houston Chapter - SIG Security Guide & Tool Development Manager.

Slides:



Advertisements
Similar presentations
©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 3D Security Analysis Report Tool.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Security and Personnel
David A. Brown Chief Information Security Officer State of Ohio
Network Security and Audits LITN Fall Conference 2006 Presented by Katie Givens Mosaic.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Security Controls – What Works
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Or, How to Spend Your Weekends… Fall 2007 Agenda General Overview of the CISO Arena Technical Security Information Security Strategic Security Kirk Bailey.
LittleOrange Internet Security an Endpoint Security Appliance.
Controls for Information Security
Security Certification
Administration Of A Website Information Architecture November 17, 2010.
Glenn Research Center at Lewis Field Software Assurance of Web-based Applications SAWbA Tim Kurtz SAIC/GRC Software Assurance Symposium 2004.
Website Hardening HUIT IT Security | Sep
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Securing Information Systems
A First Course in Information Security
SecureAware Building an Information Security Management System.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Roles and Responsibilities
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
GOC Technical Architecture GoC Position on Open Source Presentation to eGovOS Open Source in Government Series March 15, 2004.
K-12: Transitioning from ACSIP to INDISTAR Title I Department: Little Rock School District Supplemental Training Module.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Privacy & Security Policy Meets Technology at the Crossroads: Best Practice Methods & Approaches to Developing Organizational Frameworks to Avoid Collision.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
0 eCPIC User Training: Resource Library These training materials are owned by the Federal Government. They can be used or modified only by FESCOM member.
IS Network and Telecommunications Risks Chapter Six.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
1 Microsoft Project Solution Offerings and the next chapter of EPM September 17th, 2003 Brendan Giles, PMP Systemgroup Management Services.
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Enterprise Service Management (ESM) An Approach for Adopting and Adapting Best Practice Programs to Manage, Secure and Improve an Organizations Information.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
Security Awareness – Essential Part of Security Management Ilze Murane.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
The Records Management Vision The Records Management Vision: Our Journey Towards Solutions for Everyday Life Ronald G. Smith, CRM Records and Information.
© Cloud Security Alliance, 2015 March 2, Agenda © Cloud Security Alliance, 2015 The SecaaS Working Group Recent Activity Charter Category outline/templates.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
White Paper: Enterprise Encryption and Key Management Strategy 1 Vormetric Contact: Name: Tina Stewart (send traffic.
Managing Compliance for All Departments
OIT Security Operations
Cybersecurity - What’s Next? June 2017
Patch Management Patch Management Best Practices
TECHNOLOGY GUIDE THREE
Capabilities Matrix Access and Authentication
InfraGard: An Alliance for Infrastructure Protection
I have many checklists: how do I get started with cyber security?
Cybersecurity Strategy
Deana Uhl Senior Director – Technology,
Response to Intervention R. E. A. C. H
Let’s Respond Toolkit Website Introduction
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Group Meeting Ming Hong Tsai Date :
UDTSecure TM.
Presentation transcript:

The Technology Tool Kit version 2.0 August 2014 Presenter: Deborah Watson InfraGard Houston Chapter - SIG Security Guide & Tool Development Manager

agenda Agenda Introduction Technology Tool Kit (TTK) Navigation From InfraGard Site Program Phases Tool Categories Questions

Introduction Deborah Watson - SIG Security Guide & Tool Development Manager Deborah Watson is a Solutions Architect in the Assessments and Compliance practice at Accudata. Ms. Watson has more than 15 years of experience in the information technology and security fields. For the past several years Ms. Watson has been assisting CIO/CISO/s with developing long term strategy aligned to both business and compliance requirements. Ms. Watson has a Master’s degree in Information Technology Management from Harvard University in addition to a wide range of industry certifications including the following: CISSP, GIAC – GC Intrusion Analyst, GIAC- GC Incident Handler, Microsoft Certified IT Professional – Enterprise Administrator, PMI Project Manager. Ms. Watson’s primary areas of expertise include: Security strategy, information protection, privacy and compliance, infrastructure security design, SIEM technology, PKI/CA design and key management, endpoint hardening, system architecture and design, patch and vulnerability management, project management.

Technology Tool Kit What? The Technology Tool Kit (TTK) is intended to provide a collection of cyber security tools and guidance on their utilization. OpenSource Cyber Security Tool Repository Educational Awareness on Cyber Security Tool Utilization Reference Materials for Cyber Security Tools Map Legal and Regulatory Controls to Tools (Future) Why? Increase security awareness while reducing risk and ensuring budgets are focused on capabilities that provide optimal ROI. Can be used as to supplement existing organizational assets.

Technology Tool Kit Where is it? Located on the Houston Members Alliance Navigation The Link to the Technology Tool Kit is in the Left Navigation of the Houston Chapter Members Alliance Page

Technology Tool Kit Sample: Draft Initial Tools List (version 1.0) Tool Name Tool Description Tool Source Category

Technology Tool Kit - Version 2.0 New Home Tool Kit Description Links to key areas of site which will be on the top of every page: TTK Home A – Z Index SiteMap Contact The Technology Tool Kit has been converted from being Excel file based to being website based.

Technology Tool Kit - Version 2.0 SiteMap The Technology Tool Kit has been converted from being Excel file based to being website based. Alphabet links to lower areas of SiteMap page Tool Type Description Link to Tool Page

Technology Tool Kit - Version 2.0 Tool Page The Technology Tool Kit has been converted from being Excel file based to being website based. Tool specifics: project site, license info, download link, etc. Links to instructional documentation Links to key areas of site which will be on the top of every page: TTK Home A – Z Index SiteMap Contact

Technology Tool Kit - Version 2.0 A – Z Index The Technology Tool Kit has been converted from being Excel file based to being website based. A – Z list of Tools Links to key areas of site which will be on the top of every page: TTK Home A – Z Index SiteMap Contact

Technology Tool Kit Phases Phase I - Complete Program Initiation Initiation of Tool Collection Inventory List Phase II – In Progress Redesign of Technology Tool Kit Interface Locate/Develop User Guides for Tools Promote Tool Kit Awareness Conduct Educational Presentations Phase III Map Security Controls to Tools Conduct Educational Presentations & Awareness Continuous Tool Kit Improvement

Technology Tool Kit Categories  Anonymizer  Anti Malware  Bot Detection  Browser Support  Data Deletion  Encrypted Communication  Firewalls  Forensics  Fuzzers  General Purpose/Utilites  Intrusion Detection  Packet Crafting  Packet Sniffers  Password Crackers  Port Scanners  Proxies  Recon  Reference  Rootkit Detectors  Traffic Monitoring  Vulnerability Exploitation  Web Vulnerability Scanner The categories below are currently included in the Technology Tool Kit. As of 5/15 there are over 115 tools listed in these categories.

Questions

Contacts Angela M. Haun FBI InfraGard Coordinator Special Agent Larry Dannemiller InfraGard - Houston Chapter President Deborah Watson InfraGard - Houston Chapter SIG Security Guide & Tool Development Manager