Introduction To Secure Registry Operations for ccTLDs Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.

Slides:



Advertisements
Similar presentations
Gender Perspectives in Tariffs (Pricing Policy) Gender Module #5 ITU Workshops on Sustainability in Telecommunication Through Gender & Social Equality.
Advertisements

INTERNET SHIELD COURSE F-SECURE ® ANTI-VIRUS CLIENT SECURITY 6.
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Introduction To The Course Network Architecture Hervey Allen Chris Evans Phil Regnauld September 3 - 4, 2009 Santiago, Chile.
Student name Student ID Degree program Area of specialization.
EDS Public Information Tabletop Exercise
Cyber Attack Scenario Overview Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.
T-527 Fall 2005 Developing Curriculum for Deep Learning Learning Reflective Collaborative Communities 17 November 2005.
Audit Program: Introduction. Our role Located within the Tasmanian Archives and Heritage Office (TAHO), the Government Recordkeeping team.
Secure Registry Operations Framework Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.
Complying With The Federal Information Security Act (FISMA)
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Thursday, January 23, :00 am – 11:30 am. Agenda  Cyber Security Center of Excellence  Project Phase  Implementation  Next Steps 2.
Supporting a Healthy, Stable, Resilient Internet.
Introduction To Secure Registry Operations for ccTLDs Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Response to Intervention RTI September 2014 STAT Training.
Talend ESB Training Talend ESB Training 2014 Jan Bernhardt
1 Samoa, June 2006 Welcome to the ccTLD Workshop June 2006 Maluafou, Samoa.
Journeying with a Board Coach. Why seek external assistance? From experience, the reasons for engaging someone to work with your Board tend to fall into.
1 Annual Quality Review July Agenda Welcome and introduction Qualification and Development Update Quality Assurance Update - changes Malpractice.
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
Supporting Industry Change Planning: Risk & Milestone Assessment Process & Tools 07/07/2014.
Hervey Allen Sebastian Buettrich Network Startup Resource Center – nsrc.org Welcome to PacNOG 6!
Introductions. Emergency Planning Emergency Management & Preparedness Street Smarts Version.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Welcome Network Monitoring & Management. Instructors Joe AbleyDyn Incorporated - Canada Hervey AllenNetwork Startup Resource Center - United States Jens.
1 Nairobi, September 2005 Welcome to the ccTLD Workshop September 2005 Nairobi, Kenya.
Mbombela Climate Change Workshop 2 5 November 2015 Civic Centre Hall, Mbombela.
Network Monitoring & Management Welcome APRICOT 2011.
1 Fundamentals of RCM Analysis R ELIABILITY C ENTERED M AINTENANCE.
Mitigation Strategies Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.
February 2, 2016 | Chicago NFA Cybersecurity Workshop.
SURVEYS WORKSHOP Edinburgh City Council, 16 th April 2009 ScotStat Network of Analysts from Local Government and Other Public Bodies.
SAT Department of Electronics Technologies Welcome.
Emergency Management Assistance Compact Public Health and Medical Tabletop Exercise Introduction.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
VIRUS AND SPY PROTECTION COURSE F-SECURE ® ANTI-VIRUS CLIENT SECURITY ™ 6.
Privilege Escalation Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.
BET Introduction 24 th October 2012 Santiago, Chile Prepared for: Consejo Minero de Chile A.G. and Antofagasta Minerals S.A. By James Spurgeon, Sustain.
Opening Activity (Welcome Back )
Information Security Program
New A.M. Best Cyber Questionnaire
Office 365 Security Assessment Workshop
Office 365 Security Assessment Workshop
Climate Change Impacts, Vulnerability and Adaptation
Welcome to the ccTLD Workshop February 2007 Georgetown, Guyana
Network Management Workshop
ArcSight Logger/CA Partner Certification Training
Advisement Overview Parent Presentation Summer 2017
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
Cyber Security & Embedded Systems Training Bootcamp VISIT TONEX.COM.
CMGT 433 RANK Education Your Life-- cmgt433rank.com.
GSM & GPRS Security Training
5G Security Training
CMGT 433 Education for Service-- tutorialrank.com
Lesson 6 Wrap-Up.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Welcome to Cyber Recruiter – Maximizing Requisitions
Cyber Risk & Cyber Insurance - Overview
The GEF Monitoring and Evaluation Policy
School of Advanced Leadership and Tactics (SALT)
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
Employee engagement Delivery guide
Welcome to Cyber Recruiter – Administration Training
Welcome to Cyber Recruiter – Utilizing Standard Reports
IT Security A management problem Introduction and overview
Stakeholder Mapping.
11/7/2017 Implementation Training Welcome! Please open the support website Ottawa Area ISD ©2017.
Presentation transcript:

Introduction To Secure Registry Operations for ccTLDs Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile

Welcome Thank you! LACTLD, NIC-Chile, NSRC, ISOC & ICANN Mr. Erick Iriarte-Ahon Mr. Fermin Uribe-Echevarria 2

Who we are … Strategic Consulting & Policy Development Operational Concept Development Security Program Assessment Advising technology development Cyber Exercises - Planning & Execution Training Programs & Courseware Expert Witness Services 3 Chris Evans, CEH Delta Risk, LLC

Who we are … 4 Hervey Allen NSRC A Small Company Specializing in: Core Network Services Network Monitoring

Who we are … 5 Phil Regnauld NSRC, bluepipe A/S A Small Company Specializing in: Core Network Services Network Monitoring

Introductions Name? Where are you from? Organization or activity? Duties or responsibilities? Any experiences with security operations? 6

Administrivia Ensure you: – Update your contact information on the roster – Provide feedback on the course During the course: – Ask questions when you have them – no need to wait – Your experiences are valuable – please share them – Schedule is mostly flexible Course Materials – Available electronically on the course wiki ( ) Course Support Network – You should be wired in and ready to go! 7

Course Agenda September 3, :00 – 18:30 – 09:00Welcome & Introduction – 09:30Block I: Introduction to Course Architecture – 10:45Coffee Break – 11:00Block II: Secure Operations Framework – 12:00Lunch – 13:00Block III: Cyber Attack Scenario Overview – 13:30Monitor, Detect, Analyze, Respond, Recover #1 & #2 – 15:30Tea Break – 16:30Monitor, Detect, Analyze, Respond, Recover #3 – 18:30Questions, Discussions, End of Day Wrap-up 8

Course Agenda September 4, :00 – 18:30 – 09:00NAGIOS Monitoring Framework – 10:30Coffee Break – 12:00Lunch – 13:00Monitor, Detect, Analyze, Respond, Recover #5 & #6 – 15:45Tea Break – 16:00Mitigation Strategies – 18:00Questions, Discussions, End of Course Wrap-up – 18:30Course Critique 9

Course Agenda Some Thoughts Before We Begin: – This course is ambitious in what we hope to cover – We can re-arrange the schedule as needed, but we only have two days! 10

This course … Is an Introduction to Secure Operations Will be expanded into a three day course Will be integrated into a three course program to train ccTLD registry operators 11 Initial Registry Operations Advanced Registry Operations Secure Registry Operations

Philosophy… This course attempts to inform you about securing your operations through monitoring and effective response. You operate highly visible services, and you will likely see some sort of attack on your operation, but not necessarily the ones demonstrated here. The attacks and concepts described herein may sound like the “Sky is Falling”, but it not intended to be FUD, but promote awareness! Reality Check – YOU must determine the biggest threats to your operations and YOU must determine how you will respond to those threats. YOU are the only one that can make that risk decision – See the Attack and Contingency Response Planning Workshop for Assistance 12 FUD – Fear, Uncertainty, Doubt © Disney

Please tell us … Course – Is this helpful? – How can we make it better? What would you like to see more of? What would you like to see less of? – There is a feedback form on the wiki! Security Issues or Concerns 13

QUESTIONS BEFORE WE BEGIN…? 14 ?