ISS SiteProtector and Internet Scanner LanAdmin Group Meeting 12/8/2005.

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

Solutions & Services to ‘Multiply your Business Performance’ 2013.
SACM Terminology Nancy Cam-Winget, David Waltermire, March.
The State of Security Management By Jim Reavis January 2003.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Security and Policy Enforcement Mark Gibson Dave Northey
Computer Security: Principles and Practice
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
University of Maryland I.T. Security Gerry Sneeringer IT Security Officer
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Securing Information Systems
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
SEC835 Database and Web application security Information Security Architecture.
LinuxUNIX Red HatSUSECentOSUbuntuDebianOracleAIXHP-UXSolaris Configuration Manager * * * * * * Endpoint Protection No Plans.
A NASSCOM ® Initiative DSCI-KPMG Survey 2010 State Of Data Security and Privacy in the Indian Banking Industry Vinayak Godse Director- Data Protection,
Information Systems Security Computer System Life Cycle Security.
HIPAA COMPLIANCE WITH DELL
Security Services Agenda Overview of HEAnet security services HEAnet CERT (Computer Emergency Response) Anti-Spam RBL (Real time blacklist service) HEAnet.
Dell Connected Security Solutions Simplify & unify.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
EEye Digital Security    On the Frontline of the Threat Landscape: Simple configuration goes a long way.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Vulnerability Management Let’s Get It Right This Time! Shon Harris CEO Logical Security.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Secure Cloud Solutions Open Government Forum Abu Dhabi April 2014 Karl Chambers CISSP PMP President/CEO Diligent eSecurity International.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
Planning for security Microsoft View
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
IT Security – Scanning / Vulnerability Assessment David Geick State of Connecticut IT Security.
Wireless Intrusion Prevention System
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Frontline Enterprise Security
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
Emerging and Evolving Cyber Threats Require Sophisticated Response and Protection Capabilities  Advanced Algorithms  Cyber Attack Detection and Machine.
GRC: Aligning Policy, Risk and Compliance
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
WSU IT Risk Assessment Process
Critical Security Controls
Patch Management Patch Management Best Practices
Putting It All Together
Putting It All Together
A Thread Relevant to all Levels of the EA Cube
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
UConn NIST Compliance Project
Home Internet Vulnerabilities
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
In the attack index…what number is your Company?
Cloud Computing for Wireless Networks
Presentation transcript:

ISS SiteProtector and Internet Scanner LanAdmin Group Meeting 12/8/2005

SiteProtector SiteProtector is an enterprise command, control and monitoring system. It allows us to use vulnerability assessment information to protect our operations ahead of the threat.

Internet Scanner Internet Scanner minimizes our risk by identifying the security holes, or vulnerabilities, in our network so we can protect them before an attack occurs. Once all of our networked devices are identified, Internet Scanner analyzes the configurations, patch levels, operating systems and installed applications to find vulnerabilities that could be exploited by hackers trying to gain unauthorized access.

Benefits to UTMB from SiteProtector/Internet Scanner Scanner Configuration Multiple in-line scanners Less time and network traffic More scanning Different scan configurations “Local” (10.10.x.x) scans Centralized scan management

Benefits to UTMB from SiteProtector/Internet Scanner “Enterprise” Configuration Logical group scanning User roles Distributed visibility of our security posture Compliance and remediation monitoring Departmental scanning capability

Benefits to UTMB from SiteProtector/Internet Scanner Process Flow Discovery scans Certification scans On-line query and reports Self scans - remediation Exception Documentation

Scanning Processes Current scanning process is under review and revision due to: Improved capability of tools (ISS) Staffing and priority changes Changing institutional requirements Best practices in response to changing environment

Scanning Processes Discovery Scan Identification & Grouping Vulnerability Scans Remediation Scans Remediation Reporting Identify new systems Initiated by NSS Schedule to be determined Feeds Cert. & Accreditation process NSS / Department collaboration Initiated by NSS (vulnerability assessments/system certifications) and/or Audit Services (server reviews) Servers - Quarterly Workstations/printer - Yearly Initiated by Department or NSS Verify status of remediation efforts On-line!! Exception/Risk Acceptance notes Available to Department Management, IS Security and Audit Services

Scanning Processes Patch Scan Delta Scan Exception Reports Verify Patch Management Initiated by Department with Admin. Credentials Schedule to be determined (Quarterly, as needed) Ad-hoc Processes Track Changes to system configuration Schedule to be determined Verify Exception processing Working with ISS to develop process 30-days to request Exception, then yearly review

Significant Events SiteProtector 2.0, SP6 release – 12/6/05 Scanner deployment – December 2005 Initial Group Configurations - Dec. ’05 – Jan. ’06 Department POC Training – Dec. ’05 – Jan. ’06 Transition to Group Scanning – March-April 2005

Q & A additional questions and system inventory to: Network & Security Services