VEGA TERRY WELLIVER GREG SYME JUANA WELLS NAVAL POSTGRADUATE SCHOOL.

Slides:



Advertisements
Similar presentations
1 Remediation Workflow Automated Scan Reports Patch Report Remediation Policies Remediation Tickets API Custom Report Templates.
Advertisements

What is e-BRIDGE Accounts? Why e-BRIDGE Accounts? How it works Tabular & Graphical Reports Benefits Content.
DL Windows Software “Rules” Import a CSV File From Excel
September 2, 2013 VM Evolution via API Parag Baxi, Technical Account Manager.
Usage of the memoQ web service API by LSP – a case study
Enterprise Integration Solutions SharePoint Imaging.
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
Windows 7 Project and Heartbleed Update Sian Shumway Director, IT Customer Service.
The Free IT Management App & Community. What Do I Have? How Do I Keep Track of Everything? Is Everything Working? How Do I Fix IT? IT Admin What IT Pros.
Vulnerability Scanning at NU Robert Vance NUIT-Telecom & Network Services.
SLAC Vulnerability Scanning Cyber Security Working Group - LBL December 5, 2005 Teresa Downey - SLAC.
An integrated system for handling restricted use data Felicia LeClere, Ph.D. IASSIST 2009 Tampere, Finland.
Nessus – A Vulnerability Scanning Tool SUNY Technology Conference June 2003.
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes.
Internet2 Network: Controlling a Slice of the National Network Eric Boyd Senior Director of Strategic Projects.
UPS Technology Solutions
Process Analysis & Automation Our research delivers the highest quality process analytical technology and lab automation solutions ISO 9001 : 2000 certified.
Agile Testing with Testing Anywhere The road to automation need not be long.
Spiceworks Overview Enterprise Business Group Jul-2015.
Make your messaging reliable use it Messaging. A single and global solution Send, receive and process any type of message through the appropriate channel.
Project Implementation for COSC 5050 Distributed Database Applications Lab1.
Bring it all together via Automation What is Automation? What is Automation? Why should we Automate? Why should we Automate? How do we enable Automation?
For Sage MIP Fund Accounting
Patch Management Strategy
IT:Network:Microsoft Applications
1 Team Management System (TMS) By DACCIT Pvt. Ltd., Indore.
FCMAT Technology Recommendations Fil Duldulao Shawn Cabey David Flores Julienne DeGeyter.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Imaging and Workflow Automation Session 5. Slide 2 ©2010 Financial Operations Networks LLC About the Speaker Ben is the Business Innovations Manager at.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Deploying Vulnerability Management and Policy Compliance on a Global Scale ON TIME – ON BUDGET – ON DEMAND Implementation Best Practices by David French.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Honeypot and Intrusion Detection System
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Packet Item Creation. Council Packet System Developed about 10 years ago Intranet targeted to be replaced next year Custom developed in Cold Fusion 6.
Budget Module For Sage MIP Fund Accounting. Sage Requirements Fund Accounting 10.0 or higher Budget Module optional but required for multiple budget versions.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Upgrading to IBM Cognos 10
11 SUPPORTING APPLICATIONS IN WINDOWS XP PROFESSIONAL Chapter 9.
Log onto the computer connected to the scanner and double-click the Edusoft grader program on the desktop. Note – you must be logged in to the computer.
Copyright © 2007 Vulcan Software LLC Introduction to Apex 9.5 Presented by Phil Kramer Vulcan Software LLC.
ISS SiteProtector and Internet Scanner LanAdmin Group Meeting 12/8/2005.
FINACTBooks Next Generation Account Management Software.
Security and the Questions Business Users should be asking the Techies.
GGUS at PEB – –- page 1 LCG Klaus-Peter Mickel, GridKa Karlsruhe LCG-PEB-Meeting ( ) The Global Grid User Support Model (Report of GDB.
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
Systems Analysis and Design in a Changing World, 6th Edition
Testing, Testing & Testing - By M.D.ACHARYA QA doesn't make software but makes it better.
AdLib eDocument Solutions Scott Mackey AdLib eDocument eDocument Solutions.
Retina Network Security Scanner
RCE Platform Technology (RPT) Mark Arndt User Support.
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
ELECTRONIC DOCUMENT SHARING AND MANAGEMENT BY: EDWARD DISI JUSTIN HEIN BROM ESPY Senior Design 1.
Biological Model Engineering Peter Saffrey, Department of Medicine Cakes Talk Monday, October 20, 2008.
Testimonial. “Celoxis has been awarded and recognized byWebHostingSearch.com as one of the BEST WEB TOOL FOR PROJECT MANAGEMENT SOFTWARE CATEGORY. ”
Marco Cattaneo, 6th July Remedy bug tracking tool CERN Problem Report Management System (PRMS)
Project Tools TestTrackPro. Made by a small company, SeaPine Software Have used the Issues Management modules for many years to manage changes and bug.
© 2015 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. About this Presentation  How to use this deck:  This is the Global Channel.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
Gaspar Modelo-Howard NEEScomm Cybersecurity Software Engineer Saurabh Bagchi NEEScomm Cybersecurity Officer.
Allison Nichols, Ed.D. Evaluation Specialist.  In this workshop we'll explore creating an online survey using Google Documents. You don't need to buy.
Customer Care & Help Desk. Content  What is Help Desk?  Who should use these?  Features of Help Desk  Hierarchy of Help Desk (Level of User)  Flow.
Chapter 2 New Company Set Up and Chart of Accounts Copyright ©2017 by McGraw-Hill Education. All rights reserved. 1 of 12.
Dynamics AX Henrik Hasselblad Business Unit Manager.
The FAST Report Scheduler
Overview – SOE PatchTT November 2015.
API Testing and Continuous Integration
Security Essentials for Small Businesses
1.2 System Design Basics.
Features Overview.
Presentation transcript:

VEGA TERRY WELLIVER GREG SYME JUANA WELLS NAVAL POSTGRADUATE SCHOOL

VULNERABILITY MANAGEMENT

FACTS THERE ARE AND WILL CONTINUE TO BE BUGS AND HOLES IN SOFTWARE THAT CAN BE EXPLOITED

FACTS VENDORS WILL (OR AT LEAST SHOULD) DO THEIR BEST TO FIX THEM AS FAST AS THEY CAN

FACTS BUT THE FIXES WON’T HELP IF YOU DON’T KNOW YOU NEED THEM AND THEN DON’T DEPLOY THEM

FACTS APPLYING FIXES IS GOING TO BE DISRUPTIVE TO NORMAL OPERATIONS, SO YOU NEED AN ACTIVE PLAN AND PROVEN PROCESS FOR ENSURING THAT THE WORK GETS DONE IN A TIMELY FASHION

NAVY MANDATES A FORMAL VULNERABILITY SCANNING PROCESS IN PLACE AND AN ACTIVE PLAN TO ADDRESS VULNERABILITIES THAT ARE DISCOVERED

TIME AND MONEY BUDGETS ARE TIGHT AND TIME IS FINITE

SOLUTION FIND THE BUGS YOU NEED TO FIX TAKE ACTION ON THE FINDINGS (PDF, CSV) THE SYSTEM ADMINISTRATORS CREATE YET ANOTHER EXCEL FILE TO TRACK THEM VULNERABILITY SCANNER EXPORT THE REPORTS DISTRIBUTE THE REPORTS TRACK THE FIXES VALIDATE THE FIXES SCAN AGAIN AND START OVER

INTERNET NETWORK PERIMETERDMZ INTERNAL NETWORK

SOLUTION FIND THE BUGS YOU NEED TO FIX TAKE ACTION ON THE FINDINGS (PDF, CSV) THE SYSTEM ADMINISTRATORS CREATE YET ANOTHER EXCEL FILE TO TRACK THEM VULNERABILITY SCANNER EXPORT THE REPORTS DISTRIBUTE THE REPORTS TRACK THE FIXES VALIDATE THE FIXES SCAN AGAIN AND START OVER

PROBLEM FIND THE BUGS YOU NEED TO FIX TAKE ACTION ON THE FINDINGS (PDF, CSV) THE SYSTEM ADMINISTRATORS CREATE YET ANOTHER EXCEL FILE TO TRACK THEM VULNERABILITY SCANNER EXPORT THE REPORTS DISTRIBUTE THE REPORTS TRACK THE FIXES VALIDATE THE FIXES SCAN AGAIN AND START OVER

PROBLEM

THINK DIFFERENT

SCANNERDATABASEWEBSITE

SCANNERDATABASEISSUE TRACKING

RETINAPOSTGRESJIRA RUBY SCRIPTS JIRA API DATA TYPES NORMALIZATION USER INTERFACE WORKFLOW ACCOUNTABILITY DOCUMENTATION TRACKING FEEDBACK

FUTURE NESSUS IS REPLACING RETINA IDENTIFY FALSE POSITIVE AND WON’T FIX MORE, MORE, MORE BECAUSE IT’S DAMN GOOD NEW VULNERABILITY SCANNER GLOBAL RISK ACCEPTANCE AUTOMATION DELICIOUS CAKE

FUTURE NESSUS IS REPLACING RETINA IDENTIFY FALSE POSITIVE AND WON’T FIX MORE, MORE, MORE MMMMMM, MMMMMM, GOOD NEW VULNERABILITY SCANNER GLOBAL RISK ACCEPTANCE AUTOMATION DELICIOUS CAKE

BE THE CHANGE YOU SEEK

Do we have a formal vulnerability scanning process in place and an active plan to address vulnerabilities that are discovered? There are and will continue to be bugs and holes in software we that can be exploited. Your vendors will (or at least should) be doing their best to fix them as fast as they can, but the fixes won’t help if you don’t know you need them and then don’t deploy them. Remediation is going to be disruptive to normal operations, so you need an active plan and proven process for ensuring that the work gets done in a timely fashion.