SlideShare a Scribd company logo
1 of 23
www.secpod.com
How to Achieve
NIST- CSF Compliance
using SanerNow?
SanerNow Product Series
2
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
PRESENTERS
KOUSHIK
Director of Engineering
SecPod
DIXITHA S
Product Marketing Lead
SecPod
BHARATH
Lead Product Specialist
SecPod
3
TODAY'S
AGENDA
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Questions and Answers
What are the common challenges of
implementing NIST CSF?
Why NIST CSF is popular among security
teams & what are the 5 stages of it?
About the Coverage of NIST CSF in
SanerNow and how to implement it?
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
4
Why NIST Cybersecurity Framework is popular among
Security teams?
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
5
Flexibility and
adaptability of the
framework
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
6
Clear Communication
of Risks
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
7
Helps organizations
prioritize investments in
cybersecurity
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
8
What are the 5 different stages of NIST CSF
framework?
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
9
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
10
What are the common challenges of implementing
NIST CSF?
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
11
NIST CSF Guidelines are
broad with a huge
number of security
checks
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
12
Manual validation and
enforcement of NIST
standards are tedious
and time consuming
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
13
Lack of skills, resources,
and right security tools
to implement NIST CSF
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
14
How SanerNow helps implementation of NIST CSF?
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
15
What is the coverage of NIST CSF framework in
SanerNow?
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
16
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
17
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
18
CSF controls supported by SanerNow
Real-time visibility into
hardware & software
inventory
Apply security controls
and manage system health
Analyze asset utilization,
blacklist, and whitelist
applications
Monitor 100+ endpoint
metrics and get live data
Copyright © 2008 – 2022 SecPod Technologies - AUTHORISED USE ONLY
19
CSF controls supported by SanerNow
Automate and assess
vulnerabilities
continuously
Fix misconfiguration and
compliance deviations
Remediate vulnerabilities
on time with integrated
patching
Ensure continuous
compliance by assessing
deviations
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
20
How to implement NIST CSF compliance using
SanerNow?
17
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
QUESTIONS?
2008 SecPod Founded
(Security
Podium), based
in USA and India
2012 Launched SCAP Feed
as OEM service to
major security vendors,
such as AlienVault,
CloudPassage,
Amazon
2016
Launched SanerNow,
a SaaS platform for
security risk and
compliance
2009 2015 2018
Released SecPod
Saner 2.x with
endpoint threat
detection and
response
Launched SecPod
Saner endpoint
scanning, remediation,
compliance product
Only company to host
large scale, commercial
grade SCAP content
repository
SecPod is a cyber security technology company. We prevent cyberattacks. We do everything to
prevent attacks on computing environment. Our product helps implement cyber hygiene measures so
attackers have tough time piercing through.
ABOUT
SECPOD
2
2
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Launched SanerNow
Network Vulnerability
Scanner
2021
ACHIEVE CYBER HYGIENE .
CONTINUOUS. AUTOMATED.
TRY SANERNOW FREE WWW.SECPOD.COM
For enquiries, contact us at: Email: info@secpod.com | Tech Support: support@secpod.com |
Phone: (+1) 918 625 3023 (US) | (+91) 80 4121 4020 (IN)

More Related Content

Similar to How to Achieve NIST Compliance using SanerNow?

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 
Sand river capabilities corporate
Sand river capabilities corporateSand river capabilities corporate
Sand river capabilities corporate
sandrivertech
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
CSA Argentina
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Kevin Fealey
 

Similar to How to Achieve NIST Compliance using SanerNow? (20)

Maintainability Sogeti Qx Day 2020
Maintainability Sogeti Qx Day 2020Maintainability Sogeti Qx Day 2020
Maintainability Sogeti Qx Day 2020
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Shift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINXShift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINX
 
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
OWASP Bay Area Meetup - DevSecOps the Kubernetes WayOWASP Bay Area Meetup - DevSecOps the Kubernetes Way
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
 
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Sand river capabilities corporate
Sand river capabilities corporateSand river capabilities corporate
Sand river capabilities corporate
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Brksec 2048-demystifying aci-security
Brksec 2048-demystifying aci-securityBrksec 2048-demystifying aci-security
Brksec 2048-demystifying aci-security
 
Overcome Hardware And Software Challenges - Medical Device Case Study
Overcome Hardware And Software Challenges - Medical Device Case StudyOvercome Hardware And Software Challenges - Medical Device Case Study
Overcome Hardware And Software Challenges - Medical Device Case Study
 
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC GatewayWebinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
Cncf checkov and bridgecrew
Cncf checkov and bridgecrewCncf checkov and bridgecrew
Cncf checkov and bridgecrew
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 

More from SecPod

More from SecPod (12)

Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
 
Annual Vulnerability Report Insights - 2022
Annual Vulnerability Report Insights - 2022Annual Vulnerability Report Insights - 2022
Annual Vulnerability Report Insights - 2022
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
 
Align Your ITSM and SecOps Strategy for Unstoppable IT
Align Your ITSM and SecOps Strategy for Unstoppable ITAlign Your ITSM and SecOps Strategy for Unstoppable IT
Align Your ITSM and SecOps Strategy for Unstoppable IT
 
Uncover Vulnerabilities Beyond Software Vulnerabilities
Uncover Vulnerabilities Beyond Software VulnerabilitiesUncover Vulnerabilities Beyond Software Vulnerabilities
Uncover Vulnerabilities Beyond Software Vulnerabilities
 
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptxProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
 
How can SMEs combat cyberattacks through automated vulnerability management?
How can SMEs combat cyberattacks through automated vulnerability management?How can SMEs combat cyberattacks through automated vulnerability management?
How can SMEs combat cyberattacks through automated vulnerability management?
 
Security automation architecture principles for effective vulnerability manag...
Security automation architecture principles for effective vulnerability manag...Security automation architecture principles for effective vulnerability manag...
Security automation architecture principles for effective vulnerability manag...
 
Uncovering Vulnerabilities Beyond Software Vulnerabilities
Uncovering Vulnerabilities Beyond Software VulnerabilitiesUncovering Vulnerabilities Beyond Software Vulnerabilities
Uncovering Vulnerabilities Beyond Software Vulnerabilities
 
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
 
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

How to Achieve NIST Compliance using SanerNow?

  • 1. www.secpod.com How to Achieve NIST- CSF Compliance using SanerNow? SanerNow Product Series
  • 2. 2 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY PRESENTERS KOUSHIK Director of Engineering SecPod DIXITHA S Product Marketing Lead SecPod BHARATH Lead Product Specialist SecPod
  • 3. 3 TODAY'S AGENDA Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY Questions and Answers What are the common challenges of implementing NIST CSF? Why NIST CSF is popular among security teams & what are the 5 stages of it? About the Coverage of NIST CSF in SanerNow and how to implement it?
  • 4. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 4 Why NIST Cybersecurity Framework is popular among Security teams?
  • 5. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 5 Flexibility and adaptability of the framework
  • 6. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 6 Clear Communication of Risks
  • 7. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 7 Helps organizations prioritize investments in cybersecurity
  • 8. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 8 What are the 5 different stages of NIST CSF framework?
  • 9. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 9
  • 10. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 10 What are the common challenges of implementing NIST CSF?
  • 11. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 11 NIST CSF Guidelines are broad with a huge number of security checks
  • 12. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 12 Manual validation and enforcement of NIST standards are tedious and time consuming
  • 13. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 13 Lack of skills, resources, and right security tools to implement NIST CSF
  • 14. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 14 How SanerNow helps implementation of NIST CSF?
  • 15. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 15 What is the coverage of NIST CSF framework in SanerNow?
  • 16. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 16
  • 17. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 17
  • 18. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 18 CSF controls supported by SanerNow Real-time visibility into hardware & software inventory Apply security controls and manage system health Analyze asset utilization, blacklist, and whitelist applications Monitor 100+ endpoint metrics and get live data
  • 19. Copyright © 2008 – 2022 SecPod Technologies - AUTHORISED USE ONLY 19 CSF controls supported by SanerNow Automate and assess vulnerabilities continuously Fix misconfiguration and compliance deviations Remediate vulnerabilities on time with integrated patching Ensure continuous compliance by assessing deviations
  • 20. Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 20 How to implement NIST CSF compliance using SanerNow?
  • 21. 17 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY QUESTIONS?
  • 22. 2008 SecPod Founded (Security Podium), based in USA and India 2012 Launched SCAP Feed as OEM service to major security vendors, such as AlienVault, CloudPassage, Amazon 2016 Launched SanerNow, a SaaS platform for security risk and compliance 2009 2015 2018 Released SecPod Saner 2.x with endpoint threat detection and response Launched SecPod Saner endpoint scanning, remediation, compliance product Only company to host large scale, commercial grade SCAP content repository SecPod is a cyber security technology company. We prevent cyberattacks. We do everything to prevent attacks on computing environment. Our product helps implement cyber hygiene measures so attackers have tough time piercing through. ABOUT SECPOD 2 2 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY Launched SanerNow Network Vulnerability Scanner 2021
  • 23. ACHIEVE CYBER HYGIENE . CONTINUOUS. AUTOMATED. TRY SANERNOW FREE WWW.SECPOD.COM For enquiries, contact us at: Email: info@secpod.com | Tech Support: support@secpod.com | Phone: (+1) 918 625 3023 (US) | (+91) 80 4121 4020 (IN)