SlideShare a Scribd company logo
1 of 18
Kevin J. Murphy
Cyber Security Defense
by Effective Vulnerability Mgmt.
Director, Windows Security Architecture
Agenda
2
• Before We Begin..
• Year in Review: Cyber Crime & Nation States, Breaches, & Trends
• Core of Vulnerability Management
• Best Practices
• Peer discussion
Before We Begin……
3
Manufacturing Consulting
Energy
Software
Retail Healthcare
Telecommunications
Government
Banking
Others?
Industries Representation
PCI Standards
5
Year in Review
6
Year in Review : Baits and Social Media
7
Year in Review : Identity Exposure
8
This data was before the US Gov. OPM breach of 21.5 million identities
Year in Review : Attack Profiles
9
Year in Review : Cyber crime and Nation Threats
10
• 43% of all cyber attacks originated in China in 2014. http://vpncreative.net
(I don’t believe this. I think China just gets caught)
• Mobile O/S and app threats are rising as vectors into the enterprise
• Dating sites have targeted phishing attacks
• Facebook Twitter & Pinterest –sharing links to friends that are links to malware
Patch Management : Just Do IT!
Please download this doc.
Most attacks use known vulnerabilities
Patches are available in most cases
This should be considered as part of the normal operations
Patch Management: Core Elements
1. Accurate Asset Inventory
a. Make sure you know your assets better than your attacker.
2. Patch availability awareness
a. Microsoft Security Response Center
b. http://csrc.nist.gov/
c. Your software vendors
3. Timely Monitoring, Scanning & Alerting
infrastructure
This should be considered as part of the normal operations
Patch Management: Core Elements
4. Type of Patches
a. Core operating systems patches: Windows, Linux,
Android, iOS, other
b. Infrastructure patches: Cisco, Juniper, F5, Palo Alto,
etc.
c. Your application patches: 3rd party, your internal
developed apps., mobile apps.
d. Monitor tool patches
e. Don’t forget your outliers: security cameras, HVAC,
etc.
This should be considered as part of the normal operations
Patch Management : Deployment
 Plan on rolling out patches monthly
 Critical patches should be patched out of sequence if
an active exploit is in progress
 Always test your patches first!
 Full-time team
 Fully funded in your budget cycle
 Patch status should be part of your normal information
system reporting metrics
This should be viewed as part of the normal operations of your systems
Patch Management : Tips
 Attackers would love to infect your patch and have
you roll out their malware for them.
 Use checksums/strong hash to verify patch integrity
 Maintain configuration control
 Secure network file transfer if possible
 Automate and Phase your deployment to patch your
high value systems first
Verify your patch isn’t creating an outage
Protect your patching infrastructure.
Patch Management : Cloud Based Systems
 In most cases, your cloud provided will handle
patches from the hypervisor and below
 You still own patching your cloud based
applications
 Verify you cloud service level agreements and
 Make sure there are no patching gaps. (Find
the coverage gaps before your attacker does.)
Learning From Peers
Let’s
Share
And
Learn
Veteran’s Day

More Related Content

What's hot

Best vulnerability assessment training
Best vulnerability assessment trainingBest vulnerability assessment training
Best vulnerability assessment trainingAdarshMathuri
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability ManagementVicky Ames
 
September 2012 Security Vulnerability Session
September 2012 Security Vulnerability SessionSeptember 2012 Security Vulnerability Session
September 2012 Security Vulnerability SessionKaseya
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 
Assessment and Threats: Protecting Your Company from Cyber Attacks
Assessment and Threats: Protecting Your Company from Cyber AttacksAssessment and Threats: Protecting Your Company from Cyber Attacks
Assessment and Threats: Protecting Your Company from Cyber AttacksCimation
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
Vulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewVulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewSusan Rantall
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverAlienVault
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the CloudAlert Logic
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Bossrbrockway
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Trustport - Roman Veleba
Trustport - Roman VelebaTrustport - Roman Veleba
Trustport - Roman VelebaJan Fried
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack SurvivalSkoda Minotti
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security RiskDedi Dwianto
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Managementjpubal
 
VMRay intro video
VMRay intro videoVMRay intro video
VMRay intro videoChad Loeven
 

What's hot (20)

Best vulnerability assessment training
Best vulnerability assessment trainingBest vulnerability assessment training
Best vulnerability assessment training
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
 
September 2012 Security Vulnerability Session
September 2012 Security Vulnerability SessionSeptember 2012 Security Vulnerability Session
September 2012 Security Vulnerability Session
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Blue Ocean IT Security
Blue Ocean IT SecurityBlue Ocean IT Security
Blue Ocean IT Security
 
Assessment and Threats: Protecting Your Company from Cyber Attacks
Assessment and Threats: Protecting Your Company from Cyber AttacksAssessment and Threats: Protecting Your Company from Cyber Attacks
Assessment and Threats: Protecting Your Company from Cyber Attacks
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
Vulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewVulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) Overview
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Trustport - Roman Veleba
Trustport - Roman VelebaTrustport - Roman Veleba
Trustport - Roman Veleba
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack Survival
 
VSEC LAN Security Assessment Service Profile
VSEC LAN Security Assessment Service ProfileVSEC LAN Security Assessment Service Profile
VSEC LAN Security Assessment Service Profile
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
 
VMRay intro video
VMRay intro videoVMRay intro video
VMRay intro video
 

Viewers also liked

Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014Kevin Murphy
 
Discurso del Señor Ismael Plascencia Nuñez, presidente de CONCAMIN en la Inau...
Discurso del Señor Ismael Plascencia Nuñez, presidente de CONCAMIN en la Inau...Discurso del Señor Ismael Plascencia Nuñez, presidente de CONCAMIN en la Inau...
Discurso del Señor Ismael Plascencia Nuñez, presidente de CONCAMIN en la Inau...Ismael Plascencia Nuñez
 
Galalab mo game_design_contest_(team ik)_ (the guardians)
Galalab mo game_design_contest_(team ik)_ (the guardians)Galalab mo game_design_contest_(team ik)_ (the guardians)
Galalab mo game_design_contest_(team ik)_ (the guardians)Nam Jinwoo
 
Data, Privacy and the Cloud: Oh my!
Data, Privacy and the Cloud: Oh my!Data, Privacy and the Cloud: Oh my!
Data, Privacy and the Cloud: Oh my!Jason Neiffer
 
Mapa conceptual gerencia de proyectos tecnología educativa
Mapa conceptual gerencia de proyectos tecnología educativaMapa conceptual gerencia de proyectos tecnología educativa
Mapa conceptual gerencia de proyectos tecnología educativaDiair Becerra
 
Análisis publicitario Cristina Rodríguez Donaire
Análisis publicitario Cristina Rodríguez DonaireAnálisis publicitario Cristina Rodríguez Donaire
Análisis publicitario Cristina Rodríguez DonaireCristinadonaire
 
半導体デバイス工学 第1章
半導体デバイス工学 第1章半導体デバイス工学 第1章
半導体デバイス工学 第1章Kiyoteru Hayama
 
GymNow - Unlimited Fitness Choices
GymNow - Unlimited Fitness ChoicesGymNow - Unlimited Fitness Choices
GymNow - Unlimited Fitness ChoicesGymNow
 
MENA New Energy 2017 Prospectus
MENA New Energy 2017 ProspectusMENA New Energy 2017 Prospectus
MENA New Energy 2017 ProspectusTobias Crow
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Kevin Murphy
 
Poonam handmade paper-final
Poonam handmade paper-finalPoonam handmade paper-final
Poonam handmade paper-finalMadhavi Verma
 

Viewers also liked (19)

Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014
 
Discurso del Señor Ismael Plascencia Nuñez, presidente de CONCAMIN en la Inau...
Discurso del Señor Ismael Plascencia Nuñez, presidente de CONCAMIN en la Inau...Discurso del Señor Ismael Plascencia Nuñez, presidente de CONCAMIN en la Inau...
Discurso del Señor Ismael Plascencia Nuñez, presidente de CONCAMIN en la Inau...
 
PARQUE CRETÁCICO. SUCRE, BOLIVIA
PARQUE CRETÁCICO. SUCRE, BOLIVIAPARQUE CRETÁCICO. SUCRE, BOLIVIA
PARQUE CRETÁCICO. SUCRE, BOLIVIA
 
ARCHIVO DE LA PAZ
ARCHIVO DE LA PAZARCHIVO DE LA PAZ
ARCHIVO DE LA PAZ
 
Mercator Ocean newsletter 36
Mercator Ocean newsletter 36Mercator Ocean newsletter 36
Mercator Ocean newsletter 36
 
press-release.pdf
press-release.pdfpress-release.pdf
press-release.pdf
 
Galalab mo game_design_contest_(team ik)_ (the guardians)
Galalab mo game_design_contest_(team ik)_ (the guardians)Galalab mo game_design_contest_(team ik)_ (the guardians)
Galalab mo game_design_contest_(team ik)_ (the guardians)
 
Data, Privacy and the Cloud: Oh my!
Data, Privacy and the Cloud: Oh my!Data, Privacy and the Cloud: Oh my!
Data, Privacy and the Cloud: Oh my!
 
2012-am-workshop-spousal1
2012-am-workshop-spousal12012-am-workshop-spousal1
2012-am-workshop-spousal1
 
Resume_Darshan
Resume_DarshanResume_Darshan
Resume_Darshan
 
TIK IXC Kelompok 7 - Bab 2
TIK IXC Kelompok 7 - Bab 2TIK IXC Kelompok 7 - Bab 2
TIK IXC Kelompok 7 - Bab 2
 
Mapa conceptual gerencia de proyectos tecnología educativa
Mapa conceptual gerencia de proyectos tecnología educativaMapa conceptual gerencia de proyectos tecnología educativa
Mapa conceptual gerencia de proyectos tecnología educativa
 
Análisis publicitario Cristina Rodríguez Donaire
Análisis publicitario Cristina Rodríguez DonaireAnálisis publicitario Cristina Rodríguez Donaire
Análisis publicitario Cristina Rodríguez Donaire
 
12
1212
12
 
半導体デバイス工学 第1章
半導体デバイス工学 第1章半導体デバイス工学 第1章
半導体デバイス工学 第1章
 
GymNow - Unlimited Fitness Choices
GymNow - Unlimited Fitness ChoicesGymNow - Unlimited Fitness Choices
GymNow - Unlimited Fitness Choices
 
MENA New Energy 2017 Prospectus
MENA New Energy 2017 ProspectusMENA New Energy 2017 Prospectus
MENA New Energy 2017 Prospectus
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015
 
Poonam handmade paper-final
Poonam handmade paper-finalPoonam handmade paper-final
Poonam handmade paper-final
 

Similar to SecureWorld Seattle Vulnerability Mgmt Nov 11 2015

Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseLumension
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksIvanti
 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygieneThiagu Haldurai
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Making Sense of Threat Reports
Making Sense of Threat ReportsMaking Sense of Threat Reports
Making Sense of Threat ReportsDLT Solutions
 
Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019Ivanti
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxannettsparrow
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementIvanti
 
OSB170: What a CISO Wants
OSB170: What a CISO WantsOSB170: What a CISO Wants
OSB170: What a CISO WantsIvanti
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIAhmed Banafa
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesBlack Duck by Synopsys
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE - ATT&CKcon
 

Similar to SecureWorld Seattle Vulnerability Mgmt Nov 11 2015 (20)

Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of Defense
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygiene
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Making Sense of Threat Reports
Making Sense of Threat ReportsMaking Sense of Threat Reports
Making Sense of Threat Reports
 
Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019
 
Application security
Application securityApplication security
Application security
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docx
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
 
OSB170: What a CISO Wants
OSB170: What a CISO WantsOSB170: What a CISO Wants
OSB170: What a CISO Wants
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best Practices
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
BEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICESBEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICES
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
 

SecureWorld Seattle Vulnerability Mgmt Nov 11 2015

  • 1. Kevin J. Murphy Cyber Security Defense by Effective Vulnerability Mgmt. Director, Windows Security Architecture
  • 2. Agenda 2 • Before We Begin.. • Year in Review: Cyber Crime & Nation States, Breaches, & Trends • Core of Vulnerability Management • Best Practices • Peer discussion
  • 7. Year in Review : Baits and Social Media 7
  • 8. Year in Review : Identity Exposure 8 This data was before the US Gov. OPM breach of 21.5 million identities
  • 9. Year in Review : Attack Profiles 9
  • 10. Year in Review : Cyber crime and Nation Threats 10 • 43% of all cyber attacks originated in China in 2014. http://vpncreative.net (I don’t believe this. I think China just gets caught) • Mobile O/S and app threats are rising as vectors into the enterprise • Dating sites have targeted phishing attacks • Facebook Twitter & Pinterest –sharing links to friends that are links to malware
  • 11. Patch Management : Just Do IT! Please download this doc. Most attacks use known vulnerabilities Patches are available in most cases This should be considered as part of the normal operations
  • 12. Patch Management: Core Elements 1. Accurate Asset Inventory a. Make sure you know your assets better than your attacker. 2. Patch availability awareness a. Microsoft Security Response Center b. http://csrc.nist.gov/ c. Your software vendors 3. Timely Monitoring, Scanning & Alerting infrastructure This should be considered as part of the normal operations
  • 13. Patch Management: Core Elements 4. Type of Patches a. Core operating systems patches: Windows, Linux, Android, iOS, other b. Infrastructure patches: Cisco, Juniper, F5, Palo Alto, etc. c. Your application patches: 3rd party, your internal developed apps., mobile apps. d. Monitor tool patches e. Don’t forget your outliers: security cameras, HVAC, etc. This should be considered as part of the normal operations
  • 14. Patch Management : Deployment  Plan on rolling out patches monthly  Critical patches should be patched out of sequence if an active exploit is in progress  Always test your patches first!  Full-time team  Fully funded in your budget cycle  Patch status should be part of your normal information system reporting metrics This should be viewed as part of the normal operations of your systems
  • 15. Patch Management : Tips  Attackers would love to infect your patch and have you roll out their malware for them.  Use checksums/strong hash to verify patch integrity  Maintain configuration control  Secure network file transfer if possible  Automate and Phase your deployment to patch your high value systems first Verify your patch isn’t creating an outage Protect your patching infrastructure.
  • 16. Patch Management : Cloud Based Systems  In most cases, your cloud provided will handle patches from the hypervisor and below  You still own patching your cloud based applications  Verify you cloud service level agreements and  Make sure there are no patching gaps. (Find the coverage gaps before your attacker does.)

Editor's Notes

  1. Intel collected – By knowing all the logging sources and working with the customer to incorporate them into the Detection Controls strategy, we will know what they have and the Good, Bad, and the Ugly of the entire environment.
  2. Intel collected – By knowing all the logging sources and working with the customer to incorporate them into the Detection Controls strategy, we will know what they have and the Good, Bad, and the Ugly of the entire environment.