SlideShare a Scribd company logo
1 of 39
Download to read offline
Addressing penetration testing and vulnerabilities,
and adding verification measures
April 4, 2017
Alan Calder
IT Governance Ltd
www.itgovernanceusa.com
PLEASE NOTE THAT ALL ATTENDEES ARE MUTED UPON JOINING
Introduction
• Alan Calder
• Founder of IT Governance Ltd
• Author of IT Governance: An International Guide to
Data Security and ISO27001/ISO27002
• Led the world’s first successful implementation
of ISO 27001 (then BS 7799)
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
IT Governance – a leading global provider
• The single source for everything to do with cybersecurity, cyber risk
management, and IT governance
• Our team of dedicated and knowledgeable trainers and consultants
have helped over 400 organizations worldwide achieve ISO 27001
certification
• We are privileged to work with individuals and organizations from all
business sectors and industries
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Agenda
• Penetration testing
• Vulnerability assessments and monitoring
• Monitoring and training controls for employees
4
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
NYDFS Cybersecurity Requirements
compliance deadlines
180 days 1 year 18 months 2 years
Section 500.02
Cybersecurity Program
Section 500.04 (b)
Chief Information Security
Officer (CISO)
Section 500.06
Audit Trail
Section 500.11
Third Party Service Provider
Security Policy
Section 500.03
Cybersecurity Policy
Section 500.05 Penetration
Testing and Vulnerability
Assessments
Section 500.08 Application
Security
Section 500.07
Access Privileges
Section 500.09
Risk Assessment
Section 500.13 Limitations
on Data Retention
Section 500.10
Cybersecurity Personnel
and Intelligence
Section 500.12 Multi-Factor
Authentication
Section 500.14 (a)
Training and Monitoring
Section 500.16
Incident Response Plan
Section 500.14 (b)
Training and Monitoring
Section 500.15 Encryption
of Nonpublic Information
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Financial sector vulnerabilities
7,111
financial services
companies assessed by
SecurityScorecard
1,356
out of these companies
at least one unpatched
vulnerability from the
common vulnerabilities and
exposures (CVE) database
72%
of these companies were
vulnerable to CVE 2014-
3566 (POODLE)
38%
were vulnerable to CVE
2016-0800 (DROWN)
23%
were vulnerable to CVE
2015-0204 (FREAK)
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Penetration testing and vulnerability
assessments (Section 500.05)
• The cybersecurity program must include monitoring and testing in
accordance with the risk assessment
• Monitoring and testing must consist of carrying out either:
– Continuous monitoring
– Or periodic Penetration testing and vulnerability assessments
• Any entity lacking effective continuous monitoring, or other systems
to detect changes in information systems that may generate or point
out vulnerabilities, must conduct both:
– Annual Penetration Testing of the Covered Entity’s Information Systems
determined each given year based on relevant identified risks in accordance with
the Risk Assessment; and
– Bi-annual vulnerability assessments, including any systematic scans or
reviews of Information Systems reasonably designed to identify publicly known
cybersecurity vulnerabilities in the Covered Entity’s Information Systems based
on the Risk Assessment.
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Penetration testing
• A penetration test, or pen test, is an authorized attack on a computer
system, carried out with the intention of finding security weaknesses,
and gaining access to it, its functionality and data
• Why should your organization conduct testing?
– Regulatory compliance
– Demonstrating due diligence
– Providing risk-based assurance that controls are being implemented effectively
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Why should you conduct a regular
test?
• New vulnerabilities are identified and exploited by hackers every
week, if not every day.
• In many cases, you won’t even know that your defenses have been
successfully breached until it’s too late.
• The Federal Deposit Insurance Corporation (FDIC) was accused
last year of covering up data breaches that occurred in 2010, 2011,
and 2013. In each instance, the regulator’s computers were
compromised by the Chinese government.
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Advantages of penetration testing
EVALUATE IDENTIFY PRIORITIZE
Accurately evaluate your
organization’s ability to
protect its networks,
applications, endpoints, and
users from determined
attackers.
Get detailed information on
actual, exploitable security
threats to identify which
vulnerabilities are more
critical, which are less
significant and which are false
positives.
More intelligently prioritize
remediation, apply necessary
security patches, and allocate
security resources more
effectively to ensure they are
available when and where
they are needed most.
COMMUNICATE PROTECT COMPLY
Help IT security professionals
communicate and prove the
need for a security budget
with business managers and
non-tech folk.
Protect your company’s
profits and reputation by
avoiding the financial costs
and negative publicity
associated with a compromise
of your systems.
Address the general auditing
aspects of regulations and
standards – such as the PCI
DSS, ISO 27001, and the GDPR
– and avoid significant fines
for non-compliance.
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Conducting a penetration test
• What needs to be tested:
– Network layer
– Application layer
– User layer
– Publicly accessible system
– High-risk systems
– High-value systems
– Internal systems
– Segmentation
User attack surface
Application
attack surface
Network attack
surface
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Internal or external testing
• Internal simulation
– A malicious insider
– The actions of a hacker who has gained access
• External simulation
– An external threat
– The actions of a hacker trying to gain access
• In 2016, the New York Times reported that the FBI had arrested a
National Security Agency (NSA) contractor for stealing and sharing
highly classified computer code developed by the NSA to hack into the
networks of foreign governments.
• In 2015, an FDIC employee copied personally identifiable information of
40,000 individuals. Additionally, information on how 31,000 banks
handle bankruptcy was copied to a thumb drive immediately before the
employee left the FDIC. The drive was recovered months later.
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Arranging a test
• Selecting a supplier
• Scoping the engagement
• Understanding the report
• Conducting remediation
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Levels of attack
• L1 - Mostly automated, high volume, always-on attack systems that
search out and exploit known vulnerabilities
• L2 - Targeted attacks, aimed at breaking into high-value targets,
which incorporate a significant human element
• Penetration testing should be deployed to match the activity
Monthly or quarterly
Identifies known vulnerabilities
from the CVE database and
provides detailed remediation
advice
As new vulnerabilities emerge every
day, this sort of testing should be
the standard practice
L1
Every 6 to 12 months
More sophisticated
Tests for linked vulnerabilities
and weaknesses that a competent
attacker could exploit
L2
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Different test types
Detail of test Vulnerability Scan L1 penetration test L2 penetration test
Alternative names Automated scan Vulnerability
assessment
Full penetration testing
Pre-assessment client scoping and
consultation
Scope of assessment Agreed with client Agreed with client Agreed with client
Can be conducted internally and
externally
Identification of potential
vulnerabilities
Identification of configuration
vulnerabilities
Identification of potential security
loopholes
Immediate notification of critical
issues
R R R
R R R
R R R
R R
R R R
R R R
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Different test types (continued)
Detail of test Vulnerability Scan L1 penetration test L2 penetration test
Automated scanning
Manual scanning
Manual testing
Manual grading of vulnerabilities
Exploitation of potential
vulnerabilities to establish the
impact of an attack
R R R
R R
R R
RR
R
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Credentials to look for in a penetration
tester
• Can they provide evidence of a solid reputation, history and
ethics (e.g. a full trading history, good feedback from both clients
and suppliers, a reliable financial record, and a strong history
of performance)?
• Do they take part in specialised industry events
(such as those run by CREST or OWASP chapters)?
• Are they able to demonstrate exploits or vulnerabilities, you have
found in other similar environments?
• Can they provide independent feedback on the quality of work
performed and conduct of staff involved?
• Do they adhere to a formal code of conduct overseen by an
independent industry body?
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Scoping the penetration test: questions
your provider should ask
• What are the business drivers behind needing/wanting to do a
penetration test?
• What are the outputs you require from the testing? – Assurance/
governance
• What threats are trying to protect against? – Internal/external
• What are the systems that need to be tested? – Critical/high
profile/everything
• Are you testing infrastructure and applications or admin and
monitoring systems?
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Are third-party permissions
required?
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Reporting – what is included and what
can you expect to receive?
• Provide a detailed technical report on the vulnerabilities of
the system
• Explain the vulnerabilities in a way that is easily understood by
senior management
• Report the outcome of the test in business risk terms
• Identify short-term (tactical) recommendations
• Conclude with and define ‘root cause’/long-term (strategic)
recommendations
• Include a security improvement action plan
• Provide assistance to the organization in implementing the
security improvements
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Report findings
• Findings identified during the penetration test should be recorded
in an agreed format and describe each finding in both:
– Technical terms that can be acted upon
– Non-technical, business terms, so that the justifications for the corrective actions
are understood
• Reports should describe the vulnerabilities found, including:
– Test narrative – describing the process that the tester used to achieve
particular results
– Test evidence – results of automated testing tools and screen shots of
successful exploits
– The associated technical risks and how to address them
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
ISO27001 and penetration testing
• As part of the risk assessment process: uncovering
vulnerabilities in any Internet-facing IP addresses, web applications,
or internal devices and applications, and linking them to identifiable
threats
• As part of the risk treatment plan: ensuring that the controls that
are implemented actually work as designed
• As part of the continual improvement processes: ensuring that
controls continue to work as required and that new and emerging
threats and vulnerabilities are identified and dealt with
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Why ISO 27001?
• Internationally recognized standard
• Best-practice solution
• Substantial eco-system of implementers
• Leading companies have implemented
– Wells Fargo
– Citibank
– The Federal Reserve Bank of New York
• Co-ordinates multiple legal and contractual compliance requirements
• Built around business-focused risk assessment
• Balances confidentiality, integrity, availability
• It’s possible to achieve certification in a timely and
cost-effective manner
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Annex A: 14 control categories
5 Infosec policies
6 Organization of infosec 7 Human resources security
8 Asset management 9 Access control
12 Operations security
14 System acq., dev. & mtnce.
16 Infosec incident management 17 Infosec aspects of BC mgmt
18 Compliance
11 Physical and environmental sec.
15 Supplier relationships
10 Cryptography
13 Comms security
114 CONTROLS
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Employee training and monitoring
controls (Section 500.14)
• As part of each cybersecurity program, the Covered Entity must:
– implement risk-based policies, procedures and controls designed to
monitor the activity of Authorized Users and detect unauthorized access or
use of, or tampering with, Nonpublic Information by such Authorized Users
– provide regular cybersecurity awareness training for all personnel that
is updated to reflect risks identified by the Covered Entity in its
Risk Assessment
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
ISO 27001 covers training and awareness
• A7.3 - Persons working within the ISMS must:
– be aware of the information security policy
– understand their contribution
– understand the implications of non-conformance
• A7.2.2 - Information security awareness, education, and training
should be proportionate to the role, including updates to policies
and procedures
• Gaining management support and sponsorship for an awareness
program is recognized as the most crucial aspect of the entire
initiative
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Staff training and awareness
• Password use and protection
• Virus protection
• Internet use and behavior that protects against malware
• Email use and behavior that protects against malware
• Confidential information protection
• Physical access
• Network access issues (such as modem use, home connection,
log-in issues)
• Incident reporting
• Social engineering = exploiting human vulnerabilities
– “Following instructions (or refusing to)”
– Ignorance
– Gullibility
– Desire to be liked
– Being helpful
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Building a cybersecurity culture
• Establishing a threat-aware culture of institutional integrity and personal
reliability. Provide regular staff awareness training, produce an Acceptable use
policy governing IT resources, and create a safe environment in which security
incidents can be reported without judgment
• Building a multi-disciplinary program to deter, prevent, detect, and respond to
insider threats and to limit their impact
• Building and operating security controls, including access controls; data
protection; configuration management; vulnerability and patch management;
and internal network segmentation
• Monitoring and detecting insider behavior to prevent insider attacks by capturing
observable indicators of potential activity before insiders act
• Developing and regularly testing an action plan for reacting to actual or
suspected insider misbehaviour
• Evolving the approach as conditions change
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Procedures, policies, and controls
• Implement a user account management system and privilege
management process
• Don’t use network and system administrator user accounts for non-
administrator activities
• Restrict special account privileges to a limited number of authorized
individuals
• Don’t allow unauthorized user accounts access to applications,
computers and networks
• Document user access permissions
• Implement a unique username and strong password policy
• Ensure user passwords are changed on a regular basis
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Staff awareness program
• The best solution for all companies
wishing to engage their staff with their
cybersecurity strategy is a staff
awareness program. Using training,
tools, and thought-provoking activities,
organizations can raise staff awareness
of the daily cyber risks they face, and
suggest actions and procedures to
adopt to minimize such risks.
• A staff awareness program should be an ongoing process that begins
with staff induction, and continues with periodic updates throughout the
year and/or whenever any staff-related security incidents occur.
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Benefits of staff awareness
• Helps companies identify potential security problems
• Helps staff understand the consequences of poor information
security and cybersecurity
• Ensures procedures are followed consistently
• Ensures staff are fully aware of corporate compliance requirements
for security regulations and frameworks such as the General Data
Protection Regulation (GDPR), the PCI DSS, ISO 27001, HIPAA,
and the GLBA
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Valuable resources
• Free green papers:
Penetration testing and ISO 27001:
º www.itgovernanceusa.com/resources/green-papers/penetration-testing-
and-iso27001
NYDFS Cybersecurity Requirements:
º Part 1 – The Regulation and the ISO 27001 standard
º Part 2 – Mapped alignment with ISO 27001
• Penetration testing and ISO 27001
º www.itgovernanceusa.com/iso27001_pen_testing
• More information on ISO 27001 and the Regulation
º www.itgovernanceusa.com/iso27001-nydfs-cybersecurity
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
• Penetration testing (pen testing) packages
– www.itgovernanceusa.com/penetration-testing-packages
• Staff security awareness and compliance training
– www.itgovernanceusa.com/itg-elearning
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
IT Governance offers two levels of penetration test to
meet your budget and technical requirements
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
eLearning courses
• IT Governance multi-user eLearning courses (whether generic or
customized) can be hosted externally or internally.
• We offer the following hosting options:
– Hosted in and delivered from our online learning environment. Staff simply log on
to the selected training courses, and the nominated administrator can access
online reports that show how many users have completed training, passed tests,
etc.
– Deployed in and delivered from your own network environment, on your own
learning management system (LMS). All courses are SCORM 1.2- and AICC-
compliant, and we also can provide you with an LMS for internal deployment if
required.
– You could also start with an external hosting environment and then, when you're
ready, progress to an internal environment.
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Customizable course content
• IT Governance courses can be rebranded to match your corporate
identity so that your employees will enjoy an eLearning course
experience that feels authentic, reinforces important brand
messages, and enables you to make a bigger impact on your
organization’s goals and objectives
• We offer two different customization options for any course:
– Core customization includes incorporating company policies and procedures,
company contact information, corporate logos, and colour schemes according to
a standard set of available customization options
– Tailored customization includes editing any additional element of the course
and/or eLearning experience at an additional hourly charge, and is subject to a
scoping call with your organization
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Choose from products that are tailored
to NYDFS Cybersecurity Requirements
and developed by expert practitioners
• New York DFS Cybersecurity & ISO 27001
Certified ISMS online training
– New York DFS Cybersecurity & ISO 27001 Certified ISMS Foundation
– New York DFS Cybersecurity & ISO 27001 Certified ISMS Lead Implementer
• ISO 27001 Cybersecurity Documentation Toolkit
– www.itgovernanceusa.com/shop/product/iso-27001-
cybersecurity-documentation-toolkit
• vsRisk™ – risk assessment software
– www.itgovernanceusa.com/shop/Product/vsrisk-standalone-basic
• ISO 27001 standard
– ISO/IEC 27001 2013 (ISO 27001 Standard) ISMS Requirements
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Join the conversation
• Subscribe to our IT Governance LinkedIn group:
NYDFS Cybersecurity Requirements
https://www.linkedin.com/groups/8598504
TM
www.itgoverrnanceusa.com
Copyright IT Governance Ltd 2017 – v1.0
Questions and answers

More Related Content

What's hot

The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceIT Governance Ltd
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPRIT Governance Ltd
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practiceZoneFox
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines Skyhigh Networks
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber securityIT Governance Ltd
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for developmentTomppa Järvinen
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPRTripwire
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Stephanie Vasey
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?Frederick Penaud
 

What's hot (20)

The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practice
 
Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPR
 
Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...Preparing for general data protection regulations (gdpr) within the hous...
Preparing for general data protection regulations (gdpr) within the hous...
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
 

Similar to Addressing penetration testing and vulnerabilities, and adding verification measures

Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisNorth Texas Chapter of the ISSA
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats Jim Kaplan CIA CFE
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
 
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S proaxissolutions
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTuan Phan
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Bossrbrockway
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...Cam Fulton
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsUlf Mattsson
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsPriyanka Aash
 
What is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptxWhat is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptxBluechipComputerSyst
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disneykamensm02
 
Newsletter Connect - Sep 2015
Newsletter Connect  - Sep 2015Newsletter Connect  - Sep 2015
Newsletter Connect - Sep 2015Arish Roy
 
Enhancing Cybersecurity with VAPT for IT Industries and ISO 27001 Compliant O...
Enhancing Cybersecurity with VAPT for IT Industries and ISO 27001 Compliant O...Enhancing Cybersecurity with VAPT for IT Industries and ISO 27001 Compliant O...
Enhancing Cybersecurity with VAPT for IT Industries and ISO 27001 Compliant O...ShyamMishra72
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsSolarWinds
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyNandita Nityanandam
 
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementProtect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementDevOps.com
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 

Similar to Addressing penetration testing and vulnerabilities, and adding verification measures (20)

Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability Management
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 
What is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptxWhat is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptx
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disney
 
Newsletter Connect - Sep 2015
Newsletter Connect  - Sep 2015Newsletter Connect  - Sep 2015
Newsletter Connect - Sep 2015
 
Enhancing Cybersecurity with VAPT for IT Industries and ISO 27001 Compliant O...
Enhancing Cybersecurity with VAPT for IT Industries and ISO 27001 Compliant O...Enhancing Cybersecurity with VAPT for IT Industries and ISO 27001 Compliant O...
Enhancing Cybersecurity with VAPT for IT Industries and ISO 27001 Compliant O...
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementProtect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 

More from IT Governance Ltd

Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get startedIT Governance Ltd
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security cultureIT Governance Ltd
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardIT Governance Ltd
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...IT Governance Ltd
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeIT Governance Ltd
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRIT Governance Ltd
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer IT Governance Ltd
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0IT Governance Ltd
 

More from IT Governance Ltd (12)

Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get started
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security culture
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on board
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programme
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPR
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0Implementing PCI DSS v 2.0 and v 3.0
Implementing PCI DSS v 2.0 and v 3.0
 

Recently uploaded

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
BADDI 💋 Call Girl 9827461493 Call Girls in Escort service book now
BADDI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowBADDI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
BADDI 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Availablepr788182
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Puja Sharma
 
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Available
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service AvailableBankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Available
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Availablepr788182
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSkajalroy875762
 
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDINGPuri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDINGpriyakumari801827
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTSkajalroy875762
 
KOLKATA 💋 Call Girl 9827461493 Call Girls in Escort service book now
KOLKATA 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKOLKATA 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KOLKATA 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 

Recently uploaded (20)

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
BADDI 💋 Call Girl 9827461493 Call Girls in Escort service book now
BADDI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowBADDI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
BADDI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Available
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service AvailableBankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Available
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Available
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDINGPuri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
KOLKATA 💋 Call Girl 9827461493 Call Girls in Escort service book now
KOLKATA 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKOLKATA 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KOLKATA 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 

Addressing penetration testing and vulnerabilities, and adding verification measures

  • 1. Addressing penetration testing and vulnerabilities, and adding verification measures April 4, 2017 Alan Calder IT Governance Ltd www.itgovernanceusa.com PLEASE NOTE THAT ALL ATTENDEES ARE MUTED UPON JOINING
  • 2. Introduction • Alan Calder • Founder of IT Governance Ltd • Author of IT Governance: An International Guide to Data Security and ISO27001/ISO27002 • Led the world’s first successful implementation of ISO 27001 (then BS 7799)
  • 3. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 IT Governance – a leading global provider • The single source for everything to do with cybersecurity, cyber risk management, and IT governance • Our team of dedicated and knowledgeable trainers and consultants have helped over 400 organizations worldwide achieve ISO 27001 certification • We are privileged to work with individuals and organizations from all business sectors and industries
  • 4. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Agenda • Penetration testing • Vulnerability assessments and monitoring • Monitoring and training controls for employees 4
  • 5. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 NYDFS Cybersecurity Requirements compliance deadlines 180 days 1 year 18 months 2 years Section 500.02 Cybersecurity Program Section 500.04 (b) Chief Information Security Officer (CISO) Section 500.06 Audit Trail Section 500.11 Third Party Service Provider Security Policy Section 500.03 Cybersecurity Policy Section 500.05 Penetration Testing and Vulnerability Assessments Section 500.08 Application Security Section 500.07 Access Privileges Section 500.09 Risk Assessment Section 500.13 Limitations on Data Retention Section 500.10 Cybersecurity Personnel and Intelligence Section 500.12 Multi-Factor Authentication Section 500.14 (a) Training and Monitoring Section 500.16 Incident Response Plan Section 500.14 (b) Training and Monitoring Section 500.15 Encryption of Nonpublic Information
  • 6. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Financial sector vulnerabilities 7,111 financial services companies assessed by SecurityScorecard 1,356 out of these companies at least one unpatched vulnerability from the common vulnerabilities and exposures (CVE) database 72% of these companies were vulnerable to CVE 2014- 3566 (POODLE) 38% were vulnerable to CVE 2016-0800 (DROWN) 23% were vulnerable to CVE 2015-0204 (FREAK)
  • 7. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Penetration testing and vulnerability assessments (Section 500.05) • The cybersecurity program must include monitoring and testing in accordance with the risk assessment • Monitoring and testing must consist of carrying out either: – Continuous monitoring – Or periodic Penetration testing and vulnerability assessments • Any entity lacking effective continuous monitoring, or other systems to detect changes in information systems that may generate or point out vulnerabilities, must conduct both: – Annual Penetration Testing of the Covered Entity’s Information Systems determined each given year based on relevant identified risks in accordance with the Risk Assessment; and – Bi-annual vulnerability assessments, including any systematic scans or reviews of Information Systems reasonably designed to identify publicly known cybersecurity vulnerabilities in the Covered Entity’s Information Systems based on the Risk Assessment.
  • 8. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Penetration testing • A penetration test, or pen test, is an authorized attack on a computer system, carried out with the intention of finding security weaknesses, and gaining access to it, its functionality and data • Why should your organization conduct testing? – Regulatory compliance – Demonstrating due diligence – Providing risk-based assurance that controls are being implemented effectively
  • 9. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Why should you conduct a regular test? • New vulnerabilities are identified and exploited by hackers every week, if not every day. • In many cases, you won’t even know that your defenses have been successfully breached until it’s too late. • The Federal Deposit Insurance Corporation (FDIC) was accused last year of covering up data breaches that occurred in 2010, 2011, and 2013. In each instance, the regulator’s computers were compromised by the Chinese government.
  • 10. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Advantages of penetration testing EVALUATE IDENTIFY PRIORITIZE Accurately evaluate your organization’s ability to protect its networks, applications, endpoints, and users from determined attackers. Get detailed information on actual, exploitable security threats to identify which vulnerabilities are more critical, which are less significant and which are false positives. More intelligently prioritize remediation, apply necessary security patches, and allocate security resources more effectively to ensure they are available when and where they are needed most. COMMUNICATE PROTECT COMPLY Help IT security professionals communicate and prove the need for a security budget with business managers and non-tech folk. Protect your company’s profits and reputation by avoiding the financial costs and negative publicity associated with a compromise of your systems. Address the general auditing aspects of regulations and standards – such as the PCI DSS, ISO 27001, and the GDPR – and avoid significant fines for non-compliance.
  • 11. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Conducting a penetration test • What needs to be tested: – Network layer – Application layer – User layer – Publicly accessible system – High-risk systems – High-value systems – Internal systems – Segmentation User attack surface Application attack surface Network attack surface
  • 12. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Internal or external testing • Internal simulation – A malicious insider – The actions of a hacker who has gained access • External simulation – An external threat – The actions of a hacker trying to gain access • In 2016, the New York Times reported that the FBI had arrested a National Security Agency (NSA) contractor for stealing and sharing highly classified computer code developed by the NSA to hack into the networks of foreign governments. • In 2015, an FDIC employee copied personally identifiable information of 40,000 individuals. Additionally, information on how 31,000 banks handle bankruptcy was copied to a thumb drive immediately before the employee left the FDIC. The drive was recovered months later.
  • 13. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Arranging a test • Selecting a supplier • Scoping the engagement • Understanding the report • Conducting remediation
  • 14. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Levels of attack • L1 - Mostly automated, high volume, always-on attack systems that search out and exploit known vulnerabilities • L2 - Targeted attacks, aimed at breaking into high-value targets, which incorporate a significant human element • Penetration testing should be deployed to match the activity Monthly or quarterly Identifies known vulnerabilities from the CVE database and provides detailed remediation advice As new vulnerabilities emerge every day, this sort of testing should be the standard practice L1 Every 6 to 12 months More sophisticated Tests for linked vulnerabilities and weaknesses that a competent attacker could exploit L2
  • 15. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Different test types Detail of test Vulnerability Scan L1 penetration test L2 penetration test Alternative names Automated scan Vulnerability assessment Full penetration testing Pre-assessment client scoping and consultation Scope of assessment Agreed with client Agreed with client Agreed with client Can be conducted internally and externally Identification of potential vulnerabilities Identification of configuration vulnerabilities Identification of potential security loopholes Immediate notification of critical issues R R R R R R R R R R R R R R R R R
  • 16. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Different test types (continued) Detail of test Vulnerability Scan L1 penetration test L2 penetration test Automated scanning Manual scanning Manual testing Manual grading of vulnerabilities Exploitation of potential vulnerabilities to establish the impact of an attack R R R R R R R RR R
  • 17. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Credentials to look for in a penetration tester • Can they provide evidence of a solid reputation, history and ethics (e.g. a full trading history, good feedback from both clients and suppliers, a reliable financial record, and a strong history of performance)? • Do they take part in specialised industry events (such as those run by CREST or OWASP chapters)? • Are they able to demonstrate exploits or vulnerabilities, you have found in other similar environments? • Can they provide independent feedback on the quality of work performed and conduct of staff involved? • Do they adhere to a formal code of conduct overseen by an independent industry body?
  • 18. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Scoping the penetration test: questions your provider should ask • What are the business drivers behind needing/wanting to do a penetration test? • What are the outputs you require from the testing? – Assurance/ governance • What threats are trying to protect against? – Internal/external • What are the systems that need to be tested? – Critical/high profile/everything • Are you testing infrastructure and applications or admin and monitoring systems?
  • 19. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Are third-party permissions required?
  • 20. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Reporting – what is included and what can you expect to receive? • Provide a detailed technical report on the vulnerabilities of the system • Explain the vulnerabilities in a way that is easily understood by senior management • Report the outcome of the test in business risk terms • Identify short-term (tactical) recommendations • Conclude with and define ‘root cause’/long-term (strategic) recommendations • Include a security improvement action plan • Provide assistance to the organization in implementing the security improvements
  • 21. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Report findings • Findings identified during the penetration test should be recorded in an agreed format and describe each finding in both: – Technical terms that can be acted upon – Non-technical, business terms, so that the justifications for the corrective actions are understood • Reports should describe the vulnerabilities found, including: – Test narrative – describing the process that the tester used to achieve particular results – Test evidence – results of automated testing tools and screen shots of successful exploits – The associated technical risks and how to address them
  • 22. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 ISO27001 and penetration testing • As part of the risk assessment process: uncovering vulnerabilities in any Internet-facing IP addresses, web applications, or internal devices and applications, and linking them to identifiable threats • As part of the risk treatment plan: ensuring that the controls that are implemented actually work as designed • As part of the continual improvement processes: ensuring that controls continue to work as required and that new and emerging threats and vulnerabilities are identified and dealt with
  • 23. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Why ISO 27001? • Internationally recognized standard • Best-practice solution • Substantial eco-system of implementers • Leading companies have implemented – Wells Fargo – Citibank – The Federal Reserve Bank of New York • Co-ordinates multiple legal and contractual compliance requirements • Built around business-focused risk assessment • Balances confidentiality, integrity, availability • It’s possible to achieve certification in a timely and cost-effective manner
  • 24. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Annex A: 14 control categories 5 Infosec policies 6 Organization of infosec 7 Human resources security 8 Asset management 9 Access control 12 Operations security 14 System acq., dev. & mtnce. 16 Infosec incident management 17 Infosec aspects of BC mgmt 18 Compliance 11 Physical and environmental sec. 15 Supplier relationships 10 Cryptography 13 Comms security 114 CONTROLS
  • 25. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Employee training and monitoring controls (Section 500.14) • As part of each cybersecurity program, the Covered Entity must: – implement risk-based policies, procedures and controls designed to monitor the activity of Authorized Users and detect unauthorized access or use of, or tampering with, Nonpublic Information by such Authorized Users – provide regular cybersecurity awareness training for all personnel that is updated to reflect risks identified by the Covered Entity in its Risk Assessment
  • 26. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 ISO 27001 covers training and awareness • A7.3 - Persons working within the ISMS must: – be aware of the information security policy – understand their contribution – understand the implications of non-conformance • A7.2.2 - Information security awareness, education, and training should be proportionate to the role, including updates to policies and procedures • Gaining management support and sponsorship for an awareness program is recognized as the most crucial aspect of the entire initiative
  • 27. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Staff training and awareness • Password use and protection • Virus protection • Internet use and behavior that protects against malware • Email use and behavior that protects against malware • Confidential information protection • Physical access • Network access issues (such as modem use, home connection, log-in issues) • Incident reporting • Social engineering = exploiting human vulnerabilities – “Following instructions (or refusing to)” – Ignorance – Gullibility – Desire to be liked – Being helpful
  • 28. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Building a cybersecurity culture • Establishing a threat-aware culture of institutional integrity and personal reliability. Provide regular staff awareness training, produce an Acceptable use policy governing IT resources, and create a safe environment in which security incidents can be reported without judgment • Building a multi-disciplinary program to deter, prevent, detect, and respond to insider threats and to limit their impact • Building and operating security controls, including access controls; data protection; configuration management; vulnerability and patch management; and internal network segmentation • Monitoring and detecting insider behavior to prevent insider attacks by capturing observable indicators of potential activity before insiders act • Developing and regularly testing an action plan for reacting to actual or suspected insider misbehaviour • Evolving the approach as conditions change
  • 29. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Procedures, policies, and controls • Implement a user account management system and privilege management process • Don’t use network and system administrator user accounts for non- administrator activities • Restrict special account privileges to a limited number of authorized individuals • Don’t allow unauthorized user accounts access to applications, computers and networks • Document user access permissions • Implement a unique username and strong password policy • Ensure user passwords are changed on a regular basis
  • 30. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Staff awareness program • The best solution for all companies wishing to engage their staff with their cybersecurity strategy is a staff awareness program. Using training, tools, and thought-provoking activities, organizations can raise staff awareness of the daily cyber risks they face, and suggest actions and procedures to adopt to minimize such risks. • A staff awareness program should be an ongoing process that begins with staff induction, and continues with periodic updates throughout the year and/or whenever any staff-related security incidents occur.
  • 31. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Benefits of staff awareness • Helps companies identify potential security problems • Helps staff understand the consequences of poor information security and cybersecurity • Ensures procedures are followed consistently • Ensures staff are fully aware of corporate compliance requirements for security regulations and frameworks such as the General Data Protection Regulation (GDPR), the PCI DSS, ISO 27001, HIPAA, and the GLBA
  • 32. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Valuable resources • Free green papers: Penetration testing and ISO 27001: º www.itgovernanceusa.com/resources/green-papers/penetration-testing- and-iso27001 NYDFS Cybersecurity Requirements: º Part 1 – The Regulation and the ISO 27001 standard º Part 2 – Mapped alignment with ISO 27001 • Penetration testing and ISO 27001 º www.itgovernanceusa.com/iso27001_pen_testing • More information on ISO 27001 and the Regulation º www.itgovernanceusa.com/iso27001-nydfs-cybersecurity
  • 33. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 • Penetration testing (pen testing) packages – www.itgovernanceusa.com/penetration-testing-packages • Staff security awareness and compliance training – www.itgovernanceusa.com/itg-elearning
  • 34. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 IT Governance offers two levels of penetration test to meet your budget and technical requirements
  • 35. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 eLearning courses • IT Governance multi-user eLearning courses (whether generic or customized) can be hosted externally or internally. • We offer the following hosting options: – Hosted in and delivered from our online learning environment. Staff simply log on to the selected training courses, and the nominated administrator can access online reports that show how many users have completed training, passed tests, etc. – Deployed in and delivered from your own network environment, on your own learning management system (LMS). All courses are SCORM 1.2- and AICC- compliant, and we also can provide you with an LMS for internal deployment if required. – You could also start with an external hosting environment and then, when you're ready, progress to an internal environment.
  • 36. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Customizable course content • IT Governance courses can be rebranded to match your corporate identity so that your employees will enjoy an eLearning course experience that feels authentic, reinforces important brand messages, and enables you to make a bigger impact on your organization’s goals and objectives • We offer two different customization options for any course: – Core customization includes incorporating company policies and procedures, company contact information, corporate logos, and colour schemes according to a standard set of available customization options – Tailored customization includes editing any additional element of the course and/or eLearning experience at an additional hourly charge, and is subject to a scoping call with your organization
  • 37. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Choose from products that are tailored to NYDFS Cybersecurity Requirements and developed by expert practitioners • New York DFS Cybersecurity & ISO 27001 Certified ISMS online training – New York DFS Cybersecurity & ISO 27001 Certified ISMS Foundation – New York DFS Cybersecurity & ISO 27001 Certified ISMS Lead Implementer • ISO 27001 Cybersecurity Documentation Toolkit – www.itgovernanceusa.com/shop/product/iso-27001- cybersecurity-documentation-toolkit • vsRisk™ – risk assessment software – www.itgovernanceusa.com/shop/Product/vsrisk-standalone-basic • ISO 27001 standard – ISO/IEC 27001 2013 (ISO 27001 Standard) ISMS Requirements
  • 38. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Join the conversation • Subscribe to our IT Governance LinkedIn group: NYDFS Cybersecurity Requirements https://www.linkedin.com/groups/8598504
  • 39. TM www.itgoverrnanceusa.com Copyright IT Governance Ltd 2017 – v1.0 Questions and answers