SlideShare a Scribd company logo
1 of 12
Download to read offline
www.hertsdirect.org
Finding and Understanding the Risk
Impact of Firewall Changes
Dave Mansfield, Head of IT Technology
Jaswant Golan, Technical Security Officer
www.hertsdirect.org
Your Speakers
Dave Mansfield – Head of Technology HCC
Head of Technology 3 years
Infrastructure Manager for 5 years
Network and Security Manager for 15 years (Public and Private)
Jaswant Golan – Technical Security Officer HCC
Technical Security Officer 8 years (HCC)
Security Compliance Manager 3 years (Private Sector)
Systems Architect 8 years (Financial Sector)
www.hertsdirect.org
About Hertfordshire County Council
Heading
Sub heading
Body text
Business Challenges
• Large and complex
infrastructure with many
change requests
• Many outsourced service
providers
• Limited management
visibility of firewall change
impacts
• Resource intensive risk
identification process
• Ensure compliance with
industry standards
Focus on critical risks
www.hertsdirect.org
Network model to visualize infrastructure
ThreatsConfig data and
routing tables VulnerabilitiesLayer 3
Devices Assets
www.hertsdirect.org
Policy Compliance
• Internal security
policy
• UK Public Service
Network (PSN)
• PCI and ISO 27001
• Trusted zones
trusting semi-trusted
zones
Compliance Assessment
www.hertsdirect.org
Automating Change Management Risk Assessment
Technical
Details
Change
Request
Risk
Assessment
Change
Implementation
Reconcile
and Verify
Automate the management
process
• Monitor changes
• Automate risk
assessment before
change is made
• Identify devices involved
• Deliver access path
information immediately
• Handle exceptions
• Reconcile changes
www.hertsdirect.org
Assess Risk Before Implementation
• Reduced manual
effort by 60%
• Police firewall
changes
• Focused on
outcome instead
of ACLs and rules
• ‘Think Security’
www.hertsdirect.org
Intelligent use of Independent Pen Tests
Vulnerability Hot Spots
Attack Vectors
Virtual pen test
Target concentrations of
vulnerabilities to meet SLAs
Target attack vectors against
critical assets
Attack Vectors
Target specific attack vectors
Vendor Security
Bulletins
Business Units
Technical
Groups
Vulnerability
Severity
www.hertsdirect.org
Results
• Understand downstream impact and risk of proposed
firewall changes in seconds
• 60% reduction in manual effort for firewall change
assessment process
• Complete visibility of security network infrastructure
• Regulatory evidential support
• Understand firewall rules and what they actually do
• Focused on effectively reducing risk
• Able to meet future needs and enable new business
services
• Even the firewall blokes are using the tool !
www.hertsdirect.org
thank you
www.hertsdirect.org

More Related Content

Viewers also liked

PR Training for Startups
PR Training for StartupsPR Training for Startups
PR Training for StartupsHarlan Beverly
 
The astonishia Flats Neemrana.7503367689
The astonishia Flats Neemrana.7503367689The astonishia Flats Neemrana.7503367689
The astonishia Flats Neemrana.7503367689sahilkharkara
 
9 coast and jungle malnutrition
9   coast and jungle malnutrition9   coast and jungle malnutrition
9 coast and jungle malnutritionJuan R Farro
 
Re-building confidence in the lending market, Working Party on Land Registrat...
Re-building confidence in the lending market, Working Party on Land Registrat...Re-building confidence in the lending market, Working Party on Land Registrat...
Re-building confidence in the lending market, Working Party on Land Registrat...LandRegistry
 
Critical Mass for Bangladeshi Industries
Critical Mass for Bangladeshi IndustriesCritical Mass for Bangladeshi Industries
Critical Mass for Bangladeshi IndustriesDr Nahin Mamun
 
Business e services-overview
Business e services-overviewBusiness e services-overview
Business e services-overviewLandRegistry
 
Cross Border Electronic Conveyancing, Wim Louwman, President of the European ...
Cross Border Electronic Conveyancing, Wim Louwman, President of the European ...Cross Border Electronic Conveyancing, Wim Louwman, President of the European ...
Cross Border Electronic Conveyancing, Wim Louwman, President of the European ...LandRegistry
 
Outdoor display products
Outdoor display productsOutdoor display products
Outdoor display productsJian Meilai
 
3 research psychiatric
3   research psychiatric3   research psychiatric
3 research psychiatricJuan R Farro
 

Viewers also liked (13)

Bullying ahome
Bullying ahomeBullying ahome
Bullying ahome
 
PR Training for Startups
PR Training for StartupsPR Training for Startups
PR Training for Startups
 
The astonishia Flats Neemrana.7503367689
The astonishia Flats Neemrana.7503367689The astonishia Flats Neemrana.7503367689
The astonishia Flats Neemrana.7503367689
 
2013 Go Native Go Local Guide -- Excerpts
2013 Go Native Go Local Guide -- Excerpts 2013 Go Native Go Local Guide -- Excerpts
2013 Go Native Go Local Guide -- Excerpts
 
9 coast and jungle malnutrition
9   coast and jungle malnutrition9   coast and jungle malnutrition
9 coast and jungle malnutrition
 
Re-building confidence in the lending market, Working Party on Land Registrat...
Re-building confidence in the lending market, Working Party on Land Registrat...Re-building confidence in the lending market, Working Party on Land Registrat...
Re-building confidence in the lending market, Working Party on Land Registrat...
 
33 27 profetas asiaticos español ingles www.gftaognosticaespiritual.org
33 27 profetas asiaticos   español ingles www.gftaognosticaespiritual.org33 27 profetas asiaticos   español ingles www.gftaognosticaespiritual.org
33 27 profetas asiaticos español ingles www.gftaognosticaespiritual.org
 
Critical Mass for Bangladeshi Industries
Critical Mass for Bangladeshi IndustriesCritical Mass for Bangladeshi Industries
Critical Mass for Bangladeshi Industries
 
Business e services-overview
Business e services-overviewBusiness e services-overview
Business e services-overview
 
Reflection
ReflectionReflection
Reflection
 
Cross Border Electronic Conveyancing, Wim Louwman, President of the European ...
Cross Border Electronic Conveyancing, Wim Louwman, President of the European ...Cross Border Electronic Conveyancing, Wim Louwman, President of the European ...
Cross Border Electronic Conveyancing, Wim Louwman, President of the European ...
 
Outdoor display products
Outdoor display productsOutdoor display products
Outdoor display products
 
3 research psychiatric
3   research psychiatric3   research psychiatric
3 research psychiatric
 

Similar to Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes

Communication Technology Inc-Company Brief Charts-032515
Communication Technology Inc-Company Brief Charts-032515Communication Technology Inc-Company Brief Charts-032515
Communication Technology Inc-Company Brief Charts-032515Larry Arps
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014KBIZEAU
 
Novel cloud computingsecurity issues
Novel cloud computingsecurity issuesNovel cloud computingsecurity issues
Novel cloud computingsecurity issuesJoo Manthar
 
cloudComputingSec_p3.pptx
cloudComputingSec_p3.pptxcloudComputingSec_p3.pptx
cloudComputingSec_p3.pptxSteven Quach
 
Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...Carotek
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...元 黄
 
Building Converged Plantwide Ethernet
Building Converged Plantwide EthernetBuilding Converged Plantwide Ethernet
Building Converged Plantwide EthernetRockwell Automation
 
Evolving Enterprise Networks for Future Initiatives - The Importance of a Lif...
Evolving Enterprise Networks for Future Initiatives - The Importance of a Lif...Evolving Enterprise Networks for Future Initiatives - The Importance of a Lif...
Evolving Enterprise Networks for Future Initiatives - The Importance of a Lif...DImension Data
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2KBIZEAU
 
The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemLancope, Inc.
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud EcosystemLumos Networks
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud EcosystemLumosNetworks
 
Data Center Design Guide 4 1
Data Center Design Guide 4 1Data Center Design Guide 4 1
Data Center Design Guide 4 1Fiyaz Syed
 
Overview of Ericsson’s Products
Overview of Ericsson’s ProductsOverview of Ericsson’s Products
Overview of Ericsson’s ProductsSyedZakiReza
 

Similar to Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes (20)

Communication Technology Inc-Company Brief Charts-032515
Communication Technology Inc-Company Brief Charts-032515Communication Technology Inc-Company Brief Charts-032515
Communication Technology Inc-Company Brief Charts-032515
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014
 
Novel cloud computingsecurity issues
Novel cloud computingsecurity issuesNovel cloud computingsecurity issues
Novel cloud computingsecurity issues
 
cloudComputingSec_p3.pptx
cloudComputingSec_p3.pptxcloudComputingSec_p3.pptx
cloudComputingSec_p3.pptx
 
Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...
 
PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)
 
SM Consulting Services Inc.
SM Consulting Services Inc.SM Consulting Services Inc.
SM Consulting Services Inc.
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
 
Lowering Industrial Network Total Cost of Ownership
Lowering Industrial Network Total Cost of OwnershipLowering Industrial Network Total Cost of Ownership
Lowering Industrial Network Total Cost of Ownership
 
Building Converged Plantwide Ethernet
Building Converged Plantwide EthernetBuilding Converged Plantwide Ethernet
Building Converged Plantwide Ethernet
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 
Evolving Enterprise Networks for Future Initiatives - The Importance of a Lif...
Evolving Enterprise Networks for Future Initiatives - The Importance of a Lif...Evolving Enterprise Networks for Future Initiatives - The Importance of a Lif...
Evolving Enterprise Networks for Future Initiatives - The Importance of a Lif...
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2
 
The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch System
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
 
Data Center Design Guide 4 1
Data Center Design Guide 4 1Data Center Design Guide 4 1
Data Center Design Guide 4 1
 
Overview of Ericsson’s Products
Overview of Ericsson’s ProductsOverview of Ericsson’s Products
Overview of Ericsson’s Products
 
AboutWeb
AboutWebAboutWeb
AboutWeb
 

More from Skybox Security

Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelSkybox Security
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Skybox Security
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 
Network Security Best Practices - Reducing Your Attack Surface
Network Security Best Practices - Reducing Your Attack SurfaceNetwork Security Best Practices - Reducing Your Attack Surface
Network Security Best Practices - Reducing Your Attack SurfaceSkybox Security
 
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
CAPITA - Network Visibility to Manage Firewall Changes & Reduce RiskCAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
CAPITA - Network Visibility to Manage Firewall Changes & Reduce RiskSkybox Security
 
What's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix ItWhat's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix ItSkybox Security
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSkybox Security
 
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...Skybox Security
 
Risk Analytics: One Intelligent View
Risk Analytics: One Intelligent ViewRisk Analytics: One Intelligent View
Risk Analytics: One Intelligent ViewSkybox Security
 
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Skybox Security
 
Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security? Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security? Skybox Security
 
Infosec 2014: Tech Talk - Firewall Change Management
Infosec 2014: Tech Talk - Firewall Change ManagementInfosec 2014: Tech Talk - Firewall Change Management
Infosec 2014: Tech Talk - Firewall Change ManagementSkybox Security
 
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability DiscoveryInfosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability DiscoverySkybox Security
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesSkybox Security
 
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...Skybox Security
 
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline SecurityInfosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline SecuritySkybox Security
 
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your NetworkRSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your NetworkSkybox Security
 
RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Firewall Change Management: Automate, Secure & Comply RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Firewall Change Management: Automate, Secure & Comply Skybox Security
 
RSA 2014: Skybox Security Risk Analytics Overview
RSA 2014: Skybox Security Risk Analytics OverviewRSA 2014: Skybox Security Risk Analytics Overview
RSA 2014: Skybox Security Risk Analytics OverviewSkybox Security
 
Best Practices for Network Security Management
Best Practices for Network Security Management Best Practices for Network Security Management
Best Practices for Network Security Management Skybox Security
 

More from Skybox Security (20)

Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
Network Security Best Practices - Reducing Your Attack Surface
Network Security Best Practices - Reducing Your Attack SurfaceNetwork Security Best Practices - Reducing Your Attack Surface
Network Security Best Practices - Reducing Your Attack Surface
 
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
CAPITA - Network Visibility to Manage Firewall Changes & Reduce RiskCAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
 
What's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix ItWhat's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix It
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual Intelligence
 
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
 
Risk Analytics: One Intelligent View
Risk Analytics: One Intelligent ViewRisk Analytics: One Intelligent View
Risk Analytics: One Intelligent View
 
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
 
Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security? Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security?
 
Infosec 2014: Tech Talk - Firewall Change Management
Infosec 2014: Tech Talk - Firewall Change ManagementInfosec 2014: Tech Talk - Firewall Change Management
Infosec 2014: Tech Talk - Firewall Change Management
 
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability DiscoveryInfosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
 
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
 
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline SecurityInfosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
 
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your NetworkRSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
 
RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Firewall Change Management: Automate, Secure & Comply RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Firewall Change Management: Automate, Secure & Comply
 
RSA 2014: Skybox Security Risk Analytics Overview
RSA 2014: Skybox Security Risk Analytics OverviewRSA 2014: Skybox Security Risk Analytics Overview
RSA 2014: Skybox Security Risk Analytics Overview
 
Best Practices for Network Security Management
Best Practices for Network Security Management Best Practices for Network Security Management
Best Practices for Network Security Management
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes

  • 1. www.hertsdirect.org Finding and Understanding the Risk Impact of Firewall Changes Dave Mansfield, Head of IT Technology Jaswant Golan, Technical Security Officer
  • 2. www.hertsdirect.org Your Speakers Dave Mansfield – Head of Technology HCC Head of Technology 3 years Infrastructure Manager for 5 years Network and Security Manager for 15 years (Public and Private) Jaswant Golan – Technical Security Officer HCC Technical Security Officer 8 years (HCC) Security Compliance Manager 3 years (Private Sector) Systems Architect 8 years (Financial Sector)
  • 4. Heading Sub heading Body text Business Challenges • Large and complex infrastructure with many change requests • Many outsourced service providers • Limited management visibility of firewall change impacts • Resource intensive risk identification process • Ensure compliance with industry standards Focus on critical risks
  • 5. www.hertsdirect.org Network model to visualize infrastructure ThreatsConfig data and routing tables VulnerabilitiesLayer 3 Devices Assets
  • 6. www.hertsdirect.org Policy Compliance • Internal security policy • UK Public Service Network (PSN) • PCI and ISO 27001 • Trusted zones trusting semi-trusted zones Compliance Assessment
  • 7. www.hertsdirect.org Automating Change Management Risk Assessment Technical Details Change Request Risk Assessment Change Implementation Reconcile and Verify Automate the management process • Monitor changes • Automate risk assessment before change is made • Identify devices involved • Deliver access path information immediately • Handle exceptions • Reconcile changes
  • 8. www.hertsdirect.org Assess Risk Before Implementation • Reduced manual effort by 60% • Police firewall changes • Focused on outcome instead of ACLs and rules • ‘Think Security’
  • 9. www.hertsdirect.org Intelligent use of Independent Pen Tests Vulnerability Hot Spots Attack Vectors Virtual pen test Target concentrations of vulnerabilities to meet SLAs Target attack vectors against critical assets Attack Vectors Target specific attack vectors Vendor Security Bulletins Business Units Technical Groups Vulnerability Severity
  • 10. www.hertsdirect.org Results • Understand downstream impact and risk of proposed firewall changes in seconds • 60% reduction in manual effort for firewall change assessment process • Complete visibility of security network infrastructure • Regulatory evidential support • Understand firewall rules and what they actually do • Focused on effectively reducing risk • Able to meet future needs and enable new business services • Even the firewall blokes are using the tool !