An overview of current cyber security concerns and ways to combat them, as well as an introduction to some of the capabilities of Azure Active Directory
Presentation on Zero Trust model, used for the Codecademy Manipal Chapter event. Covers basic information about the Zero trust model, implementation, and benefits.
Bridging the Social Media Implementation/Audit GapJerod Brennen
It's one thing to embrace social media, but it's another thing entirely to embrace it securely. This presentation helps organizations understand what steps should be taken to ensure that their social media properties aren't abused or exploited to attack the organization.
Presentation on Zero Trust model, used for the Codecademy Manipal Chapter event. Covers basic information about the Zero trust model, implementation, and benefits.
Bridging the Social Media Implementation/Audit GapJerod Brennen
It's one thing to embrace social media, but it's another thing entirely to embrace it securely. This presentation helps organizations understand what steps should be taken to ensure that their social media properties aren't abused or exploited to attack the organization.
What to Expect in 2016: Top 5 Predictions for Security and Access ControlSecureAuth
SecureAuth and special guest Forrester Research discuss the trends and strategies that will help you boost security and protect your organization from access threats. In this session, you will hear from Forrester's Andras Cser as he shares the top 5 information security and access control trends to watch for in 2016 and how they will impact your organization. Additionally, Keith Graham, CTO from SecureAuth, will present effective strategies to stay ahead of these trends and protect against advanced cyber attacks with adaptive authentication.
Building an Effective Identity Management StrategyNetIQ
Very few organizations do identity management as effectively as they could.
They have trouble developing effective methods for provisioning new users, de-provisioning old users, updating access privileges as users move around the organization, and automating the user change and configuration processes.
This presentation by identity and access management (IAM) experts, Adrian Lane, CTO and analyst at Securosis, and Rick Wagner, director of product management at NetIQ covered key elements of building a strong IAM strategy and the leading industry practices behind those strategies.
Originally presented as a UBM TechWeb DarkReading webinar the on-demand version will be available at: http://bit.ly/UUABIz until July 1st 2013.
Recent security breaches by trusted insiders have propelled Identity and Access Management (IAM) to the top security priority of many organizations. After all, it’s clear security is only as strong as its weakest link – people – and the press is full of articles documenting the damage people can do. So it’s natural for security managers to want to shore up their IAM infrastructure to avoid similar embarrassment. But IAM needs to be approached with an eye towards the full extended environment and by taking associated risks into account. In other words, whether you are starting from scratch or taking on new IAM challenges such as cloud security, there are certain IAM tenets you should follow to build a successful, effective IAM solution.
Don’t join the Hall of Shame by having a security breach at your organization. Attend this webcast to learn five ways a typical IAM solution can fail, so you don’t make the same mistakes.
View the full on-demand webcast: http://securityintelligence.com/events/5-reasons-iam-solution-will-fail/#.VYxJ4_lVhBd
Office 365 Security Features That Nonprofits Should Know and UseTechSoup
When it comes to email, document storage, and online browsing, security should be foremost. Join us for a 30-minute webinar where we will discuss how you can use built-in features of Office 365 to protect your organization. Learn how to protect your systems and keep data in the hands of only those users who need it.
This webinar is intended for organizations that already use Office 365, or those that want to better understand how Office 365 can keep their communications and data secure.
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
Organizations today are facing unprecedented and sophisticated attacks to their internal Information Technology infrastructure. These evolving attacks include spear phishing, ransomware, credential hijacking, and more and can result in significant data loss and/or theft of confidential and valuable intellectual property. In response to these threats, Microsoft has released an array of tools such as Azure Sentinel, Cloud App Security, Microsoft Defender for Identity, and more which can help to secure and protect against these threats. These tools work with both on-premises and cloud-based infrastructure to provide for comprehensive protection of hybrid environments.
This session breaks down each of these Microsoft tools and provides for an understanding of their value for specific security scenarios. A simple, no-marketing approach is taken to evaluating each individual tool, and a simple breakdown of what is provided with each Microsoft licensing model is outlined. Attendees will gain a better appreciation to which tools to utilize and how to better protect their Information Technology investments from the type of career-ending attacks which are unfortunately common today.
• Understand how modern threats such as spear phishing, ransomware, credential hijacking, and more are commonly faced in today’s IT environments and what tools and techniques can be used to mitigate the risk faced by these modern threats
• Examine Microsoft security tools such as Azure Sentinel, Microsoft Defender for Identity, Azure Security Center, Cloud App Security, Azure AD Privileged Identity Management, Azure AD Identity Protection, Azure Information Protection, and more
• Understand which tools are available for each licensing model in the Microsoft world and when it may make sense to ‘upgrade’ existing licenses to support specific toolsets as opposed to investment in third-party tools
To help organizations identify identity and access management (IAM) solutions that are both comprehensive and cost-effective, leading industry analyst firm Enterprise Management Associates (EMA) has conducted primary research on current and emerging IAM challenges, requirements, and solutions.
Get key results from this new research when you check out this presentation.
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
Protecting today’s cloud-based, mobile enterprise requires a new approach – one that focuses on secure identity and access management (IAM), while at the same time driving two critical imperatives:
Learn how to enable business growth by:
• Quickly deploying new online services
• Leveraging new advances in cloud computing and virtualization
• Accommodating the needs of demanding, tech-savvy users
(i.e., customers, partners, employees, etc.)
• Driving greater employee productivity and increasing business intelligence
Protect the business by:
• Mitigating the risk of fraud, breaches, insider threats and improper access – from both internal and external sources
• Safeguarding critical systems, applications and data
Download the eBook today to learn more.
Why do databases have the highest rate of breaches among all business assets? The answer is simple: they house the sensitive business data that malicious insiders and hackers want most. The risk of a database breach can be mitigated by implementing internal controls and following industry best practices - but you must first understand the shifting threat landscape. This presentation will (1) present the top 10 threats to your database in 2013 (2) define a layered defense strategy for preventing database breaches using industry best practices (3) demonstrate a successful defense against data theft with a customer case study.
Intel IT's Identity and Access Management JourneyIntel IT Center
Advances in the SMAC stack – social, mobile, analytics, and cloud – have affected every part of the enterprise. Organizations want to move more diverse data to more places, and more people need access via more services and devices. Managing all this is a big task for information security. Learn about Intel IT's approach to IDAM redesign and IT best practices for enhanced security and a better user experience.
Selleks, et julgeks andmed pilveteenusesse viia, peab esmalt teenusepakkujat usaldama. Mida on Microsoft ära teinud selleks, et klientide usaldust võita? Kuidas hoida andmeid pilve-Exchange’is ja pilve-SharePointis turvaliselt, jagada välja krüpteeritult ning põhjalikult kontrollida süsteemide kasutajate volitusi.
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Core Security
Passwords, multi-factor authentication, knowledge-based questions/answers, and hard tokens are based on technologies that are now 20 years old. With organizations losing the battle against cyber attacks, it’s clearly time to move beyond these legacy technologies and adopt a modern approach in which awareness and flexibility are king. Authentication must adapt based on the level of risk, so that it can deliver strong security yet be invisible to users most of the time.
Achieving that balance of strong security and appropriate user friction is the basis for modern authentication. This session will explore what modern authentication is and why using it across all users, devices, and services is vital to turning a losing battle into a winning strategy to stop cyber attacks.
What to Expect in 2016: Top 5 Predictions for Security and Access ControlSecureAuth
SecureAuth and special guest Forrester Research discuss the trends and strategies that will help you boost security and protect your organization from access threats. In this session, you will hear from Forrester's Andras Cser as he shares the top 5 information security and access control trends to watch for in 2016 and how they will impact your organization. Additionally, Keith Graham, CTO from SecureAuth, will present effective strategies to stay ahead of these trends and protect against advanced cyber attacks with adaptive authentication.
Building an Effective Identity Management StrategyNetIQ
Very few organizations do identity management as effectively as they could.
They have trouble developing effective methods for provisioning new users, de-provisioning old users, updating access privileges as users move around the organization, and automating the user change and configuration processes.
This presentation by identity and access management (IAM) experts, Adrian Lane, CTO and analyst at Securosis, and Rick Wagner, director of product management at NetIQ covered key elements of building a strong IAM strategy and the leading industry practices behind those strategies.
Originally presented as a UBM TechWeb DarkReading webinar the on-demand version will be available at: http://bit.ly/UUABIz until July 1st 2013.
Recent security breaches by trusted insiders have propelled Identity and Access Management (IAM) to the top security priority of many organizations. After all, it’s clear security is only as strong as its weakest link – people – and the press is full of articles documenting the damage people can do. So it’s natural for security managers to want to shore up their IAM infrastructure to avoid similar embarrassment. But IAM needs to be approached with an eye towards the full extended environment and by taking associated risks into account. In other words, whether you are starting from scratch or taking on new IAM challenges such as cloud security, there are certain IAM tenets you should follow to build a successful, effective IAM solution.
Don’t join the Hall of Shame by having a security breach at your organization. Attend this webcast to learn five ways a typical IAM solution can fail, so you don’t make the same mistakes.
View the full on-demand webcast: http://securityintelligence.com/events/5-reasons-iam-solution-will-fail/#.VYxJ4_lVhBd
Office 365 Security Features That Nonprofits Should Know and UseTechSoup
When it comes to email, document storage, and online browsing, security should be foremost. Join us for a 30-minute webinar where we will discuss how you can use built-in features of Office 365 to protect your organization. Learn how to protect your systems and keep data in the hands of only those users who need it.
This webinar is intended for organizations that already use Office 365, or those that want to better understand how Office 365 can keep their communications and data secure.
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
Organizations today are facing unprecedented and sophisticated attacks to their internal Information Technology infrastructure. These evolving attacks include spear phishing, ransomware, credential hijacking, and more and can result in significant data loss and/or theft of confidential and valuable intellectual property. In response to these threats, Microsoft has released an array of tools such as Azure Sentinel, Cloud App Security, Microsoft Defender for Identity, and more which can help to secure and protect against these threats. These tools work with both on-premises and cloud-based infrastructure to provide for comprehensive protection of hybrid environments.
This session breaks down each of these Microsoft tools and provides for an understanding of their value for specific security scenarios. A simple, no-marketing approach is taken to evaluating each individual tool, and a simple breakdown of what is provided with each Microsoft licensing model is outlined. Attendees will gain a better appreciation to which tools to utilize and how to better protect their Information Technology investments from the type of career-ending attacks which are unfortunately common today.
• Understand how modern threats such as spear phishing, ransomware, credential hijacking, and more are commonly faced in today’s IT environments and what tools and techniques can be used to mitigate the risk faced by these modern threats
• Examine Microsoft security tools such as Azure Sentinel, Microsoft Defender for Identity, Azure Security Center, Cloud App Security, Azure AD Privileged Identity Management, Azure AD Identity Protection, Azure Information Protection, and more
• Understand which tools are available for each licensing model in the Microsoft world and when it may make sense to ‘upgrade’ existing licenses to support specific toolsets as opposed to investment in third-party tools
To help organizations identify identity and access management (IAM) solutions that are both comprehensive and cost-effective, leading industry analyst firm Enterprise Management Associates (EMA) has conducted primary research on current and emerging IAM challenges, requirements, and solutions.
Get key results from this new research when you check out this presentation.
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
Protecting today’s cloud-based, mobile enterprise requires a new approach – one that focuses on secure identity and access management (IAM), while at the same time driving two critical imperatives:
Learn how to enable business growth by:
• Quickly deploying new online services
• Leveraging new advances in cloud computing and virtualization
• Accommodating the needs of demanding, tech-savvy users
(i.e., customers, partners, employees, etc.)
• Driving greater employee productivity and increasing business intelligence
Protect the business by:
• Mitigating the risk of fraud, breaches, insider threats and improper access – from both internal and external sources
• Safeguarding critical systems, applications and data
Download the eBook today to learn more.
Why do databases have the highest rate of breaches among all business assets? The answer is simple: they house the sensitive business data that malicious insiders and hackers want most. The risk of a database breach can be mitigated by implementing internal controls and following industry best practices - but you must first understand the shifting threat landscape. This presentation will (1) present the top 10 threats to your database in 2013 (2) define a layered defense strategy for preventing database breaches using industry best practices (3) demonstrate a successful defense against data theft with a customer case study.
Intel IT's Identity and Access Management JourneyIntel IT Center
Advances in the SMAC stack – social, mobile, analytics, and cloud – have affected every part of the enterprise. Organizations want to move more diverse data to more places, and more people need access via more services and devices. Managing all this is a big task for information security. Learn about Intel IT's approach to IDAM redesign and IT best practices for enhanced security and a better user experience.
Selleks, et julgeks andmed pilveteenusesse viia, peab esmalt teenusepakkujat usaldama. Mida on Microsoft ära teinud selleks, et klientide usaldust võita? Kuidas hoida andmeid pilve-Exchange’is ja pilve-SharePointis turvaliselt, jagada välja krüpteeritult ning põhjalikult kontrollida süsteemide kasutajate volitusi.
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Core Security
Passwords, multi-factor authentication, knowledge-based questions/answers, and hard tokens are based on technologies that are now 20 years old. With organizations losing the battle against cyber attacks, it’s clearly time to move beyond these legacy technologies and adopt a modern approach in which awareness and flexibility are king. Authentication must adapt based on the level of risk, so that it can deliver strong security yet be invisible to users most of the time.
Achieving that balance of strong security and appropriate user friction is the basis for modern authentication. This session will explore what modern authentication is and why using it across all users, devices, and services is vital to turning a losing battle into a winning strategy to stop cyber attacks.
A Developer's Introduction to Azure Active Directory B2CJohn Garland
Adding personalized experiences is often a critical part of creating an application, and the key to personalization is being able to identify your users. However, properly managing user identities can be difficult, and getting it wrong can cost you users due to usability problems, or worse, can expose your users to harm if their identity information is not properly protected. Azure Active Directory B2C provides you the ability to integrate a ready-made identity platform into your application, with options for integration with social identity providers, application-local accounts, customized workflows, and a user interface that can integrate into your app's layout and design. In this talk you will learn how you can integrate Azure Active Directory B2C into a variety of applications, and several of the ways you can customize the experience to best support both your users' and your application's needs.
In this session we will talk through deployment scenarios, design considerations and introduce AWS Active Directory Service. AWS Directory Service is a managed service that allows you to connect your AWS resources with an existing on-premises Microsoft Active Directory or to set up a new, stand-alone directory in the AWS cloud.
This Deck, gives you an overview of the zero trust security posture, considerations you should have while looking to adopt that posture, and the advantages of doing so.
IBM i is securable BUT not secured by default. To help protect your organization from the increasing security threats, you must take control of all access points to your IBM i server. You can limit IBM i security threats by routinely assessing your risks and taking control of logon security, powerful authorities, and system access.
With the right tools and process, you can assure comprehensive control of unauthorized access and can trace any activity, suspicious or otherwise, on your IBM i systems.
Watch this on-demand webcast to learn:
• How to secure network access and communication ports
• How to implement different authentication options and tradeoffs
• How to limit the number of privileged user accounts
• How Precisely’s Assure Security can help
A series of Cyber security lecture notes..........................
(Endpoint, Server, and Device Security), (Identity, Authentication, and Access Management)
(Data Protection and Cryptography)
A Guide To Single Sign-On for IBM Collaboration SolutionsGabriella Davis
Single sign-on, single identity and even password synchronization—in this session, we will take you through all the options available to minimize or eradicate logins across IBM's Collaboration Solutions (ICS); whether it is a Domino web server, IHS, Notes client, Traveler, Sametime, Connections or Verse, on-premises or cloud. The discussion will cover security certificates, password synchronization, IWA, SPNEGO and SAML Federation. We will explain what you can (and can't) do, and how to do it. Presented at Think 2018
The Best Shield Against Ransomware for IBM iPrecisely
Did you know a frequent vulnerability that is exploited to initiate a ransomware attack on your IBM i is a compromised password? The most frequent approach to compromise system access is Credential Stuffing where an intruder finds user ids and passwords that have been stolen from somewhere else, sold on the dark web and attempts to use them at another organization. This is often successful because many people re-use the same password they use at work at multiple other online sites.
Adding multi-factor authentication is the #1 action most enterprises can do to prevent cybersecurity incidents from occurring. Even in industries that do not currently require MFA for regulatory compliance, governments are taking cybersecurity more seriously as agencies and infrastructure are increasingly being targeted. Investing in an MFA solution is an effective way to secure your data from unauthorized access and protect your resources.
Assure Multi-factor Authentication’s advanced capabilities provide unique, flexible solutions to access control on the IBM i. With our new, powerful user interface, we are making MFA easier to implement and control. Watch this on-demand webinar to learn:
• How malware gets on to the IBM i system
• Tips on implementing MFA for the IBM i
• How our new interface can make deploying MFA even easier
Kaasaegsed ettevõtted muutuvad üha mobiilsemaks, kuna töötajad suudavad üha enam tööd teha kontorisse tulemata. Kuidas sellises uues situatsioonis säilitada kontroll organisatsiooni andmete üle ning tagada kasutajate ja seadmete turvalisus.
Esineja: Tõnis Tikerpäe
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
Scalable enterprise mobility solutions: How to give your employees tools they need without sacrificing user experience and security.
Consumerization of IT and BYOD are here – and it’s a GOOD thing. Today's dynamic workplaces and hyper-competitive markets drive demand for more mobile productivity solutions. Nearly 70% of enterprise employees report making better decisions, being more productive and happier if they are allowed to use mobile devices and cloud-based tools. Yet, IT organizations often resist these trends because of cost and risk associated with multi-platform, multi-device ecosystem having access to corporate data and resources.
In this webinar, product experts from Sencha and Centrify will help your organization embrace BYOD and SaaS in a cost-effective, scalable way. Sencha Space is an advanced platform for securely deploying mobile apps and delivering a consistent, elegant, mobile user experience to end-users. Users can launch any mobile web app, or HTML5 app in a secure, managed environment. Combining Space with secure, Active Directory- or Cloud-Based Identity and Access Management (IAM) from Centrify gives IT visibility and control over mobile platforms and SaaS / in-house apps while improving user experience and reducing security risk.
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication Precisely
Your IBM i holds data that is vital to your business and can be a target for ransomware and other types of malware. Did you know a frequent vulnerability that is exploited to initiate a ransomware attack on your IBM i is a compromised password?
Security breaches caused by passwords written on sticky notes, guessed passwords, or bruteforce password attacks have compelled IBM i shops to implement stronger password management controls. One of the most effective protections against this type of attack is MultiFactor Authentication.
Watch this on-demand webinar to learn:
- What true multifactor authentication really is
- How malware gets on to the IBM i system
- Tips on implementing MFA for the IBM i
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
James Romer, Chief Security Architect, discussed the requirements for achieving secure access control for Office 365, leveraging existing infrastructure and increasing security without compromising your user experience.
Explore how to move beyond two-factor authentication towards adaptive authentication which continuously analyzes risk-factors including, geo-location, behavioral biometrics and threat intelligence, to ensure your users are who they say they are.
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
As a CISO, you have been asked why you can't just trust your employees to do the right thing. What benefit to the business comes from technical security controls? You have likely been asked to reduce risk and action every funded project at once. In this session, we will realistically consider which projects can reduce risk most quickly, which layers of security are most important, and how things like privilege management, vulnerability control, over-communicating, and simply reducing the attack surface can bring peace of mind and actual direct improvements to your information security posture.
Identity and Data protection with Enterprise Mobility Security in ottica GDPRJürgen Ambrosi
Introduzione agli scenari di autenticazione per i servizi informativi nei contesti lavorativi moderni. Panoramica delle soluzioni offerte dalla soluzione Enterprise Mobility and Security per la messa in sicurezza delle identità e delle informazioni nel loro completo ciclo di vita. Prevenzione, rilevamento, contenimento e risposta a minacce di tipo avanzato con riferimenti alla cyber kill chain (focus su Endpoint, Identità, servizi di produttività e cloud app).
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
3. Cyber Threats
…no longer just an IT issue.
• Average time attackers stay in a network before detection is over 200 days
• Over 75% of all network intrusions are traced back to compromised credentials
• Average cost of a data breach to a company is $3.5 million
• Estimated cost of cybercrime to the global economy is $500 billion
4. Motivations
• Enforcement of social or political points of view
• To gain long term trusted access to internal resources
• Information
• Compute power and bandwidth
• Obtain credentials for access to other services
• Extortion by means of
• Business systems interruption
• Threatening individuals privacy
• or discrediting the organisation
5. Cyber Threats
…there are 2 types of organisations affected:
Those that don’t
know it (yet)
Those that have
been breached
6. Changing nature of Cyber Attacks
Attacks and threats have grown substantially more
sophisticated, frequent and severe.
In the vast majority of attacks, they compromise user credentials
and use legitimate IT tools instead of malware.
We are now working under the assumption
that we are already breached
7.
8. 5 Key Recommendations
Amit Yoran, RSA President
1. Even advanced protection can fail
2. We need pervasive and true visibility of everything
3. Identity and Authentication matter more than ever
• Don’t trust the trusted, protect them!
4. Don’t mistake a malware solution for an Advanced Threat Strategy
5. Use external Threat Intelligence Reports
9. What REALLY matters?
Brand • Trustworthiness
Reputation
• Availability
• Reliability
Credibility • Accreditation
Financials
• Cost to prevent
• Cost to repair
10. What needs protection?
•Logon credentials
•Gaining trusted access
•Across all entities
Identity
•Infrastructure – admin, service, and system accounts
•high costs to repair in both time and materials
•Use MFA and education!
Resources
•Privileged access to sensitive information
•DLP helps classified/controlled, information
•What about the rest?
Information
•Documents at rest, in transit, or shared externally
•Encryption is the minimal level for everythingData
11. HOW?
Protect
Education and
vigilance is key
Layered approach
Technology and
People
Detect
Understand the
scenarios
Look for anomalies
Test regularly
Analyse
Know the scale of
the problem
Identify the
potential impact
Protect the logs
and other
information
Respond
Don’t react hastily,
follow a plan
Call in the experts,
including the
lawyers if necessary
Communicate
clearly, but securely
12. Identity Management
• Know who your people are and centralise management of Identities:
• Administrators and trusted authorities
• Insiders
• Externals
• Implement good housekeeping
• Ensure training for security and privacy at all levels
• Monitor behaviours and regulate access permissions
• Implement key policies:
• Pin locks
• Passwords
• Multi-Factor authentication
13. Application and Device Management
Management based on characteristics:
• Ownership
• Support/Management
• Level of trust
• Device standards and capabilities
• Location and usage scenario
14. Data Security
Enable key features where possible:
• Full drive encryption
• Data replication services
• Invest in Information Rights Management and Data Loss
Prevention for the most sensitive information
17. Multi-Factor Authentication
Enable/Enforce MFA to end-users
Will enforce App Passwords for
rich clients that don t support MFA
- Office 2013 (can preview ADAL)
- Office 2010
- Skype for Business
- OneDrive for Business
- Mail apps on smartphones
Multi-Factor
Authentication
Second Factor options:
- Mobile app (online and OTP)
- Phone Call
- SMS
Application passwords
Default Microsoft greetings
Office 365 /
Azure Administrators
Fraud alert
One-Time Bypass
Custom greetings/caller ID
Caching
Trusted IPs
MFA SDK
Security Reports
MFA for on-premises apps
Block/Unblock Users
Event Confirmation
Azure AD Premium
additional features
18. Access Control Service
Enables the use of multiple
IdPs to provision access to
SaaS applications
• Integrated Single Sign On
• Claims-based access control
• Centralised authorization into web
applications
• Google, Yahoo!, Facebook, etc.
• Available in Basic and Premium
20. Azure Rights Management
Enable control of data
beyond your security
boundary
• Limit access to known identities
• Monitor, track, change
permissions in-flight
• Company policy templates,
automated application, individual
control
25. Resources
• Protecting Azure Blob Storage with Azure RMS Whitepaper
http://blogs.msdn.com/b/rms/archive/2014/05/27/protecting-azure-blob-storage-with-azure-rms-whitepaper.aspx
• Information Protection and Control (IPC) in Office 365 with Microsoft
Rights Management service (RMS) whitepaper
http://www.microsoft.com/en-us/download/confirmation.aspx?id=34768
• Official RMS Team blog
http://blogs.technet.com/b/rms/
• RMS Analyzer Tool
http://blogs.technet.com/b/rms/
26. Azure Security Center
Currently in public preview:
• Advanced Threat Analytics – global scale
• Security monitoring and auditing
• Threat detection and alerts
• Hadoop cluster ingests massive quantities of data from security feeds
• Machine Learning and Real People! (cyber security teams and partnerships)
• In partnership with the major industry security vendors
• Integrates with existing security solutions (SIEM)
27. Cloud Access Security Broker
Adallom: recently purchase by Microsoft
• Centralised AuthN/AuthZ for all cloud application
• Agentless, flexible deployment options
• Integrated with solutions like CheckPoint, SIEM, DLP and MDM
28. Advanced Threat Analytics
Focus on what’s
important, fast
• Malicious attack detection
• Alerts for known security
issues and risks
• Analysis for abnormal
behaviour using machine
learning
29. ATA: Pass-The-Hash Demo
• Our bad guy is DodgyUser, he’s managed to get access to a PC and running his tools….
• Our good guy is MarketingUser, he’s logged on to this pc and carrying out his work
normally
• DodgyUser is able to enumerate all users logged on,
and obtain the HASH of their password:
30. ATA: Pass-The-Hash Demo
• With this information, DodgyUser can now switch to use these credentials
on any machine and perform operations as that user
34. Coming soon…
Administrative
Units
BYO SaaS
Applications
Pwd rollover
for FB, Twitter
and Linked In
Dynamic group
membership
Conditional
Access – per
app
Privileged
Identity
management
Self-service
app requests
Azure
reporting API
Cloud Access
Security Broker
(Adallom?)
35. Windows 10
• 110 million activations in just 2 months !
• Deploy without re-imaging the device
• Windows Hello & BitLocker
• Registered hardware can be 2nd factor for sign-in to all services
• Separation of business and personal information
• Same experience on Phone as on Desktop
• Enterprise containerisation with Hyper-V
• Universal App Store – with employee store experience
36. Actions & Resources
• Start using MFA for all your personal accounts
• Consider security at the beginning of Solution
Development
• Look for and highlight any risks or concerns
at your customer
• Join the discussion on our Yammer group
Security
• Use the Cloud Roadmap diagrams to explore
solutions and options
• Use this deck, works well on mobile
Share the message, raise awareness
Layered security, protection and isolation
When we look the way we have been building security over the last 10 years, it has been focused on a “Defence In Depth” approach: protecting assets, data and identities at multiple levels through our IT infrastructure.
This has worked well when we had control of our infrastructure and knew where the boundaries were.
Previously we only had to worry about our data centres, networks, and managed devices.
Now we have BYOD, Social Networking, Work-from-anywhere, and apps that we have little control over, or zero visibility.
The landscape has changed, and our approach to protection has to change also: we need new strategies and new tools
Some worrying facts – you might not know you are being attacked until its already too late.
Source: https://www.microsoft.com/en-us/server-cloud/products/advanced-threat-analytics/#Fragment_Scenario2
Assume Breached – this is rapidly being adopted as the security industry standard approach – go hunting for vulnerabilities, check in on trusted solutions to ensure they are being used appropriately, and by the right people, and protect the most vulnerable accounts (those that will do the most damage if compromised).
Unfortunately the bad guys are winning, and there is no sign of the breaches reducing, only getting worse.
Unless we do something about it !
Source: Escaping Security’s Dark Ages https://www.youtube.com/watch?v=op-2Aj6Wizo
For every solution ask: “how does this really help?”
True visibility requires control over IDENTITY. Everywhere.
Focus on what is important and identify threats quicker
Brand: It takes years to build the trust, but only takes a simple mistake to break it
Reputation: doing what you say you are going to do, being predictable and reliable
Financials: Cost to prepare, or cost to repair (some pay the ransom)
To protect our most trusted identities we can deploy technologies that utilise behavioural analytics and machine learning to identify changes in behaviour and unusual activity, 24/7
We also need to deploy MFA and most importantly educate our users.
MFA is available for all Azure Administrators and all Office 365 subscription users.
When enabled for Azure AD Premium, additional functionality is available.