SanerNow Endpoint Management (EM) is a cloud-delivered
service that allows complete control over all your endpoint
systems. It provides visibility into the status of endpoints and
equips you with hundreds of built-in checks. SanerNow
Endpoint Management provides necessary features for
managing endpoints.
PITA Technical and Business Session: Cybersecurity outside the officeAPNIC
APNIC Security Specialist Jamie Gillespie gives a presentation at the PITA Technical and Business session, held online on 10 Juen 2020, on 'Cybersecurity outside the office' on the changes to traditional cybersecurity, the challenges around technology, and the less-discussed threats around the people and processes, and how those need to adapt as well.
7 Habits of Highly Secure OrganizationsHelpSystems
We all want “best-practice” security, but what are top organizations doing to achieve and maintain it?
View this slideshow to learn the details about how to develop the seven habits that are part of daily life for secure organizations.
You’ll learn how to:
- Break the Ostrich Syndrome
- Develop a Security Policy
- Assess Current Standing
- Perform Security Event Logging and Review
- Use “Best of Breed” Technologies
- Monitor for Ongoing Compliance
- Plan For The Future
Hem Infotech was founded in 2002 with Main Focus Area Of computer sales and maintenance.
Currently We operate under Five verticals namely Computer Maintenance - AMC, Thin Client - World's Smallest & Lowest Energy Computing, Telephony - Crm/Erp Integration, It Consultancy - AUDIT & SOLUTION SUPPORT & Public Wifi.
We r Business Associates & Oem Service Partner For Brands Like Hp, Ncomputing, Qnap, Sophos, Enjay, Purple Etc.
Currently Maintaining 20000+ Hardwares With 1000+ Customers.
18+ Well Experience, Certified Technical Team Focusing Govt., Banking, Education, Finance, Hospitality Etc..
We r Gujarat's One Of Very Few Companies Using Crm Based Systematic Mechanism For Quick & Accurate Support.
CTG 's end-to-end monitoring service, proactively monitors the health of your systems, allowing you to address minor issues before they escalate into larger issues that impact your business. CTG gives you peace of mind knowing your critical systems are being monitored 24x7x365, without any CAPEX costs, or having to dedicate staff time to maintaining a monitoring infrastructure.
SanerNow Endpoint Management (EM) is a cloud-delivered
service that allows complete control over all your endpoint
systems. It provides visibility into the status of endpoints and
equips you with hundreds of built-in checks. SanerNow
Endpoint Management provides necessary features for
managing endpoints.
PITA Technical and Business Session: Cybersecurity outside the officeAPNIC
APNIC Security Specialist Jamie Gillespie gives a presentation at the PITA Technical and Business session, held online on 10 Juen 2020, on 'Cybersecurity outside the office' on the changes to traditional cybersecurity, the challenges around technology, and the less-discussed threats around the people and processes, and how those need to adapt as well.
7 Habits of Highly Secure OrganizationsHelpSystems
We all want “best-practice” security, but what are top organizations doing to achieve and maintain it?
View this slideshow to learn the details about how to develop the seven habits that are part of daily life for secure organizations.
You’ll learn how to:
- Break the Ostrich Syndrome
- Develop a Security Policy
- Assess Current Standing
- Perform Security Event Logging and Review
- Use “Best of Breed” Technologies
- Monitor for Ongoing Compliance
- Plan For The Future
Hem Infotech was founded in 2002 with Main Focus Area Of computer sales and maintenance.
Currently We operate under Five verticals namely Computer Maintenance - AMC, Thin Client - World's Smallest & Lowest Energy Computing, Telephony - Crm/Erp Integration, It Consultancy - AUDIT & SOLUTION SUPPORT & Public Wifi.
We r Business Associates & Oem Service Partner For Brands Like Hp, Ncomputing, Qnap, Sophos, Enjay, Purple Etc.
Currently Maintaining 20000+ Hardwares With 1000+ Customers.
18+ Well Experience, Certified Technical Team Focusing Govt., Banking, Education, Finance, Hospitality Etc..
We r Gujarat's One Of Very Few Companies Using Crm Based Systematic Mechanism For Quick & Accurate Support.
CTG 's end-to-end monitoring service, proactively monitors the health of your systems, allowing you to address minor issues before they escalate into larger issues that impact your business. CTG gives you peace of mind knowing your critical systems are being monitored 24x7x365, without any CAPEX costs, or having to dedicate staff time to maintaining a monitoring infrastructure.
Your IT infrastructure is the lifeblood of your company.
CTG 's end-to-end monitoring service, proactively monitors the health of your systems,
allowing you to address minor issues before they escalate into larger issues that impact
your business. CTG gives you peace of mind knowing your critical systems are being
monitored 24x7x365, without any CAP EX costs, or having to dedicate staff time to
maintaining a monitoring infrastructure.
Old Dogs, New Tricks: Big Data from and for Mainframe ITPrecisely
If you’re like most z/OS mainframe professionals, you’ve been using monitoring tools from industry leaders like BMC, Compuware, etc. for years now. These valuable, reliable point solution tools get the job done, but can they do more?
View this webinar on-demand to show how machine data from z/OS is changing everything for Mainframe IT and enabling new solutions around IT Operations Analytics, Security Information and Event Management, and IT Service Intelligence. We will review the state of the mainframe and look at some interesting use cases for new solutions including:
• Being able to quickly discover and act upon correlations between mainframe issues and their broader impact to application service delivery
• To know or even project forward your MLC costs such that you can really understand what is impacting the 4-hour rolling average window
• A performance monitor for your mainframe sort which will clearly show how the sort is performing and what can be done to help those that are not performing optimally
12 Simple Cybersecurity Rules For Your Small Business NSUGSCIS
James Cannady, Ph.D., Professor at Nova Southeastern University's Graduate School of Computer and Information Sciences will present on "12 Simple Cybersecurity Rules For Your Small Business."
In this online presentation twelve simple and inexpensive techniques for protecting small businesses from cyber threats will be discussed. While complex and expensive solutions exist to improve the security of information technology most of these products are not designed for the specific needs of small businesses. The techniques that will be discussed in the presentation are designed to address the most common threats encountered by small businesses without requiring significant expertise and expense.
Outsourcing small cell deployment - How process automation tools can enable ...David Chambers
70% of MNOs are prepared to use small cell networks rolled out by or owned by a third-party. How will the outsourcing be efficiently engineered and managed?
This webinar discusses how process automation tools can enable service providers to hand-off network planning, build and backhaul services to 3rd party providers.
Sponsored and presented by Amdocs
Security information and event management (SIEM) solutions have entered the market to provide security intelligence and automate managing terabytes of log data for IT security. SIEM solutions monitor network systems, devices, and applications in real time, providing security intelligence for IT professionals to mitigate threats, correlate events, identify the root cause of security incidents, and meet compliance requirements.
Most organizations think that SIEM solutions have a steep learning curve and are expensive, complex, and hard to deploy. This claim may be true about many SIEM vendors. However, the right SIEM solution is one that can be easily deployed, is cost-effective, and meets all your IT security needs with a single tool.
ManageEngine's SIEM Expert, Joel Fernandes will discuss on 8 things every IT manager should know about choosing an SIEM Solution.
You'll learn how to:
Choose an SIEM solution
Monitor user activity to curb insider threat
Proactively mitigate sophisticated cyber-attacks
Meet IT Compliance Requirements
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
As a CISO, you have been asked why you can't just trust your employees to do the right thing. What benefit to the business comes from technical security controls? You have likely been asked to reduce risk and action every funded project at once. In this session, we will realistically consider which projects can reduce risk most quickly, which layers of security are most important, and how things like privilege management, vulnerability control, over-communicating, and simply reducing the attack surface can bring peace of mind and actual direct improvements to your information security posture.
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
A presentation given in April 2019 in London during ICS Cyber Security Conference. I discuss an anonymized investigation conducted by our team to identify a real malware infection on a production network, the tools and techniques used to contain this threat and how to use threat intelligence and visibility to stay ahead of cyber adversaries.
Asset visibility and network baselining
Continuous network monitoring
Threat intelligence ingestion
Thorough incident response plans
Your IT infrastructure is the lifeblood of your company.
CTG 's end-to-end monitoring service, proactively monitors the health of your systems,
allowing you to address minor issues before they escalate into larger issues that impact
your business. CTG gives you peace of mind knowing your critical systems are being
monitored 24x7x365, without any CAP EX costs, or having to dedicate staff time to
maintaining a monitoring infrastructure.
Old Dogs, New Tricks: Big Data from and for Mainframe ITPrecisely
If you’re like most z/OS mainframe professionals, you’ve been using monitoring tools from industry leaders like BMC, Compuware, etc. for years now. These valuable, reliable point solution tools get the job done, but can they do more?
View this webinar on-demand to show how machine data from z/OS is changing everything for Mainframe IT and enabling new solutions around IT Operations Analytics, Security Information and Event Management, and IT Service Intelligence. We will review the state of the mainframe and look at some interesting use cases for new solutions including:
• Being able to quickly discover and act upon correlations between mainframe issues and their broader impact to application service delivery
• To know or even project forward your MLC costs such that you can really understand what is impacting the 4-hour rolling average window
• A performance monitor for your mainframe sort which will clearly show how the sort is performing and what can be done to help those that are not performing optimally
12 Simple Cybersecurity Rules For Your Small Business NSUGSCIS
James Cannady, Ph.D., Professor at Nova Southeastern University's Graduate School of Computer and Information Sciences will present on "12 Simple Cybersecurity Rules For Your Small Business."
In this online presentation twelve simple and inexpensive techniques for protecting small businesses from cyber threats will be discussed. While complex and expensive solutions exist to improve the security of information technology most of these products are not designed for the specific needs of small businesses. The techniques that will be discussed in the presentation are designed to address the most common threats encountered by small businesses without requiring significant expertise and expense.
Outsourcing small cell deployment - How process automation tools can enable ...David Chambers
70% of MNOs are prepared to use small cell networks rolled out by or owned by a third-party. How will the outsourcing be efficiently engineered and managed?
This webinar discusses how process automation tools can enable service providers to hand-off network planning, build and backhaul services to 3rd party providers.
Sponsored and presented by Amdocs
Security information and event management (SIEM) solutions have entered the market to provide security intelligence and automate managing terabytes of log data for IT security. SIEM solutions monitor network systems, devices, and applications in real time, providing security intelligence for IT professionals to mitigate threats, correlate events, identify the root cause of security incidents, and meet compliance requirements.
Most organizations think that SIEM solutions have a steep learning curve and are expensive, complex, and hard to deploy. This claim may be true about many SIEM vendors. However, the right SIEM solution is one that can be easily deployed, is cost-effective, and meets all your IT security needs with a single tool.
ManageEngine's SIEM Expert, Joel Fernandes will discuss on 8 things every IT manager should know about choosing an SIEM Solution.
You'll learn how to:
Choose an SIEM solution
Monitor user activity to curb insider threat
Proactively mitigate sophisticated cyber-attacks
Meet IT Compliance Requirements
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
As a CISO, you have been asked why you can't just trust your employees to do the right thing. What benefit to the business comes from technical security controls? You have likely been asked to reduce risk and action every funded project at once. In this session, we will realistically consider which projects can reduce risk most quickly, which layers of security are most important, and how things like privilege management, vulnerability control, over-communicating, and simply reducing the attack surface can bring peace of mind and actual direct improvements to your information security posture.
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
A presentation given in April 2019 in London during ICS Cyber Security Conference. I discuss an anonymized investigation conducted by our team to identify a real malware infection on a production network, the tools and techniques used to contain this threat and how to use threat intelligence and visibility to stay ahead of cyber adversaries.
Asset visibility and network baselining
Continuous network monitoring
Threat intelligence ingestion
Thorough incident response plans
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsShah Sheikh
Abstract: Modern day cyber threats are ever increasing in sophistication and evasiveness against Process Control Networks. Organizations in the industry are facing a constant challenge to adopt modern techniques to proactively monitor the security posture within the SCADA infrastructure whilst keeping cyber attackers and threat actors at bay.
In this presentation we will cover the fundamental building blocks of building a SCADA cyber security operations center with key responsibilities such as Incident Response Management, Vulnerability and Patch Management, Secure-by-design Architecture, Security Logging and Monitoring and how such security domains drive accountability and act as a line of authority across the PCN.
Effective Security Monitoring for IBM i: What You Need to KnowPrecisely
Defending against the increasing sophistication and complexity of today’s security threats requires a comprehensive, multi-layered approach. The key is to maximize the strength of each layer of your defenses, and then ask yourself “If this layer is breached, what do I have in place to prevent further damage?”
Even if you have implemented the proper layers of protection, effective security still requires a thoughtful and comprehensive approach to monitoring and reporting. Monitoring plays a critical role in any effective IT security strategy. It's like having a security guard constantly patrolling your digital infrastructure, vigilantly watching for suspicious activity and potential threats. Security monitoring allows you to detect threats as soon as possible, giving you a better chance of responding quickly and effectively.
Join us for this webinar we will cover:
• The best practices for monitoring your IBM i environment.
• The benefits of combining your IBM i monitoring with other IT systems
• A demonstration of a new Assure Security Monitoring and Reporting interface
Most of the money thrown at securing information systems misses the weak spots. Huge amounts are spent securing infrastructure while web applications are left exposed. It is a crisis that is largely ignored.
Software development teams, under pressure to deliver features and meet deadlines, often respond to concerns about the security of their web applications by commissioning a last-minute security assessment and then desperately attempt to address only the most glaring findings. They may even simply throw up a web application firewall to mitigate the threats. Such bolted-on solutions are not long-term answers to web application security.
Instead, we advocate a built-in approach. We will show that by weaving security into the software development life cycle, and using mature resources for security coding standards, toolkits and frameworks such as those from OWASP, development teams can consistently produce secure systems without dramatically increasing the development effort or cost.
This slide deck was most recently presented at a SPIN meeting in Cape Town In September 2012 by Paul and Theo from ThinkSmart (www.thinksmart.co.za).
For more information, contact Paul at ThinkSmart (dot see oh dot zed ay).
The Nozomi Networks solution improves ICS cyber resiliency and provides real-time operational visibility. Major customers have improved reliability, cybersecurity and operational efficiency using our technology. Learn more about our solutions and technology here and how they can bring immediate benefit to your industrial control system (ICS)
With the adoption of Cloud as a platform , it is essential that organisations setup effective monitoring and mitigation mechanism both in tools and process. This talk speaks about some of the essentials
Acture Solutions - 5 Efficient Ways To Align Your District's Cybersecurity w/...ActureSolutions
In this presentation for CoSN (Consortium for School Networking), Acture CEO Gabe Stacy and CISO Shain Jacob discuss the five ways that New York school district's can solve the confusion around the role of CTO's and cybersecurity.
Evolving technologies and business models have led to advanced network security threats that never existed a few years back. Moreover, enterprises are also relying on outdated security solutions to shut out such threats and this is leading to bigger and frequent data breaches. So if your company recognizes the need for a reliable IT security solution, then you should join our webinar to learn the following:
- An overview of the prevalent enterprise security threats
- The evolving security landscape and the obsolete security mechanisms
- What Seqrite does to ensure enterprise security and network compliance
“Using the Cisco CAM for IoT Intelligence, we have been able not only to reduce our energy consumption, but also to realize a continual increase in those savings. As we continue to implement more of the capabilities of the Cisco CAM for IoT Intelligence, we anticipate even greater operational efficiencies."
- Caroline Dowling, President, Flex, CEC Communications Infrastructure & Enterprise Compute
Decrypting the security mystery with SIEM (Part 1) Zoho Corporation
Decrypting the security mystery with SIEM - Part I
1. EventLog Analyzer, your complete security arsenal
2. Sealing securityloopholes: Getting to know vulnerable ports, devices, and more.
3. Combating attacks with EventLog Analyzer
a. Mitigating brute force attacks
b. Stopping the rise of ransomware
c. Containing SQL injection attacks
4. Proactively preventing insider attacks
a. Monitoring privileged user activities
5. Securing physical, virtual, and cloud environments
6. Adhering to stringent compliance rules with the integrated compliance management
Deck provides an overview of Panduit's Enterprise Network Infrastructure security solution, plus a summary of how Panduit achieved cost savings while deploying secure Enterprise solution in its own World Headquarters building. Go to http://www.panduit.com/NetKey for more information.
There are three main factors that influence how information security is dealt with these days – (1) the presumed risk if we don’t do it (or do it badly), (2) the pace at which technologies and business styles change and (3) the lack of a structure behind any infosec activities.
It’s clear to me that these are just some of the challenges infosec teams must deal with nowadays. This talk will open the floor to a discussion of blockers, challenges and drivers discussing the evolution of the roles associated with infosec and later merging best practice recommendations with an infosec strategy to dealing with risks. Finally, once a strategy is adopted, the presentation will present some ideas on how to gauge progress– such that efforts to improve are both meaningful and measurable.
Information security is often misunderstood, undervalued and often tackled as an afterthought. This presentation was given in 2014 during an ISACA educational event.
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
Information Security
1.Why the need to think about it?
2.What exactly are we talking about?
3.How do we go about doing something about it?
4.Is there a one-size-fits-all framework?
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
4. The idea behind CERT
• Provide for post incident analysis
• Compliance with laws and regulations
governing breaches
• Preservation of company goodwill
The main corporate drivers for IS & CERT
• Compliance – top down strategy
• Minimise company loss of revenue and
customers
• Company reputation
5. The reality corporate IS faces
• 60% of corporate date resides unprotected
on PC desktops and laptops
• Statistically 1-out-of-10 laptops are stolen
with 12 months of purchase
• 66% of USB thumb drive owners report
losing them – over 60% with private
corporate data on them
• Data problem: Users want to access their
data anytime, from anywhere
6. CCBill’s approach to IS ..1..
• Logical level
– Securing all endpoints – AV alone is no longer effective
– Employing dual-factor authentication for sensitive
servers
– Instilling a security mindset throughout our SDLC
– Disallow USB and WiFi devices company-wide
– Automated user account de/provisioning
– HIDS implementations on secured servers
– Effective patch management
– Full-disk encryption for laptops
– End to end encryption (IPSEC, SSH, SSL etc..)
– Inherently redundant network architectures
7. Inherently redundant network
architectures
AMSTERDAM
PHOENIX
OVERALL OBJECTIVES
• MAXIMISE NETWORK UPTIME
ASHBURN • MINIMISE IMPACT TO OUR SYSTEMS AUSTRALIA
8. CCBill’s approach to IS ..2..
• Organisational level
– Business Continuity Planning (BCP)
– Periodic business impact analysis (BIA)
– Service level agreements -> transfer of risk
– Inherent fail-over strategies
– Separation of duties
– Periodic security awareness training
– Acceptable usage policy (AUP)
9. Security Monitoring
• Augments prevention, doesn’t replace it
• Monitoring Incident response cycle
– Feedback from forensics into monitoring
• Policy review team
• Effective change management procedures
• Typical network monitoring tools
– Snort (IDS)
– Ntop
– Rancid CISCO logs
– Splunk SIEM
• Periodic gap analysis by third parties
• Syslog aggregation from all devices and endpoints
11. IS implementation challenges
• Balancing security with usability
• Minimising human error
• Instilling a security mindset
• Keeping abreast with technology shifts
• Mitigating and reducing risks to an acceptable
level
• Preventing breaches
• Responding to incidents in a timely manner
• Enforcing confidentiality, integrity and availability
12. CERT challenges
• Post incident analysis is expensive and time
consuming
– Companies are sometimes ready to suffer the
brunt
• Time is money
– Release today, get the business and patch
tomorrow
• Often, business strategies win hands down
over security best practices