SlideShare a Scribd company logo
Murli Menon
Atos India Pvt Ltd
Case Study
Vulnerability Management (VM)
A process by which loopholes in IT systems are identified, risks
are evaluated & remediated
Why VM ?
 Cyber Crime Rise
 Compromise of Data
 Major Software flaws
 Inappropriate IT system administrations
 Identifications of weakness
On Ground
 13000 + IT Systems
 2200 + Critical Assets
 1200+ Network Systems
 8000+ Actual
Vulnerabilities
 34% False Positives
 600 + Customers
supported
 88% Critical SLA’s
 24x7 Business
Operations
 Minimal Down Times
 Maximum Privilege
Access
 Zero Risk Tolerance
Vs
Facts Business Challenges
Action Plans
 Dedicated team
 Assigned Roles and Responsibilities based on RASCI
Matrix including business representatives
 Defined policies on VMS considering the business &
Organization impacts
 Obtained business approvals on actions plans of
remediation's
 Formulation of vulnerability calculations vs Impact as a
Security KPI
VMS Cycle
Remediate
& Confirm
Search
EvaluatePrioritize
• Prioritizing the critical
assets + Vulnerabilities
• Focusing on Top Critical
• Developing plans to
test the remediation's
on Critical
• Approvals for
Remediation's
• Identify the assets
• Filtering False Positives
• Finalizing the reports
• Discovering the network
• Identify the scopes
• Initiate Scan with
schedules considering
the business operations
(Servers, devices
scanned during non
business hours)
• Patching /Remediate
• evaluating the impact
• rescanning & Confirm
for closure of
vulnerability
1
2
4
3
Long term Remediation's
• Identify the
consequences
of reported
vulnerabilities
• Detailed
analysis of
Root causes
• Targeting the
hidden gaps
• Designing the
solutions to
avoid
reoccurrences
• Testing &
Deploying the
solutions
• Monitoring for
any
reoccurrences
• Maintain the
Knowledge
base for future
remediation's
Advantages ..In 8 months
78 % vulnerabilities been remediated with Zero
impacts on business
36% Outdated Systems, Software's been
withdrawn
Patch Management improvised to 96%
Overall compliance 98.89% (WIR)
Minimum Risk Exceptions
Increase in Customer Confidence
Continuous Improvements
Regular Watch on latest Threats & Vulnerabilities
Daily Team meeting to understand the progress
Measure the performance of security teams by the
reduction of critical vulnerabilities
Evaluate actual vulnerability management results
against targeted metrics
Area of Challenge
Major Counts Adobe Vulnerabilities
Apache Vulnerabilities with weak Ciphers
Database patching was not easy
Client systems non availability
Poodle, Heartbleed
Key Consideration on VMS
 Meeting compliance requirements and legal boundaries
 Checking current security controls if proactive or
reactive
 Efficiency of Vulnerability Management tool
 Check current security state of your network
 Is confidential data sufficiently protected
 Latest Threats vs Assets
Thank You

More Related Content

PDF
Breach and attack simulation tools
PDF
Vulnerability Management
PPTX
Security Training: #3 Threat Modelling - Practices and Tools
PPTX
Vulnerability Management: What You Need to Know to Prioritize Risk
PPTX
Introduction To Vulnerability Assessment & Penetration Testing
PPTX
Optimizing Security Operations: 5 Keys to Success
PPTX
Penetration testing reporting and methodology
PPTX
Security Information and Event Management (SIEM)
Breach and attack simulation tools
Vulnerability Management
Security Training: #3 Threat Modelling - Practices and Tools
Vulnerability Management: What You Need to Know to Prioritize Risk
Introduction To Vulnerability Assessment & Penetration Testing
Optimizing Security Operations: 5 Keys to Success
Penetration testing reporting and methodology
Security Information and Event Management (SIEM)

What's hot (20)

PPTX
Security and DevOps Overview
PPTX
Cybersecurity Hands-On Training
PPTX
Politique de sécurité des systèmes d'information hospitaliers
PPTX
Cyber Threat Modeling
PDF
Introduction IDS
PPTX
Security Operation Center - Design & Build
PDF
Vulnerability Management Program
PPTX
Security Operation Center Fundamental
PPT
Introduction To OWASP
PDF
Forcepoint Dynamic Data Protection
PPTX
Owasp top 10 vulnerabilities
PPTX
Bsides 2019 - Intelligent Threat Hunting
PPTX
Security Awareness Training from KnowBe4
PPTX
An introduction to SOC (Security Operation Center)
PDF
Cloud Auditing
PPTX
Cyber Hygiene
PDF
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
PPTX
7 Steps to Threat Modeling
PDF
Cyber Security
PPTX
Vulnerability assessment and penetration testing
Security and DevOps Overview
Cybersecurity Hands-On Training
Politique de sécurité des systèmes d'information hospitaliers
Cyber Threat Modeling
Introduction IDS
Security Operation Center - Design & Build
Vulnerability Management Program
Security Operation Center Fundamental
Introduction To OWASP
Forcepoint Dynamic Data Protection
Owasp top 10 vulnerabilities
Bsides 2019 - Intelligent Threat Hunting
Security Awareness Training from KnowBe4
An introduction to SOC (Security Operation Center)
Cloud Auditing
Cyber Hygiene
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
7 Steps to Threat Modeling
Cyber Security
Vulnerability assessment and penetration testing
Ad

Similar to Challenges of Vulnerability Management (20)

PDF
10 Steps to Building an Effective Vulnerability Management Program
PPT
Vuln.ppt
PPT
Vuln_Man_91003.ppt
PPT
Planning and Deploying an Effective Vulnerability Management Program
PDF
Enterprise Vulnerability Management: Back to Basics
PPTX
Vulnerability_Management.pptx
PDF
Vulnerability Management Whitepaper PowerPoint Presentation Slides
PDF
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
PDF
Patch and Vulnerability Management
PDF
Vulnerability Management.pdf
DOC
081014 Vulnerability Management - VM Framework Procedural Guidelines 1.0
PDF
The Dynamic Nature of Virtualization Security
PDF
Implementing Vulnerability Management
PPT
Info Security - Vulnerability Assessment
PDF
Understanding Vulnerability Management | USCSI®
DOC
Five Mistakes of Vulnerability Management
PPT
Qualys user group presentation - vulnerability management - November 2009 v1 3
PDF
Is Your Vulnerability Management Program Irrelevant?
DOCX
Globally.docx
PDF
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
10 Steps to Building an Effective Vulnerability Management Program
Vuln.ppt
Vuln_Man_91003.ppt
Planning and Deploying an Effective Vulnerability Management Program
Enterprise Vulnerability Management: Back to Basics
Vulnerability_Management.pptx
Vulnerability Management Whitepaper PowerPoint Presentation Slides
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Patch and Vulnerability Management
Vulnerability Management.pdf
081014 Vulnerability Management - VM Framework Procedural Guidelines 1.0
The Dynamic Nature of Virtualization Security
Implementing Vulnerability Management
Info Security - Vulnerability Assessment
Understanding Vulnerability Management | USCSI®
Five Mistakes of Vulnerability Management
Qualys user group presentation - vulnerability management - November 2009 v1 3
Is Your Vulnerability Management Program Irrelevant?
Globally.docx
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
Ad

More from Rahul Neel Mani (20)

PPTX
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
PPTX
TweetChat - A Grey Head Digital Initiative
PPTX
Cybersecurity: Glimpses from the 2017
PPTX
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
PPTX
CIO Productivity Conclave 2017
PPTX
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
PPTX
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
PDF
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
PPTX
Sumit dhar
PDF
Security Incident Response Readiness Survey
PDF
Cybersecurity: Mock Cyberwar Game
PPT
Cyber Crime Management
PPTX
ABC of Infosec
PPTX
State of the Internet: Mirai, IOT and History of Botnets
PPTX
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
PPTX
Get the Basics Right
PDF
Upgrading Your Firewall? Its Time for an Inline Security Fabric
PPTX
Is Cyber Security the Elephant in the Boardroom?
PDF
CIO Productivity Conclave 2016
PPT
Take Control of Your Imaging and Printing: Siva Kumar
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
TweetChat - A Grey Head Digital Initiative
Cybersecurity: Glimpses from the 2017
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
CIO Productivity Conclave 2017
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Sumit dhar
Security Incident Response Readiness Survey
Cybersecurity: Mock Cyberwar Game
Cyber Crime Management
ABC of Infosec
State of the Internet: Mirai, IOT and History of Botnets
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Get the Basics Right
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Is Cyber Security the Elephant in the Boardroom?
CIO Productivity Conclave 2016
Take Control of Your Imaging and Printing: Siva Kumar

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
Teaching material agriculture food technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Cloud computing and distributed systems.
PDF
Approach and Philosophy of On baking technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Modernizing your data center with Dell and AMD
“AI and Expert System Decision Support & Business Intelligence Systems”
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Review of recent advances in non-invasive hemoglobin estimation
Unlocking AI with Model Context Protocol (MCP)
Building Integrated photovoltaic BIPV_UPV.pdf
Teaching material agriculture food technology
The AUB Centre for AI in Media Proposal.docx
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
Cloud computing and distributed systems.
Approach and Philosophy of On baking technology
Per capita expenditure prediction using model stacking based on satellite ima...

Challenges of Vulnerability Management

  • 1. Murli Menon Atos India Pvt Ltd Case Study
  • 2. Vulnerability Management (VM) A process by which loopholes in IT systems are identified, risks are evaluated & remediated Why VM ?  Cyber Crime Rise  Compromise of Data  Major Software flaws  Inappropriate IT system administrations  Identifications of weakness
  • 3. On Ground  13000 + IT Systems  2200 + Critical Assets  1200+ Network Systems  8000+ Actual Vulnerabilities  34% False Positives  600 + Customers supported  88% Critical SLA’s  24x7 Business Operations  Minimal Down Times  Maximum Privilege Access  Zero Risk Tolerance Vs Facts Business Challenges
  • 4. Action Plans  Dedicated team  Assigned Roles and Responsibilities based on RASCI Matrix including business representatives  Defined policies on VMS considering the business & Organization impacts  Obtained business approvals on actions plans of remediation's  Formulation of vulnerability calculations vs Impact as a Security KPI
  • 5. VMS Cycle Remediate & Confirm Search EvaluatePrioritize • Prioritizing the critical assets + Vulnerabilities • Focusing on Top Critical • Developing plans to test the remediation's on Critical • Approvals for Remediation's • Identify the assets • Filtering False Positives • Finalizing the reports • Discovering the network • Identify the scopes • Initiate Scan with schedules considering the business operations (Servers, devices scanned during non business hours) • Patching /Remediate • evaluating the impact • rescanning & Confirm for closure of vulnerability 1 2 4 3
  • 6. Long term Remediation's • Identify the consequences of reported vulnerabilities • Detailed analysis of Root causes • Targeting the hidden gaps • Designing the solutions to avoid reoccurrences • Testing & Deploying the solutions • Monitoring for any reoccurrences • Maintain the Knowledge base for future remediation's
  • 7. Advantages ..In 8 months 78 % vulnerabilities been remediated with Zero impacts on business 36% Outdated Systems, Software's been withdrawn Patch Management improvised to 96% Overall compliance 98.89% (WIR) Minimum Risk Exceptions Increase in Customer Confidence
  • 8. Continuous Improvements Regular Watch on latest Threats & Vulnerabilities Daily Team meeting to understand the progress Measure the performance of security teams by the reduction of critical vulnerabilities Evaluate actual vulnerability management results against targeted metrics
  • 9. Area of Challenge Major Counts Adobe Vulnerabilities Apache Vulnerabilities with weak Ciphers Database patching was not easy Client systems non availability Poodle, Heartbleed
  • 10. Key Consideration on VMS  Meeting compliance requirements and legal boundaries  Checking current security controls if proactive or reactive  Efficiency of Vulnerability Management tool  Check current security state of your network  Is confidential data sufficiently protected  Latest Threats vs Assets

Editor's Notes

  • #3: The increasing growth of cyber-crime and the associated risks are forcing most organizations to focus more attention on information security. A vulnerability management process should be part of an organization’s effort to control information security risks. This process will allow an organization to obtain a continuous overview of vulnerabilities in their IT environment and the risks associated with them. Only by identifying and mitigating vulnerabilities in the IT environment can an organization prevent attackers from penetrating their networks and stealing information