SlideShare a Scribd company logo
CYBER RISK
REDUCTION SERIES
01.02

SOFTWARE
END OF SUPPORT
Overview
Fact: Unpatched software is
vulnerable software. Even when no
known vulnerabilities exist for
software, if must continuously be
monitored for newly discovered
vulnerabilities.
ClearArmor
ClearArmor™ Corporation
519 Easton Rd.
Riegelsville, PA 18077
info@cleararmor.com
http://www.cleararmor.com
+1-(610) 816-0101
Risk increases when software is allowed to remain in an organization past End of Support
(EOS). Why? Unsupported software will not have patches created by their publisher. How is
this allowed to occur? Sometimes due to a lack of visibility. Other times due to misplaced
frugalness for the purposes of cost reduction. The result is increased vulnerabilities, an
increased attach surface area, and risk to the organization.
ClearArmor CyberSecurity Resource Planning (CSRP) provides the structured process through
the Momentum Methodology (M2) and the technology through the Intelligent CyberSecurity
Platform (ICSP) to mitigate this risk.
Step 1 – Accept that no risk reduction is sustainable possible without a
structured CyberSecurity program. That Program must be based on a
recognized standard. The most accepted standard is the NIST CyberSecurity
Framework (CSF).
Step 1- Structure and Standards are foundational to CyberSecurity
Step 2 – A structured CyberSecurity program requires process, technology,
and governance. ClearArmor CyberSecurity Resource Planning (CSRP) is the
only solution that truly aligns organizations to the NIST CSF. This is achieved
through ClearArmor CyberSecurity Resource Planning. An integration of
Methodology and technology.
Step 2 - Process, Technology, and Governance are foundational to CyberSecurity
2 Copyright © 2019 Clear Armor Corporation. All Rights Reserved
Step 3 – Assign Ownership to all NIST CSF Functions, Categories, and Sub-
Categories. These are the ‘Things’ that organizations must do to ensure
‘CyberSecurity’. Ownership requires a Responsible Role (Responsible for
Doing) and an Accountable Rile (Responsible for Auditing). By assigning
ownership, organizations are able to comply with guidance provide by the
NIST CSF.
Step 3- Assignment of Accountable and Responsible Roles are foundational to
CyberSecurity
Step 4 – Policy - establish your organizations software patching, upgrade
policy. A subset of this will include maximum durations for remediations to
reach production, testing guidance, and methods to distribute software
patches.
Step 4 – Creation of clearly defined policy is foundational to CyberSecurity
Step 5 – Discovery your entire network. This includes, but is not limited to, all
hardware, software, configuration information, used ports, utilization, etc. This
requires technology and process that are complete. Only the ClearArmor
Discovery, Classification, Identification (DCI) process achieves a level of
insight into your organizations networked assets, software, hardware,
utilization that is instrumental to a significant number of NIST CSF sub-
categories.
Step 5 – Discovery is foundational to CyberSecurity
Step 6 – The ICSP consumes date from IT-Pedia®, the Comprehensive IT
Product Data Library. Amongst others are two critical data points instrumental
in combating EOS caused risk.
1) Software End of Service Data
2) NIST Vulnerability Database information.
This data is refreshed daily and part of a continuous EOS detection process
Step 6- Automated identification of software past EOS
Step 7 – Automated population of historical EOS data allows for continuous
monitoring of the organizations progress in combatting this risk. This allows up
to the date dashboard views of where the organization is now and the
success of their continued remediation progress
 or other details are identified in the wild, we bring that information
down into your installation of the ICSP.
Step 7- Daily evaluation of EOS Dashboard Information
Step 8 – Automated delivery of precise EOS data to the organizations teams
that can remediate the problem. This includes the ability to
1) Prepare for software set to be EOS in the future
2) Software currently past EOS
3 Copyright © 2019 Clear Armor Corporation. All Rights Reserved
3) And in the way that is needed by the organization to directly take
action
Step 8- Delivery of EOS data to teams that remediate EOS software
Step 9 – Plan your upgrades to target the remediations based on your
organizations policy (example: most critical systems first, largest installed
base)
Step 9- Upgrading Operating Systems and Software can have long lead times, plan early
Step 10 – Remediate your problem, and measure your progress
Step 10 – A Structured approach to risk reduction
ClearArmor CSRP is CyberSecurity
See your Active EOS Distribution
See the affected endpoints
4 Copyright © 2019 Clear Armor Corporation. All Rights Reserved
CyberSecurity Resource Planning
CSRP = Methodology + Technology
A structured approach to CyberSecurity

More Related Content

PDF
Software Vulnerabilities Risk Remediation
PDF
Avoid Meltdown from the Spectre - How to measure impact and track remediation
PDF
KASPERSKY SECURITY CENTER IMPLEMENTATION
PDF
The uncool-security-hygiene
PDF
CMTPS (Cloud-base Multi-engine Threat Prevention System)
PPTX
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
PPTX
Cyber Tech Israel 2016: Get Your Head in the Cloud
PPTX
April2010 Sales Presentation
Software Vulnerabilities Risk Remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
KASPERSKY SECURITY CENTER IMPLEMENTATION
The uncool-security-hygiene
CMTPS (Cloud-base Multi-engine Threat Prevention System)
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Cyber Tech Israel 2016: Get Your Head in the Cloud
April2010 Sales Presentation

What's hot (20)

PDF
Windows Active Directory Security with IS Decisions
PDF
Photography Company Lifetouch Safeguards IT Security for Third Party Software...
PDF
Paper4
PDF
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
PPTX
September 2012 Security Vulnerability Session
DOCX
PPTX
Security architecture, engineering and operations
PPTX
Introducing Kaspersky Security for Virtualization
PPTX
Best Practices for Managing Risk from Open Source Libraries and Components
PDF
Managing Compliance
PDF
Vulnerability threat and attack
PDF
Symantec control compliance suite
PPT
SegurançA Da InformaçãO Faat V1 4
PDF
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
PDF
Healthcare It Security Necessity Wp101118
PDF
Network Environments
PDF
The impact of consumerization
PDF
Control Compliance Suite 10
PPTX
Post Wannacry Update
PDF
Qualys Corporate Brochure
Windows Active Directory Security with IS Decisions
Photography Company Lifetouch Safeguards IT Security for Third Party Software...
Paper4
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
September 2012 Security Vulnerability Session
Security architecture, engineering and operations
Introducing Kaspersky Security for Virtualization
Best Practices for Managing Risk from Open Source Libraries and Components
Managing Compliance
Vulnerability threat and attack
Symantec control compliance suite
SegurançA Da InformaçãO Faat V1 4
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Healthcare It Security Necessity Wp101118
Network Environments
The impact of consumerization
Control Compliance Suite 10
Post Wannacry Update
Qualys Corporate Brochure
Ad

Similar to ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES (20)

PPTX
From Vulnerability to Strength: The Role
PPTX
Managing an enterprise cyber security program
PDF
inSOC Sales Deck Dec 2020.pdf
PPTX
iDEAFest Enteprise InfoSec Program Lessons Learned
PDF
Bit defender ebook_secmonitor_print
PDF
Cisco Advanced Services
PPTX
defensible_security-executive_support-sample.pptx
PDF
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
PDF
OSB50: Operational Security: State of the Union
PDF
Cybersecurity Program Assessments
PPTX
Cybersecurity Capability Maturity Model (C2M2)
PDF
2023-it-roadmap-for-cybersecurity-techcnical
PPTX
Turning security into code by Jeff Williams
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PDF
The Endpoint Security Paradox
PPTX
Unc charlotte prezo2016
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PDF
DevSecOps: Taking a DevOps Approach to Security
PDF
Standards for protection of data on storage device are emerging from both the...
PPTX
Securing Your Digital Transformation: Cybersecurity and You
From Vulnerability to Strength: The Role
Managing an enterprise cyber security program
inSOC Sales Deck Dec 2020.pdf
iDEAFest Enteprise InfoSec Program Lessons Learned
Bit defender ebook_secmonitor_print
Cisco Advanced Services
defensible_security-executive_support-sample.pptx
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
OSB50: Operational Security: State of the Union
Cybersecurity Program Assessments
Cybersecurity Capability Maturity Model (C2M2)
2023-it-roadmap-for-cybersecurity-techcnical
Turning security into code by Jeff Williams
Cyber Risk Management in 2017: Challenges & Recommendations
The Endpoint Security Paradox
Unc charlotte prezo2016
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
DevSecOps: Taking a DevOps Approach to Security
Standards for protection of data on storage device are emerging from both the...
Securing Your Digital Transformation: Cybersecurity and You
Ad

Recently uploaded (20)

PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PDF
MSPs in 10 Words - Created by US MSP Network
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PPTX
5 Stages of group development guide.pptx
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PPT
Data mining for business intelligence ch04 sharda
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PPTX
Principles of Marketing, Industrial, Consumers,
PPTX
HR Introduction Slide (1).pptx on hr intro
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
A Brief Introduction About Julia Allison
PDF
Tata consultancy services case study shri Sharda college, basrur
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
Types of control:Qualitative vs Quantitative
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
MSPs in 10 Words - Created by US MSP Network
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
New Microsoft PowerPoint Presentation - Copy.pptx
5 Stages of group development guide.pptx
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Belch_12e_PPT_Ch18_Accessible_university.pptx
Data mining for business intelligence ch04 sharda
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Principles of Marketing, Industrial, Consumers,
HR Introduction Slide (1).pptx on hr intro
ICG2025_ICG 6th steering committee 30-8-24.pptx
A Brief Introduction About Julia Allison
Tata consultancy services case study shri Sharda college, basrur
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Types of control:Qualitative vs Quantitative
Ôn tập tiếng anh trong kinh doanh nâng cao
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Digital Marketing & E-commerce Certificate Glossary.pdf.................

ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES

  • 1. CYBER RISK REDUCTION SERIES 01.02  SOFTWARE END OF SUPPORT Overview Fact: Unpatched software is vulnerable software. Even when no known vulnerabilities exist for software, if must continuously be monitored for newly discovered vulnerabilities. ClearArmor ClearArmor™ Corporation 519 Easton Rd. Riegelsville, PA 18077 info@cleararmor.com http://www.cleararmor.com +1-(610) 816-0101 Risk increases when software is allowed to remain in an organization past End of Support (EOS). Why? Unsupported software will not have patches created by their publisher. How is this allowed to occur? Sometimes due to a lack of visibility. Other times due to misplaced frugalness for the purposes of cost reduction. The result is increased vulnerabilities, an increased attach surface area, and risk to the organization. ClearArmor CyberSecurity Resource Planning (CSRP) provides the structured process through the Momentum Methodology (M2) and the technology through the Intelligent CyberSecurity Platform (ICSP) to mitigate this risk. Step 1 – Accept that no risk reduction is sustainable possible without a structured CyberSecurity program. That Program must be based on a recognized standard. The most accepted standard is the NIST CyberSecurity Framework (CSF). Step 1- Structure and Standards are foundational to CyberSecurity Step 2 – A structured CyberSecurity program requires process, technology, and governance. ClearArmor CyberSecurity Resource Planning (CSRP) is the only solution that truly aligns organizations to the NIST CSF. This is achieved through ClearArmor CyberSecurity Resource Planning. An integration of Methodology and technology. Step 2 - Process, Technology, and Governance are foundational to CyberSecurity
  • 2. 2 Copyright © 2019 Clear Armor Corporation. All Rights Reserved Step 3 – Assign Ownership to all NIST CSF Functions, Categories, and Sub- Categories. These are the ‘Things’ that organizations must do to ensure ‘CyberSecurity’. Ownership requires a Responsible Role (Responsible for Doing) and an Accountable Rile (Responsible for Auditing). By assigning ownership, organizations are able to comply with guidance provide by the NIST CSF. Step 3- Assignment of Accountable and Responsible Roles are foundational to CyberSecurity Step 4 – Policy - establish your organizations software patching, upgrade policy. A subset of this will include maximum durations for remediations to reach production, testing guidance, and methods to distribute software patches. Step 4 – Creation of clearly defined policy is foundational to CyberSecurity Step 5 – Discovery your entire network. This includes, but is not limited to, all hardware, software, configuration information, used ports, utilization, etc. This requires technology and process that are complete. Only the ClearArmor Discovery, Classification, Identification (DCI) process achieves a level of insight into your organizations networked assets, software, hardware, utilization that is instrumental to a significant number of NIST CSF sub- categories. Step 5 – Discovery is foundational to CyberSecurity Step 6 – The ICSP consumes date from IT-Pedia®, the Comprehensive IT Product Data Library. Amongst others are two critical data points instrumental in combating EOS caused risk. 1) Software End of Service Data 2) NIST Vulnerability Database information. This data is refreshed daily and part of a continuous EOS detection process Step 6- Automated identification of software past EOS Step 7 – Automated population of historical EOS data allows for continuous monitoring of the organizations progress in combatting this risk. This allows up to the date dashboard views of where the organization is now and the success of their continued remediation progress  or other details are identified in the wild, we bring that information down into your installation of the ICSP. Step 7- Daily evaluation of EOS Dashboard Information Step 8 – Automated delivery of precise EOS data to the organizations teams that can remediate the problem. This includes the ability to 1) Prepare for software set to be EOS in the future 2) Software currently past EOS
  • 3. 3 Copyright © 2019 Clear Armor Corporation. All Rights Reserved 3) And in the way that is needed by the organization to directly take action Step 8- Delivery of EOS data to teams that remediate EOS software Step 9 – Plan your upgrades to target the remediations based on your organizations policy (example: most critical systems first, largest installed base) Step 9- Upgrading Operating Systems and Software can have long lead times, plan early Step 10 – Remediate your problem, and measure your progress Step 10 – A Structured approach to risk reduction ClearArmor CSRP is CyberSecurity See your Active EOS Distribution See the affected endpoints
  • 4. 4 Copyright © 2019 Clear Armor Corporation. All Rights Reserved CyberSecurity Resource Planning CSRP = Methodology + Technology A structured approach to CyberSecurity