SlideShare a Scribd company logo
Cost-effective approach to full-cycle
vulnerability management
Sumita Chotani
13th November 2012
Company Confidential
Common Issues across SMB
2
 One man army
 Security is not a priority
 Upper Management wants results
 Time is of the essence
 User friendly product is imperative
AUTOMATION is the key
3
What can you automate?
 Identifying your Network Topology and Asset
Management?
 Vulnerability Assessment of the network?
 Reporting the findings of the assessment?
 Remediation workflow via a ticketing system?
Identifying your network topology
and Asset Management
4
 Discover, understand and organize your network
and the people managing the systems
3 Basic Steps:
o Run Scheduled maps*
o Form Asset Groups around the existing
logical structure
o Assign each Asset Group to its respective
owner
Map ~ Network discovery
Identifying your network topology
and Asset Management
5
6
Identifying your network topology
and Asset Management
7
Identifying your network topology
and Asset Management
Identifying your network topology
and Asset Management
8
Vulnerability Assessment of the
network
9
 Periodic scanning of all perimeter and internal
systems
E.g.
o Nightly scans of Production Environment
o Weekly scans Critical servers and workstations
o Monthly scans of entire network pre and post Patch
Tuesday
Vulnerability Assessment of the
network
10
11
Reporting the findings of the
assessment
 Actionable Report
o Patch Report
• One Interactive Report:
- View of a Patch Matrix
- Patch – Host Mapping
- Link to download the Patch
 Schedule report generation
12
Reporting the findings of the
assessment
13
Reporting the findings of the
assessment
14
Setting up a Remediation workflow
via a ticketing system
 Need for Closed Loop Ticketing System
15
Setting up a Remediation workflow
via a ticketing system
 Closing Open Tickets
16
Setting up a Remediation workflow
via a ticketing system
 Reopening Closed Tickets
17
Setting up a Remediation workflow
via a ticketing system
18
Setting up a Remediation workflow
via a ticketing system
Check - List
19
 Automated Inventory Lookup ✓
 Asset Management and Delegation ✓
 Automated Scanning ✓
 Automated Report Generation ✓
 Reports for Patch Management ✓
 Automated Remediation Workflow ✓
20
Reduce workload for everyone through
automation and prioritisation
schotani@qualys.com
Thank You
© 1999–2012 Qualys, Inc. All rights reserved.

More Related Content

PPTX
WFWPI & Global Peace Women's Network, October 2013 in London
PDF
Women's Social Leadership Awards 2013 presentation
PDF
Vortex Tutorial -- Part I
PDF
2015 Back To School Transformation Challenge
PPTX
Carols Presentation53
PPT
Negation
PPTX
Rain
PDF
DDS Efficiency and Extensibility
WFWPI & Global Peace Women's Network, October 2013 in London
Women's Social Leadership Awards 2013 presentation
Vortex Tutorial -- Part I
2015 Back To School Transformation Challenge
Carols Presentation53
Negation
Rain
DDS Efficiency and Extensibility

Viewers also liked (18)

PDF
I need the data and I need it 1ms ago!
PDF
Visita de plastichín 2015
PPT
Present Tense Verbs
PDF
DDS Web Programming with dscript
PDF
Sunshine coast literacy_jan_2015
PDF
Asis. educ. inic.
PDF
CIC 17 - Nominal Scaling of Print Substrates
PDF
Elaboración jabón 2016
PDF
ikd312-08-fd
PDF
Borderland.Reading Is Thinking.Sept2015
ODP
HC Vrchlabí
PPT
Ugliest Nhl Jerseys
PPT
Sph 107 Ch16
PDF
Web Application Security For Small and Medium Businesses
PPT
Osservatorio sul turismo Scolastico 2012
PPT
Pronunciation
PDF
The Dawn
DOCX
Test 2 Polymer Notes
I need the data and I need it 1ms ago!
Visita de plastichín 2015
Present Tense Verbs
DDS Web Programming with dscript
Sunshine coast literacy_jan_2015
Asis. educ. inic.
CIC 17 - Nominal Scaling of Print Substrates
Elaboración jabón 2016
ikd312-08-fd
Borderland.Reading Is Thinking.Sept2015
HC Vrchlabí
Ugliest Nhl Jerseys
Sph 107 Ch16
Web Application Security For Small and Medium Businesses
Osservatorio sul turismo Scolastico 2012
Pronunciation
The Dawn
Test 2 Polymer Notes
Ad

Similar to Cost-effective approach to full-cycle vulnerability management (20)

PPTX
NuvoSys Solutions, LLC
PDF
Implementing Vulnerability Management
PPTX
Acculink systems end user presentation
PPTX
Acculink systems end user presentation
PPT
Why Use Wes Tech Solutions
PPT
Why Use Westech Solutions
PPTX
The Benefits of Having Nerds On Site Monitoring Your Technology
PPTX
The Benefits of Having Nerds On Site Monitoring Your Technology
PDF
2 20613 qualys_top_10_reports_vm
PPT
Planning and Deploying an Effective Vulnerability Management Program
PDF
Group 4 Networks Assessment Outline
PPTX
DTS Services
PPS
Net Monitor Presentation
DOC
081014 Vulnerability Management - VM Framework Procedural Guidelines 1.0
PDF
Infrastructure Management PowerPoint Presentation Slides
PDF
Enterprise Vulnerability Management: Back to Basics
PPT
Managed Services Presentation
PDF
Facilities Management Powerpoint Presentation Slides
PPTX
Manage services presentation
PDF
The uncool-security-hygiene
NuvoSys Solutions, LLC
Implementing Vulnerability Management
Acculink systems end user presentation
Acculink systems end user presentation
Why Use Wes Tech Solutions
Why Use Westech Solutions
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
2 20613 qualys_top_10_reports_vm
Planning and Deploying an Effective Vulnerability Management Program
Group 4 Networks Assessment Outline
DTS Services
Net Monitor Presentation
081014 Vulnerability Management - VM Framework Procedural Guidelines 1.0
Infrastructure Management PowerPoint Presentation Slides
Enterprise Vulnerability Management: Back to Basics
Managed Services Presentation
Facilities Management Powerpoint Presentation Slides
Manage services presentation
The uncool-security-hygiene
Ad

More from Sasha Nunke (7)

PDF
Don’t let Your Website Spread Malware – a New Approach to Web App Security
PDF
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
PDF
ABC's of Securing Educational Networks
PDF
PCI Myths
PDF
Web Application Scanning 101
PPT
Automating Policy Compliance and IT Governance
PDF
PCI Compliance: What You Need to Know
Don’t let Your Website Spread Malware – a New Approach to Web App Security
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
ABC's of Securing Educational Networks
PCI Myths
Web Application Scanning 101
Automating Policy Compliance and IT Governance
PCI Compliance: What You Need to Know

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Machine learning based COVID-19 study performance prediction
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Big Data Technologies - Introduction.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Cloud computing and distributed systems.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Empathic Computing: Creating Shared Understanding
Network Security Unit 5.pdf for BCA BBA.
The Rise and Fall of 3GPP – Time for a Sabbatical?
Machine learning based COVID-19 study performance prediction
MYSQL Presentation for SQL database connectivity
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Big Data Technologies - Introduction.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Programs and apps: productivity, graphics, security and other tools
Chapter 3 Spatial Domain Image Processing.pdf
Cloud computing and distributed systems.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
20250228 LYD VKU AI Blended-Learning.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Weekly Chronicles - August'25 Week I

Cost-effective approach to full-cycle vulnerability management

  • 1. Cost-effective approach to full-cycle vulnerability management Sumita Chotani 13th November 2012 Company Confidential
  • 2. Common Issues across SMB 2  One man army  Security is not a priority  Upper Management wants results  Time is of the essence  User friendly product is imperative
  • 3. AUTOMATION is the key 3 What can you automate?  Identifying your Network Topology and Asset Management?  Vulnerability Assessment of the network?  Reporting the findings of the assessment?  Remediation workflow via a ticketing system?
  • 4. Identifying your network topology and Asset Management 4  Discover, understand and organize your network and the people managing the systems 3 Basic Steps: o Run Scheduled maps* o Form Asset Groups around the existing logical structure o Assign each Asset Group to its respective owner Map ~ Network discovery
  • 5. Identifying your network topology and Asset Management 5
  • 6. 6 Identifying your network topology and Asset Management
  • 7. 7 Identifying your network topology and Asset Management
  • 8. Identifying your network topology and Asset Management 8
  • 9. Vulnerability Assessment of the network 9  Periodic scanning of all perimeter and internal systems E.g. o Nightly scans of Production Environment o Weekly scans Critical servers and workstations o Monthly scans of entire network pre and post Patch Tuesday
  • 10. Vulnerability Assessment of the network 10
  • 11. 11 Reporting the findings of the assessment  Actionable Report o Patch Report • One Interactive Report: - View of a Patch Matrix - Patch – Host Mapping - Link to download the Patch  Schedule report generation
  • 12. 12 Reporting the findings of the assessment
  • 13. 13 Reporting the findings of the assessment
  • 14. 14 Setting up a Remediation workflow via a ticketing system  Need for Closed Loop Ticketing System
  • 15. 15 Setting up a Remediation workflow via a ticketing system  Closing Open Tickets
  • 16. 16 Setting up a Remediation workflow via a ticketing system  Reopening Closed Tickets
  • 17. 17 Setting up a Remediation workflow via a ticketing system
  • 18. 18 Setting up a Remediation workflow via a ticketing system
  • 19. Check - List 19  Automated Inventory Lookup ✓  Asset Management and Delegation ✓  Automated Scanning ✓  Automated Report Generation ✓  Reports for Patch Management ✓  Automated Remediation Workflow ✓
  • 20. 20 Reduce workload for everyone through automation and prioritisation
  • 21. schotani@qualys.com Thank You © 1999–2012 Qualys, Inc. All rights reserved.