SlideShare a Scribd company logo
Kevin J. Murphy
Cyber Security Defense
by Effective Vulnerability Mgmt.
Director, Windows Security Architecture
Agenda
2
• Before We Begin..
• Year in Review: Cyber Crime & Nation States, Breaches, & Trends
• Core of Vulnerability Management
• Best Practices
• Peer discussion
Before We Begin……
3
Manufacturing Consulting
Energy
Software
Retail Healthcare
Telecommunications
Government
Banking
Others?
Industries Representation
PCI Standards
5
Year in Review
6
Year in Review : Baits and Social Media
7
Year in Review : Identity Exposure
8
This data was before the US Gov. OPM breach of 21.5 million identities
Year in Review : Attack Profiles
9
Year in Review : Cyber crime and Nation Threats
10
• 43% of all cyber attacks originated in China in 2014. http://vpncreative.net
(I don’t believe this. I think China just gets caught)
• Mobile O/S and app threats are rising as vectors into the enterprise
• Dating sites have targeted phishing attacks
• Facebook Twitter & Pinterest –sharing links to friends that are links to malware
Patch Management : Just Do IT!
Please download this doc.
Most attacks use known vulnerabilities
Patches are available in most cases
This should be considered as part of the normal operations
Patch Management: Core Elements
1. Accurate Asset Inventory
a. Make sure you know your assets better than your attacker.
2. Patch availability awareness
a. Microsoft Security Response Center
b. http://csrc.nist.gov/
c. Your software vendors
3. Timely Monitoring, Scanning & Alerting
infrastructure
This should be considered as part of the normal operations
Patch Management: Core Elements
4. Type of Patches
a. Core operating systems patches: Windows, Linux,
Android, iOS, other
b. Infrastructure patches: Cisco, Juniper, F5, Palo Alto,
etc.
c. Your application patches: 3rd party, your internal
developed apps., mobile apps.
d. Monitor tool patches
e. Don’t forget your outliers: security cameras, HVAC,
etc.
This should be considered as part of the normal operations
Patch Management : Deployment
 Plan on rolling out patches monthly
 Critical patches should be patched out of sequence if
an active exploit is in progress
 Always test your patches first!
 Full-time team
 Fully funded in your budget cycle
 Patch status should be part of your normal information
system reporting metrics
This should be viewed as part of the normal operations of your systems
Patch Management : Tips
 Attackers would love to infect your patch and have
you roll out their malware for them.
 Use checksums/strong hash to verify patch integrity
 Maintain configuration control
 Secure network file transfer if possible
 Automate and Phase your deployment to patch your
high value systems first
Verify your patch isn’t creating an outage
Protect your patching infrastructure.
Patch Management : Cloud Based Systems
 In most cases, your cloud provided will handle
patches from the hypervisor and below
 You still own patching your cloud based
applications
 Verify you cloud service level agreements and
 Make sure there are no patching gaps. (Find
the coverage gaps before your attacker does.)
Learning From Peers
Let’s
Share
And
Learn
Veteran’s Day

More Related Content

PPT
Reorganizing Federal IT to Address Today's Threats
PPTX
Vulnerability Assessment
PDF
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
PPTX
Vulnerability management today and tomorrow
PPTX
Vulnerability Assessment Presentation
PPT
Key Strategies to Address Rising Application Risk in Your Enterprise
PDF
OSB130 Patch Management Best Practices
PPTX
Software Vulnerability management
Reorganizing Federal IT to Address Today's Threats
Vulnerability Assessment
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability management today and tomorrow
Vulnerability Assessment Presentation
Key Strategies to Address Rising Application Risk in Your Enterprise
OSB130 Patch Management Best Practices
Software Vulnerability management

What's hot (20)

PDF
Best vulnerability assessment training
PPTX
Effective Vulnerability Management
PPTX
September 2012 Security Vulnerability Session
PPTX
Vulnerability Management: What You Need to Know to Prioritize Risk
PPT
Blue Ocean IT Security
PPTX
Assessment and Threats: Protecting Your Company from Cyber Attacks
PPT
The Role of Application Control in a Zero-Day Reality
PPTX
Vulnerability Assessment & Analysis (VAA) Overview
PPTX
Malicious software
 
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PDF
Security Implications of the Cloud
PPTX
Enterprise Class Vulnerability Management Like A Boss
PPT
IT Security management and risk assessment
 
PDF
Trustport - Roman Veleba
PPTX
VAPT, Ethical Hacking and Laws in India by prashant mali
PPTX
Cyber Attack Survival
PDF
VSEC LAN Security Assessment Service Profile
PPTX
Network Security Risk
PPTX
Web Application Vulnerability Management
PPTX
VMRay intro video
Best vulnerability assessment training
Effective Vulnerability Management
September 2012 Security Vulnerability Session
Vulnerability Management: What You Need to Know to Prioritize Risk
Blue Ocean IT Security
Assessment and Threats: Protecting Your Company from Cyber Attacks
The Role of Application Control in a Zero-Day Reality
Vulnerability Assessment & Analysis (VAA) Overview
Malicious software
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
Security Implications of the Cloud
Enterprise Class Vulnerability Management Like A Boss
IT Security management and risk assessment
 
Trustport - Roman Veleba
VAPT, Ethical Hacking and Laws in India by prashant mali
Cyber Attack Survival
VSEC LAN Security Assessment Service Profile
Network Security Risk
Web Application Vulnerability Management
VMRay intro video
Ad

Viewers also liked (19)

PPTX
Cyber Sec Update Secure World Seattle Nov 13, 2014
DOC
Discurso del Señor Ismael Plascencia Nuñez, presidente de CONCAMIN en la Inau...
PPTX
PARQUE CRETÁCICO. SUCRE, BOLIVIA
PPTX
ARCHIVO DE LA PAZ
PDF
Mercator Ocean newsletter 36
PDF
PPTX
Galalab mo game_design_contest_(team ik)_ (the guardians)
PDF
Data, Privacy and the Cloud: Oh my!
PDF
2012-am-workshop-spousal1
DOC
Resume_Darshan
PPTX
TIK IXC Kelompok 7 - Bab 2
PPT
Mapa conceptual gerencia de proyectos tecnología educativa
PPTX
Análisis publicitario Cristina Rodríguez Donaire
PPTX
PDF
半導体デバイス工学 第1章
PPTX
GymNow - Unlimited Fitness Choices
PDF
MENA New Energy 2017 Prospectus
PPTX
Cyber Crime Seminar Jan 2015
PPTX
Poonam handmade paper-final
Cyber Sec Update Secure World Seattle Nov 13, 2014
Discurso del Señor Ismael Plascencia Nuñez, presidente de CONCAMIN en la Inau...
PARQUE CRETÁCICO. SUCRE, BOLIVIA
ARCHIVO DE LA PAZ
Mercator Ocean newsletter 36
Galalab mo game_design_contest_(team ik)_ (the guardians)
Data, Privacy and the Cloud: Oh my!
2012-am-workshop-spousal1
Resume_Darshan
TIK IXC Kelompok 7 - Bab 2
Mapa conceptual gerencia de proyectos tecnología educativa
Análisis publicitario Cristina Rodríguez Donaire
半導体デバイス工学 第1章
GymNow - Unlimited Fitness Choices
MENA New Energy 2017 Prospectus
Cyber Crime Seminar Jan 2015
Poonam handmade paper-final
Ad

Similar to SecureWorld Seattle Vulnerability Mgmt Nov 11 2015 (20)

PDF
Patch and Vulnerability Management
PPTX
Why Patch Management is Still the Best First Line of Defense
PDF
Vulnerability and Patch Management
PPTX
Patch Management Best Practices 2019
PDF
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
PPTX
Prevent Getting Hacked by Using a Network Vulnerability Scanner
PPTX
The Threat Is Real. Protect Yourself.
PPTX
How to Perform Continuous Vulnerability Management
PDF
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PPTX
Vulnerability Management
PDF
Vulnerability Management.pdf
PPTX
Cybersecurity Basics of awareness presentation .pptx
PPTX
Be More Secure than your Competition: MePush Cyber Security for Small Business
PPTX
Fears and fulfillment with IT security
PPT
It's Your Move: The Changing Game of Endpoint Security
PPTX
Internet safety and you
PPTX
IT Security Basics For Managers
PPTX
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
PPT
Vuln.ppt
Patch and Vulnerability Management
Why Patch Management is Still the Best First Line of Defense
Vulnerability and Patch Management
Patch Management Best Practices 2019
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
Prevent Getting Hacked by Using a Network Vulnerability Scanner
The Threat Is Real. Protect Yourself.
How to Perform Continuous Vulnerability Management
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
CyberCare Pro - Cybersecurity for SME's updated.pptx
Vulnerability Management
Vulnerability Management.pdf
Cybersecurity Basics of awareness presentation .pptx
Be More Secure than your Competition: MePush Cyber Security for Small Business
Fears and fulfillment with IT security
It's Your Move: The Changing Game of Endpoint Security
Internet safety and you
IT Security Basics For Managers
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
Vuln.ppt

SecureWorld Seattle Vulnerability Mgmt Nov 11 2015

  • 1. Kevin J. Murphy Cyber Security Defense by Effective Vulnerability Mgmt. Director, Windows Security Architecture
  • 2. Agenda 2 • Before We Begin.. • Year in Review: Cyber Crime & Nation States, Breaches, & Trends • Core of Vulnerability Management • Best Practices • Peer discussion
  • 7. Year in Review : Baits and Social Media 7
  • 8. Year in Review : Identity Exposure 8 This data was before the US Gov. OPM breach of 21.5 million identities
  • 9. Year in Review : Attack Profiles 9
  • 10. Year in Review : Cyber crime and Nation Threats 10 • 43% of all cyber attacks originated in China in 2014. http://vpncreative.net (I don’t believe this. I think China just gets caught) • Mobile O/S and app threats are rising as vectors into the enterprise • Dating sites have targeted phishing attacks • Facebook Twitter & Pinterest –sharing links to friends that are links to malware
  • 11. Patch Management : Just Do IT! Please download this doc. Most attacks use known vulnerabilities Patches are available in most cases This should be considered as part of the normal operations
  • 12. Patch Management: Core Elements 1. Accurate Asset Inventory a. Make sure you know your assets better than your attacker. 2. Patch availability awareness a. Microsoft Security Response Center b. http://csrc.nist.gov/ c. Your software vendors 3. Timely Monitoring, Scanning & Alerting infrastructure This should be considered as part of the normal operations
  • 13. Patch Management: Core Elements 4. Type of Patches a. Core operating systems patches: Windows, Linux, Android, iOS, other b. Infrastructure patches: Cisco, Juniper, F5, Palo Alto, etc. c. Your application patches: 3rd party, your internal developed apps., mobile apps. d. Monitor tool patches e. Don’t forget your outliers: security cameras, HVAC, etc. This should be considered as part of the normal operations
  • 14. Patch Management : Deployment  Plan on rolling out patches monthly  Critical patches should be patched out of sequence if an active exploit is in progress  Always test your patches first!  Full-time team  Fully funded in your budget cycle  Patch status should be part of your normal information system reporting metrics This should be viewed as part of the normal operations of your systems
  • 15. Patch Management : Tips  Attackers would love to infect your patch and have you roll out their malware for them.  Use checksums/strong hash to verify patch integrity  Maintain configuration control  Secure network file transfer if possible  Automate and Phase your deployment to patch your high value systems first Verify your patch isn’t creating an outage Protect your patching infrastructure.
  • 16. Patch Management : Cloud Based Systems  In most cases, your cloud provided will handle patches from the hypervisor and below  You still own patching your cloud based applications  Verify you cloud service level agreements and  Make sure there are no patching gaps. (Find the coverage gaps before your attacker does.)

Editor's Notes

  • #18: Intel collected – By knowing all the logging sources and working with the customer to incorporate them into the Detection Controls strategy, we will know what they have and the Good, Bad, and the Ugly of the entire environment.
  • #19: Intel collected – By knowing all the logging sources and working with the customer to incorporate them into the Detection Controls strategy, we will know what they have and the Good, Bad, and the Ugly of the entire environment.