SlideShare a Scribd company logo
WoC Dubai
April 2018
VULNERABILITY MANAGEMENT?
Who am I?
• European, husband & father
• Security Architecture
• Vulnerability management technology
and processes
• Security Operations Centre
• Cloud Security
• Crypto coin backed VPN project
• CEO, Jirasek Security Ltd
Just a guy with some experience
in security
https://Vladimir.jirasek.eu
@vjirasek on Twitter
Not on Facebook
Why Vulnerability management?
Known challenges
4
• Knowns & unknowns
• Data overload
• Priorities
© Jirasek Security. All rights reserved. 2018
Relationship between two key processes
5© Jirasek Security. All rights reserved. 2018
Patch
management
•Regular activity by Dev or
Ops driven by patch cycles
•Not necessarily risk driven
•Responsible: Ops
Vulnerability
management
• Analytics is key – threat,
company context, …
• Threat triggered process
• Responsible: Cyber Security
Ops
Blueprint for an effective Vulnerability Management Process
Asset
discovery Vulnerability
acquisition
Triage
(Analysis)
Action
Patch
Reconfigure
Monitoring
Vulnerabilities
CMDB
Reporting
Threat
intelligence
& existing
controls
Reconciliation between
scanned and known
hosts. Asset criticality.
Authenticated and
agent-based scanning
where possible
Automated analysis of
each vulnerability,
threat context – threat
actors, exploitability
Implementing
corrective actions and
increasing monitoring
Incident and
change
requests
Determine
criticality
6
Vulnerability
posture
© Jirasek Security. All rights reserved. 2018
Business
Assets
“We have worked with Jirasek
Security for over 3 years. Their work
has been professional, precise and
exceeding expectations.”
• We come from your side of the
fence
• We’ve experienced the good, bad
and the ugly
• Ability to relate to expectations
• Taking an interest in our clients
• Always available
• We never reach “the end”, the
journey continues
CISO, a global semiconductor company
7© Jirasek Security. All rights reserved. 2018
What makes us unique
We have worked with Jirasek Security
since 2017. Their professional and
managed service have helped us
secure and retain business with FTSE
100 companies.”
CTO, Cortexica Vision Systems
Our clients
8
For over 7 years we have successfully helped our clients enhance their cyber security capability
© Jirasek Security. All rights reserved. 2018
Our partners
9
Well balanced portfolio covering all cyber security domains
© Jirasek Security. All rights reserved. 2018
Benefits of engaging with Jirasek Security
10
• Customer Satisfaction
• Specialist Resources
• Additional Revenue
© Jirasek Security. All rights reserved. 2018
Contact us
1
1
Jirasek Security Ltd
+44 207 183 9858
Contact@JirasekSecurity.com
www.JirasekSecurity.com
Company Number: 06871193

More Related Content

PDF
OWASP based Threat Modeling Framework
PPTX
Architecting for Security Resilience
PDF
Enumerating your shadow it attack surface
PDF
GDPR: The Application Security Twist
PDF
Case study financial_services
PDF
"Thinking diffrent" about your information security strategy
PPTX
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
PDF
The Real Costs of SIEM vs. Managed Security Service
OWASP based Threat Modeling Framework
Architecting for Security Resilience
Enumerating your shadow it attack surface
GDPR: The Application Security Twist
Case study financial_services
"Thinking diffrent" about your information security strategy
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
The Real Costs of SIEM vs. Managed Security Service

What's hot (15)

PDF
Super CISO 2020: How to Keep Your Job
PDF
Hunting for cyber threats targeting weapon systems
PPTX
Critical Capabilities for MDR Services - What to Know Before You Buy
PPTX
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
PDF
Why Zero Trust Yields Maximum Security
PPTX
Tictaclabs Managed Cyber Security Services
PPTX
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
PDF
The State of Threat Detection 2019
PPTX
Your cyber security webinar
PPTX
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
PDF
Part 1: Identifying Insider Threats with Fidelis EDR Technology
PDF
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
PDF
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
PDF
Information Security Intelligence
PPTX
Roadmap to security operations excellence
Super CISO 2020: How to Keep Your Job
Hunting for cyber threats targeting weapon systems
Critical Capabilities for MDR Services - What to Know Before You Buy
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Why Zero Trust Yields Maximum Security
Tictaclabs Managed Cyber Security Services
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The State of Threat Detection 2019
Your cyber security webinar
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Information Security Intelligence
Roadmap to security operations excellence
Ad

Similar to Vulnerability management - beyond scanning (20)

PPT
Vuln.ppt
PPT
Vuln_Man_91003.ppt
PPTX
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
PDF
What your scanner isn't telling you
PPTX
Protecting Your Business - All Covered Security Services
PDF
10 Steps to Building an Effective Vulnerability Management Program
PPTX
How to Perform Continuous Vulnerability Management
PDF
Protecting Your Business
PDF
Risksense: 7 Experts on Threat and Vulnerability Management
PDF
Insuring your future: Cybersecurity and the insurance industry
PDF
SFScon17 - Luca Moroni: "Outsourcing Cyber Risks"
PPT
Qualys user group presentation - vulnerability management - November 2009 v1 3
PDF
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
PDF
Vulnerability Management Whitepaper PowerPoint Presentation Slides
PDF
The 10 Most Influential People In Cyber Security, 2024.pdf
PDF
Its time to grow up by Eric C.
PPTX
Be More Secure than your Competition: MePush Cyber Security for Small Business
PPT
NH Bankers 10 08 07 Kamens
PDF
The Security Ecosystem
PPTX
Justifying Security Investment
Vuln.ppt
Vuln_Man_91003.ppt
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
What your scanner isn't telling you
Protecting Your Business - All Covered Security Services
10 Steps to Building an Effective Vulnerability Management Program
How to Perform Continuous Vulnerability Management
Protecting Your Business
Risksense: 7 Experts on Threat and Vulnerability Management
Insuring your future: Cybersecurity and the insurance industry
SFScon17 - Luca Moroni: "Outsourcing Cyber Risks"
Qualys user group presentation - vulnerability management - November 2009 v1 3
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
Vulnerability Management Whitepaper PowerPoint Presentation Slides
The 10 Most Influential People In Cyber Security, 2024.pdf
Its time to grow up by Eric C.
Be More Secure than your Competition: MePush Cyber Security for Small Business
NH Bankers 10 08 07 Kamens
The Security Ecosystem
Justifying Security Investment
Ad

More from Vladimir Jirasek (17)

PPTX
Vulnerability Management @ DevSecOps London Gathering
PPTX
C-Level tools for Cloud security
PPTX
Secure your cloud applications by building solid foundations with enterprise ...
PPTX
Cloud security and security architecture
PPTX
2012 10 cloud security architecture
PPT
Mobile phone as Trusted identity assistant
KEY
Security architecture for LSE 2009
PPTX
Mobile security summit - 10 mobile risks
PDF
Information Risk Security model and metrics
PPTX
Integrating Qualys into the patch and vulnerability management processes
PPTX
Securing mobile population for White Hats
PPTX
Security models for security architecture
PPTX
Meaningfull security metrics
PPTX
CAMM presentation for Cyber Security Gas and Oil june 2011
PDF
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
PPT
Qualys Webex 24 June 2008
PPTX
Federation For The Cloud Opportunities For A Single Identity
Vulnerability Management @ DevSecOps London Gathering
C-Level tools for Cloud security
Secure your cloud applications by building solid foundations with enterprise ...
Cloud security and security architecture
2012 10 cloud security architecture
Mobile phone as Trusted identity assistant
Security architecture for LSE 2009
Mobile security summit - 10 mobile risks
Information Risk Security model and metrics
Integrating Qualys into the patch and vulnerability management processes
Securing mobile population for White Hats
Security models for security architecture
Meaningfull security metrics
CAMM presentation for Cyber Security Gas and Oil june 2011
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
Qualys Webex 24 June 2008
Federation For The Cloud Opportunities For A Single Identity

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
cuic standard and advanced reporting.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Advanced IT Governance
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Machine learning based COVID-19 study performance prediction
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
20250228 LYD VKU AI Blended-Learning.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Electronic commerce courselecture one. Pdf
Review of recent advances in non-invasive hemoglobin estimation
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
cuic standard and advanced reporting.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The AUB Centre for AI in Media Proposal.docx
Dropbox Q2 2025 Financial Results & Investor Presentation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced IT Governance
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Machine learning based COVID-19 study performance prediction
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Diabetes mellitus diagnosis method based random forest with bat algorithm

Vulnerability management - beyond scanning

  • 2. Who am I? • European, husband & father • Security Architecture • Vulnerability management technology and processes • Security Operations Centre • Cloud Security • Crypto coin backed VPN project • CEO, Jirasek Security Ltd Just a guy with some experience in security https://Vladimir.jirasek.eu @vjirasek on Twitter Not on Facebook
  • 4. Known challenges 4 • Knowns & unknowns • Data overload • Priorities © Jirasek Security. All rights reserved. 2018
  • 5. Relationship between two key processes 5© Jirasek Security. All rights reserved. 2018 Patch management •Regular activity by Dev or Ops driven by patch cycles •Not necessarily risk driven •Responsible: Ops Vulnerability management • Analytics is key – threat, company context, … • Threat triggered process • Responsible: Cyber Security Ops
  • 6. Blueprint for an effective Vulnerability Management Process Asset discovery Vulnerability acquisition Triage (Analysis) Action Patch Reconfigure Monitoring Vulnerabilities CMDB Reporting Threat intelligence & existing controls Reconciliation between scanned and known hosts. Asset criticality. Authenticated and agent-based scanning where possible Automated analysis of each vulnerability, threat context – threat actors, exploitability Implementing corrective actions and increasing monitoring Incident and change requests Determine criticality 6 Vulnerability posture © Jirasek Security. All rights reserved. 2018 Business Assets
  • 7. “We have worked with Jirasek Security for over 3 years. Their work has been professional, precise and exceeding expectations.” • We come from your side of the fence • We’ve experienced the good, bad and the ugly • Ability to relate to expectations • Taking an interest in our clients • Always available • We never reach “the end”, the journey continues CISO, a global semiconductor company 7© Jirasek Security. All rights reserved. 2018 What makes us unique We have worked with Jirasek Security since 2017. Their professional and managed service have helped us secure and retain business with FTSE 100 companies.” CTO, Cortexica Vision Systems
  • 8. Our clients 8 For over 7 years we have successfully helped our clients enhance their cyber security capability © Jirasek Security. All rights reserved. 2018
  • 9. Our partners 9 Well balanced portfolio covering all cyber security domains © Jirasek Security. All rights reserved. 2018
  • 10. Benefits of engaging with Jirasek Security 10 • Customer Satisfaction • Specialist Resources • Additional Revenue © Jirasek Security. All rights reserved. 2018
  • 11. Contact us 1 1 Jirasek Security Ltd +44 207 183 9858 Contact@JirasekSecurity.com www.JirasekSecurity.com Company Number: 06871193