1 Continuous Monitoring Proprietary Information of SecureInfo ® Corporation © 2011 All Rights Reserved.

Slides:



Advertisements
Similar presentations
SHIFTING INFORMATION SECURITY LANDSCAPE FROM C&AS TO CONTINUOUS MONITORING ANDREW PATCHAN JD, CISA ASSOCIATE IG FOR IT, FRB LOUIS C. KING, CPA, CISA, CMA,
Advertisements

Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
Federal Desktop Core Configuration and the Security Content Automation Protocol Peter Mell, National Vulnerability Database National Institute of Standards.
Federal Risk and Authorization Management Program (FedRAMP) Lisa Carnahan, Computer Scientist National Institute of Standards & Technology Standards Coordination.
SACM Terminology Nancy Cam-Winget, David Waltermire, March.
Office of the Secretary of Defense – Comptroller Financial Improvement and Audit Readiness Directorate Unclassified 17 September 2014 GAO Revised “Green.
Office of Technology Partnerships September 17, 2007 State and Local Collaboration Michigan’s Cross Boundary Program.
© 2003 IBM Corporation Privacy 12 th CACR Workshop Yim Y. Chan Chief Privacy Officer & CIO IBM Canada Ltd. w3.ibm.com/Privacy.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Information System Continuous Monitoring (ISCM)
Risk Management Framework
High-Level Assessment Month Year
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
Complying With The Federal Information Security Act (FISMA)
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
An overview of the NIST Risk Management Framework ISA 652 Fall 2010
Vulnerability Management Dimension Data – Tom Gilis 24 November 2011.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Panel: Moderator: Michele Iversen Guest Experts: Dr. Ron Ross, Rod Beckstrom, Bob Wandell.
Information System Continuous Monitoring (ISCM) FITSP-A Module 7.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
SEC835 Database and Web application security Information Security Architecture.
Jim Reavis, Executive Director Cloud Security Alliance November 22, 2010 Developing a Baseline On Cloud Security.
© 2006 Avaya Inc. All rights reserved. Avaya Services Michael Dundon Business Development Manager.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
Federal Cyber Policy and Assurance Issues Dwayne Ramsey Computer Protection Program Manager Berkeley Lab Cyber Security Summit September 27, 2004.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Roles and Responsibilities
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Secure Cloud Solutions Open Government Forum Abu Dhabi April 2014 Karl Chambers CISSP PMP President/CEO Diligent eSecurity International.
Copyright Security-Assessment.com 2004 Vulnerability Management Explained By Peter Benson.
Quality Activity Matrix Presented by Sandra Toalston President, SanSeek 1.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
NESTOA September 20, 2011 Safeguards Program Briefing.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Novell Compliance Management Platform Update CMP & CMP Extension for SAP Environments Leo Castro Product Marketing Manager Patrick Gookin.
University of Maryland University College (UMUC) 3/11/2004 POA&M and FISMA What does it really mean? FISSEA Annual Conference.
The Direction of Information Security and Privacy in State Government Presented by Colleen Pedroza Chief Information Security Officer California State.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Managed Support CSM Event – 1 st June Steven Grier Premier Support Manager Premier Support.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Risk Management Process Frame = context, strategies Assess = determine.
Managing your IT Environment. Microsoft Operations Manager 2005 Overview.
A way to develop software that emphasizes communication, collaboration, and integration between development and IT operations teams.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
‘Enhanced Cyber Situational Awareness with Continuous Monitoring’ John Crupi, CTO Rick Smith, Cyber Consultant.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Securing Privileged Identities Joseph Dadzie, Principal PM Manager, Microsoft 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 James Cowling,
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
 December 2010 US Chief Information Officer Vivek Kundra released the Federal Cloud Computing Strategy. This became to be what is known as “Cloud First”
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Presenter: Mohammed Jalaluddin
Capabilities Matrix Access and Authentication
Deployment Planning Services
Securing Critical Assets: Arizona’s Security & Privacy Initiatives
Introduction to the Federal Defense Acquisition Regulation
Special Publication Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Dr. Ron Ross Computer Security.
Office 365 Security Assessment Workshop
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
TechEd /11/ :44 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Continuous Monitoring
Microsoft Data Insights Summit
In the attack index…what number is your Company?
Presentation transcript:

1 Continuous Monitoring Proprietary Information of SecureInfo ® Corporation © 2011 All Rights Reserved

2 Agenda Current State of Continuous Monitoring Continuous Monitoring Defined FedRAMP Status Continuous Monitoring Solutions Top 10 Lessons Learned

3 1.“Annual” systems inventory 2.“Annual” testing 3.C&A every “three” years 4.Weaknesses “Quarterly” 5.Train “once a year” (awareness) 3 FISMA Continuous Monitoring Today

4 7. Incident Reporting 6. Configuration Management 5. “Daily” weakness updates 4. C&A technical controls x Daily not “Annual” testing 2. Inventory improvements 1. “Daily” awareness training 4 Continuous Monitoring Tomorrow

5 Strong Demand for Ideas Continuous Monitoring / RMF Webinar –SecureInfo sponsored and moderated –400+ attendees from public/private sector –Closed all available seats in less than a month

6 Continuous Monitoring Defined Source: NIST IPD

7 Continuous Monitoring Domains  All controls are NOT required  Define your own frequencies of monitoring controls.  provides guidance on controls by domains

8 Continuous Monitoring Simplified Rules Engine correlates data to standards NIST Or your own Assessment Data Compliance Data Asset Data If 5 out of 10 requirements are compliant, your score is 50% Drill down into Scorecards & Reports My Tasks

9 FedRAMP Federal Agencies Outsourced Systems FedRAMP Risk Management -Authorization -Continuous Monitoring -Federal Security Requirements … … A government-wide initiative to provide joint authorizations and continuous security monitoring services Unified government-wide risk management Agencies would leverage FedRAMP authorizations Source: FedRAMP Exec Briefing

10 Recommendations to FedRAMP (116 controls) Recommended Controls to be represented via Continuous Monitoring for Low impact cloud systems are: 1. CM-6 Configuration Settings 2. CM-8 Information System Component Inventory 3. RA-5 Vulnerability Scanning 4. SI-2 Flaw Remediation 5. SI-3 Malicious Code Protection (297 controls) Recommended Controls to be represented via Continuous Monitoring for Moderate impact cloud systems are: 1. AU-2 Auditable Events 2. CM-6 Configuration Settings 3. CM-8 Information System Component Inventory 4. IR-5 Incident Monitoring 5. IR-6 Incident Reporting 6. RA-5 Vulnerability Scanning 7. SI-2 Flaw Remediation 8. SI-3 Malicious Code Protection 9. SC-7 Boundary Protection

11 CAESARS Continuous Asset Evaluation, Situational Awareness, and Risk Scoring Reference Architecture Report

12 iPOST Remedy CiscoWorks HP OpenView Tavve PreView Microsoft SMS Niksun NetOmni Tenable Security Center NetIQ AppManager & SecurityManager

13 In Commerical Sector: Microsoft Source: Global Foundation Services Information Security Management in the Cloud

14

15 Top 10 Lessons Learned 1.Identify a pilot group/department to use that represents a good cross section of your organization 2.Validate systems of record for your data sources 3.Verify data accuracy and “cleanliness” for analysis and reporting purposes 4.Develop questionnaires that are consumable in less than 15 minutes 5.Identify common keys for your data source linkages

16 Top 10 Lessons Learned Continued 6.Use Web Services and common data formats as much as possible (reduce batch jobs) 7.Define your key performance indicators & report metrics that are trackable automatically 8.Baseline pilot and enterprise deployments & tracking variances in parallel 9.Request review from peers at other organizations & form an internal steering committee of key stakeholders 10.Have a backup plan to generate the data manually should an issue arise with your automated system.

17 Questions ?

18 Contact Information Yong-Gon Chon SVP & Chief Technology Officer SecureInfo Corporation work mobile fax