Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”

Slides:



Advertisements
Similar presentations
THE 20 CRITICAL CONTROLS: A SECURITY STRATEGY RANDY MARCHANY VA TECH IT SECURITY OFFICE 1 (C) MARCHANY 2011.
Advertisements

David A. Brown Chief Information Security Officer State of Ohio
Automating Microsoft Azure with PowerShell MMS Minnesota 2014 Trevor Sullivan and David O’Brien – #MMSMinnesota.
Your CMDB and PowerShell DSC: DevOps Techniques
OSAC/ISMA Conference The Changing Nature of Cyber Space Ryan W. Garvey.
SEC835 Database and Web application security Information Security Architecture.
Security Management prepared by Dean Hipwell, CISSP
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Continuous Monitoring: Diagnostics & Mitigation October 24, 2012.
System Center Reporting Zero to Hero 15 minutes x 4 MMS Minnesota 2014 Samuel Erskine (Sam) Dieter Gasser (Didi) IT Driving Fellow Principal Consultant.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Chapter 2 Securing Network Server and User Workstations.
Module 11: Designing Security for Network Perimeters.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
End to End Automation with MDT Managing your reference images. Fred om Daniel
Windows 10 Setup InternalsWindows 10 Setup Internals Johan
MMS Every Month at Home - User Groups. Expectations and Overview Would you so kindly: Listen and Participate Actively Ask Questions Heckle When Necessary.
Cybersecurity Presented by Charles Brookson OBE CEng FIET FRSA
Are you Ready for Configuration Manager vNext?
PowerShell Package Management for the Enterprise Kirk Aleksandar
Windows 10 Feature & Servicing Updates Options and Demystifying Steven Rachui
Define, bundle, deployDefine, bundle, deploy Working with Windows Server Containers and Docker James David O’Brien.
ConfigMgr! Intune! Azure!ConfigMgr! Intune! Azure! Understanding Cloud Based Management Options Steven Rachui
Monitoring and Managing the Hybrid Cloud with System Center
Managing Third Party Updates with Microsoft’s System Center Configuration Manager Secunia Integration, MMS 2015 Kent AgerlundSherry Kissinger.
Nano ServerNano Server The Future of Window Server Mikael Johan
House of tails dogs charity All donations go 100% to the charity #MMSGIVEBACK.
Managing iOS Device Using ConfigMgr and Intune Hybrid MDM John Presenter #2 Twitter Handle Blog or address.
How to Model an Application for Monitoring Nathan Jonathan
Introduction to Administering a SQL Server Matthew Steve Thompson, stevethompsonmvp.wordpress.com.
The Art of deploying Windows 10 With ConfigMgr 2012 R2 Johan Mikael
XPlatform ManagementxPlatform Management Windows Provisioning from *nix David James.
Midwest Management Summit MMSSQL – What are Your SQL Reporting Questions? #MMSMinnesot a #MMSSQL.
ConfigMgr 2012 SQL Refresher MMS Minnesota 2014 Matthew Teegarden/Steve Thompson.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Introduction to T-SQL – Part Deux Matthew Sherry Kissinger kissinger.
OS Deployment - LEVEL 500OS Deployment - LEVEL 500 Johan
Restricted Admin & Credential Exposure MMS Minnesota 2014 Hasain Alshakarti – TrueSec Enterprise Security #MMSMinnesota #MMSConfigMgr #MMSLove.
Information Security tools for records managers Frank Rankin.
SQL Tips & Tricks Best practices from the field John Nelson Apps Systems Engineer Steve Thompson Senior Consultant,
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Real Life Enterprise PKI MMS Minnesota 2014 Hasain Alshakarti – TrueSec Enterprise Security #MMSMinnesota #MMSConfigMgr #MMSLove.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Long Live Azure Automation!Long Live Azure Automation! Cloud-first Configuration Management and Automation Beth Cooper Program Manager.
Everything you want to know about
Common Network Penetration Testing Techniques Russel Van Tuyl.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Douglas DiJulio Director – Enterprise Operations Application Support Cyber Security.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Brian Ventura SANS Community Instructor
Your Partner for Superior Cybersecurity
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Security Standard: “reasonable security”
Module 1: Identity is the New Perimeter
Migrating Infrastructure to Microsoft Azure
Shielded VM and Guarded Fabric
Security Insights: How Microsoft Secures IT
Leverage What’s Out There
Cyber Protections: First Step, Risk Assessment
NYBA 2017 Technology, Compliance &
Implementing and Auditing the Critical Controls
ISMS Information Security Management System
Cybersecurity Presented by Charles Brookson OBE CEng FIET FRSA
National Cyber Security
Security week 1 Introductions Class website Syllabus review
Cybersecurity Threat Assessment
November 30, 2017 By: Richard D. Condello NRECA Senior Director
6. Application Software Security
Presentation transcript:

Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”

Cyber Security Advisor MS Ignite 2015 MS TechEd’s 20 Years of Coding, Pentesting, Security & Identity Mgmt Hasain ”The Wolf” Alshakarti Enterprise Security Stockholm, Sweden

Evaluations: Please provide session feedback by clicking the EVAL button in the scheduler app (also download slides). One lucky winner will receive a free ticket to the next MMS! Session Title: Discuss… Ask your questions-real world answers! Plenty of time to engage, share knowledge. SPONSORS

CSC 1:Inventory of Authorized and Unauthorized Devices Center for Internet Security

CSC 2:Inventory of Authorized and Unauthorized Software Center for Internet Security

CSC 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Center for Internet Security

CSC 4: Continuous Vulnerability Assessment and Remediation Center for Internet Security

CSC 5: Controlled Use of Administrative Privileges Center for Internet Security

CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs Center for Internet Security

CSC 7: and Web Browser Protections Center for Internet Security

CSC 8: Malware Defenses Center for Internet Security

CSC 9: Limitation and Control of Network Ports, Protocols, and Services Center for Internet Security

CSC 10: Data Recovery Capability Center for Internet Security

CSC 11: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Center for Internet Security

CSC 12: Boundary Defense Center for Internet Security

CSC 13: Data Protection Center for Internet Security

CSC 14: Controlled Access Based on the Need to Know Center for Internet Security

CSC 15: Wireless Access Control Center for Internet Security

CSC 16: Account Monitoring and Control Center for Internet Security

CSC 17: Security Skills Assessment and Appropriate Training to Fill Gaps Center for Internet Security

CSC 18: Application Software Security Center for Internet Security

CSC 19: Incident Response and Management Center for Internet Security

CSC 20: Penetration Tests and Red Team Exercises Center for Internet Security