SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
Cost-effective approach to full-cycle
vulnerability management
Sumita Chotani
13th November 2012
Company Confidential
Common Issues across SMB
2
 One man army
 Security is not a priority
 Upper Management wants results
 Time is of the essence
 User friendly product is imperative
AUTOMATION is the key
3
What can you automate?
 Identifying your Network Topology and Asset
Management?
 Vulnerability Assessment of the network?
 Reporting the findings of the assessment?
 Remediation workflow via a ticketing system?
Identifying your network topology
and Asset Management
4
 Discover, understand and organize your network
and the people managing the systems
3 Basic Steps:
o Run Scheduled maps*
o Form Asset Groups around the existing
logical structure
o Assign each Asset Group to its respective
owner
Map ~ Network discovery
Identifying your network topology
and Asset Management
5
6
Identifying your network topology
and Asset Management
7
Identifying your network topology
and Asset Management
Identifying your network topology
and Asset Management
8
Vulnerability Assessment of the
network
9
 Periodic scanning of all perimeter and internal
systems
E.g.
o Nightly scans of Production Environment
o Weekly scans Critical servers and workstations
o Monthly scans of entire network pre and post Patch
Tuesday
Vulnerability Assessment of the
network
10
11
Reporting the findings of the
assessment
 Actionable Report
o Patch Report
• One Interactive Report:
- View of a Patch Matrix
- Patch – Host Mapping
- Link to download the Patch
 Schedule report generation
12
Reporting the findings of the
assessment
13
Reporting the findings of the
assessment
14
Setting up a Remediation workflow
via a ticketing system
 Need for Closed Loop Ticketing System
15
Setting up a Remediation workflow
via a ticketing system
 Closing Open Tickets
16
Setting up a Remediation workflow
via a ticketing system
 Reopening Closed Tickets
17
Setting up a Remediation workflow
via a ticketing system
18
Setting up a Remediation workflow
via a ticketing system
Check - List
19
 Automated Inventory Lookup ✓
 Asset Management and Delegation ✓
 Automated Scanning ✓
 Automated Report Generation ✓
 Reports for Patch Management ✓
 Automated Remediation Workflow ✓
20
Reduce workload for everyone through
automation and prioritisation
schotani@qualys.com
Thank You
© 1999–2012 Qualys, Inc. All rights reserved.

Más contenido relacionado

Destacado

Visita de plastichín 2015
Visita de plastichín 2015Visita de plastichín 2015
Visita de plastichín 2015
XXX XXX
 
Web Application Security For Small and Medium Businesses
Web Application Security For Small and Medium BusinessesWeb Application Security For Small and Medium Businesses
Web Application Security For Small and Medium Businesses
Sasha Nunke
 
Osservatorio sul turismo Scolastico 2012
Osservatorio sul turismo Scolastico 2012 Osservatorio sul turismo Scolastico 2012
Osservatorio sul turismo Scolastico 2012
Jacopo Zurlo
 
The Dawn
The DawnThe Dawn
The Dawn
RuthEA
 
Test 2 Polymer Notes
Test 2 Polymer NotesTest 2 Polymer Notes
Test 2 Polymer Notes
sad asad
 

Destacado (18)

I need the data and I need it 1ms ago!
I need the data and I need it 1ms ago!I need the data and I need it 1ms ago!
I need the data and I need it 1ms ago!
 
Visita de plastichín 2015
Visita de plastichín 2015Visita de plastichín 2015
Visita de plastichín 2015
 
Present Tense Verbs
Present Tense VerbsPresent Tense Verbs
Present Tense Verbs
 
DDS Web Programming with dscript
DDS Web Programming with dscriptDDS Web Programming with dscript
DDS Web Programming with dscript
 
Sunshine coast literacy_jan_2015
Sunshine coast literacy_jan_2015Sunshine coast literacy_jan_2015
Sunshine coast literacy_jan_2015
 
Asis. educ. inic.
Asis. educ. inic.Asis. educ. inic.
Asis. educ. inic.
 
CIC 17 - Nominal Scaling of Print Substrates
CIC 17 - Nominal Scaling of Print SubstratesCIC 17 - Nominal Scaling of Print Substrates
CIC 17 - Nominal Scaling of Print Substrates
 
Elaboración jabón 2016
Elaboración jabón 2016Elaboración jabón 2016
Elaboración jabón 2016
 
ikd312-08-fd
ikd312-08-fdikd312-08-fd
ikd312-08-fd
 
Borderland.Reading Is Thinking.Sept2015
Borderland.Reading Is Thinking.Sept2015Borderland.Reading Is Thinking.Sept2015
Borderland.Reading Is Thinking.Sept2015
 
HC Vrchlabí
HC VrchlabíHC Vrchlabí
HC Vrchlabí
 
Ugliest Nhl Jerseys
Ugliest Nhl JerseysUgliest Nhl Jerseys
Ugliest Nhl Jerseys
 
Sph 107 Ch16
Sph 107 Ch16Sph 107 Ch16
Sph 107 Ch16
 
Web Application Security For Small and Medium Businesses
Web Application Security For Small and Medium BusinessesWeb Application Security For Small and Medium Businesses
Web Application Security For Small and Medium Businesses
 
Osservatorio sul turismo Scolastico 2012
Osservatorio sul turismo Scolastico 2012 Osservatorio sul turismo Scolastico 2012
Osservatorio sul turismo Scolastico 2012
 
Pronunciation
PronunciationPronunciation
Pronunciation
 
The Dawn
The DawnThe Dawn
The Dawn
 
Test 2 Polymer Notes
Test 2 Polymer NotesTest 2 Polymer Notes
Test 2 Polymer Notes
 

Similar a Cost-effective approach to full-cycle vulnerability management

Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
Argyle Executive Forum
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
AssadLeo1
 

Similar a Cost-effective approach to full-cycle vulnerability management (20)

Observability in highly distributed systems
Observability in highly distributed systemsObservability in highly distributed systems
Observability in highly distributed systems
 
Cloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow AnalysisCloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow Analysis
 
Next generation alerting and fault detection, SRECon Europe 2016
Next generation alerting and fault detection, SRECon Europe 2016Next generation alerting and fault detection, SRECon Europe 2016
Next generation alerting and fault detection, SRECon Europe 2016
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Federal Agencies top 10 Use Cases
Federal Agencies top 10 Use CasesFederal Agencies top 10 Use Cases
Federal Agencies top 10 Use Cases
 
Monitoring & alerting presentation sabin&mustafa
Monitoring & alerting presentation sabin&mustafaMonitoring & alerting presentation sabin&mustafa
Monitoring & alerting presentation sabin&mustafa
 
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
 
Nonfunctional Testing: Examine the Other Side of the Coin
Nonfunctional Testing: Examine the Other Side of the CoinNonfunctional Testing: Examine the Other Side of the Coin
Nonfunctional Testing: Examine the Other Side of the Coin
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
 
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network
 
ML in Production at FunTech Meetup (Feb 2019)
ML in Production at FunTech Meetup (Feb 2019)ML in Production at FunTech Meetup (Feb 2019)
ML in Production at FunTech Meetup (Feb 2019)
 
What is Platform Observability? An Overview
What is Platform Observability? An OverviewWhat is Platform Observability? An Overview
What is Platform Observability? An Overview
 
Troubleshooting for Intent-based Networking
Troubleshooting for Intent-based NetworkingTroubleshooting for Intent-based Networking
Troubleshooting for Intent-based Networking
 
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManager
 
Dependable Operation - Performance Management and Capacity Planning Under Con...
Dependable Operation - Performance Management and Capacity Planning Under Con...Dependable Operation - Performance Management and Capacity Planning Under Con...
Dependable Operation - Performance Management and Capacity Planning Under Con...
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Production Monitoring Platform
Production Monitoring PlatformProduction Monitoring Platform
Production Monitoring Platform
 
Defects mining in exchanges - medvedev, klimakov, yamkovi
Defects mining in exchanges - medvedev, klimakov, yamkoviDefects mining in exchanges - medvedev, klimakov, yamkovi
Defects mining in exchanges - medvedev, klimakov, yamkovi
 

Más de Sasha Nunke

Don’t let Your Website Spread Malware – a New Approach to Web App Security
Don’t let Your Website Spread Malware – a New Approach to Web App SecurityDon’t let Your Website Spread Malware – a New Approach to Web App Security
Don’t let Your Website Spread Malware – a New Approach to Web App Security
Sasha Nunke
 

Más de Sasha Nunke (8)

Don’t let Your Website Spread Malware – a New Approach to Web App Security
Don’t let Your Website Spread Malware – a New Approach to Web App SecurityDon’t let Your Website Spread Malware – a New Approach to Web App Security
Don’t let Your Website Spread Malware – a New Approach to Web App Security
 
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
 
ABC's of Securing Educational Networks
ABC's of Securing Educational NetworksABC's of Securing Educational Networks
ABC's of Securing Educational Networks
 
PCI Myths
PCI MythsPCI Myths
PCI Myths
 
Web Application Scanning 101
Web Application Scanning 101Web Application Scanning 101
Web Application Scanning 101
 
Automating Policy Compliance and IT Governance
Automating Policy Compliance and IT GovernanceAutomating Policy Compliance and IT Governance
Automating Policy Compliance and IT Governance
 
PCI Compliance: What You Need to Know
PCI Compliance: What You Need to KnowPCI Compliance: What You Need to Know
PCI Compliance: What You Need to Know
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 

Último

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Cost-effective approach to full-cycle vulnerability management

  • 1. Cost-effective approach to full-cycle vulnerability management Sumita Chotani 13th November 2012 Company Confidential
  • 2. Common Issues across SMB 2  One man army  Security is not a priority  Upper Management wants results  Time is of the essence  User friendly product is imperative
  • 3. AUTOMATION is the key 3 What can you automate?  Identifying your Network Topology and Asset Management?  Vulnerability Assessment of the network?  Reporting the findings of the assessment?  Remediation workflow via a ticketing system?
  • 4. Identifying your network topology and Asset Management 4  Discover, understand and organize your network and the people managing the systems 3 Basic Steps: o Run Scheduled maps* o Form Asset Groups around the existing logical structure o Assign each Asset Group to its respective owner Map ~ Network discovery
  • 5. Identifying your network topology and Asset Management 5
  • 6. 6 Identifying your network topology and Asset Management
  • 7. 7 Identifying your network topology and Asset Management
  • 8. Identifying your network topology and Asset Management 8
  • 9. Vulnerability Assessment of the network 9  Periodic scanning of all perimeter and internal systems E.g. o Nightly scans of Production Environment o Weekly scans Critical servers and workstations o Monthly scans of entire network pre and post Patch Tuesday
  • 10. Vulnerability Assessment of the network 10
  • 11. 11 Reporting the findings of the assessment  Actionable Report o Patch Report • One Interactive Report: - View of a Patch Matrix - Patch – Host Mapping - Link to download the Patch  Schedule report generation
  • 12. 12 Reporting the findings of the assessment
  • 13. 13 Reporting the findings of the assessment
  • 14. 14 Setting up a Remediation workflow via a ticketing system  Need for Closed Loop Ticketing System
  • 15. 15 Setting up a Remediation workflow via a ticketing system  Closing Open Tickets
  • 16. 16 Setting up a Remediation workflow via a ticketing system  Reopening Closed Tickets
  • 17. 17 Setting up a Remediation workflow via a ticketing system
  • 18. 18 Setting up a Remediation workflow via a ticketing system
  • 19. Check - List 19  Automated Inventory Lookup ✓  Asset Management and Delegation ✓  Automated Scanning ✓  Automated Report Generation ✓  Reports for Patch Management ✓  Automated Remediation Workflow ✓
  • 20. 20 Reduce workload for everyone through automation and prioritisation
  • 21. schotani@qualys.com Thank You © 1999–2012 Qualys, Inc. All rights reserved.