220 likes | 247 Views
Operational Excellence Webinar Series. Patch Management. Dynamics of (in)security. ReBIT in collaboration with Sequretek & Kotak Bank http://webinar.rebit.org.in Webinar support from Cisco. Agenda. Agenda : ReBIT’s Industry Initiatives Stats on Patching Security Vocabulary
E N D
Operational Excellence Webinar Series Patch Management Dynamics of (in)security ReBIT in collaboration with Sequretek & Kotak Bank http://webinar.rebit.org.in Webinar support from Cisco
Agenda • Agenda: • ReBIT’s Industry Initiatives • Stats on Patching • Security Vocabulary • Patch and Vulnerability Management Best Practices • Case Study at Kotak Bank • Q/A Sessions
ReBIT’s Industry Initiatives Securing the Financial Sector
ReBIT’s Facilitator Role Business Leader’s - Forum Industry Stakeholders Research Institutions Community Leadership - WG Operational Excellence
ReBIT’sIndustryInitiatives Cybersecurity Assessment Tools VAPT Accreditation Body Auditing and Monitoring Tools Regulatory Technologies & Reporting Operational Excellence Webinar (monthly): Industry initiatives to improve cybersecurity postures DMARC Webinar - with PayPal & ICICI Bank – May 11th Patch Management – Dynamics of (in)security – July 4th Upcoming - FIDO DNSSEC & DNS Governance IR Cybersecurity Awareness Campaign Business Leader’s Forum Cybersecurity Assessment Framework WG Auditing and Monitoring Cybersecurity Maturity Model - WG 6-months effort: Kicked off in Feb, ongoing industry initiative to define a uniform yardstick to assess a firm’s cybersecurity maturity, benchmark and help create evolution roadmap
Vulnerability and Patch Management Some statistics
Patching Vulnerability • Recent incident of Petya/NotPetya and WannaCry underscores the importance of Patch Management • 77% of the total vulnerabilities are because of either poor patching or poor configuration Edgescan 2016 Stats Report
How fast are we fixing vulnerabilities? Edgescan 2016 Stats Report
Median number of days for vulnerability exploit Source: Recorded Future - Week to Weak: The Weaponization of Cyber Vulnerabilities, 2014
Security Vocabulary Talk about security like a pro Source attribution: Cisco
Vulnerability Vulnerability A weakness, design or coding error, or lack of protection in a product that enables an attack. • Lack of protection against code injection • Mishandling of unexpected conditions • Insufficient enforcement of authentication and authorization “What do you mean, vulnerable? It works the way I designed it to!”
Threats Threat A potential danger that could cause harm to information or a system Product Threat Agent Threat Agent An entity that exploits a threat
Exploits and Attacks Exploit A practical method to take advantage of a specific vulnerability Attack The use of an exploit against an actual vulnerability Attack Vector A theoretical application of an exploit “Exploits and attacks go hand in hand…” Zero-Day Attack An attack that exploits a previously unknown vulnerability for which there is not yet a defense
Exposure Exposure • The probability and severity of an attack using a specific exploit • Time between the announcement of a vulnerability and a suitable patch • Any information leak that facilitates an attack Close calls still count! Whether or not an attack is successful, an exposure has still occurred.
Mitigation • PI (Platform Independent) code • Run time defenses • Security features (encryption, packet filtering, logging) Mitigation A strategy for reducing or eliminating the severity of a security issue A few examples… • Reduction in attack surface • Security education and training • Defensive coding • Secure code review
Mitigation Vulnerability and Patch Management Mitigation A strategy for reducing or eliminating the severity of a security issue And the most important
ReBIT Operational Excellence Webinar Series Patch Management - Dynamics of (in)security http://webinar.rebit.org.in Visit for future webinars and events