140 likes | 277 Views
The Technology Tool Kit version 2.0 August 2014. Presenter: Deborah Watson InfraGard Houston Chapter - SIG Security Guide & Tool Development Manager. agenda. Agenda Introduction Technology Tool Kit (TTK) Navigation From InfraGard Site Program Phases Tool Categories Questions.
E N D
The Technology Tool Kitversion 2.0August 2014 Presenter: Deborah Watson InfraGard Houston Chapter - SIG Security Guide & Tool Development Manager
agenda Agenda Introduction Technology Tool Kit (TTK) Navigation From InfraGard Site Program Phases Tool Categories Questions
IntroductionDeborah Watson - SIG Security Guide & Tool Development Manager • Deborah Watson is a Solutions Architect in the Assessments and Compliance practice at Accudata. Ms. Watson has more than 15 years of experience in the information technology and security fields. For the past several years Ms. Watson has been assisting CIO/CISO/s with developing long term strategy aligned to both business and compliance requirements. • Ms. Watson has a Master’s degree in Information Technology Management from Harvard University in addition to a wide range of industry certifications including the following: CISSP, GIAC – GC Intrusion Analyst, GIAC- GC Incident Handler, Microsoft Certified IT Professional – Enterprise Administrator, PMI Project Manager. • Ms. Watson’s primary areas of expertise include: Security strategy, information protection, privacy and compliance, infrastructure security design, SIEM technology, PKI/CA design and key management, endpoint hardening, system architecture and design, patch and vulnerability management, project management.
Technology Tool Kit What? The Technology Tool Kit (TTK) is intended to provide a collection of cyber security tools and guidance on their utilization. • OpenSourceCyber Security Tool Repository • Educational Awareness on Cyber Security Tool Utilization • Reference Materials for Cyber Security Tools • Map Legal and Regulatory Controls to Tools (Future) Why? • Increase security awareness while reducing risk and ensuring budgets are focused on capabilities that provide optimal ROI. • Can be used as to supplement existing organizational assets.
Technology Tool KitWhere is it? Located on the Houston Members Alliance Navigation The Link to the Technology Tool Kitis in the Left Navigation of the Houston Chapter Members Alliance Page
Technology Tool Kit Sample: Draft Initial Tools List (version 1.0) Tool Name Tool Source Category Tool Description
Technology Tool Kit - Version 2.0New Home The Technology Tool Kit has been converted from being Excel file based to being website based. • Links to key areas of site which will be on the top of every page: • TTK Home • A – Z Index • SiteMap • Contact Tool Kit Description
Technology Tool Kit - Version 2.0SiteMap The Technology Tool Kit has been converted from being Excel file based to being website based. Alphabet links to lower areas of SiteMap page Tool Type Description Link to Tool Page
Technology Tool Kit - Version 2.0Tool Page The Technology Tool Kit has been converted from being Excel file based to being website based. • Links to key areas of site which will be on the top of every page: • TTK Home • A – Z Index • SiteMap • Contact Tool specifics: project site, license info, download link, etc. Links to instructional documentation
Technology Tool Kit - Version 2.0A – Z Index The Technology Tool Kit has been converted from being Excel file based to being website based. • Links to key areas of site which will be on the top of every page: • TTK Home • A – Z Index • SiteMap • Contact A – Z list of Tools
Technology Tool KitCategories The categories below are currently included in the Technology Tool Kit. As of 5/15 there are over 115 tools listed in these categories. • Anonymizer • Anti Malware • Bot Detection • Browser Support • Data Deletion • Encrypted Communication • Firewalls • Forensics • Fuzzers • General Purpose/Utilites • Intrusion Detection • Packet Crafting • Packet Sniffers • Password Crackers • Port Scanners • Proxies • Recon • Reference • Rootkit Detectors • Traffic Monitoring • Vulnerability Exploitation • Web Vulnerability Scanner