Secure Configuration in Action (and How to Apply It)
- Tuesday, March 26th, 2013 at 1:00 PM (13:00:00 EDT/US Eastern)
- Michael Thelaner, Jim D. Hietala, and Logan Kleier
You can now attend the webinar using your mobile device!
Most attack code getting into organizations starts at the end point, where attackers escalate privileges and move to servers, then help themselves to the crown jewels. They then move onto compromise other servers to store their ill-gotten gains and to quietly exfiltrate sensitive data. The malware even attempts turn off networking and security devices so their actions won't be detected.
Their strategies depend on the systems and vulnerabilities they discover in them: shared admin passwords, default settings, insecure ports, unpatched software or hardware. The good ones include zero-days administrators don't even know about, let alone patch against.
In this webcast learn how to reduce this attack surface by an order of magnitude through secure configuration practices across end points, servers and network and security devices as defined by the SANS 20 Critical Security Controls, controls numbers 3 and 10 (configuration of end points, laptops, network and security devices). According to the Control Number 3 section of the 20CC document, "Defenses against these automated exploits include:
- procuring computer and network components with the secure configurations already implemented,
- deploying such pre-configured hardened systems, updating these configurations on a regular basis,
- and tracking them in a configuration management system."
Speaking from experience will be CISO of the City of Portland, Logan Kleier, who will explain Portland's implementation of secure configuration practices based on the 20 Critical Controls, along with the benefits produced.
Register for this webcast and be among the first to view the accompanying whitepaper written by SANS Analyst Jim D. Hietala.
Click here to view the associated whitepaper.
Michael Thelander, Director of Product Marketing for Tripwire, has served in co-founder, product manager and business strategist roles for a number of innovative technology companies over the last 20 years. His successful new product introductions include FAA-approved computer-based flight training systems, network energy management solutions, online print estimation and bidding systems, and collaborative multi-user educational programs. At Tripwire he's filled the roles of product marketing director, product manager, and business unit director. He spends the bulk of his time presenting at industry and user events, working with Tripwire's product strategy teams, and serving as a liaison to analysts, editors, and industry thought leaders. His articles and interviews have appeared in IT Professional, CFO Magazine, SoftwareCEO.com and other publications.
Jim D. Hietala
Jim D. Hietala, GIAC GSEC and CISSP, heads security standards activities for a major IT industry standards group. He has led the development of a number of IT security standards. Jim is an active participant in the articles on information security, risk and compliance topics in publications including the Risk Factor, Bank Accounting & Finance, SC Magazine and others. A security industry veteran, he has held leadership roles at a number of security technology startups. He holds a B.S. in marketing from Southern Illinois University.
Logan is the information security officer for the City of Portland. Prior to this role, he served as the Unwire Portland project manager in which he oversaw the deployment of a city-wide wireless broadband network. Mr. Kleier has also worked for the U.S. Government Accountability Office (GAO) as well as various product management roles for various national and international software and telecommunications organizations.