Artwork

Contenuto fornito da Cybersecurity Growth. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Cybersecurity Growth o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !

#2 - Practical uses of the Secure Controls Framework

1:23:08
 
Condividi
 

Manage episode 353106870 series 3438766
Contenuto fornito da Cybersecurity Growth. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Cybersecurity Growth o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

Cybersecurity Growth

- livestream and podcast

Duration: Weekly, 90 minutes

Title: Cybersecurity Growth #2 - Practical uses of the Secure Controls Framework

Opening

  • When You Arrived instrumental as theme song

Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. I’m your host Shawn Valle, Exec Director and CISO of Cybersecurity Growth

Former Chief Security Officer of Rapid7 and former CISO of Tricentis

Musician here on Twitch and elsewhere, MusicBySV (more on that later)

Top News Stories

https://www.rapid7.com/blog/post/2023/01/19/etr-cve-2022-47966-rapid7-observed-exploitation-of-critical-manageengine-vulnerability/?utm_campaign=sm-blog&utm_source=linkedin&utm_medium=organic-social

New emergent threat response: "CVE-2022-47966: Rapid7 Observed Exploitation of Critical ManageEngine Vulnerability."

Glenn Thorpe of Rapid7 “This has kept us busy over the past 24+ hours. If you’re running ManageEngine software you should:

1. Patch it always no questions asked just do it.

2a. Keep it as segmented as possible from the public internet regardless of its function.

2b. Migrate away from it.”

Dozens of products impacted.

Access Manager Plus*

Active Directory 360**

ADAudit Plus**

ADManager Plus**

ADSelfService Plus**

Analytics Plus*

Application Control Plus*

Asset Explorer**

Browser Security Plus*

Device Control Plus*

Endpoint Central*

Endpoint Central MSP*

Endpoint DLP*

Key Manager Plus*

OS Deployer*

PAM 360*

Password Manager Pro*

Patch Manager Plus*

Remote Access Plus*

Remote Monitoring and Management (RMM)*

ServiceDesk Plus**

ServiceDesk Plus MSP**

SupportCenter Plus**

Vulnerability Manager Plus*

https://www.csoonline.com/article/3684850/11-top-xdr-tools-and-how-to-evaluate-them.html

By Tim Ferrill CSO Online

11 top XDR tools and how to evaluate them

Extended detection and response tools provide a deeper and more automated means to identify and respond to threats. These are some of the most popular options.

XDR is a relatively new class of security tool that combines and builds on the strongest elements of security incident and event management (SIEM), endpoint detection and response (EDR), and even security orchestration and response (SOAR).

Trend Micro,

Microsoft XDR,

Palo Alto Networks Cortex XDR,

Crowdstrike Falcon Insight XDR,

Bitdefender GravityZone Business Security Enterprise,

SentinelOne Singularity XDR,

Cybereason XDR,

VMware Carbon Black XDR,

Elastic Security for XDR,

Trellix XDR Platform,

Cynet 360 AutoXDR

https://www.csoonline.com/article/3685670/attackers-deploy-sophisticated-linux-implant-on-fortinet-network-security-devices.html

By Lucian Constantin

Attackers deploy sophisticated Linux implant on Fortinet network security devices

The exploit allows attackers to remotely execute arbitrary code and commands without authentication.

Fortinet disclosed that a critical vulnerability in its FortiOS operating system was being exploited by attackers in the wild. This week, after additional analysis, the company released more details…

…the original zero-day attack was highly targeted to government-related entities…

CVE-2022-42475, is in the SSL-VPN functionality of FortiOS and can be exploited by remote attackers without authentication. Successful exploitation can result in the execution of arbitrary code and commands.

Patch your Fortinet gear.

Death By Slides

- Practical uses of the Secure Controls Framework

What’chu Listening To or Creating

- Talk about music

That’s a Wrap

  • Concluding topics
  • Thank you for listening
  • Web address, socials
  • I’m Shawn Valle, creator of this show and the music here on Cybersecurity Growth
  • Cybersecuritygrowth.com and cybersecuritygrowth.com/blog
  • @shawnvalle or @cybersecuritygrowth
  • If you like the show, please tell your friends. If you hate it, tell your adversaries. Like/subscribe and leave 5-stars and a review like “great show, I learned something new to help me in my cybersecurity career.”
  • This week we covered
  • Practical application of the Secure Controls Framework. Picking up from where we left off last week. My takeaway is, if you are dealing with 3 or more security/privacy frameworks, it’s worth investing time into SCF and possibly a tool that uses SCF as an overarching security framework, for all your compliance/security/privacy frameworks. It may save you time, and provides a wholistic framework for just about any control you could imagine. But, it could be overwhelming, if you are just getting started...so, if you are just getting started on your compliance/security/privacy journey, you may want to wait a year or two before you jump into SCF.
  • Plans for next week
  • [My approach for the first 100 days as a security leader (this could be as a CISO, but also as a Director of team reporting to the CISO – like GRC Dir, SecOps Dir, ProdSec Dir, etc.)]
  • Live on Twitch weekly, Fridays at 10:30 AM EST, 7:30 AM PST, 3:30 PM GMT in your pod feeds a few days later.

  continue reading

24 episodi

Artwork
iconCondividi
 
Manage episode 353106870 series 3438766
Contenuto fornito da Cybersecurity Growth. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Cybersecurity Growth o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

Cybersecurity Growth

- livestream and podcast

Duration: Weekly, 90 minutes

Title: Cybersecurity Growth #2 - Practical uses of the Secure Controls Framework

Opening

  • When You Arrived instrumental as theme song

Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. I’m your host Shawn Valle, Exec Director and CISO of Cybersecurity Growth

Former Chief Security Officer of Rapid7 and former CISO of Tricentis

Musician here on Twitch and elsewhere, MusicBySV (more on that later)

Top News Stories

https://www.rapid7.com/blog/post/2023/01/19/etr-cve-2022-47966-rapid7-observed-exploitation-of-critical-manageengine-vulnerability/?utm_campaign=sm-blog&utm_source=linkedin&utm_medium=organic-social

New emergent threat response: "CVE-2022-47966: Rapid7 Observed Exploitation of Critical ManageEngine Vulnerability."

Glenn Thorpe of Rapid7 “This has kept us busy over the past 24+ hours. If you’re running ManageEngine software you should:

1. Patch it always no questions asked just do it.

2a. Keep it as segmented as possible from the public internet regardless of its function.

2b. Migrate away from it.”

Dozens of products impacted.

Access Manager Plus*

Active Directory 360**

ADAudit Plus**

ADManager Plus**

ADSelfService Plus**

Analytics Plus*

Application Control Plus*

Asset Explorer**

Browser Security Plus*

Device Control Plus*

Endpoint Central*

Endpoint Central MSP*

Endpoint DLP*

Key Manager Plus*

OS Deployer*

PAM 360*

Password Manager Pro*

Patch Manager Plus*

Remote Access Plus*

Remote Monitoring and Management (RMM)*

ServiceDesk Plus**

ServiceDesk Plus MSP**

SupportCenter Plus**

Vulnerability Manager Plus*

https://www.csoonline.com/article/3684850/11-top-xdr-tools-and-how-to-evaluate-them.html

By Tim Ferrill CSO Online

11 top XDR tools and how to evaluate them

Extended detection and response tools provide a deeper and more automated means to identify and respond to threats. These are some of the most popular options.

XDR is a relatively new class of security tool that combines and builds on the strongest elements of security incident and event management (SIEM), endpoint detection and response (EDR), and even security orchestration and response (SOAR).

Trend Micro,

Microsoft XDR,

Palo Alto Networks Cortex XDR,

Crowdstrike Falcon Insight XDR,

Bitdefender GravityZone Business Security Enterprise,

SentinelOne Singularity XDR,

Cybereason XDR,

VMware Carbon Black XDR,

Elastic Security for XDR,

Trellix XDR Platform,

Cynet 360 AutoXDR

https://www.csoonline.com/article/3685670/attackers-deploy-sophisticated-linux-implant-on-fortinet-network-security-devices.html

By Lucian Constantin

Attackers deploy sophisticated Linux implant on Fortinet network security devices

The exploit allows attackers to remotely execute arbitrary code and commands without authentication.

Fortinet disclosed that a critical vulnerability in its FortiOS operating system was being exploited by attackers in the wild. This week, after additional analysis, the company released more details…

…the original zero-day attack was highly targeted to government-related entities…

CVE-2022-42475, is in the SSL-VPN functionality of FortiOS and can be exploited by remote attackers without authentication. Successful exploitation can result in the execution of arbitrary code and commands.

Patch your Fortinet gear.

Death By Slides

- Practical uses of the Secure Controls Framework

What’chu Listening To or Creating

- Talk about music

That’s a Wrap

  • Concluding topics
  • Thank you for listening
  • Web address, socials
  • I’m Shawn Valle, creator of this show and the music here on Cybersecurity Growth
  • Cybersecuritygrowth.com and cybersecuritygrowth.com/blog
  • @shawnvalle or @cybersecuritygrowth
  • If you like the show, please tell your friends. If you hate it, tell your adversaries. Like/subscribe and leave 5-stars and a review like “great show, I learned something new to help me in my cybersecurity career.”
  • This week we covered
  • Practical application of the Secure Controls Framework. Picking up from where we left off last week. My takeaway is, if you are dealing with 3 or more security/privacy frameworks, it’s worth investing time into SCF and possibly a tool that uses SCF as an overarching security framework, for all your compliance/security/privacy frameworks. It may save you time, and provides a wholistic framework for just about any control you could imagine. But, it could be overwhelming, if you are just getting started...so, if you are just getting started on your compliance/security/privacy journey, you may want to wait a year or two before you jump into SCF.
  • Plans for next week
  • [My approach for the first 100 days as a security leader (this could be as a CISO, but also as a Director of team reporting to the CISO – like GRC Dir, SecOps Dir, ProdSec Dir, etc.)]
  • Live on Twitch weekly, Fridays at 10:30 AM EST, 7:30 AM PST, 3:30 PM GMT in your pod feeds a few days later.

  continue reading

24 episodi

Tutti gli episodi

×
 
Loading …

Benvenuto su Player FM!

Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.

 

Guida rapida