46
Presented by Peter Fortunato

BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

Presented by Peter Fortunato

Page 2: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

BNN’s Risk and Business Advisory Team

◦ Peter Fortunato; CISM, CISA, CISSP

Page 3: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_execsummary_en_xg.pdf

Comptia◦ Security+

ISACA◦ CISA – Certified Information Security Auditor◦ CISM – Certified Information Security Manager◦ CRISC – Certified in Risk and Information Systems

Control

Page 4: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_execsummary_en_xg.pdf

(ISC)2◦ SSCP – Systems Security Certified Practitioner◦ CISSP – Certified Information Systems Security

Professional

Page 5: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 6: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 7: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 8: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 9: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 10: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 11: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 12: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 13: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

A system administrator is configuring accounts on a newly established server. Which of the following characteristics BEST differentiates service accounts from other types of accounts?

A. They can often be restricted in privilege.B. They are meant for non-person entities.C. They require special permissions to OS files and

folders.D. They remain disabled in operations.E. They do not allow passwords to be set.

Page 14: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

Which of the following if used would BEST reduce the number of successful phishing attacks?

A. Two-factor authenticationB. Application layer firewallC. MantrapsD. User training

Page 15: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 16: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 17: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 18: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 19: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 20: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 21: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 22: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 23: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

Protection of Information Assets

Information Systems Operations, Maintenance and Service Management

Information Systems Acquisition, Development and Implementation

Governance and Management of IT

The Process of Auditing Information Systems

Page 24: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

Which of the following programs would a sound information security policy MOST likely include to handle suspected intrusions?

A. ResponseB. CorrectionC. DetectionD. Monitoring

Page 25: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

When reviewing the IT strategic planning process, an IS auditor should ensure that the plan:

A. incorporates state of the art technology.B. addresses the required operational controls.C. articulates the IT mission and vision.D. specifies project management practices.

Page 26: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 27: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

Information Security Governance

Information Risk ManagementInformation Security

Program Development and Management

Information Security Incident Management

Page 28: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

All risk management activities are PRIMARILY designed to reduce impacts to:

A. a level defined by the security manager.B. an acceptable level based on organizational risk

tolerance.C. a minimum level consistent with regulatory

requirements.D. the minimum level possible.

Page 29: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

A mission-critical system has been identified as having an administrative system account with attributes that prevent locking and change of privileges and name.

Which would be the BEST approach to prevent successful brute forcing of the account?

A. Prevent the system from being accessed remotelyB. Create a strong random passwordC. Ask for a vendor patchD. Track usage of the account by audit trails

Page 30: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 31: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 32: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

Which of the following is MOST beneficial to the improvement of an enterprise’s risk management process?

A. Key risk indicators (KRIs)B. External benchmarkingC. The latest risk assessmentD. A maturity model

Page 33: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

Which of the following factors should be analyzed to help management select anappropriate risk response?

A. The impact on the control environmentB. The likelihood of a given threatC. The costs and benefits of the controlsD. The severity of the vulnerabilities

Page 34: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 35: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

Certification Years of

Exp.

Exam Cost PracticeQuestions

Books Total

Security+ 3 $330 $89 $50 $420SSCP 1 $330 $89 $45 $464CISSP 5 $650 $99 $70 $819CISA, CISM, CRISC 5 $575 -

$760*$185 -$225*

$105 -$135*

$865 -$1,120

*ISACA Non-member price.

Page 36: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 37: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

https://www.csoonline.com/article/3116884/security/top-cyber-security-certifications-who-theyre-for-what-they-cost-and-which-you-need.html

Page 38: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

Job Requirement

Desire for a Self-propelled Career

Personal Challenge / Satisfaction

Monetary Gain

Page 39: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

Knowledge of Subject Matter Experience Ethics

Page 40: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

In my opinion, and by the standards of many employers, this is not true. The exams might not be as respected as other certification leaders, but they are comprehensive and you must study hard to pass.

CompTIA Security+ certification covers network security, cryptography, identity management, compliance, operation security, threats, and host security, among other topics.

Page 41: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 42: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts
Page 43: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

https://www.globalknowledge.com/us-en/content/articles/top-paying-certifications

Page 44: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

According to the 2018 Report:

“IT WILL PROBABLY BE YOU ONE DAY”

“Most cybercriminals are motivated by cold, hard cash. If there’s some way they can make money out of you, they will.”

*Verizon 2018 Data Breach Investigation Report, 11th Edition

Page 45: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

For further information or questions feel free to reach out to:

Peter Fortunato, RBA Manager◦ [email protected]◦ (207) 791-7561

Page 46: BNN’s Risk and Business Advisory Team · BNN’s Risk and Business Advisory Team Peter Fortunato; CISM, CISA, CISSP ... following characteristics BEST differentiates service accounts

https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf

https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_execsummary_en_xg.pdf

http://www.nomoreransom.org/

https://urlhaus.abuse.ch/host/bluesky-oz.ru

https://cloudblogs.microsoft.com/microsoftsecure/2014/12/30/before-you-enable-those-macros/

https://www.nist.gov/blogs/taking-measure/easy-ways-build-better-pw0rd

https://www.washingtonpost.com/local/public-safety/hack-of-baltimores-911-dispatch-system-was-ransomware-attack-city-officials-say/2018/03/28/e273ef36-32a3-11e8-8abc-22a366b72f2d_story.html?noredirect=on&utm_term=.bd822425af42

https://www.engadget.com/2018/04/23/atlanta-spends-over-2-million-ransomware-recovery/

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf