Hi [[ session.user.profile.firstName ]]

Increase Protection Against Cyber Attacks with System Hardening

Increase protection against cyber attacks with system hardening and vulnerability management. See how NNT delivers two key solutions, auditing against a range of CIS Benchmarks and continuous change control.

What is system hardening?

System Hardening is the process of securing a system’s configuration and settings to reduce IT vulnerability and the possibility of being compromised. This can be done by reducing the attack surface and attack vectors which attackers continuously try to exploit for purpose of malicious activity.

By creating a secure and compliant state for all IT systems and combining that with ongoing, context-based change control plus baseline management, Change Tracker™ Gen7 R2 ensures systems remain in a secure and compliant state at all times.

Learn more about NNT's System Hardening: https://www.newnettechnologies.com/device-hardening.html
Recorded Apr 1 2019 3 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mark Kedgley
Presentation preview: Increase Protection Against Cyber Attacks with System Hardening

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cybersecurity Lesson from the Death Star: CIS Control 5 Explained in 30 Minutes Recorded: Jul 31 2019 61 mins
    Mark Kedgley and Tony Sager
    CIS Control 5 should be called the ‘Remember-what-happened-to-the-Death-Star’ security control because it’s all about hardening systems against cyber-attacks through secure configuration settings. And just in case you don’t remember what happened to the Star Wars® Death Star, it was designed to be impregnable, seemingly impossible to attack. But it still needed an engine, which in turn needed an exhaust port, which ultimately left it prone to a fatal strike. Therefore, in any scenario, be it for IT systems or planet-busting, intergalactic weapons of mass destruction, reducing the ‘attack surface’ is a critical security control.

    Research suggests that the gap between digital security teams and IT operations is growing. The genesis of this problem appears to be the inability for IT operations to reliably asses or control the state and condition of assets in line with the priorities and business objectives set out by the security team & vice versa. The result is an increase in vulnerabilities, leading to an increased risk of breaches along with an inability to make good decisions about investments in security controls and operational infrastructure.
     
    Hear from Tony Sager Senior Vice President and Chief Evangelist of Center for Internet Security and Mark Kedgley CTO of New Net Technologies as they discuss Critical Control #5 and explore an effective SecureOps strategy with the ultimate goal of aligning IT operations with effective security controls that increases service availability while mitigating security risk at the same time.
  • NNT ITSM Integration for Cherwell Recorded: May 23 2019 6 mins
    Mark Kedgley
    NNT has integrated its award-winning Change Tracker ™ Gen7R2 with Cherwell's leading service management framework to enable a closed-loop environment for change management. Approved and authorized changes issued by Cherwell can be validated by NNT Change Tracker Gen7 R2, with a full audit trail of what actually changed and reconciled with the Change Request(s).

    By leveraging NNT’s Closed-Loop Intelligent Change Control Technology, repeated or recurring change patterns can be captured and identified as either harmless or potentially harmful as well, discriminating pre-approved changes from unexpected and unwanted changes. Pre-approved changes may also be forensically profiled ahead of time in order to spot any deviations that may indicate ‘insider threats’.

    This approach drastically improves the ability to spot potential breaches by reducing the “change noise”
    and exposing insider and zero-day malware activity. This approach also helps enable SecureOps.
  • NNT Vulnerability Tracker™ Overview Recorded: May 9 2019 7 mins
    Mark Kedgley
    NNT’s Vulnerability Tracker™ identifies known vulnerabilities within software and configuration settings before they can be exploited by a cyber-attack.

    Vulnerability Tracker continuously tests and assesses your IT network and any device connected to it against over 66,000 Network Vulnerability Tests (NVTs).

    New vulnerabilities are added daily through various content providers and industry trusted resources which include over 111,400 CVE and Bugtraq alerts, aggregate compliance rulesets, controls for scan agents and embedded Nmap NSE test routines.

    Our fully distributed architecture provides centrally controlled, scanning mesh even for the largest global enterprise networks and our hyper-fast scanning technology means you can assess over 50,000 endpoints per 24 hours.

    Learn more about NNT Vulnerability Tracker: https://www.newnettechnologies.com/vulnerability-tracker.html
  • What Makes NNT Different From Other File Integrity Monitoring (FIM) Solutions Recorded: May 9 2019 2 mins
    Mark Kedgley
    File Integrity Monitoring (FIM) is a foundational control that involves analyzing operating system and application software files to determine if and when they have changed, how they changed and who made the change using a verification method between a current file state and a known baseline.

    NNT has introduced a number of revolutionary concepts into its suite of products giving FIM the “Integrity” element it is sadly absent in other ‘so-called’ FIM solutions. It also solves the issue of “noise” and "integrity drift" while delivering the necessary manageability and scalability where traditional solutions fall short.

    Noise Reduction - NNT has developed a unique intelligent change control technology which is proven to reduce change noise as much as 99% leaving only unknown, unwanted or unauthorized changes highlighted.

    Prevent Integrity Drift - NNT has a white-list database of over 9 billion known and trusted files in its Fast Cloud Integrity Assurance product that can validate and verify the integrity and authenticity of system and application files in real-time.

    Scalability/Manageability - NNT’s modern, componentized architecture can support at a minimum 10 times more devices with a single console than any competitive FIM solution. This solves the problem of having multiple consoles deployed to manage what a single NNT console can provide.

    Continuous Compliance & Assurance - NNT can deliver continuous compliance in real-time...whatever the standards, regulations or policies. If systems deviate, NNT provides descriptive details on how to rectify the compliance requirement so the issue will no longer present itself.
  • NNT FAST™ (File Approved-Safe Technology) Cloud Integrity Assurance Recorded: May 9 2019 4 mins
    Mark Kedgley
    Change Tracker Gen 7 R2™ provides the most accurate and effective FIM solution guaranteeing the integrity of your secure IT systems and reporting any changes as they occur. But how do you distinguish between:

    ‘good’ - intended, desirable changes such as updates and patches, and
    ‘bad’ - malicious activity following a breach?

    The smart response is to leverage cloud-based Threat Intelligence to automatically validate file changes as they are detected using an authoritative file whitelist. And now you can use the NNT FAST™ (File Approved-Safe technology) Cloud to do just this, in real-time.

    Learn more about NNT FAST™ Cloud here: https://www.newnettechnologies.com/nnt-fast-cloud-threat-intelligence.html
  • Increase Protection Against Cyber Attacks with System Hardening Recorded: Apr 1 2019 3 mins
    Mark Kedgley
    Increase protection against cyber attacks with system hardening and vulnerability management. See how NNT delivers two key solutions, auditing against a range of CIS Benchmarks and continuous change control.

    What is system hardening?

    System Hardening is the process of securing a system’s configuration and settings to reduce IT vulnerability and the possibility of being compromised. This can be done by reducing the attack surface and attack vectors which attackers continuously try to exploit for purpose of malicious activity.

    By creating a secure and compliant state for all IT systems and combining that with ongoing, context-based change control plus baseline management, Change Tracker™ Gen7 R2 ensures systems remain in a secure and compliant state at all times.

    Learn more about NNT's System Hardening: https://www.newnettechnologies.com/device-hardening.html
  • SecureOps™ - A Critical Missing Piece to an Effective Security Strategy Recorded: Mar 1 2019 2 mins
    Mark Kedgley
    SecureOps™ combines established best practices for security and IT service management to deliver a holistic and comprehensive solution that identifies and highlights unknown, unwanted and potentially malicious events in real-time…without all the NOISE and headaches of endless alerts.

    SecureOps focuses on three key areas to deliver an effective security strategy: Security, IT Service Management (ITSM), and Compliance.

    Security - Focuses on the establishment of policy to detect changes from a known baseline or trusted state by utilizing NNT’s best practices and library of policies. These policies are derived from trusted third-parties like the Center for Internet Security (CIS) top 20 controls that prioritize a set of actions that mitigate an organizations risk from known cyber-attack vectors.

    ITSM - Focuses on creating a closed-loop environment specific to “expected” changes. Any identified changes that are not planned or map to an authorized work order are suspect to investigation and/or remediation.

    Compliance - The by-product of leveraging these two approaches together is that you are able to deliver continuous compliance & assurance on a daily basis...whatever the standard, regulation or policy.

    Learn more about NNT's unique SecureOps strategy: https://www.newnettechnologies.com/secureops.html
  • NNT Vulnerability Tracker™ - Re-Innovating the Vulnerability Scanning Market Recorded: Feb 13 2019 46 mins
    Mark Kerrison and Mark Kedgley
    Through a major collaboration with Greenbone Networks, NNT has advanced their security through system integrity strategy with distributed, fast and accurate Enterprise-Class vulnerability scanning.

    NNT Vulnerability Tracker is based on the commercial-grade version of OpenVAS, the world’s most widely adopted vulnerability assessment tool. This forms a significant progression of NNT’s SecureOps Enterprise Security Strategy and complements NNT’s award-winning Change Tracker Gen7R2 to further efforts in solving IT Security through the definition and delivery of Integrity.

    NNT’s Vulnerability Tracker™ identifies known vulnerabilities within software and configuration settings before they can be exploited by a cyber-attack. Vulnerability Tracker continuously tests and assesses your IT network and any device connected to it against more than 66k Network Vulnerability Tests (NVTs) with new vulnerabilities are added daily.

    Join Mark Kerrison, Chief Executive Officer of New Net Technologies and Mark Kedgley, Chief Technology Officer of New Net Technologies, in an interactive webinar as they showcase the all-new Vulnerability Tracker. Key topics and highlights will include:

    • Understanding how vulnerability management aligns with the basic underlying principles required for every security strategy
    • Where and how vulnerability management corresponds with the CIS Top 20 Controls
    • Architectural, features, functionality and competitive differentiators
    • Familiarity with our hyper-fast scanning technology allowing you can assess over 50,000 endpoints per 24 hours

    With Vulnerability Tracker, you will be able to identify and reduce the attack surface giving you better control and assurance that your infrastructure is operating with the least amount of risk.

    Register now to learn more about Vulnerability Tracker’s unique ability to deliver a comprehensive security solution that aligns with your security strategy to mitigate your overall security risk.
  • NNT Unveils the Future of Intelligent System Integrity Monitoring: Gen7R2 Recorded: Nov 8 2018 53 mins
    Mark Kerrison and Mark Kedgley
    NNT’s newly released Change Tracker Gen7R2 solves IT Security and the problems that plague all organizations – the overwhelming noise of change control and ensuring the integrity of IT systems.

    Completely redesigned with both security and IT operations in mind, Change Tracker Gen7R2 is the only solution designed to reduce chance noise and the complexity of integrity monitoring and policy management all while allowing for unprecedented scalability and management that meets the most demanding enterprise environments.

    Join Mark Kerrison, Chief Executive Officer of New Net Technologies and Mark Kedgley, Chief Technology Officer of New Net Technologies, in an interactive webinar as they showcase the all-new Change Tracker Gen7R2 Key highlights:

    • Embracing the SecureOps strategy: merging basic fundamentals of security and operations to deliver one unified solution
    • Automating the IT service management (ITSM) workflow to enable Closed-Loop Intelligent Change Control
    • Utilizing pattern matching intelligence to identify expected, planned changes against changes that could represent a security breach
    • Adopting the basic underlying principle required for every security strategy- Security through System Integrity
    • Achieve real-time continuous compliance regardless of the standard or policy

    With Gen7R2’s integration and automation with ITSM platforms such as ServiceNow®, change noise is reduced by more than 90%, leaving only changes that are unknown unwanted, unexpected, or malicious in nature.

    Register now to learn more about NNT’s newly released Change Tracker Gen7R2 and how comprehensive and effective our SecureOps strategy can be to achieving operational excellence.
  • What's New in Change Tracker Gen7R2 Recorded: Oct 24 2018 5 mins
    Mark Kedgley
    Change Tracker Gen7 has been completely re-designed and improved to more effectively deliver automated, key foundational security controls, encompassing System Integrity Monitoring, Vulnerability Management, Malware Protection and Change Control.

    Change Tracker Gen7R2 delivers a breath-taking range of new innovations to target and solve key cybersecurity issues. Best of all, Gen7R2 elevates system integrity monitoring to new levels of forensic visibility and change control, but also solves the issue of alert fatigue that previously blunted the power of traditional file integrity monitoring systems.

    Our latest self-learning breach detection technology utilizes pattern matching intelligence to identify expected, planned changes, against changes that could represent a breach. Gen7R2 leverages contextual change control underpinned by the world’s largest authoritative file whitelist, enabling organizations to spot breach activity in real-time and act before any serious damage is done.

    Click here to learn more about Change Tracker Gen7R2: https://www.newnettechnologies.com/change-tracker-gen-7.html
  • SecureOps:Driving Unprecedented Security & Operational Results Recorded: Oct 11 2018 53 mins
    Tony Sager and Mark Kedgley
    The security industry as we know it is broken and the problem is getting worse. We now must look at security through a different set of spectacles. Ones that allow us to manage more by fact and not fiction. Simply put…there are no silver bullets to solve this problem! We have to stop following bright shiny objects and get back to “Basics”.

    This webinar is the first in a series delivered by the Center for Internet Security (CIS) and NNT intended to help educate and articulate how security and operations need to leverage one another to achieve common IT goals. The content of this webinar will provide very specific data points about a SecureOps strategy and the benefits from such an approach. More importantly, it will articulate a framework that prioritizes IT controls that begin to move from descriptive to one that is prescriptive and is prioritized based on risk mitigation and overall defensible effectiveness.

    Join Tony Sager, Senior Vice President and Chief Evangelist for the CIS and Founder of the Secure Controls Framework and Mark Kedgley, Chief Technology Officer and Co-Founder of New Net Technologies in an interactive webinar where we will:

    • Provide the data point(s) that support why SecureOps effort is necessary and long overdue – Manage by Fact Not Fiction
    • Understand what are the common denominators between security and operations - Where 1+1=3
    • Articulate how the CIS “basic” controls are essentially operational controls – The Common Denominators
    • Discuss how the CIS and NNT can help an organization prioritize efforts where 20% of the effort delivers 80% of the value – The Cliffs Notes

    Register now and get a free copy of the new SANS Security Leadership Poster and a fully-functional extended trial of NNT Change Tracker Gen7 to see how easily you can embrace SecureOps in your environment.
  • Detect Unplanned Changes & Create Security Incidents in ServiceNow® with Gen7 Recorded: Sep 20 2018 4 mins
    NNT
    For the first time ever, ServiceNow customers are able to reconcile changes that occur with the IT environment with the actual changes approved in ServiceNow.

    NNT has integrated its award-winning Change Tracker Gen7™ with ServiceNow's service management tool to enable a closed-loop environment for change management. This integration provides zero tolerance to changes –leaving no place to hide for unwanted changes or breach activity. To further help reduce change noise, NNT Change Tracker leverages the worlds largest whitelisting service to automatically analyze changes in real-time using NNT's File Assured Safe Technology (FAST).

    See how NNT Change Tracker Gen 7 ™ delivers "closed loop" SecureOps, reconciling all actual changes made with ServiceNow® change requests.
  • Compliance...Implement and Operate the Right Security Controls Recorded: Aug 22 2018 55 mins
    Tom Cornelius and Mark Kedgley
    Most organizations today run a ‘Build-a-Bear’ approach to Cyber Security, with products and practices they piece together.

    If you aren’t already subject to one or more specific GRC mandates, inevitably, one will soon be dropped on you. Regardless of the regulation, you will need to provide structured evidence proving you operate in compliance with a fit-for-purpose set of controls.

    Just in the last 12 months, GDPR and NIST 800-171 have been made mandatory. This, coupled with the stats telling us that security breaches are increasing despite year on year increases in security investment, tells us that the need to understand and implement security controls is inevitable.

    What is the most strategic, long-term and resource-effective way to reconcile increased demands for compliance and security? How do you bring together the aligned but segregated needs for ITSM and Security? How do you elevate traditional change management to the state of the art of change control, providing security-grade change visibility but without compromising your organizations’ IT agility?

    Join Tom Cornelius, Senior Partner at Compliance Forge and Founder of the Secure Controls Framework, and Mark Kedgley, Chief Technology Officer and Co-Founder of New Net Technologies in an interactive webinar where we will

    •Work out how to streamline and bring together overlapping or conflicting requirements for controls
    •Simplify the need for multiple compliance and privacy mandates
    •Examine what gives us the right mix of technology and automation to deliver the new hybrid SecureOps way for operating ITSM and security

    Get a free copy of the integrated Secure Controls Framework playbook and a fully-functional extended trial of NNT Change Tracker to see how easily you can embrace SecureOps in your environment.
Security through System Integrity
NNT is the leading provider of Security through System Integrity focused on helping organizations reduce their security risk, increase service availability and achieving continuous compliance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Increase Protection Against Cyber Attacks with System Hardening
  • Live at: Apr 1 2019 2:45 pm
  • Presented by: Mark Kedgley
  • From:
Your email has been sent.
or close