RiskRecon Overview June 10, 2020 Transforming How Texas Government - - PowerPoint PPT Presentation

riskrecon overview
SMART_READER_LITE
LIVE PREVIEW

RiskRecon Overview June 10, 2020 Transforming How Texas Government - - PowerPoint PPT Presentation

RiskRecon Overview June 10, 2020 Transforming How Texas Government Serves Texans Introductions Matt Kelly, Texas Department of Information Resources Dave Manning, RiskRecon Raine Drosdick, RSA Professional Services Transforming How


slide-1
SLIDE 1

Transforming How Texas Government Serves Texans

RiskRecon Overview

June 10, 2020

slide-2
SLIDE 2

Transforming How Texas Government Serves Texans

Introductions

  • Matt Kelly, Texas Department of Information Resources
  • Dave Manning, RiskRecon
  • Raine Drosdick, RSA Professional Services
slide-3
SLIDE 3

RiskRecon Onboarding Overview

Dave Manning Customer Success Advisor

3

slide-4
SLIDE 4

Some questions you may want answers to

4

slide-5
SLIDE 5

Some Questions

  • What is my risk exposure today?
  • Is my risk exposure getting better or worse?
  • Do I encrypt sensitive data in transit?
  • Do I manage software vulnerabilities well?

5

slide-6
SLIDE 6

Where are the answers?

6

slide-7
SLIDE 7

7

slide-8
SLIDE 8

What kind of data do you need to understand risk?

8

slide-9
SLIDE 9

Asset value is critical to determining risk

Strictly RiskRecon Confidential – Shared with under NDA 9

1 system is sensitive email gateway 1 system is marketing brochure site

VS

Same issue, but risks are very different Example: 2 systems with same critical unpatched software issue:

slide-10
SLIDE 10

RiskRecon builds risk profiles by analyzing each third-party’s publicly-accessible Internet surface

Strictly RiskRecon Confidential – Shared with under NDA 10

Input Only Vendor Name and URL

slide-11
SLIDE 11

11

slide-12
SLIDE 12

Transforming How Texas Government Serves Texans

State Implementation

Matt Kelly

slide-13
SLIDE 13

Transforming How Texas Government Serves Texans

RiskRecon Overview

  • Provides security metrics on public-facing assets across 10 security domains.
  • Identifies vulnerabilities and recommends remediation responses.
  • Integration with Archer IT Security Vulnerability Management use case.
  • Issues Management
  • Vulnerability Ticketing
  • Licensed for 300 companies
  • Limiting RiskRecon accounts to ISO
  • Including common vendors in monitoring
  • Vendor suggestion form:

https://www.surveygizmo.com/s3/5620263/RiskRecon-Vendor- Suggestions

slide-14
SLIDE 14

Transforming How Texas Government Serves Texans

State Implementation

  • Mapped identified assets to organization profiles via MS-ISAC VMP program scan

results, existing RiskRecon state of Texas domains/hosts, DIR Registrar records, etc.

  • Profiles can be tuned – add/remove domains and hosts. Send requests to

support@riskrecon.com

  • Starting with designated ISO – additional users and user administration on

RiskRecon side handled by support@riskrecon.com

  • Moving to production in SPECTRIM – new workspace (IT Security Vulnerability

Management) will be available for Information Security Group members.

  • General users will have visibility into only assigned tickets.
  • Scan results are for the benefit of your organization, DIR is not incorporating scan

results into maturity scores, security plans, etc.

slide-15
SLIDE 15

Transforming How Texas Government Serves Texans

RiskRecon Does…

  • Deep mining of domain registration databases
  • Deep mining of network registration databases
  • Analysis of Internet DNS IP to hostname resolution logs
  • DNS queries
  • Lightly browse web sites, obeying robots.txt instructions
  • Analytics of publicly accessible code, content, configurations
  • Monitoring and analysis of commercial and open-source IP reputation feeds
  • Mining the internet for relevant information such as indicators of data loss events
  • Analyze Internet port scan data sourced from a commercial provider
slide-16
SLIDE 16

Transforming How Texas Government Serves Texans

RiskRecon Does Not…

  • Tamper with parameters
  • Inject code
  • Conduct cross-site scripting
  • Conduct SQL injection
  • Attempt to bypass authentication
  • Execute memory overflow tests
  • Fill out form fields
  • Guess credentials
  • Execute vulnerability exploits
  • Attempt to bypass security controls
slide-17
SLIDE 17

Transforming How Texas Government Serves Texans

Account Confirmation Email

slide-18
SLIDE 18

Transforming How Texas Government Serves Texans

SPECTRIM Integration

Raine Drosdick

slide-19
SLIDE 19

Transforming How Texas Government Serves Texans

SPECTRIM Workflow

Scan Results Vulnerability Tickets Issues Management

Remediate Accept Risk

slide-20
SLIDE 20

Transforming How Texas Government Serves Texans

Own Enterprise Monitoring

slide-21
SLIDE 21

Transforming How Texas Government Serves Texans

Vulnerability Scan Results

slide-22
SLIDE 22

Transforming How Texas Government Serves Texans

Vulnerability Tickets

slide-23
SLIDE 23

Transforming How Texas Government Serves Texans

Questions

GRC@dir.texas.gov

slide-24
SLIDE 24

Transforming How Texas Government Serves Texans

Thank You

dir.texas.gov #DIRisIT @TexasDIR