July 2014 – Overcoming Configuration Management Challenges
By Isaac Salles on July 10, 2014
Date |
Venue |
Presentations |
|
– |
Check back after this event. |
Details: |
Date |
POSTPONED |
Event Start Time – End Time |
N/A |
Overall Event Title |
Overcoming Configuration Management Challenges |
Event abstract |
Configuration Management facilitates the availability, reliability, and security of an organization’s systems by establishing minimum baseline standards for server builds, developing systems based on those standards, and ensuring the integrity of those systems throughout their life-cycle.Where deviations from approved standards occur, they should be captured by auditing or monitoring processes and reported to management, and if necessary reconciled to ensure the security of affected systems.In this session, various presenters will cover the key elements of configuration management, and how to overcome common challenges |
Venue |
Guardian Life Insurance, 7 Hanover Square, New York, NY 10005
|
Dress Code |
Business casual |
Event kickoff opening remarks |
2:00 – 2:10 |
Speaker |
NY ISSA Board Member |
Session description |
Welcome attendees |
|
|
Session Title |
Building Minimum Baseline Standards |
Start Time – End Time |
2:10 – 2:55 |
Session Description |
Minimum Baseline Standards (MBS) are developed by organizations as a matter of due diligence and industry regulation. The standards are developed to reflect your business, best practices and to comply, where possible, with industry guidelines.However, the task of coordinating resources and obtaining “buy-in” in the development of these standards can be daunting. This discussion will offer some methods to overcome these challenges. |
Speakers |
TBD |
Bio(s) |
TBD |
|
|
Session Title |
Deploying Security Configurations |
Start Time – End Time |
2:55 – 3:30 |
Session Description |
Once a configuration standard is identified and constructed, an organization must develop a procedure to quickly and seamlessly implement a new, or newly updated, standard. This must be done without disrupting the course of normal business and without damaging the organization’s technical infrastructure.A deployment plan allows organizations to maintain secure configurations and assists in identifying security vulnerabilities, which often occur as deviations from the plan.This discussion will focus on the phased implementation of minimum baseline standards throughout an enterprise. |
Speakers |
TBD
|
Bio(s) |
TBD
|
Networking Break |
3:30 pm – 3:50 |
Session Title |
Monitoring and Maintaining Compliance |
Start Time – End Time |
3:50 – 4:30 PM |
Session Description |
Once deployed, a configuration standard should be monitored or periodically audited for any deviations from the standard. Data from systems should be aggregated and analyzed in order to identify any systems which may deviate from the standard configuration.Mechanisms for monitoring range from automated tools to manual review. Once identified, deviations from the standard should be documented and cause of the deviation should be addressed in the deployment plan. |
Speakers |
TBD
|
Bio(s) |
TBD |
|
|
Who should attend (customize to each session content) |
Who should attend this session:ISSA Members, ISACA Members and FS/ISAC Members (and other ISAC’s)This program has been created for information security practitioners,
but may also be of interest to the following:Auditors who intend to evaluate configuration management within an enterprise.Security practitioners and system admins seeking to accomplish or implement Configuration Management objectives.Security Management & Executives – With a goal of understanding industry practices trends, and seeking perspective on implementing technical assessment activities in the context of a broader application security program. |
Sponsored by: |
Guardian Life Insurance |
|
Posted in Event Calendar