trojin said: No mater what you have to start from inventorying all devices, subnets, networks, etc
JDMurray said:...Many orgs don't have a single, complete database of their assets...
trojin said:Single database...I would be happy to see this in my place
JDMurray said: trojin said:Single database...I would be happy to see this in my place An asset tracking "database" implemented as multiple Excel spreadsheets maintained by different people distributed across the Enterprise is much more the norm.
egrizzly said:It auto-discovers assets plugged into your corporate network versus manually keying things into Excel.
JDMurray said: However, Excel is on your computer right now and asset inventory is a famously underestimated task in many businesses. Therefore, Excel is always what is tried first as the quickest and cheapest inventory tracking "solution."
However, Excel is on your computer right now and asset inventory is a famously underestimated task in many businesses. Therefore, Excel is always what is tried first as the quickest and cheapest inventory tracking "solution."
trojin said: wow, doing asset inventory after securing perimeter, backup and few steps - looks quite brave for meI know it's my personal experience and personal point of view, but asset inventory should start as first task and have to run all the time. Instead you never will know did you secure already all your endpoints, public IPs, networks, appliances, etc
SteveLavoie said: Implementing security for SMB is my bread and butter. Usually, I am doing a security assesment based on a light security control (I am using Canada's CyberSecure control, it is geared toward SMB). Then based on that, I focused on the most essential and try to get them a few quick win that does not cost too much money. Implementing a good password policy is not very expensive usually.So: security assesment to have an assessment and get them to realize how much they are insecure.then in relative order: password policybackupemail security / user education toward phishingperimeter security / remote access (vpn)endpoint update and antivirusasset inventorySure there a lot of more to security than that, but most SMB are totally deficient in most or all of those. If you can implement those recomendation, then you can continue your security journey.
JDMurray said: This is a very broad topic. Usually the motivation is to increase revenue (e.g., ISO 9001 for selling to the EU), or compliance to obtain a contract (e.g. FISMA and FedRAMP), or to remediate problems cause by a change in their size or business interests or have gone public (e.g., SOX, PCI-DSS, HIPAA), or they've realized they might/are being cyber-targeted and want to stay off the front page of the WSJ for negative publicity reasons (e.g., security frameworks, IT audits). This all has been happening for decades now and is only getting more intense with the (seemingly) sudden proliferation of ransomware.
JDMurray said: Are the loans to implement the plans or for something else?
egrizzly said: heh, btw, since you said implementing security for SMB is your bread and butter let me ask the question - What was the craziest network that you've organized from its bad condition to a strong cyber security posture. Can you share the roadmap you used for that network?
SteveLavoie said:One of the worst network was not using any perimeter security (in 2014!)...
SteveLavoie said: One of the worst network was not using any perimeter security (in 2014!)... All public server were connected to a switch where the ISP was plugged too.. ......
UnixGuy said: SteveLavoie said: One of the worst network was not using any perimeter security (in 2014!)... All public server were connected to a switch where the ISP was plugged too.. ...... Oh wait for some vendors to try and market as "zero trust" network LOL. Just remove everything and put their product that'll solve everything, join their webinar, get a free t-shirt that doesn't fit and sign up for their mailing list