Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

CI Matching for Vulnerability Response - How to get it right.

Автор: ServiceNow Community

Загружено: 2020-03-03

Просмотров: 12250

Описание:

The matching of your CMDB's Configuration Items (CIs) to the list of hosts and vulnerabilities brought in by your scanner is key to the success of your Vulnerability Response (VR) implementation. Learn how this works and how to do it right in 20 minutes.

In this second episode of the 2020 VR series, Andy Ojha, Principal Security Consultant with the Professional Services organization at ServiceNow shares his knowledge and advice so you can be successful.

Ensuring that the early steps of CI Matching are executed as needed will ensure an optimum use of the CMDB and guarantee time savings and effectiveness down the line. Getting it wrong will create unnecessary challenges.

This tutorial follows the earlier episode of the VR series: "The importance of your CMDB for Vulnerability Response." https://community.servicenow.com/comm...

-----------------------------
Video contents

00:01 Introductions.
01:20 The VR maturity model.
01:37 The VR tutorials series.
02:08 The VR forum.
02:28 CI Matching = Scanner + VR application + CMDB.
02:55 CI Matching: how it works. CI Lookup Rule, Discovered Items, Vulnerable Items, Third Party Entries library.
05:56 An example.
04:55 CI Matching is an iterative process, the first run is critical. Matched Discovered Item, Unmatched Discovered Item, Unmatched CI.
06:05 Flavors of Matched Discovered Items: Complete (success), Incomplete (needs more work), Incorrect (needs more work). Unmatched Discovered Items.
07:39 "Walk-up" for low level CIs with no context.Parent.
08:37 Vulnerable Items.
09:00 Lessons learned in the field. Best prevention: get the CMDB and the CMDB team ready.
11:40 Success with VR is about cross-functional leadership, change management and coordination.
12:18 What YOU (Security team) should do: training and community, start small and iterate.
12:30 How to interact with the CMDB team: engage early, understand the CMDB, make sure they understand your VR strategy, ensure they are ready to handle unmatched CIs.
14:31 How to interact with your Partner/Consultant. Iterative approach is key, track results, tune the Lookup Rules, ServiceNow Discovery.
16:51 Involve the remediation teams, the end users of the VR implementation.
17:15 Keep the executives apprised.
17:52 Beyond CI Matching, there is more. Scanners, Vulnerabilities, Exploit Enrichment, Remediation Target Rules, Risk based approach with Scoring, Grouping, Assignment. Watch the upcoming episodes.
19:00 What you should be doing RIGHT NOW: Engage with your partner and your CMDB team, review the other VR tutorials, engage in the VR forum, sign up for training.
19:48 Conclusion and reminders.

For all your questions and to download the PDF version of the slides, please go to the VR forum: https://community.servicenow.com/comm...

CI Matching for Vulnerability Response - How to get it right.

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Success Meetup: Community MVP Steven Bell - Implementing a CMDB [Knowledge 2020 ACT2106]

Success Meetup: Community MVP Steven Bell - Implementing a CMDB [Knowledge 2020 ACT2106]

How to prepare for implementation. Vulnerability Response, Security Incident Response

How to prepare for implementation. Vulnerability Response, Security Incident Response

How To - Vulnerability Response

How To - Vulnerability Response

TechTalk - Build a rock solid digital foundation (CMDB) with ITOM Visibility -Deep Dive

TechTalk - Build a rock solid digital foundation (CMDB) with ITOM Visibility -Deep Dive

CMDB Health Deepdive - Keeping CI's Fresh

CMDB Health Deepdive - Keeping CI's Fresh

The more you know - SecOps and CMDB Interactions

The more you know - SecOps and CMDB Interactions

Введение в кибербезопасность | Обучение кибербезопасности для начинающих | CyberSecurity | Simpli...

Введение в кибербезопасность | Обучение кибербезопасности для начинающих | CyberSecurity | Simpli...

«Мессенджер Max — это МЕНТ в вашем телефоне» | Как безопасно звонить и обходить блокировки в России

«Мессенджер Max — это МЕНТ в вашем телефоне» | Как безопасно звонить и обходить блокировки в России

NOWCommunity Live Stream - Lessons Learned - Flow Designer - Referencing Records

NOWCommunity Live Stream - Lessons Learned - Flow Designer - Referencing Records

Intro to CMDB Query Builder with Reporting - Performance Analytics Academy - Aug 12, 2020

Intro to CMDB Query Builder with Reporting - Performance Analytics Academy - Aug 12, 2020

Как начать работу с реагированием на уязвимости

Как начать работу с реагированием на уязвимости

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

CSDM In A Nutshell

CSDM In A Nutshell

Александра Прокопенко: настроения российских элит, повышение налогов, инфляция, Козак и Дмитриев

Александра Прокопенко: настроения российских элит, повышение налогов, инфляция, Козак и Дмитриев

Краткое описание Agile Product Ownership

Краткое описание Agile Product Ownership

Profiles (Entities) for Governance, Risk and Compliance: why you need them and how to set them up.

Profiles (Entities) for Governance, Risk and Compliance: why you need them and how to set them up.

Breaking Down the Common Service Data Model (CSDM) | GlideFast on Air

Breaking Down the Common Service Data Model (CSDM) | GlideFast on Air

Интервью по проектированию системы Google: Design Spotify (с бывшим менеджером по маркетингу Google)

Интервью по проектированию системы Google: Design Spotify (с бывшим менеджером по маркетингу Google)

как работает модель OSI на YouTube (уровни приложений и транспорта) // БЕСПЛАТНЫЙ CCNA // EP 5

как работает модель OSI на YouTube (уровни приложений и транспорта) // БЕСПЛАТНЫЙ CCNA // EP 5

Risk Management in ServiceNow | Share the ServiceNow Wealth

Risk Management in ServiceNow | Share the ServiceNow Wealth

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]