Top Banner
An Internal Auditor’s Guide to Cybersecurity Part 2: Penetration Testing
19

An Internal Auditor’s Guide to Cybersecurity

May 15, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: An Internal Auditor’s Guide to Cybersecurity

An Internal Auditor’s Guide to Cybersecurity Part 2: Penetration Testing

Page 2: An Internal Auditor’s Guide to Cybersecurity

Emily Swindle Senior Consultant Risk Advisory

Donel Martinez Director Risk Advisory

Jeremy Archer Managing Director Cyber Defense

Skylar Slotter Senior Manager Cyber Defense

Page 3: An Internal Auditor’s Guide to Cybersecurity
Page 4: An Internal Auditor’s Guide to Cybersecurity

Vulnerability Management vs. Vulnerability Assessment

Page 5: An Internal Auditor’s Guide to Cybersecurity

Elements of Vulnerability Management

Page 6: An Internal Auditor’s Guide to Cybersecurity

6

Team Involvement

Blue Team Purple Team Red Team

The defense team. This team may include SOC personnel, incident response teams, analysts, and security engineers.

Created when the red team and the blue team work together to test an organization’s defenses

and identify opportunities for improvement.

A dedicated attack team who emulates enemy

tactics to achieve objectives outlined by an

organization’s leaders.

Page 7: An Internal Auditor’s Guide to Cybersecurity

What value do vulnerability assessments provide to an organization?

Page 8: An Internal Auditor’s Guide to Cybersecurity

How do red and blue teams intersect with internal audit?

Page 9: An Internal Auditor’s Guide to Cybersecurity

Anti-virus Deployment Use Cases

Anti-virus Configuration Example

Anti-virus Tool

Threat Modeling Series of Increasingly Difficult Tests

Page 10: An Internal Auditor’s Guide to Cybersecurity

Wireless Example

Page 11: An Internal Auditor’s Guide to Cybersecurity

How can internal audit help strengthen the security perimeter?

Page 12: An Internal Auditor’s Guide to Cybersecurity

12

What are best practices for vulnerability scanning?

Page 13: An Internal Auditor’s Guide to Cybersecurity

What is the difference between a pen test and a vulnerability

assessment?

Page 14: An Internal Auditor’s Guide to Cybersecurity

People TechnologyProcesses

Penetration Testing Focus Areas

Page 15: An Internal Auditor’s Guide to Cybersecurity

Why would an auditor look at a pen testing report?

Page 16: An Internal Auditor’s Guide to Cybersecurity

Report Excerpt

Page 17: An Internal Auditor’s Guide to Cybersecurity

Severity vs. Risk

Page 18: An Internal Auditor’s Guide to Cybersecurity

Questions?

Focal Point Data Risk

@[email protected]

focal-point.com

Page 19: An Internal Auditor’s Guide to Cybersecurity

Gary McIntyre Managing Director Cyber Defense

Episode 3: Internal Audit & the SOC

August 12, 2020 | 1 PM ET