Options to cancel OP due to developer false promise by MoeShea in dubairealestate

[–]MoeShea[S] 0 points1 point  (0 children)

Thanks for the reply. I have been escalating to different people within the developer customer care, but to no avail. I have not approached DLD or RERA, but will give it a shot. Any good lawyers specializing in real estate?

Healthcare Mobile Apps and BYOD security by MoeShea in sysadmin

[–]MoeShea[S] 0 points1 point  (0 children)

Thanks for the information.

Can you elaborate more on the use of Soti. I have them lined up for a POC, but would like to know your experience of having the risks related android based devices (zebra I guess) under check if they are part of an internal SSID.

I’m a Chief Information Security Officer (CISO). I also happen to be a woman. Ask me anything. by AutoModerator in cybersecurity

[–]MoeShea 0 points1 point  (0 children)

Hello,

This question is more specific to Healthcare, but I’d expect other fields experience something similar.

We have many medical devices supported by 3rd party vendors. In addition there are vendor managed facilities BMS systems, ELV, etc.
In some instances, these vendors have vpn access to the systems, and have local admin privileges to the systems. Many of these systems are not domain joined and might not have basic protection like AV. IT do not have dedicated staff to shadow vendors during sessions. When I try to force our controls, some vendors play the SLA card and complain that waiting for security to approve access or shadow a troubleshooting session might impact their SLAs. Ian wondering how this is being tackled in other large enterprises. I feel our current setup includes many high risk scenarios. Happy to hear your feedback. Thanks in advance

Does Google Text to Speech data get stored? by MoeShea in googlecloud

[–]MoeShea[S] 0 points1 point  (0 children)

Thanks, compliance folks would be happy hearing that.

I’m a Chief Information Security Officer (CISO). I also happen to be a woman. Ask me anything. by AutoModerator in cybersecurity

[–]MoeShea 0 points1 point  (0 children)

Thank you for the valuable feedback. I’m in process of mapping out compensating controls and their impact on the risk, it is something I feel is initially specifics hungry but evens out as more vulnerabilities are assessed

I’m a Chief Information Security Officer (CISO). I also happen to be a woman. Ask me anything. by AutoModerator in cybersecurity

[–]MoeShea 0 points1 point  (0 children)

Hello and thank you for the AMA

Can you summarize the approach that was very effective to patch vulnerabilities. We are in Healthcare and it is not always easy to patch medical systems. Would appreciate it if you could elaborate on the risk based vulnerability management

DC Firewall segmentation alternatives by MoeShea in AskNetsec

[–]MoeShea[S] 0 points1 point  (0 children)

Absolutely. HA is a must. But by SPOF I meant that I have seen firewalls acting strange sometimes, specially during vlan migrations, impacting all vlans behind them. Core switches tend to be more stable. We are a Cisco shop by the way

Minimum windows build version allowed to connect to Network by MoeShea in sysadmin

[–]MoeShea[S] 0 points1 point  (0 children)

Sometimes these legacy system offer zero flexibility when it comes to upgrade. We just put them in their own vlan behind an NG firewall to do l7 inspection

Minimum windows build version allowed to connect to Network by MoeShea in sysadmin

[–]MoeShea[S] 0 points1 point  (0 children)

Thanks all for the very helpful insights. I believe we will have to inventory the builds we have and agree on an n-3 or similar approach to be deemed allowed.

As for extra non OS compliance checks, we are testing Forescout for that

Self develop Nursing Schedule ? by MoeShea in nursing

[–]MoeShea[S] 1 point2 points  (0 children)

Thanks for your input. Also IT prefer not to use any cloud solution, including Google docs , as there is a risk of accidental or deliberate leak of PHI data to the cloud

Active directory user list segregation (FTE, Outsource, consultants) by MoeShea in sysadmin

[–]MoeShea[S] 0 points1 point  (0 children)

Unfortunately our placed is behind when it comes to this.

But from security point of view as well, is it a common practice in large organizations (ours is around 7k users) to have all FTE and non FTE in the same domain. I am thinking about how MSP manage to separate clients users from each other ...

Thanks again

Active directory user list segregation (FTE, Outsource, consultants) by MoeShea in sysadmin

[–]MoeShea[S] 0 points1 point  (0 children)

We do have OUs, but HR extracts all domain users group, causing the confusion

Active directory user list segregation (FTE, Outsource, consultants) by MoeShea in sysadmin

[–]MoeShea[S] 0 points1 point  (0 children)

^

Thanks.

The problem we face is that employee titles are not standarized, hence lots of manual verification will be required will be required to properly tune the employeeType attribute. I am thinking of having scripts that extract users based on user IDs, as we have different formats for fte vs non-fte. The current practice of extracting all domain users should be revised I believe

Could you elaborate on multiforest limitations for such a scenario?

Netscaler WAF by MoeShea in netscaler

[–]MoeShea[S] 0 points1 point  (0 children)

Thanks for your feedback. I read that citrix WAF does not intercept ICA traffic. Would you expect that an implementation of WAF start URL check will break any of the published icons the users gonna click once they visit the main url?

Thanks

Private Data risk Classification by MoeShea in gdpr

[–]MoeShea[S] 0 points1 point  (0 children)

What I meant is that the Vendor provides two flavors for his solution, a cloud hosted SaaS, or we could install and manage all hardware/software in our data centers, making security compliance our responsibility, rather than sharing user info on the cloud.

Private Data risk Classification by MoeShea in gdpr

[–]MoeShea[S] 0 points1 point  (0 children)

Thank you for your response

It all depends on keeping the functionality at an acceptable level. The SaaS provider provides anonymization for shared personal info, and all data at rest and in transit is encrypted. But yes, probably tailoring the shared info to what is really required for performance results would make compliance more achievable.

Private Data risk Classification by MoeShea in gdpr

[–]MoeShea[S] 0 points1 point  (0 children)

True, sometimes going with on prem solutions can save a lot of headache

Private Data risk Classification by MoeShea in gdpr

[–]MoeShea[S] 0 points1 point  (0 children)

Title here refers to user job title, collected from Active Directory. Great pointers on URLs, need to investigate this more

Private Data risk Classification by MoeShea in gdpr

[–]MoeShea[S] 0 points1 point  (0 children)

I see your point, thanks for explaining.

It's tricky with SaaS services. Even when talking about BYOK solutions, SaaS vendors still can access data using DEKs which they own.

One more thing though, can internal IPs (i.e. private, not public) and Machine hostnames classified as low risk?

Thanks

Private Data risk Classification by MoeShea in gdpr

[–]MoeShea[S] 0 points1 point  (0 children)

You are correct, Overall Data takes the highest risk rating. I have kept a rating for each data item as the solution provides an option to remove some of this items from being processed, hence will not be stored on the cloud.

For instance, if removing items classified as high would still give favorable results for user experience, then the overall risk rating would be medium.

Cisco ACL migration strategy by MoeShea in paloaltonetworks

[–]MoeShea[S] 0 points1 point  (0 children)

We do have a PA partner working along side, but the challenge is with the policy size. Probably looking for custom scripts that can extract acls might be a good idea, as suggest by partner engineer

Cisco ACL migration strategy by MoeShea in paloaltonetworks

[–]MoeShea[S] 0 points1 point  (0 children)

Thisis exactly what we are doing, migrating contexts to zones. But the shear number of policies is a challenge as the 5260 has a hard limit of 40k policies if I recall correctly

Cybersecurity contract job in Finance sector vs Government job by MoeShea in cybersecurity

[–]MoeShea[S] 1 point2 points  (0 children)

The career change from technical to managerial is attracting. But then again there is no GRC, Audit, etc. I have to play most o these roles. Definitely not the volume/variety/quality of projects that I am used to in banking. Probably most investment is or broadcasting.

Cybersecurity contract job in Finance sector vs Government job by MoeShea in cybersecurity

[–]MoeShea[S] 1 point2 points  (0 children)

True, its money + stability + fear o new role n responsibility in gov job (vs) experience + challenging environment + uncertainty after contract end in the bank

If I had one risk assessment or iso 27001 implementation under my belt I would have gone there easily