Configuration hardening is vital for improving the security of IT infrastructure. As there are a number of various standards and benchmarks related to this topic, implementing the hardening plan does not seem to be a tough task. The practice shows something different - some recommendations may be unacceptable due to their negative impact on system usability, compatibility or effort related to IT infrastructure management. Risk assessment may be helpful in selecting the critical requirements for system hardening and omitting the ones which are not so important and may have an overall negative impact on the system. Risk assessment results may also justify using the substitutional safeguards instead of system hardening.
Main points covered:
IT hardening based on best practices
Building the hardening plan relevant to real needs - examples
Finding the requirements and contraindications during risk assessment process
IT hardening as a part of risk management
Presenter:
This webinar was presented by Adam Galach. Mr. Galach is an expert in the area of IT security, ISMS and risk management, having more than 20 years of professional experience. He has participated in and managed a number of projects delivered to the organization coming from various industries, including automotive, chemical and petrochemical, telecommunication, energy, banking and insurance etc.