1-10 of 10 results returned for: indexed terms: Library Archive section, IAS section, Adversary Mitigations section, Presentation
Comply to Connect
Ensuring that devices on a network are not vulnerable is hard to do. Comply to Connect (C2C) simplifies this by enforcing that patches and hardened configuration are applied to devices before they connect and updated continually. Learn about the benefits...
18 November 2016 15 page(s) pdf
Application Whitelisting Best Practices
Cyber defense is not easy. Application Whitelisting is the number one mitigation from the NSA's Information Assurance Top 10, yet many network owners find it a challenge to implement. Learn about some of the common barriers to implementing Application Whitelisting...
18 November 2016 13 page(s) pdf
Application Isolation Containment
Given that writing fully secure code remains an elusive goal, other techniques such as isolating processes to limit the adverse effect of a compromise are promising. This talk will summarize some of the techniques, both integrated into the operating system...
18 November 2016 17 page(s) pdf
Making Mitigations Matter Measuring Host Mitigation State
Mitigations are a significant factor when considering the risks applicable to a network and must be accounted for in order to provide a sense of priority to any additional mitigations that should be applied. This talk will explore means created...
17 November 2016 8 page(s) pdf
Mitigating Insider Threats
External cyber intrusions can be difficult to defend against. Internal intrusions by insiders are even more difficult to defend against. Learn about mitigations that can be effective against insider threats.
18 November 2016 12 page(s) pdf
Eliminating Control Flow Exploitation
Many attacks rely on the ability of an adversary to manipulate the normal, expected flow of the legitimate software executing on a platform. This talk will summarize the mitigations NSA is developing with industry to address this attack vector at...
21 November 2016 33 page(s) pdf
Overcoming Barriers to Adopting Top10 IA Mitigations
While fundamental in nature, implementing the Top 10 Information Assurance Mitigations presents challenges, for a variety of reasons. This brief will explore common challenges and suggest potential strategies to overcome them.
21 November 2016 27 page(s) pdf
Top Ten IA Mitigations
Learn about how NSA’s Top 10 Information Assurance Mitigations obstruct the intrusion lifecycle into networks and have been applied in response to real intrusions in order to mitigate the threat techniques used.
21 November 2016 11 page(s) pdf
Securely Configuring Adobe Acrobat
Adobe Reader is the predominant PDF reader, one that added numerous security features over the last few years. This talk will highlight the security features in the most current version along with our recommended settings.
18 November 2016 19 page(s) pdf
Voice and Video over IP
An overview of Video and Voice Over Internet Protocol (VVOIP) will be presented along with security concerns and NSA's recommendations on how to build a secure VoIP architecture.
21 November 2016 12 page(s) pdf