Solving IT Audit With Policy Compliance Control Automation

Josh Hankins, Lead Security Analyst, Fifth Third Processing Solutions

  • A Path to Compliance Automation (00:00:00)
  • My Background (00:00:19)
  • About Fifth Third Processing Solutions, LLC (00:00:54)
  • Agenda (00:01:39)
  • Migration Blueprint (00:01:54)
  • Where to Begin the Migration Process? (00:02:10)
  • Fostering Buy-In From from IT Owners (00:02:55)
  • Chapter Title (00:03:35)
  • Chapter Title (00:05:10)
  • Chapter Title (00:06:13)
  • Example: Windows Policy Compliance Report (00:07:10)
  • Chapter Title (00:07:33)
  • Chapter Title (00:07:48)
  • Example: Unix Policy Control (00:07:53)
  • End Results (00:08:27)
  • Policy Compliance Process Flow (00:09:40)
  • Lessons Learned (00:10:37)
  • Chapter Title (00:12:01)
  • Keys to my Success (00:12:53)
  • Bonus Features of the Qualys PC module (00:13:31)
  • Summary (00:15:07)
  • Audit Preperation Checklist (00:16:22)
  • Chapter Title (00:17:07)
  • Chapter Title (00:18:35)
  • Helpful Tips (00:19:10)
  • Audits Passed (00:20:10)
A Path to Compliance Automation