Solving IT Audit With Policy Compliance Control Automation
Josh Hankins, Lead Security Analyst, Fifth Third Processing Solutions
- A Path to Compliance Automation (00:00:00)
- My Background (00:00:19)
- About Fifth Third Processing Solutions, LLC (00:00:54)
- Agenda (00:01:39)
- Migration Blueprint (00:01:54)
- Where to Begin the Migration Process? (00:02:10)
- Fostering Buy-In From from IT Owners (00:02:55)
- Chapter Title (00:03:35)
- Chapter Title (00:05:10)
- Chapter Title (00:06:13)
- Example: Windows Policy Compliance Report (00:07:10)
- Chapter Title (00:07:33)
- Chapter Title (00:07:48)
- Example: Unix Policy Control (00:07:53)
- End Results (00:08:27)
- Policy Compliance Process Flow (00:09:40)
- Lessons Learned (00:10:37)
- Chapter Title (00:12:01)
- Keys to my Success (00:12:53)
- Bonus Features of the Qualys PC module (00:13:31)
- Summary (00:15:07)
- Audit Preperation Checklist (00:16:22)
- Chapter Title (00:17:07)
- Chapter Title (00:18:35)
- Helpful Tips (00:19:10)
- Audits Passed (00:20:10)