DATE: 11/1/2006
LIVE EVENT: Lockdown: Securing Today's Enterprise Data
LOCATION: New York, The Westin Times Square
More Information
DATE: October 17, 2006
LIVE EVENT: ATCA, AMC & MicroTCA: Next Steps
LOCATION: The Boston Park Plaza Hotel, Boston
Register Now
Home > Webinars

Please register below to view the archive of this webinar.

How to Reduce the Cost & Complexity of Patch Management

Sponsors: PatchLink

Host: Tim Wilson, Dark Reading, and Gabriel Selmi, Network Administrator, Advanced Behavioral Health

Original Webinar Date: Thursday, June 22, 2006

Original Webinar Time: 2:00 p.m. New York / 7:00 p.m. London

Overview: Network security is becoming more complicated and expensive as the number of threats and vulnerabilities to networks increases year after year. The endless stream of software patches that help ensure network security can overwhelm the resources of an IT department with testing and implementation.

Attend this Webcast and learn how Advanced Behavior Health (ABH), a healthcare company requiring 24/7 uptime with multiple locations and internal and external end points, met the challenge to develop a patch management process to secure its network and protect client data.

Join Gabriel Selmi, Network Administrator for Advanced Behavioral Health, as he shares the challenges, approach, benefits, and lessons learned in developing a security patch and vulnerability management process for ABH. Hear how to:

- Minimize IT resources through an automated patch management process

- Accurately assess and continuously monitor the health of a network

- Easily demonstrate patch compliance-based internal and external policies and regulations

- Lessons learned in developing an effective patch management process

Archive Registration

Webinar: How to Reduce the Cost & Complexity of Patch Management

To view the archive for this Webinar, please complete the form below. Take care to provide all required information (indicated in red). Press Register to access this Webinar Archive to complete your registration. If you have already registered for our site or for one of our webinars, you may login to register without re-entering your information.

Registering to view the archive of this Webinar entails your agreement to the Webinar Agreement displayed at the bottom of this form.

Email
Username - (Choose carefully, your username cannot be changed!)
First Name
Last Name
Title
Company
Address
City
State / Province
Zip / Postal Code
Country
Phone
Business
 Business User of Security Equipment
 Service Provider/Carrier
 Financial/Banking/Insurance/Legal  Consultancy/Integrator/VAR
 Component Supplier  Hardware and/or Software Supplier
 Public Sector/Government  Other:
Company Annual Revenues
Number of employees in your organization
In what technologies are you interested? (choose all that apply)
 Anti-spam / email security  Anti-spyware tools
 Antivirus  Application security
 Encryption  Firewalls
 Identity management  IDS/IPS
 Managed security services  Network access control
 Patch management  Penetration testing services
 Security event management / security information management  Storage security
 Virtual private network  Vulnerability assessment/management
 Wireless security  Other:
What is your job function?
Please indicate your agreement to Dark Reading's Privacy Policy, Terms of Use, the Webinar Agreement for this webinar.
I agree to abide by the Dark Reading Privacy Policy, Terms of Use, and the Webinar Agreement (printed in the box below).
Occasionally Light Reading Inc. sponsors may want to send you information about exciting new products and services. If you prefer not to receive these solicitations, please uncheck this box.
Dark Reading's repository of intel on IT security. More of a 'megabase' than a database, Dark Entries lets you dig for information, or share your expertise. The choice is yours, grasshopper.
ENTERPRISE VULNERABILITIES
Vulnerability: Dimension of phpBB Dimension of phpBB
Published: 2006-10-12
Severity: HIGH
Description: Multiple PHP
remote file inclusion
vulnerabilities in Dimension
of phpBB 0.2.6 and earlier
allow remote attackers to
execute arbitrary PHP code
via a URL in the
phpbb_root_path parameter in
(1)
includes/themen_portal_mitte-
.php or (2)
includes/logger_engine.php.

Vulnerability: Cahier de textes Cahier de textes
Published: 2006-10-12
Severity: HIGH
Description: Multiple SQL
injection vulnerabilities in
Cahier de textes 2.0 allow
remote attackers to execute
arbitrary SQL commands via
the (1) matiere_ID parameter
in lire.php or the (2)
classe_ID parameter in
lire_a_faire.php.

Vulnerability: Objective Development WebYep
Published: 2006-10-12
Severity: HIGH
Description: Multiple PHP
remote file inclusion
vulnerabilities in WebYep
1.1.9, when register_globals
is enabled, allow remote
attackers to execute
arbitrary PHP code via the
webyep_sIncludePath in (1)
files in the programm/lib/
directory including (a)
WYApplication.php, (b)
WYDocument.php, (c)
WYEditor.php, (d)
WYElement.php, (e)
WYFile.php, (f)
WYHTMLTag.php, (g)
WYImage.php, (h)
WYLanguage.php, (i)
WYLink.php, (j) WYPath.php,
(k) WYPopupWindowLink.php,
(l) WYSelectMenu.php, and
(m) WYTextArea.php; (2)
files in the
programm/elements/ directory
including (n)
WYGalleryElement.php, (o)
WYGuestbookElement.php, (p)
WYImageElement.php, (q)
WYLogonButtonElement.php,
(r) WYLongTextElement.php,
(s) WYLoopElement.php, (t)
WYMenuElement.php, and (u)
WYShortTextElement.php; and
(3) programm/webyeb.php.

Vulnerability: Moodle Moodle
Published: 2006-10-12
Severity: MEDIUM
Description: SQL injection
vulnerability in
blog/index.php in the blog
module in Moodle 1.6.2
allows remote attackers to
execute arbitrary SQL
commands via a double-
encoded tag parameter.

Vulnerability: NetBSD NetBSD, OpenBSD OpenBSD
Published: 2006-10-12
Severity: MEDIUM
Description: Integer
overflow in the
systrace_preprepl function
(STRIOCREPLACE) in systrace
in OpenBSD 3.9 and NetBSD 3
allows local users to cause
a denial of service (crash),
gain privileges, or read
arbitrary kernel memory via
large numeric arguments to
the systrace ioctl.

POWERFUL INFORMATION
AT YOUR FINGERTIPS
(SPONSORED LINKS)
Anti-spam  |  Antivirus  |  Application scanning  |  Application Security  |  Attacks / Exploits / Threats  |  Authentication  |  Browser security  |  Buffer overflows  |  Cisco  |  Computer crime  |  Cross-site scripting  |  CSI  |  CVE  |  Encryption  |  F5  |  Filtering  |  Host intrusion prevention  |  Host Protection  |  IDS  |  Industry Trends   |  IPS  |  Juniper  |  Law enforcement  |  Legal & Regulatory Topics  |  Malware  |  Market Research  |  McAfee  |  Messaging Security  |  Microsoft  |  NAC  |  Patch management  |  Perimeter Security  |  Phishing  |  Rootkits  |  Security Administration / Management  |  Security Industry  |  Social engineering  |  Source-code auditing  |  Spam  |  SQL injection  |  Symantec  |  Trojans  |  User privacy  |  Viruses  |  Vulnerabilities  |  Vulnerability assessment  |  Vulnerability Management  |  Vulnerability management  |  Web services security  |  Worms
Dark Reader Weekly Newsletter
Dark Reading Daily Newsletter
MORE INFO
Copyright © 2000-2006 Light Reading Inc. - All rights reserved.
RSS FEED  |   ARCHIVE  |   FREE NEWSLETTER  |   ORDER REPRINTS  |   ADVERTISE WITH US  |   TECHWEB  |   CONTACT US  |   USER PREFERENCES  |   HELP
Companies
3Com (4), Aventail (4), CA (10), Check Point (11), Cisco (43), Enterasys (4), F-Secure (4), F5 (3), HP (4), IBM (25), Intel (4), ISS (11), Juniper (17), Lucent (1), McAfee (56), Microsoft (341), Nokia (1), Nortel (5), Oracle (7), Qualys (2), RSA (16), Secure Computing (6), Sun (3), Symantec (83), Trend Micro (7), VeriSign (11)

Application and Perimeter Security
802.11x (10), Anomaly detection (11), Anti-spam (28), Application quality assurance (6), Application scanning (16), Auditing (5), Buffer overflows (27), CERT (6), Consultants (4), Cross-site scripting (24), CVE (1), Database encryption (5), Digital vaults (5), DOS (26), EAP/LEAP (1), Email gateways (11), Encryption (23), Filtering (20), Firewalls (62), FIRST (1), HIPAA (31), Host-based IDS (4), Host/server configuration (4), Host/server encryption (1), IDS (4), IDS (35), IM (12), IPS (44), ISO 17799 (5), Key management (10), Least-privilege user (3), License management (11), Malware (203), NAC (55), Network IDS (10), NIST (9), OWASP (3), OWASP (5), Patch management (68), PCI (17), Penetration testing (14), Phishing (128), PKI (8), Rootkits (22), SAML (1), Software metering (2), Source-code auditing (12), SOX (33), SSL (43), Systems integrators (1), VPNs (77), Vulnerability assessment (57), Web App Security Consortium (3), Web App Security Consortium (3), Web application firewall (12), Web services security (24), WLANs (53), Worms (78), WPA (4), XML (5)

Desktop Security (Sponsored by Webroot Software)
Anti-spam (28), Antivirus (62), Application Security (232), Attacks / Exploits / Threats (312), Authentication (92), Browser security (97), Digital certificates (13), Digital signatures (9), Disk encryption (9), DRM (17), Encryption (102), File/folder encryption (15), Identity management (30), IM (12), Malware (203), Messaging Security (121), PGP (1), Phishing (128), Rootkits (22), Security Administration / Management (303), Social engineering (59), Spam (69), Spyware (61), Tokens (14), Trojans (72), User privacy (166), Viruses (86), VOIP security (25), Vulnerabilities (435), Vulnerability Management (135), Worms (78)

Discovery and management
Anomaly detection (11), Application scanning (16), Black Hat (16), COBIT (7), Consultants (4), Content filtering (33), CVE (1), End-user monitoring (35), Filtering (20), FISMA (5), HIPAA (31), Host intrusion prevention (32), Host-based IDS (4), IDS (4), IDS (35), IPS (44), ISACA (2), ISO 17799 (5), Log aggregation (7), Network IDS (10), OWASP (3), OWASP (5), PCI (17), Penetration testing (7), Penetration testing (14), SAML (1), SIM/SEM (27), Source-code auditing (12), SOX (33), Vulnerability assessment (57), Vulnerability management (93), Web App Security Consortium (3)

Host security (Sponsored by ScanSafe Inc.)
802.11x (10), Application quality assurance (6), Authentication (92), Backup security (23), Biometrics (31), Buffer overflows (27), Digital certificates (13), Disk encryption (9), Encryption (102), End-user monitoring (35), HIPAA (31), Host anti-spam (6), Host anti-spyware (11), Host antivirus (13), Host intrusion prevention (32), Host Protection (32), Host-based IDS (4), Host/server configuration (4), Host/server encryption (1), Host/server patching (3), IDS (4), IEEE (5), ISO 17799 (5), Least-privilege user (3), License management (11), NAC (55), P2P management (4), Patch management (68), PGP (6), Port control (1), Single sign-on (18), Smart cards (15), Software metering (2), SOX (33), Systems integrators (1), TCG (8), Tokens (14), User privacy (166), Vulnerability Management (135), WPA (4)

Security services
Agency application (2), Application quality assurance (6), Application scanning (16), COBIT (7), Consultants (4), FISMA (5), HIPAA (31), ISO 17799 (5), Managed services (66), PCI (17), Penetration testing (7), PKI (8), Policy management (50), SIM/SEM (27), Source-code auditing (12), SOX (33), Systems integrators (1)

Storage Security
AES (7), Backup security (23), COBIT (7), Database encryption (5), DES (1), Digital vaults (5), Disk encryption (9), Encryption (23), File/folder encryption (15), FISMA (5), Hashing algorithms (3), HIPAA (31), Host/server encryption (1), Identity management (21), ISO 17799 (5), Key management (10), Law enforcement (69), Legislation (54), Offsite backup (12), PCI (17), PKI (8), SOX (33), Stored data losses (48), Systems integrators (1), Triple DES (2), User privacy (166)

Wireless Security
802.11x (10), AES (7), Auditing (5), COBIT (7), DES (1), Digital certificates (13), Digital signatures (9), DOS (26), EAP/LEAP (1), FISMA (5), Hashing algorithms (3), HIPAA (31), Host/server encryption (1), IEEE (5), IETF (3), ISO 17799 (5), Key management (10), NAC (55), Network IDS (10), PCI (17), Penetration testing (7), PKI (8), Port control (1), Tokens (14), Triple DES (2), VPNs (77), Vulnerability assessment (57), WLANs (53), WPA (4)