NetRoadshow Information Security
Secure By Design
The core tenets of NetRoadshow’s security program are to safeguard customer data and to maintain customer trust.
NetRoadshow uses a defense-in-depth approach to implement layers of security throughout our organization. We’re passionate about defining new security controls and continuously refining our existing ones.
Our security program is driven not only by compliance and regulatory requirements, but also by industry best practices like the OWASP Top 10, CIS Critical Security Controls and threat intelligence.


Security Culture
We have security policies for ensuring the integrity, confidentiality and availability of all customer data and protecting that data against any unauthorized or unlawful access, use disclosure or destruction.

Privacy & Protection
NetRoadshow is committed to ongoing GDPR compliance and will work with clients to execute standard contractual clauses and data protection agreements to document how NetRoadshow uses and protects personal data.


Disaster Recovery & Business Continuity
If any disaster occurs, whether a fire, weather related, political or pandemic, causing NetRoadshow’s physical offices to be affected, local authorities would be contacted for assistance to ensure the safety and security of our employees.

Encryption
Encryption In-Motion
NetRoadshow’s policy is that all TLS endpoints accessed exclusively by NetRoadshow employees support TLS 1.2 and 1.3.
Encryption At-Rest
All persistent data is encrypted at rest using AWS/KMS, which encrypts all data using AES-256 ciphers. This is managed in AWS, whose security practice implementation has successfully earned SSAE-16 compliant SOC 1, SOC 2 and SOC 3 certifications.


SSO & Device Verification


SOC 2® Type 2 Report
Sign an NDA to download the full report.

Software Development & Monitoring
NetRoadshow practices secure coding according to the recommendations of the OWASP Project and CIS.
Source code and configuration files are stored in private git-based repositories. These tools support code attribution and code reviews. Reviewers check for compliance with NetRoadshow’s conventions and style, potential bugs, potential performance issues, and that the deploy is bound to only its intended purpose. Multiple scanning tools in the CI pipelines also perform static analysis and automated tests for quality, security, and unit validation. Secrets, such as password and encryption keys are not stored in the repository. All secrets are stored in AWS Secrets Manager or AWS CloudHSM devices in the case of TLS secret keys.
Once integrated for deployment, code is scanned with the OWASP Zap tool to find unit and integration vulnerabilities. All vulnerabilities are fixed prior to any release being pushed into production.
All major components of incorporated open-source software libraries and tools are reviewed for robustness, stability, performance, security, and maintainability. The security and development teams establish and adhere to a formal software release process.

Code Reviews & Production Sign-Off
Prior to updating production services, all contributors to the updated software version are required to approve that their changes are working as intended on staging servers. All changes are required to adhere to the document change management process.


Security Training
Development employees receive additional mandatory quarterly training which focuses specifically on software and development security topics.

Employee Access
We use AWS IAM to verify employee account identity and require two-factor authentication for all internal applications without exception. Administrative permissions are enforced where applicable and all administrative access is logged and auditable from traditional web server logs and CloudWatch/CloudTrail.


Physical Security
We leverage AWS data centers to provide infrastructure and hosting services for our applications. Amazon AWS exceeds all industry standards for physical security, including 24/7 surveillance and biometrics. All data is hosted within their secure data centers. AWS undergoes various third-party independent audits on a regular basis and can provide verification of compliance controls for its data centers, infrastructure, and operations. This includes, but is not limited to, SOC 1, 2 and 3 certifications, as well as ISO 27001 certification.

Information Security Practices
Solutions we leverage include:
Intrusion Detection & Prevention
We employ Crowdstrike IPS in all cloud environments to provide protection to every server and containerized device. This offers broad and dynamic attack detection and reaction with visibility across all cloud endpoints. We also utilize the ModSecurity IDS/IPS inside ingress and egress point to prevent intrusions that might attempt to hide invalid requests. All detections are logged to a centralized log system and sent to an distribution group for review.
For Conference system steams, we employ Fortinet’s Fortiguard for IDS/IPS.
Endpoint Security & Encryption
All laptop hard drives have Bitlocker encryption, which is installed via WorkSpace ONE. Bitlocker encrypts data stored on the hard drive with an AES 256-bit key. All corporate laptops also have Crowdstrike anti-virus installed. Crowdstrike is locked from being disabled by all end users.
All corporate and personal mobile devices that have access to corporate email and data must have VMWareOne (IntelligentHub) installed on it. IntelligentHub containerizes all corporate information (including email) on each person’s mobile device. Those containers are segmented from the rest of the phone and can be remote wiped in the event a device is lost or stolen. All devices are managed through compliance and configuration policies.
Email DLP
Penetration Testing
All NetRoadshow applications are pentested via a third-party company on an annual basis. Information about any security vulnerabilities successfully exploited through penetration testing is used to set mitigation and remediation priorities. Results and findings are properly documented and presented to the management team for each application upon completion. All critical issues identified during testing are addressed within 45 calendar days of the date the issue is identified. All issues identified during testing are ranked based on the risk to the organization. Each issue is tracked from initiation to completion by a member of the Information Security Team.
NetRoadshow will provide a summary of penetration test findings to customers upon request.
Vulnerability Scanning
Application External CV
Auditing & Logging
Continuous Monitoring
Anti-Virus/ Anti-Malware
Secure Software Development
Security Policies
NetRoadshow maintains an Information Security Policy, Acceptable Use Policy and Code of Conduct that defines employee’s responsibilities and acceptable use of information system resources. The organization receives signed acknowledgement from users indicating that they have read, understand and agree to abide by the rules of behavior.
