The Integrated Data Exchange Program

Size: px
Start display at page:

Download "The Integrated Data Exchange Program"

Transcription

1 From Stovepipes to Secure Exchanges An Integrated Approach to Protecting Shared Federal Data by Greg Brill Khurram Chaudry

2

3 From Stovepipes to Secure Exchanges An Integrated Approach to Protecting Shared Federal Data Growing and pervasive threats have compelled the US Federal Government to consider cost efficient yet effective risk management principles to determine whether non-federal entities (exchange partners) have adequate security in place and should be allowed to receive sensitive information from federal agencies. The Integrated Data Exchange Program The Challenge The demand for data sharing between federal agencies and state and local governments is skyrocketing but so is the danger that the data will be compromised. Identify theft involving the fraudulent use of government documents and benefits is growing at an exponential rate. More than half a billion records with the personally identifiable information (PII) of US citizens have been lost or stolen from government and corporate databases. Though government agencies are struggling to make their systems more secure, they are hampered by budget cuts, and an increasingly complex compliance and technical environment. A lack of integration of government data exchange programs not only greatly increases the risk of data breaches, but can lead to other serious issues such as costly redundancy, resource stress, and inefficient use of federal funds. The Solution Booz Allen Hamilton s Integrated Data Exchange Program (IDEP) a secure, total-enterprise risk management, and compliance and governance framework, addresses all of these issues. It represents a shift from traditional stove-piped data security and compliance to a modern, holistic approach that is far more efficient and effective. Key Benefits of IDEP include: Cost savings through standardized compliance activities that reduce redundancy Improved compliance by promoting a federated data-sharing environment that is interoperable, transparent, and compliant with Office of Management and Budget (OMB) and National Institute of Standards and Technology (NIST) regulations Increased data security and privacy through better and centralized federal data management, continuously monitored operational risks, and prioritized resource allocation based on risk Increased exchange-partner customer satisfaction by streamlining reporting requirements and eliminating the need for exchange partners to make multiple corrections to the same security issues Coordination and oversight by establishing an oversight committee of stakeholders to collaborate on emerging problems and solutions, or a champion federal agency. Relevant and Proven Expertise Booz Allen has established and maintained regulatory compliance programs throughout the federal government, and has supported data exchange programs at various federal agencies, including the IRS and the Social Security Administration (SSA). Booz Allen has also developed an enterprise-wide IT security program for Health & Human Services (HHS), and has an ongoing partnership with NIST to produce information security guidance materials. 1

4 Overview of Data Exchange Challenges As Exhibit 1 illustrates, many federal agencies provide sensitive data to multiple exchange partners, including state, local, and tribal governments, healthcare providers, and other private organizations. The data sharing is necessary to fulfill legislative and missionbased requirements, such as determining qualifications for social assistance programs, verifying Social Security numbers and other personally identifiable information (PII), and collecting revenue for individual states. Once transferred, the federal data resides on the exchange partner s information systems, but the federal agency remains the data owner and is required to maintain adequate oversight over how the partner protects the information. Key Federal Data Exchange Stakeholders OMB NIST Federal agencies State and local governments Tribal governments Other institutions Inspector General and other audit communities Exhibit 1 Current Data Exchange Process Other Federal Agencies Sample Federal Agencies Sharing Data AGREEMENT AGREEMENT AGREEMENT AGREEMENT AGREEMENT IRS REQUIREMENTS SSA REQUIREMENTS HHS REQUIREMENTS VA REQUIREMENTS OTHER FEDERAL AGENCY REQUIREMENTS Federal Agency-Specific Requirements and MOU for Data Sharing Compliance Activities Health Provider Tribal Governments State Governments Approximately 50 State Governments and Territories Local Governments Other Academic Institutions, Insurers, Researchers, Suppliers, etc. SUMMARY FINDINGS Sample External Entities and Associated Compliance Reports Source: Booz Allen Hamilton 2

5 The oversight function ensures that: Security requirements are strategically aligned with program mission goals and objectives Risk-based trust levels assigned to data exchange partners are supported Exchange partners are assessed in accordance with established security requirements. Similar efforts are underway for secure health data exchanges (e.g., Health Information Exchange (HIE) workgroup). 1 However, significant and immediate efforts are needed for all other federal data exchanges, and this is what IDEP targets. The current federal data exchange process presents a variety of challenges to the government and its exchange partners. The following are examples of eight key issues and their impact. Redundancy Federal agencies that share data with exchange partners have separately established compliance programs to meet legislative requirements. These data-share programs have distinct sharing mechanisms (both electronic direct information system connections, file sharing protocols, or media, such as tapes and non-electronic), data exchange agreements (Memoranda of Understanding (MOU)), requirements sets against which to measure compliance, compliance reports, periodic assessment schedules, and related activities. Impact: These disparate operating models, with no intra-agency or central reporting mechanisms, create redundancy across all data exchange program activities, resulting in inefficiencies and increased security costs. For example, various state and local agencies (e.g., human services, social services) receive federal agency data extracts for the State Income Eligibility Verification System (IEVS) from both the IRS and the SSA. The state leverages the data to determine its residents eligibility for the Federal Temporary Assistance for Needy Families (TANF), Food Stamps, and Medicaid programs. Both the IRS and the SSA perform a separate assessment (though the data is used in a consistent manner) of their exchange partners and each agency s requirements are different. Therefore, each exchange partner must dedicate its operational staff to support each assessment effort and implement corrective actions. According to a gap analysis performed by Booz Allen, the compliance requirements of these two federal agencies have significant overlap (approximately 90 percent partial or full). Areas of overlap include Access Control and Audit Enforcement. Integrating the IRS and SSA data exchange systems creates the potential for a significant cost savings. Increasing Demand The demand for federal electronic data exchange services is growing as increasing numbers of exchange partners request existing and new types of data extracts. This intensifies the level of service required of federal agencies. For example, the IRS exchanges Exhibit 2 Incidents Reported to US-CERT Number FY FY FY08 Source: United States Government Accountability Office, Information Security: Cyber Threats and Vulnerabilities Place Federal Systems at Risk. May 5, For further information on health data exchanges, read the Booz Allen publication, Stemming the Rising Tide of Health Privacy Breaches, available at 3

6 data with more than 360 partners, and the SSA has more than 3,100 data sharing agreements, resulting in billions of records being transferred each year. Impact: Increasing use of resources, including funding and manpower. Data Breaches The Federal Trade Commission reports that the second most commonly reported type of identity theft involves the fraudulent use of government documents and benefits. The US Computer Emergency Readiness Team reported a 206 percent increase in federal computer security incidents from FY2006 through FY2007 (see Exhibit 2 on previous page). More than 500 million records containing the PII of US residents stored in government and corporate databases have either been lost or stolen. Sensitive data leaks are likely to rise as the number of discrete data exchanges increases. As Exhibit 3 shows, the cost of a data breach in 2008 was $202 per compromised record, up 2.5 percent from the $197-per-record cost in With compliance requirements and the technical environment becoming more complex, government agencies continue to struggle to identify and eliminate every security risk. Impact: Compromised citizen data, legal liabilities, and a negative reputation for affected government agencies. Reduction in Funding Government is constantly challenged to do more with less money, and budgets are being cut at the agency level, particularly during the current recession. States, in particular, are being hit hard. In the summer of 2009, for example, California state employees were required to take a third day off without pay each month. These types of cost cutting measures make it more difficult for states to spend the money needed to keep federal data secure. Impact: OMB may be faced with expanded budget requests from individual agencies seeking to keep pace with the increasing costs of protecting federal data. Exhibit 3 Average Per-record Cost of a Data Breach, $250 $200 $182 $197 $202 $150 $138 $100 $ Source: Ponemon Institute, 2008 Annual Study, Cost of a Data Breach: Understanding Financial Impact, Customer Turnover and Preventative Solutions (US Study), February,

7 Lack of Standardized Security Requirements Currently, there are no consistent or comprehensive requirements that apply to all exchange partners as recommended by NIST at the federal or state level. In addition, the application of security principles varies because of disclosure, privacy, and Health Insurance Portability and Accountability Act (HIPAA)-related laws and regulations. In addition, individual federal agencies continue to revise their requirements to keep pace with changing technology. All of these circumstances make compliance and security moving targets, while creating wider gaps between the compliance programs of various federal agencies. Impact: It is difficult to consistently enforce federal data protection requirements. Some essential security controls may be overlooked. Changing Technologies A recent trend in data exchange is an increase in electronic data transfers, rather than the physical exchange (mailing) of data on magnetic tapes. Additionally, as a growing number of legacy applications are retired, they are being replaced with more modern and complex applications, including many that are Web-based. Federal staff must be provided with the expertise to analyze the security of modernized technologies in the use of data exchanges. As noted by the GAO, more agencies are requesting online access to SSA s records (rather than receiving data through batch processing); providing and supporting online access generally requires more extensive compliance reviews than does batch processing. Impact: This adds complexity to protection of federal data. Lack of timely attention to changing technologies and absence of adequate security measures could result in unauthorized disclosure of federal data. Data Exchange Tracking As more exchange partners receive different types of federal data extracts, tracking the shared data becomes increasingly challenging for federal agencies. Because each agency has a complex data sharing environment, some with technological or resource deficiencies, it can be difficult to maintain a comprehensive inventory of data extracts that are shared with exchange partners. Impact: The federal government may have limited control over the data exchanged. Risk Prioritization Federal agencies are increasingly expected to better align resources to address high-priority risks. As a result, they need to gain an understanding of current data exchange risks, as well as new requests for federal data, then concentrate budget spending on areas deemed to have a higher risk. Impact: Failure to make this risk alignment makes it more difficult to focus resources on higher risk areas or particular exchange partners. Resultant data loss or unauthorized disclosure would require additional spending for corrective measures. The IDEP Solution for Data Sharing The Integrated Data Exchange Program (IDEP) is an innovative, securely managed, and compliant data exchange environment within a total compliance and governance framework. When based on serviceoriented architecture (SOA), it provides centralized secure federal data exchange services in accordance with Federal Enterprise Architecture (FEA) concepts. The purpose of the IDEP is to gain efficiencies and standardization in not only the compliance activities but also the actual data exchange itself, which can be accomplished by integrating all federal data exchange programs using an automated system and an oversight committee (see Exhibit 4 on next page). Streamlining the government s various data exchange programs into one centralized IDEP will empower it to deal with the 5

8 next-generation challenges in securing federal data held by exchange partners. One of the initial steps that can be taken prior to implementing the IDEP is a business case analysis to help determine the overall feasibility. By using the Value Measuring Methodology (VMM), federal agencies can calculate all of the qualitative and quantitative benefits that affect operations as well as exchange partners. In an IDEP environment, compliance costs are reduced as the government moves from a many-tomany relationship between federal agencies and Exhibit 4 IDEP Solution Other Federal Agencies IT Solution IT Architecture & Design IT Systems Development Integrated Data Exchange Program Compliance Solution Security Programs, Policy, and Compliance Security Architecture and Engineering Automated System Security/Privacy Compliance & Governance Oversight Board or Champion Agency Department of Motor Vehicles Health Provider Tribal Governments State and Local Governments Other Academic Institutions, Insurers, Researchers, Suppliers, etc. ONE PER ENTRY ONE PER ENTRY ONE PER ENTRY ONE PER ENTRY ONE PER ENTRY Source: Booz Allen Hamilton 6

9 exchange partners to a one-to-many relationship. The estimation of such cost savings can be used to determine the economic threshold for federal agencies to participate in the IDEP. In instances where federal agencies have a large amount of data exchange overlap, the benefits of participating increase. The analysis can be extended to cover the cost, benefit, and risk of leveraging an automated system to facilitate the IDEP solution. Use of an automated system will centralize the actual data exchange in addition to facilitating compliance-based activities. Collecting requirements, generating test plans, assimilating compliance results, conducting Plans of Action and Milestones (POA&M) reporting, and performing other continuous monitoring activities to manage operational risk to federal data are additional benefits. The Three Foundations of the IDEP There are three primary elements of the IDEP: An automated system of data exchanges and compliance activities Security/privacy compliance and governance An oversight board or champion agency. Automated System of Data Exchanges and Compliance Activities With an automated system, the IDEP operates at its most efficient and robust level. Such a system can be of particular value because it has the ability to: Facilitate data input to support compliance assessment activities, including exchange-partner inventories, requirements, and integrated schedules Serve as the authoritative source of records for the federal data shared with the external partners Be a single repository of all compliance-related data and documents, including assessment reports submitted by the partners. Government stakeholders may leverage the system to track POA&M resolution, obtain dashboard-based, partner-specific status and gauge prioritized risk areas in real time. Exchange partners can access the system 24/7 to report findings status, submit periodic safeguarding reports, and obtain partner-specific compliance to satisfy the requirements of their internal and external audits. More important, by centralizing the exchange of federal data the automated system allows the government to know what its inventory is and who it is sharing it with at all times. Security/Privacy Compliance and Governance The second foundation of the IDEP is the standardization of requirements, exchange agreements (e.g., MOUs), continued assessment activities, and reporting templates. With this element, the IDEP will streamline requirements to include applicable computer security, privacy, PII, HIPAA (if applicable), and disclosure principles. If IDEP is adopted, Booz Allen can collaborate with NIST and OMB to select the federal data exchange requirements that incorporate common and unique elements from all federal agencies that share data with external partners. As the demand for data exchange with the federal government increases, new entities can use this guidance to establish effective practices for implementing and managing safeguard measures for federal data exchanged with them. Using the central set of requirements, a single, comprehensive compliance assessment can be performed for each exchange partner. That assessment will address both the common and unique requirements of all federal agencies sharing data with that partner. Reporting content and format is standardized by establishing an extensible Markup Language (XML) reporting schema for automation. 7

10 The IDEP will develop a standard data exchange agreement (i.e., MOU) for federal agencies and external partners. The MOU can clarify each party s responsibilities with specific requirements, such as escalating and reporting breaches. The standard MOU will ensure uniform information is collected for each data exchange. Oversight Board or Champion Agency An oversight government body will be needed to spearhead the initiative. This body will not only monitor the activities performed under IDEP but will also provide it with leadership and direction. This oversight will ultimately help ensure that the IDEP mission and supporting objectives are achieved in a timely and effective manner. The oversight body can be one of the following: An oversight interagency committee with representation from each of the participating federal data exchange programs. The committee can be designed to act on behalf of the entire US federal government in the absence of a federal data exchange body. A champion federal agency capable of providing leadership and guidance on behalf of all federal agencies which have participating data exchange programs. The champion agency could leverage the existing Line of Business (LOB) concept whereby one organization is stringently evaluated and then trusted to perform a portion of other similar government organizations missions on their behalf. The overall goal of these or other solutions which may be proposed is to monitor, supervise, and control IDEP activities while promoting effective decision making. IDEP Benefits The IDEP will provide five major benefits. Cost Savings. Federal agencies can realize cost savings in fulfilling their legislative requirements to share and safeguard federal data with exchange partners. Those savings result from a centralized assessment process that eliminates redundancy in compliance activities and reporting. Furthermore, the anticipated drop in data breaches due to centralized management of the data will mean additional savings. Under the IDEP, only one onsite assessment of security controls implementation is needed for each target exchange partner. The assessment covers all requirements (disclosure, computer security, privacy, and PII) from all applicable federal agencies. It also produces a single, consolidated corrective-action report for the exchange partner to address. Compliance. Adopting the IDEP will promote a federated data-sharing environment that is interoperable, transparent, and compliant with appropriate NIST and OMB guidelines. This creates a widely acceptable, structured, and inherently flexible risk management framework consistent with the established level of risk tolerance set by the program mission stakeholder. In addition, managing risks in a comprehensive manner as a portfolio improves mitigation efforts, concentrates resources more appropriately, and helps managers in an increasingly complex IT environment. Increased Federal Data Security and Privacy: With the IDEP, the number of security breaches in federal data exchanges is likely to decline. Security and privacy are enhanced through the IDEP s continuous monitoring of operational risks, and risk-based prioritization of resource allocation. Standardization can be achieved by developing a common set of requirements and integrated schedules, using reporting and work-paper templates, and leveraging the knowledge and experience of a wide range of subject matter experts. Operational risk to federal data security and privacy is managed through methodological, continuous-monitoring activities (e.g., sample-based controls testing, periodic status report submission). Use of risk-prioritization models will direct more resources toward greater risk areas within federal agencies and their exchange partners. Increased Customer Satisfaction: Exchange partners will be able to leverage federal data exchange compliance activities and reports to 8

11 satisfy their own internal and external inspection requirements. They will no longer have to make multiple corrections to the same security issues that are identified by various federal agency assessments. By eliminating redundant reporting requirements and compliance activities, exchange partners may realize cost savings and reduce the manpower necessary to protect federal data. Coordination and Oversight: The IDEP can increase coordination between federal agencies by instituting an oversight committee with representation from all federal stakeholders, or by selecting a champion agency. This will result in knowledge sharing and proactive solutions to upcoming challenges in federal data exchange security and privacy. Booz Allen Offers Proven Performance Booz Allen has served as a catalyst in establishing and maintaining award-winning regulatory compliance programs that improve effectiveness and decrease the costs of compliance throughout the US federal government. In the process, Booz Allen has produced hundreds of deliverables. Internal Revenue Service Support Since 2001, Booz Allen has been working closely with the IRS Office of Safeguards in protecting Federal Taxpayer Information (FTI) shared with federal, state, and local agencies. We developed, deployed, executed, and maintain an effective computer and physical security evaluation framework which has enhanced security within state and local governments, and improved customer service to state and local agencies. Booz Allen has accomplished this through: Strong project management support NIST-based evaluation of IT systems covering a broad range of platforms (mainframes and Unix/ Windows servers) Technical Federal Information Security Management Act of 2002 (FISMA)-based training NIST compliance, communication plans, and continuous monitoring through periodic POA&M report submission System Security Plan (SSP)-like documents analysis for compliance with NIST and IRS requirements Expert advice on safeguarding requirements and key technical issues Strategic studies and white papers Program-wide risk management through agency risk profiling and self-assessment tools. Social Security Administration Support Booz Allen supported the SSA Deputy Commissioner of Budget, Finance, and Management (DCBFM) and the Deputy Commissioner for Systems (DCS) to perform a Data Exchange Risk Analysis and Vulnerability Assessment at four federal entities and six state governments. We used our risk assessment process to gather information and identify vulnerabilities in the data exchange process. We then assessed outside entities that had data exchange agreements in place to determine their current data access method, whether they maintained secure systems consistent with SSA s systems security policies, and whether any unauthorized use or inappropriate disclosures had occurred. We also validated how SSA information was used and viewed. Booz Allen conducted certification and compliance assessments; monitored outside entities approved for online and/or batch access to SSA information; and identified the risk and vulnerabilities of the formats in which data was electronically exchanged with outside entities. Department of Health and Human Services Support To mitigate risks resulting from an increase in cyber threats and to comply with federal legislation, HHS hired Booz Allen in June 2003 to develop an enterprise-wide IT security program. Booz Allen developed Secure One HHS to meet federal legislation and to increase the baseline HHS information security 9

12 and privacy posture across all HHS Operating Divisions (OPDIV), while reducing the reporting burdens of complying with federal mandates. Booz Allen continues to provide HHS with essential security and privacy services to: Enable the agency to maintain compliance with federal mandates Provide mission-critical services Maintain the public s trust and confidence in the quality of HHS services and business operations Booz Allen has supported the Chief Information Security Officer in leading the HIE workgroup to develop guidance for federal agencies in securing health data exchanged with private sector healthcare organizations. Workgroup support entailed all aspects of project planning; research; analysis; authoring guidance documents; and gathering input from privacy and security officers in all HHS OPDIVs, the US Department of Veteran Affairs, and the US Military Health System. the FISMA implementation guidance are consistent in content, technical accuracy, and cohesiveness. Booz Allen recently participated as a key member of the NIST A Assessment Case Project, which was an interagency workgroup consisting of NIST; the departments of Justice, Energy, and Transportation; and the intelligence community. The workgroup developed exemplary assessment cases that serve as recommended, comprehensive guidance to assist organizations and assessors representing those organizations in developing controls assessment plans to augment the high-level assessment procedures found in SP A. We have also been involved in collaborative workgroup sessions to develop , Revision 3; the risk management framework; and the new program-level management controls. National Institute of Standards and Technology Support Booz Allen has an ongoing partnership with NIST to develop high-quality, time-sensitive, and accurate information security guidance publications and materials that reflect the requirements of the latest US Federal Information Security Management Act (FISMA) laws and regulations. As such, we are an integral member of the FISMA Implementation Project. Active participation in the development of Federal Information Processing Standard (FIPS) 199, SP , SP , SP , SP , and SP A provides Booz Allen with unique insight and institutional knowledge in the practical application of NIST standards and guidance to ensure FISMA compliance mandates are achieved for federal agency clients. Booz Allen also serves as trusted advisor, and is a key member, of the quality assurance team that actively participates in the quality-control review processes to ensure FIPS and SP publications under 10

13 11

14 About the Authors Gregory J. Brill is a Principal on the Booz Allen Assurance and Resilience team who leads the certification and compliance business at Booz Allen. Mr. Brill has established and modernized the IRS Data Exchange Program (Safeguards) since In addition, he has also implemented an agency-wide Certification and Accreditation (C&A) program for the IRS, to safeguard sensitive but unclassified data in accordance with the Internal Revenue Code. Mr. Brill has experience leading large audit teams in support of the Government Accountability Office (GAO) and Inspector General financial statement audits. Khurram Chaudry is a Senior Associate on Booz Allen s Assurance and Resilience team, with 10 years of professional experience in information assurance. He played a key role in modernizing the IRS Data Exchange Program (Safeguards) and helping the IRS meet its C&A goals for FISMA compliance. Mr. Chaudry has spoken at the Federal Tax Administration (FTA) on the issue of safeguarding federal tax information when sharing with external entities. Acknowledgements. We would like to also recognize the following Booz Allen staff for their invaluable input: Eric Hodge, Alice Goguen, Laurie Graffo, and Kimberly Figel. Contact Information: Greg Brill Khurram Chaudry Principal Senior Associate 703/ / brill_gregory@bah.com chaudry_khurram@bah.com 12

15 About Booz Allen Booz Allen Hamilton has been at the forefront of strategy and technology consulting for 95 years. Every day, government agencies, institutions, corporations, and infrastructure organizations rely on the firm s expertise and objectivity, and on the combined capabilities and dedication of our exceptional people to find solutions and seize opportunities. We combine a consultant s unique problem-solving orientation with deep technical knowledge and strong execution to help clients achieve success in their most critical missions. Providing a broad range of services in strategy, operations, organization and change, information technology, systems engineering, and program management, Booz Allen is committed to delivering results that endure. With 20,000 people and $4 billion in annual revenue, Booz Allen is continually recognized for its quality work and corporate culture. In 2009, for the fifth consecutive year, Fortune magazine named Booz Allen one of The 100 Best Companies to Work For, and Working Mother magazine has ranked the firm among its 100 Best Companies for Working Mothers annually since To learn more about the firm and to download digital versions of this article and other Booz Allen Hamilton publications, visit 13

16 Principal Offices ALABAMA Huntsville CALIFORNIA Los Angeles San Diego San Francisco COLORADO Colorado Springs Denver FLORIDA Pensacola Sarasota Tampa GEORGIA Atlanta HAWAII Honolulu ILLINOIS O Fallon KANSAS Leavenworth MARYLAND Aberdeen Annapolis Junction Lexington Park Linthicum Rockville MICHIGAN Troy NEBRASKA Omaha NEW JERSEY Eatontown NEW YORK Rome OHIO Dayton PENNSYLVANIA Philadelphia SOUTH CAROLINA Charleston TEXAS Houston San Antonio VIRGINIA Arlington Chantilly Falls Church Herndon McLean Norfolk Stafford WASHINGTON, DC The most complete, recent list of offices and their addresses and telephone numbers can be found on by clicking the Offices link under About Booz Allen Booz Allen Hamilton Inc. BA9-128 IFDE WP

How To Manage Security In A Federal System

How To Manage Security In A Federal System Security Authorization An Approach for Community Cloud Computing Environments by Perry Bryden bryden_perry@bah.com Daniel C. Kirkpatrick kirkpatrick_daniel@bah.com Farideh Moghadami moghadami_farideh@bah.com

More information

Utilizing and Visualizing Geolocation Data for Powerful Analysis

Utilizing and Visualizing Geolocation Data for Powerful Analysis Utilizing and Visualizing Geolocation Data for Powerful Analysis by Walton Smith smith_walton@bah.com Timothy Ferro ferro_timothy@bah.com Table of Contents Introduction... 1 Delivering Geolocation Data

More information

Supply Chain Data Standards in Healthcare

Supply Chain Data Standards in Healthcare Supply Chain Data Standards in Healthcare by Michael Zirkle zirkle_michael@bah.com Ryan Gallagher gallagher_ryan_b@bah.com Seth Rogier rogier_seth@bah.com Table of Contents Making Healthcare Safer and

More information

Strategic Information Management Through Data Classification Reducing Corporate Risk and Cost by Gaining Control of Business Information Assets

Strategic Information Management Through Data Classification Reducing Corporate Risk and Cost by Gaining Control of Business Information Assets Strategic Information Management Through Data Classification Reducing Corporate Risk and Cost by Gaining Control of Business Information Assets by Glen Day day_glen@bah.com Strategic Information Management

More information

Information Security Governance

Information Security Governance Information Governance Government Considerations for the Cloud Computing Environment by Jamie Miller miller_jamie@bah.com Larry Candler candler_larry@bah.com Hannah Wald wald_hannah@bah.com Table of Contents

More information

Analytical Program Management

Analytical Program Management Analytical Program Management Integrating Cost, Schedule, and Risk MISSION Analytical Program Management Integrating Cost, Schedule, and Risk Analytical Program Management 1 One of the greatest challenges

More information

The Social Financial Advisor: A Path Forward

The Social Financial Advisor: A Path Forward The Social Financial Advisor: A Path Forward Take the Right Route to Using Social Media by Chris Estes estes_chris@bah.com Todd Inskeep inskeep_todd@bah.com Getting Social Is It Time for Advisors to Face

More information

How To Reduce Greenhouse Gas Emissions Through A Regional Performance Based Framework

How To Reduce Greenhouse Gas Emissions Through A Regional Performance Based Framework Miles to Go Before They're Green Reducing Surface Transportation Greenhouse Gas Emissions Through a Regional Performance-Based Framework by Gary Rahl Rahl_Gary@bah.com David Erne Erne_David@bah.com Victoria

More information

by Christopher P. Bell bell_christopher_p@bah.com Elizabeth Conjar conjar_elizabeth@bah.com

by Christopher P. Bell bell_christopher_p@bah.com Elizabeth Conjar conjar_elizabeth@bah.com Organizational Network Analysis Improving Intelligence and Information Sharing Capability among Homeland Security and Emergency Management Stakeholders by Christopher P. Bell bell_christopher_p@bah.com

More information

Ascent to the Cloud. Four Focus Areas for a Successful Enterprise Migration. by Michael Farber farber_michael@bah.com

Ascent to the Cloud. Four Focus Areas for a Successful Enterprise Migration. by Michael Farber farber_michael@bah.com Ascent to the Cloud Four Focus Areas for a Successful Enterprise Migration by Michael Farber farber_michael@bah.com Kevin Winter winter_kevin@bah.com Munjeet Singh singh_munjeet@bah.com Ascent to the

More information

Engaging Mobility in the Oil and Gas Sector

Engaging Mobility in the Oil and Gas Sector Engaging Mobility in the Oil and Gas Sector Engaging Mobility in the Oil and Gas Sector To open a dialogue about the impact of rapid mobile adoption in the energy industry, Booz Allen Hamilton, Bitzer

More information

Meeting the Challenges of the Modern CIO

Meeting the Challenges of the Modern CIO Meeting the Challenges of the Modern CIO by Darrin London, PMP london_darrin@bah.com Daniel E. Williams, PMP williams_daniel_2@bah.com Table of Contents Introduction...1 Challenges Faced by the Modern

More information

Realizing the Promise of Health Information Exchange

Realizing the Promise of Health Information Exchange Realizing the Promise of Health Information Exchange by Timathie Leslie Leslie_Timathie@bah.com Realizing the Promise of Health Information Exchange Health information exchange (HIE) the electronic movement

More information

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013 State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council

More information

Fiscal Year 2007 Federal Information Security Management Act Report

Fiscal Year 2007 Federal Information Security Management Act Report OFFICE OF INSPECTOR GENERAL Special Report Catalyst for Improving the Environment Fiscal Year 2007 Federal Information Security Management Act Report Status of EPA s Computer Security Program Report No.

More information

Managing Risk in Global ICT Supply Chains

Managing Risk in Global ICT Supply Chains Managing Risk in Global ICT Supply Chains Best Practices and Standards for Acquiring ICT Ready for what s next. Managing Risk in Global ICT Supply Chains Emerging best practices and standards can significantly

More information

Integrating IT Service Management Practices into the Defense Acquisition Lifecycle

Integrating IT Service Management Practices into the Defense Acquisition Lifecycle Integrating IT Service Management Practices into the Defense Acquisition Lifecycle by Francis Arambulo arambulo_francis@bah.com Michael Thompson thompson_michael_p@bah.com Table of Contents Introduction...1

More information

Next-Generation Governance Enhanced Decisionmaking Through a Mission-Focused, Data-Driven Approach

Next-Generation Governance Enhanced Decisionmaking Through a Mission-Focused, Data-Driven Approach Next-Generation Governance Enhanced Decisionmaking Through a Mission-Focused, Data-Driven Approach April 2011 A white paper prepared by Booz Allen Hamilton: Center of Excellence for Strategic Technology

More information

Information Security for Managers

Information Security for Managers Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize

More information

Realizing the Promise of Health Information Exchange

Realizing the Promise of Health Information Exchange Realizing the Promise of Health Information Exchange Realizing the Promise of Health Information Exchange Health information exchange (HIE) the electronic movement of health-related information among organizations

More information

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Roberta Stempfley Acting Assistant Secretary for Cybersecurity and Communications

More information

Management Spans and Layers. Streamlining the Out-of-Shape Organization

Management Spans and Layers. Streamlining the Out-of-Shape Organization Management Spans and Layers Streamlining the Out-of-Shape Organization Originally published as: Management Spans and Layers: Streamlining the Out-of-Shape Organization, by Ian Buchanan, Jong Hyun Chang,

More information

NASA OFFICE OF INSPECTOR GENERAL

NASA OFFICE OF INSPECTOR GENERAL NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA

More information

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,

More information

IBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security

IBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security IBM Internet Security Systems October 2007 FISMA Compliance A Holistic Approach to FISMA and Information Security Page 1 Contents 1 Executive Summary 1 FISMA Overview 3 Agency Challenges 4 The IBM ISS

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Treasury Inspector General for Tax Administration Federal Information Security Management Act Report October 27, 2009 Reference Number: 2010-20-004 This

More information

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9

More information

Cyber Solutions Handbook

Cyber Solutions Handbook Cyber Solutions Handbook Making Sense of Standards and Frameworks by Matthew Doan doan_matthew@bah.com Ian Bramson bramson_ian@bah.com Laura Eise eise_laura@bah.com Cyber Solutions Handbook Making Sense

More information

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial

More information

Integrated Risk Management. Balancing Risk and Budget

Integrated Risk Management. Balancing Risk and Budget Integrated Risk Management The Current Risk Landscape Organizations which depend upon information systems are challenged by serious threats that can exploit both known and unknown vulnerabilities in systems.

More information

Pulling Up Your SOX. Companies Can Gain from Compliance with U.S. Governance Act. Lisa Fabish fabish_lisa@bah.com. Stuart Groves groves_stuart@bah.

Pulling Up Your SOX. Companies Can Gain from Compliance with U.S. Governance Act. Lisa Fabish fabish_lisa@bah.com. Stuart Groves groves_stuart@bah. by Lisa Fabish fabish_lisa@bah.com Stuart Groves groves_stuart@bah.com Robert Oushoorn oushoorn_robert@bah.com Otto Waterlander waterlander_otto@bah.com Pulling Up Your SOX Companies Can Gain from Compliance

More information

Think Outside Your ERP Mission-Focused Inventory Strategies

Think Outside Your ERP Mission-Focused Inventory Strategies Think Outside Your ERP Mission-Focused Inventory Strategies by Ray Haeme haeme_ray@bah.com Margo Cohen cohen_margo@bah.com Eric Michlowitz michlowitz_eric@bah.com Think Outside Your ERP Mission-Focused

More information

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including

More information

Office of Audits and Evaluations Report No. AUD-13-007. The FDIC s Controls over Business Unit- Led Application Development Activities

Office of Audits and Evaluations Report No. AUD-13-007. The FDIC s Controls over Business Unit- Led Application Development Activities Office of Audits and Evaluations Report No. AUD-13-007 The FDIC s Controls over Business Unit- Led Application Development Activities September 2013 Executive Summary The FDIC s Controls over Business

More information

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for

More information

VA Office of Inspector General

VA Office of Inspector General VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND

More information

How To Check If Nasa Can Protect Itself From Hackers

How To Check If Nasa Can Protect Itself From Hackers SEPTEMBER 16, 2010 AUDIT REPORT OFFICE OF AUDITS REVIEW OF NASA S MANAGEMENT AND OVERSIGHT OF ITS INFORMATION TECHNOLOGY SECURITY PROGRAM OFFICE OF INSPECTOR GENERAL National Aeronautics and Space Administration

More information

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Cyberprivacy and Cybersecurity for Health Data

Cyberprivacy and Cybersecurity for Health Data Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies

More information

1 Published on September 14, 2015, and January 6, 2016, respectively.

1 Published on September 14, 2015, and January 6, 2016, respectively. STATEMENT OF BRENT ARRONTE DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS AND EVALUATIONS OFFICE OF INSPECTOR GENERAL DEPARTMENT OF VETERANS AFFAIRS BEFORE THE COMMITTEE ON VETERANS AFFAIRS UNITED STATES

More information

Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS

Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes

More information

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security. Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency

More information

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013 Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He

More information

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)

More information

Data- Centric Enterprise Approach to Risk Management Gregory G. Jackson, Sr. Cyber Analyst Cyber Engineering Division Dynetics Inc.

Data- Centric Enterprise Approach to Risk Management Gregory G. Jackson, Sr. Cyber Analyst Cyber Engineering Division Dynetics Inc. Data- Centric Enterprise Approach to Risk Management Gregory G. Jackson, Sr. Cyber Analyst Cyber Engineering Division Dynetics Inc. May 2012 (Updated) About the Author Gregory G. Jackson is a senior cyber

More information

AUDIT REPORT. The Department of Energy's Management of Cloud Computing Activities

AUDIT REPORT. The Department of Energy's Management of Cloud Computing Activities U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Department of Energy's Management of Cloud Computing Activities DOE/IG-0918 September 2014 Department

More information

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU) Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,

More information

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Improvements Are Needed to the Information Security Program March 11, 2008 Reference Number: 2008-20-076 This report has cleared the Treasury Inspector

More information

POSTAL REGULATORY COMMISSION

POSTAL REGULATORY COMMISSION POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1

More information

U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009

U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009 U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009 ISD-EV-MOA-0002-2009 Contents Acronyms and Other Reference

More information

FedRAMP Standard Contract Language

FedRAMP Standard Contract Language FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal

More information

Embarcadero Technologies, with contributions from Ron Lewis, Senior Security Analyst, CDO Technologies

Embarcadero Technologies, with contributions from Ron Lewis, Senior Security Analyst, CDO Technologies White Paper Ensuring Personally Identifiable Information (PII) Security within U.S. Government Agencies Using Data Management Tools to Ensure FISMA and Privacy Act Compliance Embarcadero Technologies,

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Insufficient Attention Has Been Given to Ensure States August 31, 2007 Reference Number: 2007-20-134 This report has cleared the Treasury Inspector General

More information

Enabling Cloud Analytics with Data-Level Security

Enabling Cloud Analytics with Data-Level Security Enabling Cloud Analytics with Data-Level Security Tapping the Full Value of Big Data and the Cloud by Jason Escaravage escaravage_jason@bah.com Peter Guerra guerra_peter@bah.com Table of Contents Introduction...

More information

HIPAA Compliance Review Analysis and Summary of Results

HIPAA Compliance Review Analysis and Summary of Results HIPAA Compliance Review Analysis and Summary of Results Centers for Medicare & Medicaid Services (CMS) Office of E-Health Standards and Services (OESS) Reviews 2008 Table of Contents Introduction 1 Risk

More information

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA White Paper Achieving HIPAA Compliance through Security Information Management White Paper / HIPAA Contents Executive Summary... 1 Introduction: Brief Overview of HIPAA... 1 The HIPAA Challenge: Protecting

More information

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL FY 2015 INDEPENDENT EVALUATION OF THE EFFECTIVENESS OF NCUA S INFORMATION SECURITY PROGRAM UNDER THE FEDERAL INFORMATION SECURITY MODERNIZATION

More information

Developing a Business Case for Cloud

Developing a Business Case for Cloud Developing a Business Case for Cloud Analyzing Return on Investment for Cloud Alternatives May Yield Surprising Results by Paul Ingholt ingholt_paul@bah.com Cynthia O Brien o brien_cynthia@bah.com John

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Program Management April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information

More information

SecurityMetrics Business Associate HIPAA compliance program

SecurityMetrics Business Associate HIPAA compliance program SecurityMetrics Business Associate HIPAA compliance program IS YOUR PHI SAFE? Business associates help your business succeed, but are they a liability? When your BAs are not HIPAA compliant, your business

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal

More information

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,

More information

2015 List of Major Management Challenges for the CFPB

2015 List of Major Management Challenges for the CFPB September 30, 2015 MEMORANDUM TO: FROM: SUBJECT: Richard Cordray Director Consumer Financial Protection Bureau Mark Bialek Inspector General 2015 List of Major Management Challenges for the CFPB We are

More information

Our Commitment to Information Security

Our Commitment to Information Security Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as

More information

The Cybersecurity Executive Order

The Cybersecurity Executive Order The Cybersecurity Executive Order Exploiting Emerging Cyber Technologies and Practices for Collaborative Success by Mike McConnell mcconnell_mike@bah.com Sedar Labarre labarre_sedar@bah.com David Sulek

More information

Department of Veterans Affairs VA Handbook 6500. Information Security Program

Department of Veterans Affairs VA Handbook 6500. Information Security Program Department of Veterans Affairs VA Handbook 6500 Washington, DC 20420 Transmittal Sheet September 18, 2007 Information Security Program 1. REASON FOR ISSUE: To provide specific procedures and establish

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 Revision History Update this table every time a new edition of the document is published Date Authored

More information

INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies

INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies United States Government Accountability Office Report to Congressional Requesters June 2014 INFORMATION SECURITY Additional Oversight Needed to Improve Programs at Small Agencies GAO-14-344 June 2014 INFORMATION

More information

OFFICE OF INSPECTOR GENERAL

OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTOR GENERAL Audit Report Catalyst for Improving the Environment Evaluation of U.S. Chemical Safety and Hazard Investigation Board s Compliance with the Federal Information Security Management

More information

Tackling the BRAC Mission Continuity Challenge Workforce

Tackling the BRAC Mission Continuity Challenge Workforce Tackling the BRAC Mission Continuity Challenge Workforce by Joseph W. Mahaffee mahaffee_ joe@bah.com Dr. William Rowe, Jr. rowe_william_ jr@bah.com Elizabeth Miller miller_elizabeth@bah.com Tackling the

More information

The Economics of Cloud Computing

The Economics of Cloud Computing The Economics of Cloud Computing Addressing the Benefits of Infrastructure in the Cloud by Ted Alford alford_theodore@bah.com Gwen Morton morton_gwen@bah.com The Economics of Cloud Computing Addressing

More information

Report No. D-2009-097 July 30, 2009. Data Migration Strategy and Information Assurance for the Business Enterprise Information Services

Report No. D-2009-097 July 30, 2009. Data Migration Strategy and Information Assurance for the Business Enterprise Information Services Report No. D-2009-097 July 30, 2009 Data Migration Strategy and Information Assurance for the Business Enterprise Information Services Additional Information and Copies To obtain additional copies of this

More information

fs viewpoint www.pwc.com/fsi

fs viewpoint www.pwc.com/fsi fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a

More information

IT-CNP, Inc. Capability Statement

IT-CNP, Inc. Capability Statement Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government

More information

Federal Bureau of Investigation s Integrity and Compliance Program

Federal Bureau of Investigation s Integrity and Compliance Program Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

HITRUST CSF Assurance Program

HITRUST CSF Assurance Program HITRUST CSF Assurance Program Simplifying the information protection of healthcare data 1 May 2015 2015 HITRUST LLC, Frisco, TX. All Rights Reserved Table of Contents Background CSF Assurance Program Overview

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Centralized Application and Management System. Category: Data, Information and Knowledge Management. Initiation date: June 2011

Centralized Application and Management System. Category: Data, Information and Knowledge Management. Initiation date: June 2011 Centralized Application and Management System Category: Data, Information and Knowledge Management Initiation date: June 2011 Completion date: November 2012 Nomination submitted by: Samuel A. Nixon Jr.

More information

Overcoming Deployment Challenges for Financial Crimes Platforms

Overcoming Deployment Challenges for Financial Crimes Platforms Overcoming Deployment Challenges for Financial Crimes Platforms by Brian Stoeckert stoeckert_brian@bah.com James Flowe flowe_james@bah.com Contents Introduction...1 Fragmented Approach to Fraud Prevention...1

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. ELECTION ASSISTANCE COMMISSION EVALUATION OF COMPLIANCE WITH THE REQUIREMENTS OF THE FEDERAL INFORMATION SECURITY MANAGEMENT

More information

Overcoming Deployment Challenges for Financial Crimes Platforms

Overcoming Deployment Challenges for Financial Crimes Platforms Overcoming Deployment Challenges for Financial Crimes Platforms Convergent Risk Management for Financial Institutions Ready for what s next. Contents Introduction 1 Fragmented Approach to Fraud Prevention

More information

The Economics of Cloud Computing

The Economics of Cloud Computing The Economics of Cloud Computing Addressing the Benefits of Infrastructure in the Cloud by Ted Alford alford_theodore@bah.com Gwen Morton morton_gwen@bah.com The Economics of Cloud Computing Addressing

More information

Overview. FedRAMP CONOPS

Overview. FedRAMP CONOPS Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Los Alamos National Laboratory's Cyber Security Program DOE/IG-0880 February 2013 Department

More information

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106

More information

States and HIPAA information

States and HIPAA information States and HIPAA information Prepared by: Jennifer Bible, MSW Alabama: Alabama s Medicaid website contains HIPAA information at http://www.medicaid.alabama.gov/resources/hipaa.aspx?tab=5. Extensive FAQ

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

OFFICE OF INSPECTOR GENERAL. Audit Report. Evaluation of the Railroad Retirement Board Medicare Contractor s Information Security

OFFICE OF INSPECTOR GENERAL. Audit Report. Evaluation of the Railroad Retirement Board Medicare Contractor s Information Security OFFICE OF INSPECTOR GENERAL Audit Report Evaluation of the Railroad Retirement Board Medicare Contractor s Information Security Report No. 08-04 September 26, 2008 RAILROAD RETIREMENT BOARD INTRODUCTION

More information

Healthcare Utilizing Trusted Identity Credentials

Healthcare Utilizing Trusted Identity Credentials Healthcare Utilizing Trusted NextgenID - Headquarters 10226 San Pedro Ave, Suite 100 San Antonio, TX 78216 (210) 530-9991 NextgenID - Washington DC 13454 Sunrise Valley Drive, Suite 430 Herndon, VA 20171

More information

Effectiveness and Efficiency

Effectiveness and Efficiency Effectiveness and Efficiency Lessons for Building and Managing a Culture of Performance by Dave Mader mader_dave@bah.com Jay Dodd dodd_ joseph@bah.com Tom Miller miller_tom@bah.com Douglas Schlemmer schlemmer_douglas@bah.com

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Customer Account Data Engine 2 (CADE 2): System Requirements and Testing Processes Need Improvements September 28, 2012 Reference Number: 2012-20-122 This

More information

Final Audit Report. Report No. 4A-CI-OO-12-014

Final Audit Report. Report No. 4A-CI-OO-12-014 U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: AUDIT OF THE INFORMATION TECHNOLOGY SECURITY CONTROLS OF THE U.S. OFFICE OF PERSONNEL MANAGEMENT'S

More information

How To Manage A Public Safety Department Risk Management Program

How To Manage A Public Safety Department Risk Management Program Information Technology Risk Management (ITRM) Program NOMINATING CATEGORY: RISK MANAGEMENT INITIATIVES NOMINATOR: TERESA A. SHUCHART DEPARTMENT OF PUBLIC WELFARE (DPW) COMMONWEALTH OF PENNSYLVANIA 1006

More information

U.S. Department of the Treasury. Treasury IT Performance Measures Guide

U.S. Department of the Treasury. Treasury IT Performance Measures Guide U.S. Department of the Treasury Treasury IT Performance Measures Guide Office of the Chief Information Officer (OCIO) Enterprise Architecture Program June 2007 Revision History June 13, 2007 (Version 1.1)

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Taxpayer Data Used at Contractor Facilities May Be at Risk for Unauthorized Access or Disclosure May 18, 2010 Reference Number: 2010-20-051 This report

More information