The Information Security Program Maturity Grid Timothy R. Stacey Payoff

Size: px
Start display at page:

Download "82-10-40 The Information Security Program Maturity Grid Timothy R. Stacey Payoff"

Transcription

1 The Information Security Program Maturity Grid Timothy R. Stacey Payoff The Information Security Program Maturity Grid is a tool composed of five stages of security maturity and five measurement categories that may be used by management in evaluating an enterprise's maturity from the perspective of information security. Introduction A position paper 38 developed for the workshop for the National Institute of Standards and Technology outlines the interrelationships of the quality assurance, Configuration Management, and security disciplines. It notes that a synergy can be developed if these disciplines maintain open lines of communication with each other and coordinate their activities. The Carnegie Mellon University Software Engineering Institute's Software Capability Maturity Model 39 (CMM) provides the intuitive view that as enterprises involved with software development increase in process maturity, their risk of failure in developing software decreases. The Systems Engineering CMM 40 and preliminary work toward the development of a Security Engineering CMM 41 support the maturity versus risk relationship illustrated in Exhibit 1. Risk/Information Security Program Maturity Relationship In his landmark book, 42 Philip Crosby outlines a simple tool, the Quality Management Maturity Grid, with which even the manager who isn't professionally trained in the quality business can determine where the operation in question stands from a quality standpoint. Based on the interrelationships of quality assurance, configuration management, and the security field, and on the relationship between process maturity and risk reduction, it appears natural that the Quality Management Maturity Grid could be tailored for use by managers in assessing an enterprise's information security program maturity. This article outlines the stages of maturity and provides five measurement categories which, when combined, reveal an enterprise's overall information security program maturity. 38 Rene H. Sanchez, ÒThe New Alliance: Gaining on Security Assurance.ÓProceedings of the International Invitational Workshop on Developmental Assurance. National Institute of Standards and Technology June, M. Paulk, W. Curtis, and M. B. Chrissis. A Capability Maturity Model for Software, Version 1.1. CMU/SEI-93-TR-24 ADA Pittsburgh, PA. Software Engineering Institute, Carnegie Mellon University. February A Systems Engineering Capability Mauturity Model, Version 1.0. CMU/SEI-94-HB-4. Pittsburgh, PA. Software Engineering Institute, Carnegie Mellon University. December Proceedings from the Security Engineering CMM Workshop. NSA. Ft. George G. Meade, MD January, Philip B. Crosby, Quality is Free. New York: McGraw-Hill

2

3 Five Stages of Security Maturity The proposed grid, shown in Exhibit 2, contains five stages of security maturity: uncertainty, awakening, enlightenment, wisdom, and benevolence. The Information Security Program Maturity Grid Uncertainty Awakening Enlightenment Wisdom Stage I: Uncertainty The lowest stage of information security program maturity, uncertainty, is characterized by a total lack of understanding of information security. Security is viewed as a hindrance to productivity. Although system integrity and availability requirements may be understood, failures to live up to these reliability requirements are viewed as system engineering failures rather than security incidents. Threats are not analyzed or understood. Protection strategies (prevention, detection, and recovery) are not formally addressed. Safeguards, if installed at all, usually consist of guns, guards, and gates. Although the facility may be protected, the information assets may be wide open. If in place at all, security is implemented from an industrial security perspective. System administrators or system programmers may implement information security on an ad hoc basis with a user ID or password system. In addition, the system administrator may restrict the system files from universal access solely to protect the system domain. Endusers are usually on their own. When incidents occur, if recognized as incidents, they may be reported to a general help desk, to industrial security, or to a system administrator. However, there usually is no mechanism in place to investigate or track the reports. When security incidents occur, management places blame on external forces rather than on the lack of protections. The threat population and their anticipated frequencies are unknown. Crisis security management is the standard method of operation. So that, when incidents occur, the question becomes, How can we recover? Due to this mentality, many organizations find that they cannot recover and they perish. Spending is rarely targeted for security. It is usually allocated for recovery from incidents. The frequency and cost effects of the incidents that occur are unpredictable. Thus, business planning and strategies depend on a crisis management environment. When incidents occur, the whole enterprise can be thrown into turmoil. All organizations must replan when incidents occur.

4

5

6

7 Moreover, the enterprise does not learn from its past inattention to security breaches. The enterprise in this stage uncertainty does not have time to learn. The more dependent the enterprise is on its data processing capabilities, the more crisis driven the enterprise becomes. Replanning is commonplace. The enterprise does not take time to plan security initiatives. In summary, the enterprise in Stage I does not understand why it continually has problems with its information assets. It has a high failure rate; its information assets seem to be brittle, unstable, and inaccurate; and its corporate secrets seem to be public knowledge. Stage II: Awakening The second stage of information security program maturity, awakening, is characterized by both the realization that information security engineering may be of value and the inability to provide money or time to support information security activities. Security is viewed as a commodity that can be bought on the open market. Management allocates funds to procure systems or products with high-reliability components rather than to determine their actual reliability needs. As a result, management often overspends by buying equipment that far exceeds its requirements. The Information Security Officer. Once management realizes that information security may be of value, an organizational information security officer is appointed. However, once appointed, the officer will most likely report to industrial security, Configuration Management, MIS or IT, or some other functional area. The function of the information security officer will be to act as a central point for the funneling of incident reports. The officer responds to incidents after the fact. The information security officer collects gross statistics and is likely to notice major trends and identify major threats. The officer will identify the significant threats and develop policies and procedures in response to the most frequently occurring crises. The information security officer may provide rudimentary reports to upper management (e.g., number of incidents per month). Little funding will be allocated to the prevention of incidents. Funds will be spent primarily on procuring expensive, higher-reliability components. Money will be wasted on the wrong or incomplete safeguards supplied by vendors touting their built-in security. Because security is designed based on past major threats and because the relative costs of differing protection strategies are not explored, the amount of money spent in crisis is high. Losses may be high especially when they do not follow the historical trend. The organizational information security officer attempts to assist organizations that have experienced security compromises. The officer will identify safeguards that must be complied with. End-users view security restrictions as an unnecessary hindrance. Often, they are because of the restrictions that are mandated universally across the entire enterprise rather than on an as-needed basis. Incidents, failures in system integrity, or availability become recognized as information security problems. Despite the implementation of more and more security hurdles, compromises still happen. The end-user's productivity is affected now both by the security incidents and by the safeguards set in place to protect the system. In summary, the enterprise in Stage II awakening does not understand why it continually has problems with the security of its information assets. It has a high incident rate, its information assets seem to be vulnerable, and its corporate secrets seem to be unprotected.

8 Stage III: Enlightenment The third stage of information security program maturity, enlightenment, is characterized by both the realization that a companywide information security infrastructure is necessary and that resources must be allocated to support information security activities. In this stage, security is no longer viewed solely as a commodity that can be purchased. Rather, information security must be designed consistent with an enterprise's needs it must be designed from within. Management realizes that because of the importance of information security to the entire enterprise, information security must be implemented from the top down. For the information security officer to be effective, the officer must report to top management. Corporate information security policy and a corporate security training program are developed. However, management usually develops and mandates that enterprisewide security requirements be followed by all organizational elements regardless of applicability. The information security officer institutes a formal reporting procedure. End-users more readily identify reportable incidents. The information security officer develops an information security strategy and performs an information security assessment based on that strategy. The strategy is developed based on both an analysis of past incidents and an analysis of a standard threat population (e.g., a published or general-purpose threat population). The strategy identifies the vulnerabilities of the information assets to the standard threat population and identifies appropriate protection strategies. Because of the security awareness program and the development of a formal incident reporting procedure, incident reports contain the relevant data required by the information security officer to enable timely, proper diagnosis of the incident. In addition, the information security officer is now able to collect more precise statistics and produce more accurate analyses to define more thoroughly the information security threat. Senior management, in this stage, receives more detailed reports that support the information security officer's professional judgment. Risk analyses convince management to allocate resources to the prevention of information security safeguards. However, once the initial studies have been conducted, the protection strategies developed, and the safeguards installed, the fervor for information security diminishes. The information assets are believed to be safe. At first, losses appear to be both expected (i.e., predicted through risk analyses) and manageable (i.e., planned, anticipated, and consciously accepted as security cost/benefit trade-offs). However, as time progresses, losses increase because of the complacency of the enterprise, the changing threat population, and the evolving, rapidly changing nature of information technology. Previously prepared risk analyses become stale and demonstrate loose applicability to the evolving environment. Because of the thorough security awareness training program, end-users are more vigilant and tend to initiate more incident reports. Because risk analyses have been performed, a balanced population of safeguards has been selected, resulting in the shift of the end-user's view of the security restrictions from a hindrance to the necessary. Cost/benefit studies convince management of the need for security, and they understand the business necessity for security. The enterprise undertakes the information security engineering activities of awareness training, risk analysis, and risk-reduction initiatives. In summary, through management commitment and information security engineering improvement, the enterprise in Stage III, awakening, is identifying, prioritizing, and protecting its assets. The enterprise is seeking solutions to prevent information security problems rather than simply recovering from incidents as they occur.

9 Stage IV: Wisdom The fourth stage of information security program maturity, wisdom, is characterized by an information security program that more closely reflects the enterprise's environment and responds to the enterprise's evolving needs. If Stage III is characterized by a companywide, top-down approach to information security, this stage represents the bottom-up approach. In this approach, the lowest-level entities are empowered and encouraged to evaluate and develop their own risk-based management strategies and to customize the enterprise's existing information security program to respond to their own needs. Because of an increased understanding of information security principles, management visibly participates in the information security program. Management actively encourages all employees to participate as well. Management is able to make informed security policy decisions and to support its decisions with conviction. Although the information security officer may not necessarily be a member of the enterprise's senior staff, information security principles are accurately represented there. Based on increased responsibilities and work load, the information security officer has established an infrastructure. Responsibilities have increased to include periodic information security assessments(i.e., security assessment updates), penetration testing, and auditing. The information security officer has developed positive, mutually beneficial relationships with all support organizations. Such interactions with other organizations (e.g., line management, product assurance, and purchasing) promote acceptance and enhance an effective enterprisewide implementation of the security program. Threats are continually reevaluated based on the changing threat population and on security incidents. All security safeguards are open to suggestion and improvement. Legal actions are prescribed for each type of incident. Risk analyses are now developed that contain greater detail and accuracy because of a greater understanding of both the threat population and the enterprise's vulnerabilities. Resources are continually allocated to the optimization of the information security program. Additional or more cost-effective safeguards are continually identified. Studies are now conducted because of the realization that the threat evolves and that the enterprise's information systems and technologies continually grow. Losses that occur have been managed, anticipated through continual cost/benefit trade-offs (e.g., risk analyses). Once the functional organizations have been empowered to augment the enterprise's information security program, risk management occurs at all levels of the enterprise. Information security engineering research activities are initiated to keep up with the rapidly changing environment. Information security practitioners now undergo periodic training and refresher courses. A complete information security training program has been developed expanded from awareness to a continuous, technical, customized, detailed security training program. The training is tailored to the needs of the differing audiences (i.e., awareness, policy-level, and performance-level training). In summary, the information security activities of an enterprise in Stage IV, wisdom, are planned, budgeted, and routine. Through the use of enterprise-specific threat models, and through the preparation of detailed risk analyses, the enterprise understands its vulnerabilities and protects its information assets. Stage V: Benevolence The fifth stage of information security program maturity, benevolence, is characterized by continual information security process improvement through research and participation and the sharing of knowledge in public and professional forums. In this stage, information security engineering is considered an essential part of the enterprise's internal controls. Management also recognizes that each of the enterprise's controls contains information security components. Adequate resources are provided and

10 management fully supports the computer security program. Management support extends to the funding of internal research and development to augment the existing information security program. The information security officer regularly meets with top management. Process and technology improvement are the main concerns. Security is a thought leader. The enterprise's information security professionals are recognized within the enterprise, within the security industry, and even by the enterprise's competitors. These security professionals achieve notoriety through presentations at information technology conferences, publishing in trade journals, and serving on government task forces. The involvement and visibility of the enterprise's information security professional enhances the enterprise's image in the marketplace. The causes of incidents are determined, and corrective actions are prescribed and monitored. Incident data is fed back into risk management to improve the information security posture. Prevention strategies are implemented to their fullest from detailed and accurate cost/benefit analyses, and losses are minimized and anticipated. Information security costs are justified and promoted because of their recognized contribution in reducing the enterprise's indirect costs of doing business (i.e., management realizes that incidents and their associated costs of recovery, which drain the enterprise's overhead, have diminished). The enterprise recovers information security costs through the positive effect of a stable environment within the enterprise (i.e., an increase in productivity). The information security program may be partially funded by its contribution to marketing. This ultimate level of documented systems integrity, availability, and confidentiality may become a marketing tool that encourages business expansion through consumer recognition of a quality boost to the enterprise's traditional product line. In addition, the information security program may be partially funded by marketing its own information security services externally. In this stage, information security protections are optimized across the enterprise. Enterprisewide protection strategies are continually reevaluated based on the needs and customized protection strategies identified by the enterprise's functional elements. Information security engineering activities (e.g., risk analyses, risk-reduction initiatives, audits, and research) are normal and continuous. Desirable security improvement suggestions come from end-users and system owners. In summary, the enterprise in Stage V, benevolence, knows that its assets are protected now and the enterprise is assured that its assets will continue to be adequately protected in the future. These assets are protected because the enterprise's planned, proactive information security activities are continually adjusting and optimizing their protection strategies. Information Security Program Improvement The five measurement categories for evaluating an enterprise's information security maturity are: management understanding and attitude, security organization status, incident handling, security economics, and security improvement actions. The following discussion outlines the steps necessary to improve an enterprise's ratings within the maturity categories. Management Understanding and Attitude To attain Stage II, awakening, management must approve the procurement of:

11 The vendor-supplied, built-in software security (e.g., virus scanners, password packages, backup software, Configuration Management tools, and tape archiving tools). The vendor-supplied, built-in hardware security (e.g., equipment with high mean-timebetween-failure ratings and inventorying a high number of line-replaceable units). To attain Stage III, enlightenment, management must support: The enterprisewide information security policies. The information security awareness training for end-users. To attain Stage IV, wisdom, management must: Attend security awareness training and actually obtain an understanding of the absolutes of information security engineering, and become able to make informed policy decisions. Promote information security. Empower organizational elements to augment the enterprise's information security program consistent with the needs of the organizational element's needs. To attain Stage V, benevolence, management must: Understand that information security engineering is an essential part of the enterprise's internal controls. Provide adequate resources and fully support the information security program to include internal research and development. Security Organization Status To attain Stage II, awakening, management must appoint an information security officer. To attain Stage III, enlightenment: Management must change the reporting structure of the information security officer to top management. The information security officer must develop a corporate information security policy based on the standard set of threats. The information security officer must institute a companywide information security training program. The enterprise must develop an information security strategy based on past incidents and on an analysis of the threat population and the vulnerabilities of the enterprise's assets. Existing information security safeguards must be evaluated and augmented based on risk analyses performed in response to the standard set of threats.

12 To attain Stage IV, wisdom: The information security officer must create an information security infrastructure. The information security officer must modify corporate information security policy based on a custom, enterprise-specific set of threats. Information security assessments must be updated periodically and penetration and audit capabilities must be supported. The information security officer must develop strategic alliances with other organizations (e.g., configuration management, product assurance, and procurement). To attain Stage V, benevolence: Top management must regularly meet with the information security officer. Information security must be able to address technical problems with leading-edge solutions obtained through internal research and development. Information security's role must expand into the community to augment the enterprise's image. Incident Handling To attain Stage II, awakening: The information security officer must collect incident reports. The information security officer must respond to security incidents. Rudimentary statistics must be collected to identify major trends. To attain Stage III, enlightenment: The information security officer must develop a formal incident reporting procedure. Incident reports must contain the relevant data required to enable timely, proper diagnosis of the incident. Detailed statistics must be collected and analyzed to more thoroughly define the information security threat. To attain Stage IV, wisdom: Threats must continually be reevaluated based on the changing threat population and on the security incidents enhancing the accuracy of the risk analyses. Legal actions must be prescribed for each type of incident. To attain Stage V, benevolence, incident data must be analyzed and fed back continually to improve the information security process.

13 Security Economics To attain Stage II, awakening, management must provide funding, albeit limited, for information security, allocated primarily for the procurement of safeguards supplied by vendors touting their built-in security. To attain Stage III, enlightenment, expenditures must be managed and justified and funding information security activities selected as a result of a risk analysis. To attain Stage IV, wisdom: Expenditures must be managed and continually justified through periodic risk analyses of greater accuracy, identifying additional or more cost-effective safeguards in response to the continually changing threat environment. Losses must be anticipated through cost/benefit trade-offs. To attain Stage V, benevolence: The cost savings aspect of a completely implemented information security program must be thoroughly understood and realized. Information security expenditures must be justified and reduced, and partial funding must be obtained by information security's contribution to marketing. Information security may generate its own marketing center. Security Improvement Actions To attain Stage II, awakening, the information security officer must begin to implement enterprisewide security policies and procedures. To attain Stage III, enlightenment: The information security officer must provide a security awareness training program to encourage end-users to be more vigilant and to initiate more incident reports. Management must understand the business necessity for security. Management must fund the information security engineering activities of awareness training, risk analysis, risk-reduction initiatives, and audits. To attain Stage IV, wisdom: Risks must be accurately evaluated and managed. Information security engineering research activities must be initiated to keep up with the rapidly changing environment. Information security awareness must be expanded to a continuous, technical, and detailed security training program. To attain Stage V, benevolence: The information security engineering activities (e.g., risk analyses, risk-reduction initiatives, audits, and research) must become normal, continual activities.

14

15

16

17

18 The information security officer must obtain desirable security improvement suggestions from end-users and system owners. How to Prepare A Security Maturity Profile To prepare a grid, assessors simply review each cell on the Information Security Program Maturity Grid (see Exhibit 2 ) to determine whether that cell best describes their enterprise's level of maturity. If only the bottom row applies for each column, that category should be considered immature. If the second or third row applies, that category should be considered moderately mature. If the fourth or fifth row applies, that category should be considered mature. Sample Security Maturity Grid Profiles Exhibits 3, 4, 5, and 6 provide enterprises' summation of their information security posture as well as a sample Information Security Program Maturity Grid for that posture. Conclusion The Information Security Program Maturity Grid is a tool introduced to aid managers in the appraisal of an enterprise's information security program. In addition, information security program improvement initiatives have been proposed for each of the measurement categories. Author Biographies Timothy R. Stacey Timothy R. Stacey is employed by Science Applications International Corporation, a division of Rockwell Space Operations Company, Houston, Texas.

Jason Bennett Thatcher Clemson University, 101 Sirrine Hall, Clemson, SC 29634 U.S.A. {jthatch@clemson.edu}

Jason Bennett Thatcher Clemson University, 101 Sirrine Hall, Clemson, SC 29634 U.S.A. {jthatch@clemson.edu} RESEARCH ARTICLE IS EMPLOYEE ATTITUDES AND PERCEPTIONS AT VARYING LEVELS OF SOFTWARE PROCESS MATURITY Janet K. Ply Pendére, Inc., 1805 S. 9 th Street, Waco, TX 76706 U.S.A. {janet.ply@pendere.com} Jo Ellen

More information

Security Engineering Best Practices. Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 ferraiolo@arca.com.

Security Engineering Best Practices. Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 ferraiolo@arca.com. Tutorial: Instructor: Topics: Biography: Security Engineering Best Practices Karen Ferraiolo, Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 ferraiolo@arca.com This tutorial

More information

The Capability Maturity Model for Software, Version 1.1

The Capability Maturity Model for Software, Version 1.1 The Capability Maturity Model for Software, Version 1.1 Mark C. Paulk xxx 1998 Carnegie Mellon University Pittsburgh, PA 15213-3890 Sponsored by the U.S. Department of Defense. 1997 by Carnegie Mellon

More information

USING SECURITY METRICS TO ASSESS RISK MANAGEMENT CAPABILITIES

USING SECURITY METRICS TO ASSESS RISK MANAGEMENT CAPABILITIES Christina Kormos National Agency Phone: (410)854-6094 Fax: (410)854-4661 ckormos@radium.ncsc.mil Lisa A. Gallagher (POC) Arca Systems, Inc. Phone: (410)309-1780 Fax: (410)309-1781 gallagher@arca.com USING

More information

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire

More information

Benchmarking Organizational Project Management Capability

Benchmarking Organizational Project Management Capability Benchmarking Organizational Project Management Capability David Hillson, PMP, Ph.D., FAPM APMP MIMgt, Director of Consultancy, Project Management Professional Solutions Limited Introducing the Project

More information

Information Security Managing The Risk

Information Security Managing The Risk Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the

More information

Leveraging a Maturity Model to Achieve Proactive Compliance

Leveraging a Maturity Model to Achieve Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................

More information

Chapter 4 Information Security Program Development

Chapter 4 Information Security Program Development Chapter 4 Information Security Program Development Introduction Formal adherence to detailed security standards for electronic information processing systems is necessary for industry and government survival.

More information

PROCESS IMPROVEMENT CAPABILITY MATURITY MODEL

PROCESS IMPROVEMENT CAPABILITY MATURITY MODEL PROCESS IMPROVEMENT CAPABILITY MATURITY MODEL Immature versus Mature Software Organisations In an immature software organisation, software processes are generally improvised by practitioners and their

More information

DATA QUALITY MATURITY

DATA QUALITY MATURITY 3 DATA QUALITY MATURITY CHAPTER OUTLINE 3.1 The Data Quality Strategy 35 3.2 A Data Quality Framework 38 3.3 A Data Quality Capability/Maturity Model 42 3.4 Mapping Framework Components to the Maturity

More information

P3M3 Portfolio Management Self-Assessment

P3M3 Portfolio Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction

More information

PACB One-Day Cybersecurity Workshop

PACB One-Day Cybersecurity Workshop PACB One-Day Cybersecurity Workshop WHAT IS CYBERSECURITY? PRESENTED BY: JON WALDMAN, SBS CISA, CRISC 1 Contact Information Jon Waldman Partner, Senior IS Consultant CISA, CRISC Masters of Info Assurance

More information

OCC 98-3 OCC BULLETIN

OCC 98-3 OCC BULLETIN To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel

More information

82-01-16 Certification of Externally Developed Software Craig A. Schiller Payoff

82-01-16 Certification of Externally Developed Software Craig A. Schiller Payoff 82-01-16 Certification of Externally Developed Software Craig A. Schiller Payoff Developers of large systems spend thousands of dollars ensuring that the software they create performs as expected, that

More information

Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview

Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve

More information

Lecture 8 About Quality and Quality Management Systems

Lecture 8 About Quality and Quality Management Systems Lecture 8 About Quality and Quality Management Systems Kari Systä 10.03.2014 10.03.2014 TIE-21100/21106; K.Systä 1 Content of today s lecture Two weeks ago we discussed about testing and inspections, that

More information

Software Project Measurement

Software Project Measurement Software Project Measurement We can t accurately measure software, yet we must have measures if we are to understand large-scale design. This lecture discusses: the practical aims of measurement; the measures

More information

Study of Security Awareness Training

Study of Security Awareness Training Study of Security Awareness Training Steve Kruse,Security Principal @ RSA Bill Pankey, Consultant @Tunitas Group Paradox Explanations Conclusions Innovation Norway Feb 04, 2010 CSI / FBI Computer Crime

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of

More information

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE

More information

Simply Sophisticated. Information Security and Compliance

Simply Sophisticated. Information Security and Compliance Simply Sophisticated Information Security and Compliance Simple Sophistication Welcome to Your New Strategic Advantage As technology evolves at an accelerating rate, risk-based information security concerns

More information

Risk Knowledge Capture in the Riskit Method

Risk Knowledge Capture in the Riskit Method Risk Knowledge Capture in the Riskit Method Jyrki Kontio and Victor R. Basili jyrki.kontio@ntc.nokia.com / basili@cs.umd.edu University of Maryland Department of Computer Science A.V.Williams Building

More information

HIPAA. Administrative Simplification

HIPAA. Administrative Simplification Ecora Corp. 500 Spaulding Turnpike, Suite W310 P.O. Box 3070 Portsmouth, NH 03802-3070 http://www.ecora.com HIPAA Administrative Simplification Managing the Impact On Your IT Department Prepared by Beverly

More information

Feature. Developing an Information Security and Risk Management Strategy

Feature. Developing an Information Security and Risk Management Strategy Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide

More information

Information Technology Auditing for Non-IT Specialist

Information Technology Auditing for Non-IT Specialist Information Technology Auditing for Non-IT Specialist IIA Pittsburgh Chapter October 4, 2010 Agenda Introductions What are General Computer Controls? Auditing IT processes controls Understanding and evaluating

More information

Configuration Management System:

Configuration Management System: True Knowledge of IT infrastructure Part of the SunView Software White Paper Series: Service Catalog Service Desk Change Management Configuration Management 1 Contents Executive Summary... 1 Challenges

More information

Introduction UNDERSTANDING BUSINESS CONTINUITY MANAGEMENT

Introduction UNDERSTANDING BUSINESS CONTINUITY MANAGEMENT INFORMATION SECURITY: UNDERSTANDING BUSINESS CONTINUITY MANAGEMENT FACTSHEET This factsheet will introduce you to Business Continuity Management (BCM), which is a process developed to counteract systems

More information

PDQ Tek. PDQpos.com. 760 Veterans Circle; Warminster, PA 18974 877-968-6430

PDQ Tek. PDQpos.com. 760 Veterans Circle; Warminster, PA 18974 877-968-6430 PDQ Tek PDQpos.com 760 Veterans Circle; Warminster, PA 18974 877-968-6430 Developing Symbiotic Relationships for over 29 years PDQTek.com PROcureItFast.com YourBusinessSecurity.com PDQpos.com Part 1: Who

More information

Integrated Risk Management:

Integrated Risk Management: Integrated Risk Management: A Framework for Fraser Health For further information contact: Integrated Risk Management Fraser Health Corporate Office 300, 10334 152A Street Surrey, BC V3R 8T4 Phone: (604)

More information

Solving IT systems management and service management challenges with help of IBM Tivoli Overview

Solving IT systems management and service management challenges with help of IBM Tivoli Overview Solving IT systems management and service management challenges with help of IBM Tivoli Overview Ēriks Miķelsons Tivoli Product Sales Manager Baltic Countries October 10, 2007 Vilnius Innovation is the

More information

White Paper from Global Process Innovation. Fourteen Metrics for a BPM Program

White Paper from Global Process Innovation. Fourteen Metrics for a BPM Program White Paper from Global Process Innovation by Jim Boots Fourteen Metrics for a BPM Program This white paper presents 14 metrics which may be useful for monitoring progress on a BPM program or initiative.

More information

Managed Services. Enhance Profitability Mitigate Risk

Managed Services. Enhance Profitability Mitigate Risk Managed Services Enhance Profitability Mitigate Risk Enhancing Profitability and Mitigating Risk Gone are the days when the mere presence of Information Technology (IT) represented a competitive business

More information

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations

More information

How To Check If Nasa Can Protect Itself From Hackers

How To Check If Nasa Can Protect Itself From Hackers SEPTEMBER 16, 2010 AUDIT REPORT OFFICE OF AUDITS REVIEW OF NASA S MANAGEMENT AND OVERSIGHT OF ITS INFORMATION TECHNOLOGY SECURITY PROGRAM OFFICE OF INSPECTOR GENERAL National Aeronautics and Space Administration

More information

Business Case. for an. Information Security Awareness Program

Business Case. for an. Information Security Awareness Program Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security

More information

The Scrum Guide. The Definitive Guide to Scrum: The Rules of the Game. July 2013. Developed and sustained by Ken Schwaber and Jeff Sutherland

The Scrum Guide. The Definitive Guide to Scrum: The Rules of the Game. July 2013. Developed and sustained by Ken Schwaber and Jeff Sutherland The Scrum Guide The Definitive Guide to Scrum: The Rules of the Game July 2013 Developed and sustained by Ken Schwaber and Jeff Sutherland Table of Contents Purpose of the Scrum Guide... 3 Definition of

More information

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security, Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security, streamline compliance reporting, and reduce the overall

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

Performance Appraisal Review for Exempt Employees

Performance Appraisal Review for Exempt Employees Client Company Performance Appraisal Review for Exempt Employees Employee Name Department Title Date Started Current Position Date of Review Current Supervisor Instructions Review employee s performance

More information

IBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security

IBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security IBM Internet Security Systems October 2007 FISMA Compliance A Holistic Approach to FISMA and Information Security Page 1 Contents 1 Executive Summary 1 FISMA Overview 3 Agency Challenges 4 The IBM ISS

More information

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,

More information

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK MAXIMIZE PERFORMANCE AND REDUCE RISK 1 BROCHURE COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications systems have become increasingly complex as more features and

More information

A Capability Maturity Model for Scientific Data Management

A Capability Maturity Model for Scientific Data Management A Capability Maturity Model for Scientific Data Management 1 A Capability Maturity Model for Scientific Data Management Kevin Crowston & Jian Qin School of Information Studies, Syracuse University July

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Case Study of CMMI implementation at Bank of Montreal (BMO) Financial Group

Case Study of CMMI implementation at Bank of Montreal (BMO) Financial Group Case Study of CMMI implementation at Bank of Montreal (BMO) Financial Group Background Started in 1817, Bank of Montreal - BMO Financial Group (NYSE, TSX: BMO) is a highly diversified financial services

More information

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM Chandramohan Muniraman, Meledath Damodaran, Amanda Ryan University of Houston-Victoria Abstract As in any information management system security

More information

Operational Risk Management - The Next Frontier The Risk Management Association (RMA)

Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational risk is not new. In fact, it is the first risk that banks must manage, even before they make their first

More information

GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office.

GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office. GAO United States General Accounting Office Internal Control November 1999 Standards for Internal Control in the Federal Government GAO/AIMD-00-21.3.1 Foreword Federal policymakers and program managers

More information

NIST Cybersecurity Framework What It Means for Energy Companies

NIST Cybersecurity Framework What It Means for Energy Companies Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber

More information

fs viewpoint www.pwc.com/fsi

fs viewpoint www.pwc.com/fsi fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a

More information

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.

OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. OPTIMUS SBR CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. Optimizing Results with Business Intelligence Governance This paper investigates the importance of establishing a robust Business Intelligence (BI)

More information

NASCIO Recognition Award Nomination - 2009. IT Project and Portfolio Management

NASCIO Recognition Award Nomination - 2009. IT Project and Portfolio Management NASCIO Recognition Award Nomination - 2009 IT State of North Carolina Enterprise Project Management Office June 3, 2009 Executive Summary The Enterprise Project Management Office () was established in

More information

4-06-55 Controlling Data Resources in Distributed Environments Barbara Grant

4-06-55 Controlling Data Resources in Distributed Environments Barbara Grant 4-06-55 Controlling Data Resources in Distributed Environments Barbara Grant Payoff As the role of data in an organization expands and data becomes increasingly related to profitability, the impact of

More information

A new paradigm for EHS information systems: The business case for moving to a managed services solution

A new paradigm for EHS information systems: The business case for moving to a managed services solution White Paper A new paradigm for EHS information systems: The business case for moving to a managed services solution Business solutions through information technology TM Entire contents 2005 by CGI Group

More information

THE ORGANISATION. Senior Management Major end users (divisions) Information Systems Department

THE ORGANISATION. Senior Management Major end users (divisions) Information Systems Department THE ORGANISATION Senior Management Major end users (divisions) Information Systems Department Technology Hardware Software Information Systems Specialists CIO Managers Systems analysts Systems designers

More information

Information Security Management System for Microsoft s Cloud Infrastructure

Information Security Management System for Microsoft s Cloud Infrastructure Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

SOFTWARE QUALITY MANAGEMENT THROUGH IMPLEMENTATION OF SOFTWARE STANDARDS

SOFTWARE QUALITY MANAGEMENT THROUGH IMPLEMENTATION OF SOFTWARE STANDARDS 4 th Int. Conf. CiiT, Molika, Dec.11-14, 2003 61 SOFTWARE QUALITY MANAGEMENT THROUGH IMPLEMENTATION OF SOFTWARE STANDARDS S. Grceva, Z. Zdravev Faculty for Education Goce Delcev, University of Sts. Cyril

More information

Develop Project Charter. Develop Project Management Plan

Develop Project Charter. Develop Project Management Plan Develop Charter Develop Charter is the process of developing documentation that formally authorizes a project or a phase. The documentation includes initial requirements that satisfy stakeholder needs

More information

Information Security Program

Information Security Program Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security

More information

The Information Assurance Process: Charting a Path Towards Compliance

The Information Assurance Process: Charting a Path Towards Compliance The Information Assurance Process: Charting a Path Towards Compliance A white paper on a collaborative approach to the process and activities necessary to attain compliance with information assurance standards.

More information

Vulnerability Management. Information Technology Audit. For the Period July 2010 to July 2011

Vulnerability Management. Information Technology Audit. For the Period July 2010 to July 2011 O L A OFFICE OF THE LEGISLATIVE AUDITOR STATE OF MINNESOTA FINANCIAL AUDIT DIVISION REPORT Vulnerability Management Information Technology Audit For the Period July 2010 to July 2011 May 22, 2012 Report

More information

Cost-Effective Alternatives to Software Asset Management. kpmg.com

Cost-Effective Alternatives to Software Asset Management. kpmg.com Cost-Effective Alternatives to Software Asset Management kpmg.com Contents Executive Summary 1 Introduction 2 Key SAM issues 4 A cost-effective approach to SAM 6 Benefits of SAM 8 Conclusion 9 Cost-Effective

More information

Click to edit Master title style

Click to edit Master title style EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all

More information

The Systems Security Engineering Capability Maturity Model (SSE-CMM)

The Systems Security Engineering Capability Maturity Model (SSE-CMM) The Systems Security Engineering Capability Maturity Model (SSE-CMM) Karen Ferraiolo ISSEA Director of Technical Development karen.ferraiolo@exodus.net 410-309-1780 Topics Why define security engineering

More information

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

Root Cause Analysis Concepts and Best Practices for IT Problem Managers

Root Cause Analysis Concepts and Best Practices for IT Problem Managers Root Cause Analysis Concepts and Best Practices for IT Problem Managers By Mark Hall, Apollo RCA Instructor & Investigator A version of this article was featured in the April 2010 issue of Industrial Engineer

More information

AUDIT REPORT. The Energy Information Administration s Information Technology Program

AUDIT REPORT. The Energy Information Administration s Information Technology Program U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department

More information

case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:

case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME: The Computerworld Honors Program Summary developed the first comprehensive penetration testing product for accurately identifying and exploiting specific network vulnerabilities. Until recently, organizations

More information

NASA S PROCESS FOR ACQUIRING INFORMATION TECHNOLOGY SECURITY ASSESSMENT AND MONITORING TOOLS

NASA S PROCESS FOR ACQUIRING INFORMATION TECHNOLOGY SECURITY ASSESSMENT AND MONITORING TOOLS MARCH 18, 2013 AUDIT REPORT OFFICE OF AUDITS NASA S PROCESS FOR ACQUIRING INFORMATION TECHNOLOGY SECURITY ASSESSMENT AND MONITORING TOOLS OFFICE OF INSPECTOR GENERAL National Aeronautics and Space Administration

More information

PACIFIC EXPLORATION & PRODUCTION CORPORATION (the Corporation )

PACIFIC EXPLORATION & PRODUCTION CORPORATION (the Corporation ) PRIVACY POLICY (Initially adopted by the Board of Directors on November 16, 2007) PACIFIC EXPLORATION & PRODUCTION CORPORATION (the Corporation ) The Corporation is committed to controlling the collection,

More information

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be

More information

FIVE PRACTICAL STEPS

FIVE PRACTICAL STEPS WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND

More information

Business Continuity Position Description

Business Continuity Position Description Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary

More information

Seven Principles of Change:

Seven Principles of Change: Managing Change, LLC Identifying Intangible Assets to Produce Tangible Results Toll Free: 877-880-0217 Seven Principles of Change: Excerpt from the new book, Change Management: the people side of change

More information

Best Value toolkit: Information management

Best Value toolkit: Information management Best Value toolkit: Information management Prepared by Audit Scotland July 2010 Contents Introduction 2 The Audit of Best Value 2 The Best Value toolkits 4 Using the toolkits 4 Auditors evaluations 5 Best

More information

5-04-45 Operating Standards and Practices for LANs Leo Wrobel

5-04-45 Operating Standards and Practices for LANs Leo Wrobel 5-04-45 Operating Standards and Practices for LANs Leo Wrobel Payoff Operating standards for LANs offer certain advantages for keeping expenses for procurement, maintenance, and support under control At

More information

Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications

Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Suggested Reference : Senft, Sandra; Gallegos, Frederick., 2009.

More information

Software as a Service Offers Broadening Appeal for Small and Medium-Sized Discrete Manufacturers

Software as a Service Offers Broadening Appeal for Small and Medium-Sized Discrete Manufacturers Software as a Service Offers Broadening Appeal for Small and Medium-Sized Discrete Manufacturers WHITE PAPER Sponsored by: SAP Simon Ellis November 2010 IDC MANUFACTURING INSIGHTS OPINION Software as a

More information

AUTOMATED PENETRATION TESTING PRODUCTS

AUTOMATED PENETRATION TESTING PRODUCTS AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for an automated penetration testing product and demonstrate

More information

Best Practices to Achieve CMMI Level 2 Configuration Management Process Area through VSS tool

Best Practices to Achieve CMMI Level 2 Configuration Management Process Area through VSS tool Best Practices to Achieve CMMI Level 2 Configuration Management Process Area through VSS tool Prerna Gupta prernagupta2k7@gmail.com Co-Author Dr.D.S.RAO Dr.dsrao@yahoo.in Abstract Over the past years,

More information

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

Data Privacy and Gramm- Leach-Bliley Act Section 501(b) Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement

More information

82-10-41 Identifying Information Security Threats Timothy R. Stacey Ronald E. Helsley Judith V. Baston Payoff

82-10-41 Identifying Information Security Threats Timothy R. Stacey Ronald E. Helsley Judith V. Baston Payoff 82-10-41 Identifying Information Security Threats Timothy R. Stacey Ronald E. Helsley Judith V. Baston Payoff The success of an enterprises information security risk-based management program is based on

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential

More information

Conquering PCI DSS Compliance

Conquering PCI DSS Compliance Any organization that stores, processes or transmits information related to credit and debit card payments has a responsibility to protect each cardholder s personal data. To help accomplish this goal,

More information

Change Management. Why Change Management? CHAPTER

Change Management. Why Change Management? CHAPTER Change Management 19 CHAPTER In this chapter, you will Learn why change management is an important enterprise management tool Understand the key concept of segregation of duties Review the essential elements

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Front Metrics Technologies Pvt. Ltd. Capacity Management Policy, Process & Procedures Document

Front Metrics Technologies Pvt. Ltd. Capacity Management Policy, Process & Procedures Document Pvt. Ltd. Capacity Management Policy, Process & Procedures Document Client: Pvt. Ltd. Date : 03/04/2011 Version : 0.6 GENERAL Description Purpose Applicable to Supersedes This document establishes a Capacity

More information

REFERENCE 5. White Paper Health Insurance Portability and Accountability Act: Security Standards; Implications for the Healthcare Industry

REFERENCE 5. White Paper Health Insurance Portability and Accountability Act: Security Standards; Implications for the Healthcare Industry REFERENCE 5 White Paper Health Insurance Portability and Accountability Act: Security Standards; Implications for the Healthcare Industry Shannah Koss, Program Manager, IBM Government and Healthcare This

More information

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce Maturity Model March 2006 Version 1.0 P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value Added product which is outside the scope of the HMSO

More information

Developing CMMI in IT Projects with Considering other Development Models

Developing CMMI in IT Projects with Considering other Development Models Developing CMMI in IT Projects with Considering other Development Models Anahita Ahmadi* MSc in Socio Economic Systems Engineering Organizational Process Development Engineer, International Systems Engineering

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Governance, Risk, and Compliance (GRC) White Paper

Governance, Risk, and Compliance (GRC) White Paper Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:

More information