Today s Financial Services IT Organization Delivering Security, Value and Performance Amid Major Transformation

Size: px
Start display at page:

Download "Today s Financial Services IT Organization Delivering Security, Value and Performance Amid Major Transformation"

Transcription

1 Today s Financial Services IT Organization Delivering Security, Value and Performance Amid Major Transformation Assessing the Financial Services Industry Results from Protiviti s 2014 IT Priorities and IT Security & Privacy Surveys In 2014, Protiviti conducted two independent surveys to assess the priorities and issues facing IT professionals across the globe the 2014 IT Priorities Survey and the 2014 IT Security and Privacy Survey. While the results are generally consistent across industries, there are some interesting nuances in the results from Financial Services respondents. 71 percent of financial services organizations are undergoing a major IT transformation If there is one word to describe the state of IT organizations in 2014, it is transformation. The results of Protiviti s 2014 IT Priorities Survey confirm that IT transformation has become the new normal for companies: Nearly two-thirds of all respondents (63 percent) reported that some form of major IT transformation is under way in their organizations. The results are even more pronounced among financial services organizations, with 71 percent reporting they have a major IT transformation occurring. Even more important: Not only is IT altering its structure, the function is also transforming its fundamental mission. IT s objective is shifting from simply leveraging technology to automate business processes to the higher-reaching goal of protecting and enhancing business value. This shift also is evident in the changing role and ever-increasing workload of the CIO. Seventy percent of CIOs said they see themselves as a future CEO, according to a recent survey by The Wall Street Journal. 1 CIOs are certainly putting in the work to get there: The issues and activities identified by CIOs and IT executives in our study indicate that they need to address these items in order to keep the business running and support challenging strategic initiatives. In fact, responses from all of our participants more than 1,100 in total and 79 from the financial services industry specifically indicate IT functions have scores of significant priorities and likely are being pulled in multiple directions to address countless critical challenges. Among the most notable for 2014: Enhancing and protecting business value The integration and alignment of IT planning and business strategy represents a paramount priority. In fact, enhancing and protecting the value of the organization via data security as well as other IT risk management and business continuity 1 Bussey, John, CIOs Eye the Corner Office, The Wall Street Journal, Feb. 10, 2014:

2 capabilities is top-of-mind not only for IT organizations, but also for their organizations boards and executive management teams. All eyes are on security Massive security breaches continue, with some organizations being questioned by congressional committees in recent months. More than ever before, this has IT departments as well as boards and executive management on edge, on notice and, in some cases, testifying under oath. Strengthening privacy and security around the organization s systems and data is now a top priority across all industries. Managing and classifying all that data As the need for stronger information security intensifies, CIOs and IT professionals are seeking out more effective ways to stratify the importance of the information they have, and organize and secure the growing volume of data they must manage. Strengthening IT asset and data management Companies are seeking to improve their data and information governance programs, a need no doubt driven by the growing use of mobile devices and applications, social media, the burgeoning Internet of Things (IoT) and the continued integration of cloud computing into IT strategy and processes. More mobile, more social Mobile commerce management, mobile security and mobile integration remain focal points for IT departments, even as security-related priorities compete for their time and resources. A similar trend holds for social media, as organizations continue to rely on IT to support their investment in social media activities while improving the integration of these capabilities with other IT assets. Additionally, the results of our 2014 IT Security and Privacy survey highlight the criticality of these important topics facing IT leaders. With the plethora of cyberattacks and data breaches both publicized and otherwise that have occurred over the past year, prevailing wisdom suggests companies are working diligently to get their houses in order with regard to IT and data security and privacy. In our study, responses from 347 IT executives and professionals, including 59 from financial services, clearly indicate that data is the lifeblood of most organization and an increasingly important topic at the Board level, yet critical gaps still exist in organizations ability to respond to ever-changing threats. The key findings from this survey: Board engagement is a key differentiator in the strength of IT security profiles Nearly three out of four boards are viewed to have a good level of understanding about the organization s information security risks. Even more important, as is evident throughout our results, organizations with a high level of board engagement in these risks have significantly stronger IT security profiles. There remains a surprising lack of key core information security policies One in three companies do not have a written information security policy (WISP). More than 40 percent lack a data encryption policy. One in four do not have acceptable use or record retention/destruction policies. These are critical gaps in data governance and management, and ones that carry considerable legal implications. On the other hand, organizations with all of these key data policies in place have far more robust IT security environments and capabilities. Protiviti 2

3 Not all data is equal The percentage of organizations that retain all data and records without a defined destruction date has more than doubled not necessarily a positive development. Companies can t protect everything designating a subset of their data deemed most critical will help with their data security measures. Organizations lack high confidence in their ability to prevent a cyberattack or data breach While executive management has a higher level of awareness when it comes to the organization s information security exposures, lower confidence levels among IT executives and professionals in preventing an attack or breach likely speak to the creativity of cyberattackers and, in many respects, the inevitability of a breach and the need for strong incident response planning and execution. Many are still unprepared for a crisis There is a significant year-over-year jump in the number of organizations without a formal and documented crisis response plan to execute in the event of a data breach or cyberattack. And less than half perform periodic fire drills to test their plans. Taken in total, these findings are consistent with Protiviti s view of the issues facing FSI IT executives, which we also explored in a recent issue of Protiviti s FS Insights. 2 As we detail in that newsletter, these industry priorities generally fall into one of six areas: Risk and compliance Security and privacy Service assurance Operating efficiency Innovation Disruptive technology It s our position that these issues form a hierarchy of priorities that FSI IT executives must seek to address. The financial services industry results from our 2014 IT Priorities and 2014 IT Security and Privacy surveys, as summarized in the following pages, mirror these areas and challenges.. 2 FS Insights, Volume 4, Issue 7, The Hierarchy of IT Concerns and the Ambiguous Cloud of Emerging Technology, Protiviti, Emerging-Technology-Protiviti.pdf. Protiviti 3

4 Technical Knowledge Regulatory compliance, including Cybersecurity Frameworks, PCI DSS, FISMA and GSEC, are viewed as significantly higher priorities for financial services organizations compared to the overall respondent group an indication of ongoing regulatory and security pressures in the industry. IT governance and IT risk management are critical issues for FSI respondents, as evidenced by high scores for data governance, IT program and IT project management, and COBIT. Emerging technologies are top of mind, with FSI participants ranking social media security and Big Data among their top priorities. However, cloud adoption lags other industry respondents. We expect this to change in future surveys as pressures to adopt cloud technologies rise. Although FSI organizations are increasing spending on mobile enablement of their services, integration with mobile commerce is surprisingly a lower rated priority. We expect to see this rise in priority in the upcoming surveys. Top 10 Priorities (including ties) Virtualization Cybersecurity Frameworks Data governance IT program management IT project management PCI DSS COBIT FISMA IT project management Virtualization IT program management Cloud computing Data governance ERP systems Data breach and privacy laws (various U.S. states) PMP Big Data ISO/IEC and Social media security Mobile commerce security Smart device integration Protiviti 4

5 Bottom 10 Priorities (including ties) ERP systems BYOD policies/programs CISM Mobile commerce integration Mobile commerce security Mobile commerce policy Cloud storage of data ISO (Risk Management) CISA CGEIT Cybersecurity Frameworks CGEIT GSEC FISMA CISA Social media policy PCI DSS COBIT European Union Data Directive CISSP CISM Protiviti 5

6 Managing Security and Privacy Incident response stands out as a critical priority for financial services companies, which is no surprise. This reflects the high volume of DDoS attacks and other cybersecurity issues in the industry. Without question, financial services companies remain a target in cyberwarfare, and firms are being forced to rethink who is at the table during an incident response. No longer is this a world dominated by IT, but included corporate communications, legal, risk management, marketing and the like. Also not surprisingly, board-level focus on cybersecurity is higher among financial services industry respondents than other survey participants. Interestingly, the U.S. Gramm-Leach Bliley Act (GLBA) is ranked as a lower priority for FSI respondents, perhaps a reflection of prior investments in this area. Surprisingly, clarity around third-party compliance readiness (partners, vendors) was a bottom five priority. We suspect that this may rise in importance in the wake of recent issues in this area and regulatory pressure to step up focus on third parties. The results indicate that financial services organizations have adopted application service providers (ASPs) more broadly than other industries, yet the adoption of cloud solutions remains very low. Financial institutions are significantly more mature in their data classification efforts than other industries. Top 5 Priorities 2014 IT Priorities Survey Incident response success (containment, recovery) Incident response reaction time Monitoring security events Managing user identities and access Monitoring security events Managing user identities and access Implementing security/privacy solutions and strategies Incident response policy and preparedness Incident response success (containment, recovery) Incident response reaction time Protiviti 6

7 Bottom 5 Priorities 2014 IT Priorities Survey U.S. Gramm-Leach Bliley Act (GLBA) Clarity about third-party compliance readiness (partners, vendors) U.S. Health Insurance Portability and Accountability Act (HIPAA) California Security Breach Information Act (SB 1386) Managing technical infrastructure configuration U.S. Gramm-Leach Bliley Act (GLBA) U.S. Health Insurance Portability and Accountability Act (HIPAA) California Security Breach Information Act (SB 1386) Managing third-party vendors Managing contractors Notable industry variances from the results of Protiviti s 2014 IT Security and Privacy Survey include the following: How has recent press coverage on "cyberwarfare" and/or "cybersecurity" affected your interest in, and focus on, the subject of information security? Significantly more interest and focus All Other Respondents 58% 31% How engaged is your board of directors with information security risks relating to your business? High engagement and level of understanding by the board All Other Respondents 38% 32% Protiviti 7

8 Where is your company's sensitive data stored? All Other Respondents On-site servers 68% 69% Off-site servers 26% 14% Cloud-based vendor 3% 6% Not stored in any centralized location 3% 8% Don t know 0% 3% Does your company have a clear data classification scheme and policy in place that categorize the organization's data and information-sensitive, confidential, public etc.? Scheme Yes 84% 69% No 16% 24% Don't know 0% 7% Policy Yes 94% 86% No 6% 12% Don't know 0% 2% Protiviti 8

9 Defining IT Governance and Strategy FSI organizations rank reporting IT activities and performance, along with managing and monitoring policy exceptions, as lower priorities compared to the overall survey response this reflects a longtime focus on these areas in the industry and, likely, the fact that FSI organizations have a better handle on them than companies in other industries. However, business alignment, IT risk management, and regulatory compliance remain top concerns for financial services institutions. Top 5 Priorities Integration/alignment of IT planning and business strategy Long-term and short-term planning IT risk analysis and reporting Monitoring IT costs and benefits Monitoring and achieving legal/regulatory compliance Integration/alignment of IT planning and business strategy Managing project quality Developing and maintaining security and privacy standards Long-term and short-term planning Key performance indicators (KPIs) Bottom 5 Priorities (including ties) Managing and monitoring policy exceptions Reporting IT activities and performance Developing and maintaining end user support policies and standards Developing and maintaining operations management policies and standards Negotiating, managing and monitoring customer service-level agreements (SLAs) Defining organizational placement of the IT function Negotiating, managing and monitoring information quality Defining IT roles and responsibilities Managing and monitoring policy exceptions Defining metrics and measurements for monitoring IT performance Developing and maintaining operations management policies and standards Defining metrics and measurements for monitoring IT performance Protiviti 9

10 Managing Application Development Although traditionally defined ERP systems are not typically found in the FSI domain, bolt-on applications rank significantly higher as a priority for FSI organizations likely a reflection of the need to augment functionality in existing, complex infrastructures. The demand for CRM, data warehousing and BI tools are critical issues for many financial services organizations. We interpret the focus on ERP systems implementation and ERP application security to be reflections of packaged software considerations broadly. Interestingly, risk management ranks as a much lower priority for financial services organizations compared to the overall response group. This appears inconsistent with other response areas that highlight overall IT risk management as a priority, but this may be an outcome of the industry s historic focus on testing and quality assurance in the specific area of application development. Top 5 Priorities ERP system "bolt-on" applications (BI, CRM, etc.) Mobile application development ERP system implementation Project monitoring and control ERP application security Risk management ERP application security Project monitoring and control Requirements management Collaboration platforms (for example, SharePoint) Bottom 5 Priorities (including ties) Object-oriented programming Spiral iterative framework Organizational process performance Rapid application development framework Scrum development methodology Spiral iterative framework Causal analysis and resolution Scrum development methodology Spreadsheet risk Organizational training Rapid application development framework Protiviti 10

11 Deploying and Maintaining Solutions Developing applications which includes the development of mobile apps ranks higher as a priority for FSI organizations. This is understandable given the push to mobile banking and ongoing changes in consumer behavior. Higher priority rankings for developing and maintaining application interfaces and managing changes in applications developed in-house are indicators of continuing pressures within the industry to innovate. Top 5 Priorities Developing applications Managing changes third-party applications Managing changes applications developed inhouse Developing and maintaining application interfaces Developing and maintaining application interfaces Managing changes applications developed inhouse Managing changes third-party applications Developing applications Acquiring applications Acquiring applications Protiviti 11

12 Managing IT Infrastructure Unlike some of the other categories in our survey, the response from FSI participants generally mirrors the overall results. These priorities including managing and administering backup recovery, managing and maintaining job processing, and IT infrastructure change management, among others reflect heightened expectations among users, as well as the importance of IT organizations within FSI companies to be available 24 hours a day to provide service. Top 5 Priorities Managing and administering backup and recovery Managing and administering backup and recovery Managing and maintaining job processing Storage management and planning IT infrastructure change management Database change management Operating system change management IT infrastructure change management Storage management and planning Network performance planning Protiviti 12

13 Managing IT Assets Similar to the Managing IT Infrastructure category, IT asset management priorities for FSI organizations generally mirror the overall response. Monitoring and accounting for IT assets has grown more complex due to smart device proliferation, growing workforce mobility and the IT function s reliance on external partners. In this environment, software and hardware deployment, along with managing software licensing and compliance, are the most significant IT asset management priorities. Of particular concern are retirement issues, including but not limited to licensing recovery and sensitive data contained on retired assets. Top 5 Priorities (including ties) Software deployment Software deployment Managing software licensing and compliance Hardware deployment Hardware deployment Managing software licensing and compliance Accounting for IT asset management Managing hardware maintenance agreements Monitoring IT assets Monitoring IT assets Managing audit process (SAS 70, SSAE 16, others) Protiviti 13

14 Management and Use of Data Assets For FSI organizations, data governance is rated even higher than the scores for the overall respondent group (which are already high). Likely reasons: a history of M&A activity within the financial services industry and fragmented data silos, along with the importance of data as an enterprise asset in the financial services industry. Also driving these priorities are increasing regulatory scrutiny and the need to obtain a 360- degree view of the customer. Top 5 Priorities (including ties) Data and information governance program Short- and long-term enterprise information management strategy Master data management Business intelligence and reporting tools Data and information governance program Master data management Data lifecycle management Data analytics platforms and support Big data initiatives Business intelligence and reporting tools Short- and long-term enterprise information management strategy Protiviti 14

15 Ensuring Continuity Interestingly, business continuity management has lower scores than the overall survey response, perhaps a reflection of the regulatory pressures and past investments in this space by financial services organizations. Top 5 Priorities Ensuring business alignment Developing and maintaining IT disaster recovery plans Ensuring executive management support and sponsorship Developing and maintaining crisis management plans Designing and maintaining business continuity strategies Business continuity management and disaster recovery program testing Developing and maintaining IT disaster recovery plans Ensuring business alignment Ensuring executive management support and sponsorship Designing and maintaining business continuity strategies Protiviti 15

16 Organizational Capabilities The ranking of leadership as a top priority is likely a result of pressures within financial services organizations to transform and innovate amid a highly regulated and complex business environment. Six Sigma as a priority is another indicator of this environment financial services organizations are striving to streamline operations and costs as margins from different financial products and services continue to be pared down as a result of industry regulation. Top 5 Priorities Leadership (within your organization) Leadership (within your organization) Six Sigma Recruiting IT talent Working effectively with regulators Working effectively with C-level/senior executives Working effectively with business-unit executives Working effectively with business-unit executives Working effectively with C-level/senior executives Coaching/mentoring Protiviti is conducting its 2015 IT Priorities Survey in late Q and early Q1 2015, and its 2015 IT Security and Privacy Survey in Q We encourage readers to participate in these studies to help us evaluate the shifts in priorities over time. For more information, visit Protiviti 16

17 About Protiviti Protiviti ( is a global consulting firm that helps companies solve problems in finance, technology, operations, governance, risk and internal audit, and has served more than 40 percent of FORTUNE 1000 and FORTUNE Global 500 companies. Protiviti and its independently owned Member Firms serve clients through a network of more than 70 locations in over 20 countries. The firm also works with smaller, growing companies, including those looking to go public, as well as with government agencies. Protiviti is a wholly owned subsidiary of Robert Half (NYSE: RHI). Founded in 1948, Robert Half is a member of the S&P 500 index. Contacts Cory Gunderson Managing Director Global Leader Financial Services Industry practice cory.gunderson@protiviti.com Ed Page Managing Director Leader U.S. Financial Services IT Consulting practice ed.page@protiviti.com 2014 Protiviti Inc. An Equal Opportunity Employer M/F/Disability/Vet. Protiviti is not licensed or registered as a public accounting firm and does not issue opinions on financial statements or offer attestation services.

Today s IT Organization Delivering Security, Value and Performance Amid Major Transformation

Today s IT Organization Delivering Security, Value and Performance Amid Major Transformation Today s IT Organization Delivering Security, Value and Performance Amid Major Transformation Assessing the Results of Protiviti s 2014 IT Priorities Survey Nearly two out of three organizations are undergoing

More information

Amid Ongoing Transformation and Compliance Challenges, Cybersecurity Represents Top IT Concern in Financial Services Industry

Amid Ongoing Transformation and Compliance Challenges, Cybersecurity Represents Top IT Concern in Financial Services Industry Amid Ongoing Transformation and Compliance Challenges, Cybersecurity Represents Top IT Concern in Financial Services Industry IT leaders are battening down the hatches, according to Protiviti s latest

More information

Today s Enterprise - Cyberthreats Lurk Amid Major Transformation. Assessing the Results of Protiviti s 2015 IT Priorities Survey

Today s Enterprise - Cyberthreats Lurk Amid Major Transformation. Assessing the Results of Protiviti s 2015 IT Priorities Survey Today s Enterprise - Cyberthreats Lurk Amid Major Transformation Assessing the Results of Protiviti s 2015 IT Priorities Survey INTRODUCTION The very technologies that empower us to do great good can

More information

FPO. 2013 IT Priorities Survey. Mobile Commerce, Social Media, Data Management and Business Continuity Dominate the Agendas of IT Departments

FPO. 2013 IT Priorities Survey. Mobile Commerce, Social Media, Data Management and Business Continuity Dominate the Agendas of IT Departments FPO Mobile Commerce, Social Media, Data Management and Business Continuity Dominate the Agendas of IT Departments 1 Introduction A cursory glance at nearly any information technology (IT) article, survey

More information

The Battle Continues Working to Bridge the Data Security Chasm. Assessing the Results of Protiviti s 2015 IT Security and Privacy Survey

The Battle Continues Working to Bridge the Data Security Chasm. Assessing the Results of Protiviti s 2015 IT Security and Privacy Survey The Battle Continues Working to Bridge the Data Security Chasm Assessing the Results of Protiviti s 2015 IT Security and Privacy Survey EXECUTIVE SUMMARY Cyber concerns and discussions abound in companies

More information

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for

More information

Bridging the Data Security Chasm. Assessing the Results of Protiviti s 2014 IT Security and Privacy Survey

Bridging the Data Security Chasm. Assessing the Results of Protiviti s 2014 IT Security and Privacy Survey Bridging the Data Security Chasm Assessing the Results of Protiviti s 2014 IT Security and Privacy Survey EXECUTIVE SUMMARY If data isn t the lifeblood of an organization, it without question is a critical

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

Hans Bos Microsoft Nederland. hans.bos@microsoft.com

Hans Bos Microsoft Nederland. hans.bos@microsoft.com Hans Bos Microsoft Nederland Email: Twitter: hans.bos@microsoft.com @hansbos Microsoft s Cloud Environment Consumer and Small Business Services Software as a Service (SaaS) Enterprise Services Third-party

More information

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Outside View of Increased Regulatory Requirements Regulatory compliance is often seen as sand in the gears requirements

More information

From Cybersecurity to IT Governance Preparing Your 2014 Audit Plan. Assessing the Results of Protiviti s Third Annual IT Audit Benchmarking Survey

From Cybersecurity to IT Governance Preparing Your 2014 Audit Plan. Assessing the Results of Protiviti s Third Annual IT Audit Benchmarking Survey From Cybersecurity to IT Governance Preparing Your 2014 Audit Plan Assessing the Results of Protiviti s Third Annual IT Audit Benchmarking Survey Table of Contents Introduction...2 Top Technology Challenges

More information

SECURITY RISK MANAGEMENT

SECURITY RISK MANAGEMENT SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Cloud Computing An Auditor s Perspective

Cloud Computing An Auditor s Perspective Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP sgadia@kpmg.com December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,

More information

KLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT

KLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT About Kyle Lai 2 Kyle Lai, CIPP/G/US, CISSP, CISA, CSSLP, BSI Cert. ISO 27001 LA President of KLC Consulting, Inc. Over 20 years in IT and Security Security

More information

A Flexible and Comprehensive Approach to a Cloud Compliance Program

A Flexible and Comprehensive Approach to a Cloud Compliance Program A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility

More information

Governance, Risk, and Compliance (GRC) White Paper

Governance, Risk, and Compliance (GRC) White Paper Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:

More information

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK By James Christiansen, VP, Information Management Executive Summary The Common Story of a Third-Party Data Breach It begins with a story in the newspaper.

More information

Securing the Microsoft Cloud

Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed

More information

Top Priorities for Internal Auditors in U.S. Healthcare Provider Organizations

Top Priorities for Internal Auditors in U.S. Healthcare Provider Organizations Top Priorities for Internal Auditors in U.S. Healthcare Provider Organizations Key Areas for Improvement Include Compliance, Information Security, Social Media and Quality Assurance INTRODUCTION Historic

More information

Securing the Microsoft Cloud Infrastructure. Reto Häni Chief Security Officer Microsoft Western Europe MEET SWISS INFOSEC! 24.06.

Securing the Microsoft Cloud Infrastructure. Reto Häni Chief Security Officer Microsoft Western Europe MEET SWISS INFOSEC! 24.06. Securing the Microsoft Cloud Infrastructure Reto Häni Chief Security Officer Microsoft Western Europe MEET SWISS INFOSEC! 24.06.2015 1 Certification & Security Reliance Microsoft s cloud environment Application

More information

Solution White Paper Monetizing the Service Provider Cloud

Solution White Paper Monetizing the Service Provider Cloud Solution White Paper Monetizing the Service Provider Cloud Deliver the value-added cloud services that customers need while maximizing revenue Table of Contents 1 EXECUTIVE SUMMARY 2 EVOLUTION OF THE CLOUD

More information

How to Lead the People in a Program Based Environment

How to Lead the People in a Program Based Environment SESSION ID: GRC-W01 Balancing Compliance and Operational Security Demands Steve Winterfeld Bank Information Security Officer CISSP, PCIP What is more important? Compliance with laws / regulations Following

More information

INFORMATION TECHNOLOGY FLASH REPORT

INFORMATION TECHNOLOGY FLASH REPORT INFORMATION TECHNOLOGY FLASH REPORT Understanding PCI DSS Version 3.0 Key Changes and New Requirements November 8, 2013 On November 7, 2013, the PCI Security Standards Council (PCI SSC) announced the release

More information

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management

More information

Microsoft s Compliance Framework for Online Services

Microsoft s Compliance Framework for Online Services Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft

More information

Cloud Security and Managing Use Risks

Cloud Security and Managing Use Risks Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access

More information

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE TECHNICAL PROPOSAL DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE A White Paper Sandy Bacik, CISSP, CISM, ISSMP, CGEIT July 2011 7/8/2011 II355868IRK ii Study of the Integration Cost of Wind and Solar

More information

2014 Vendor Risk Management Benchmark Study

2014 Vendor Risk Management Benchmark Study 2014 Vendor Risk Management Benchmark Study Introduction/Executive Summary You can have all the security in the world inside your company s four walls, but all it takes is a compromise at one third-party

More information

Keep Your Data Secure in the Cloud Using encryption to ensure your online data is protected from compromise

Keep Your Data Secure in the Cloud Using encryption to ensure your online data is protected from compromise Protection as a Priority TM Keep Your Data Secure in the Cloud to ensure your online data is protected from compromise Abstract The headlines have been dominated lately with massive data breaches exposing

More information

Software Industry KPIs that Matter

Software Industry KPIs that Matter Software Companies Run Better on NetSuite. Software Industry KPIs that Matter Sponsored by Improved Results from Businesses Like Yours Business Visibility 360 o Visibility & Actionable Insight Increased

More information

CORL Dodging Breaches from Dodgy Vendors

CORL Dodging Breaches from Dodgy Vendors CORL Dodging Breaches from Dodgy Vendors Tackling Vendor Security Risk Management in Healthcare Introductions Cliff Baker 20 Years of Healthcare Security experience PricewaterhouseCoopers, HITRUST, Meditology

More information

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Security, Compliance & Risk Management for Cloud Relationships Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Introductions & Poll Organization is leveraging the Cloud? Organization

More information

Hosting and cloud services both provide incremental and complementary benefits to the organization

Hosting and cloud services both provide incremental and complementary benefits to the organization 33 Yonge St., Suite 420, Toronto, Ontario Canada, M5E 1G4 W H I T E P A P E R I D C a n d T E L U S E n t e r p r i s e C l o u d S t u d y, 2 0 1 3 : C a p i t a l i z i n g on C l o u d ' s W i n d o

More information

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant Brochure More information from http://www.researchandmarkets.com/reports/3302152/ Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT /

More information

2014 HIMSS Analytics Cloud Survey

2014 HIMSS Analytics Cloud Survey 2014 HIMSS Analytics Cloud Survey June 2014 2 Introduction Cloud services have been touted as a viable approach to reduce operating expenses for healthcare organizations. Yet, engage in any conversation

More information

Protecting your brand in the cloud Transparency and trust through enhanced reporting

Protecting your brand in the cloud Transparency and trust through enhanced reporting Protecting your brand in the cloud Transparency and trust through enhanced reporting Third-party Assurance November 2011 At a glance Cloud computing has unprecedented potential to deliver greater business

More information

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

2015 Vendor Risk Management Benchmark Study. The Shared Assessments Program and Protiviti Examine the Maturity of Vendor Risk Management

2015 Vendor Risk Management Benchmark Study. The Shared Assessments Program and Protiviti Examine the Maturity of Vendor Risk Management 2015 Vendor Risk Management Benchmark Study The Shared Assessments Program and Protiviti Examine the Maturity of Vendor Risk Management INTRODUCTION/EXECUTIVE SUMMARY MANY ORGANIZATIONS ARE NOT PREPARED

More information

Weighing in on the Benefits of a SAS 70 Audit for Third Party Data Centers

Weighing in on the Benefits of a SAS 70 Audit for Third Party Data Centers Weighing in on the Benefits of a SAS 70 Audit for Third Party Data Centers With increasing oversight and growing demands for industry regulations, third party assurance has never been under a keener eye

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

FINRA Publishes its 2015 Report on Cybersecurity Practices

FINRA Publishes its 2015 Report on Cybersecurity Practices Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February

More information

High Value Audits: An Update on Information Technology Auditing. Robert B. Hirth Jr., Managing Director

High Value Audits: An Update on Information Technology Auditing. Robert B. Hirth Jr., Managing Director High Value Audits: An Update on Information Technology Auditing Robert B. Hirth Jr., Managing Director The technology landscape and its impact on internal audit Technology is playing an ever-growing role

More information

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania Evaluating and Managing Third Party IT Service Providers Are You Really Getting The Assurance You Need To Mitigate Information Security and Privacy Risks? Kevin Secrest IT Audit Manager, University of

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

How To Get A Tech Startup To Comply With Regulations

How To Get A Tech Startup To Comply With Regulations Agile Technology Controls for Startups a Contradiction in Terms or a Real Opportunity? Implementing Dynamic, Flexible and Continuously Optimized IT General Controls POWERFUL INSIGHTS Issue It s not a secret

More information

Priorities for Internal Auditors in U.S. Healthcare Provider Organizations. Chief Concerns Include Cybersecurity, Regulatory Compliance and Fraud

Priorities for Internal Auditors in U.S. Healthcare Provider Organizations. Chief Concerns Include Cybersecurity, Regulatory Compliance and Fraud Priorities for Internal Auditors in U.S. Healthcare Provider Organizations Chief Concerns Include Cybersecurity, Regulatory Compliance and Fraud INTRODUCTION Technology is a double-edged sword. From an

More information

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data

More information

Vendor Management Best Practices

Vendor Management Best Practices 23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion

More information

Securing the Cloud Infrastructure

Securing the Cloud Infrastructure EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy

More information

Firewall Administration and Management

Firewall Administration and Management Firewall Administration and Management Preventing unauthorised access and costly breaches G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Protects Systems and data... 2 Optimise firewall

More information

Bridging the HIPAA/HITECH Compliance Gap

Bridging the HIPAA/HITECH Compliance Gap CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According

More information

2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business

2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business Enabling Small Business Success 2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business 2008 All Covered Inc. www.allcovered.com Contents EXECUTIVE SUMMARY... 3 RECOMMENDATIONS...

More information

Payment Card Industry Data Security Standards

Payment Card Industry Data Security Standards Payment Card Industry Data Security Standards Discussion Objectives Agenda Introduction PCI Overview and History The Protiviti Difference Questions and Discussion 2 2014 Protiviti Inc. CONFIDENTIAL: This

More information

HIPAA in the Cloud How to Effectively Collaborate with Cloud Providers

HIPAA in the Cloud How to Effectively Collaborate with Cloud Providers How to Effectively Collaborate with Cloud Providers Agenda Overview of Topics Covered Agenda Evolution of the Cloud Comparison of Private vs. Public Clouds Other Regulatory Frameworks Similar to HIPAA

More information

Responses: Only a 0% Only b 100% Both a and b 0% Neither a nor b 0%

Responses: Only a 0% Only b 100% Both a and b 0% Neither a nor b 0% The Cyber Security Council has requested basic "state of the state" cyber security information from each member firm of the Association. While the information that was requested in the survey questionnaire

More information

PROTIVITI FLASH REPORT

PROTIVITI FLASH REPORT PROTIVITI FLASH REPORT Cybersecurity Framework: Where Do We Go From Here? February 25, 2014 Just over a year ago, President Barack Obama signed an Executive Order (EO) calling for increased cybersecurity

More information

Overview of Topics Covered

Overview of Topics Covered How to Effectively Collaborate with Cloud Providers Agenda Overview of Topics Covered Agenda Evolution of the Cloud Comparison of Private vs. Public Clouds Other Regulatory Frameworks Similar to HIPAA

More information

Hot Topics in IT. CUAV Conference May 2012

Hot Topics in IT. CUAV Conference May 2012 Hot Topics in IT CUAV Conference May 2012 Baker Tilly Virchow Krause, LLP Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International.

More information

Virtualization and Evolution to the Cloud Survey UNITED KINGDOM RESULTS

Virtualization and Evolution to the Cloud Survey UNITED KINGDOM RESULTS 2011 Virtualization and Evolution to the Cloud Survey UNITED KINGDOM RESULTS CONTENTS Evolution of IT... 4 Methodology... 6 Focus... 8 Finding 1: Gaps between expectations and reality reveal market evolution...

More information

Risk Considerations for Internal Audit

Risk Considerations for Internal Audit Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013

More information

Weighing in on the Benefits of a SAS 70 Audit for Payroll Service Providers

Weighing in on the Benefits of a SAS 70 Audit for Payroll Service Providers Weighing in on the Benefits of a SAS 70 Audit for Payroll Service Providers With increasing oversight and growing demands for industry regulations, third party assurance has never been under a keener eye

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT) INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

Cloud Security Trust Cisco to Protect Your Data

Cloud Security Trust Cisco to Protect Your Data Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive

More information

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations

More information

How To Understand The Reasons For A Cloud-Based Server Farm

How To Understand The Reasons For A Cloud-Based Server Farm 2011 Virtualization and Evolution to the Cloud Survey GLOBAL RESULTS CONTENTS Evolution of IT... 4 Methodology... 6 Focus... 8 Finding 1: Gaps between expectations and reality reveal market evolution...

More information

2011 Virtualization and Evolution to the Cloud Survey

2011 Virtualization and Evolution to the Cloud Survey 2011 Virtualization and Evolution to the Cloud Survey DENMARK RESULTS CONTENTS Evolution of IT... 4 Methodology... 6 Focus... 8 Finding 1: Gaps between expectations and reality reveal market evolution...

More information

Cloud models and compliance requirements which is right for you?

Cloud models and compliance requirements which is right for you? Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,

More information

White Paper on Financial Institution Vendor Management

White Paper on Financial Institution Vendor Management White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety

More information

Making Shadow IT Work for You: What Financial Companies Can Do to Bring Grassroots IT Solutions Into the Fold

Making Shadow IT Work for You: What Financial Companies Can Do to Bring Grassroots IT Solutions Into the Fold Making Shadow IT Work for You: What Financial Companies Can Do to Bring Grassroots IT Solutions Into the Fold Issue Among the many concerns of information technology (IT) departments is a phenomenon known

More information

Key Considerations of Regulatory Compliance in the Public Cloud

Key Considerations of Regulatory Compliance in the Public Cloud Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 w_haskins-hafer@intuit.com Disclaimer Unless otherwise specified,

More information

Self-Service SOX Auditing With S3 Control

Self-Service SOX Auditing With S3 Control Self-Service SOX Auditing With S3 Control The Sarbanes-Oxley Act (SOX), passed by the US Congress in 2002, represents a fundamental shift in corporate governance norms. As corporations come to terms with

More information

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers How to Effectively Collaborate with Cloud Providers Speaker Bio Chad Kissinger Chad Kissinger Founder OnRamp Chad Kissinger is the Founder of OnRamp, an industry leading high security and hybrid hosting

More information

XBRL & GRC Future opportunities?

XBRL & GRC Future opportunities? XBRL & GRC Future opportunities? Suzanne Janse Deloitte NL Paul Hulst Deloitte / Said Tabet EMC Presenters Suzanne Janse Deloitte Netherlands Director ERP (SAP, Oracle) Risk Management GRC software Paul

More information

Cloud and Regulations: A match made in heaven, or the worst blind date ever?

Cloud and Regulations: A match made in heaven, or the worst blind date ever? Cloud and Regulations: A match made in heaven, or the worst blind date ever? Vinod S Chavan Director Industry Cloud Solutions, IBM Cloud October 28, 2015 Customers are faced with challenge of balancing

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

RISK MANAGEMENT PROGRAM THAT WORKS FOUR KEYS TO CREATING A VENDOR. HEADQUARTERS 33 Bradford Street Concord, MA 01742 PHONE: 978-451-7655

RISK MANAGEMENT PROGRAM THAT WORKS FOUR KEYS TO CREATING A VENDOR. HEADQUARTERS 33 Bradford Street Concord, MA 01742 PHONE: 978-451-7655 FOUR KEYS TO CREATING A VENDOR RISK MANAGEMENT PROGRAM THAT WORKS HEADQUARTERS 33 Bradford Street Concord, MA 01742 PHONE: 978-451-7655 FOUR KEYS TO CREATING A VENDOR RISK MANAGEMENT PROGRAM THAT WORKS

More information

Keeping watch over your best business interests.

Keeping watch over your best business interests. Keeping watch over your best business interests. 0101010 1010101 0101010 1010101 IT Security Services Regulatory Compliance Services IT Audit Services Forensic Services Risk Management Services Attestation

More information

THE CXO S GUIDE TO MANAGING EXPANSION... WHILE CONTROLLING COSTS & COMPLIANCE CONSIDERATIONS

THE CXO S GUIDE TO MANAGING EXPANSION... WHILE CONTROLLING COSTS & COMPLIANCE CONSIDERATIONS THE CXO S GUIDE TO MANAGING EXPANSION... WHILE CONTROLLING COSTS & COMPLIANCE CONSIDERATIONS The CXO s Guide to Managing Expansion While Controlling Costs & Compliance Considerations 2 45% OF IT PROFESSIONALS

More information

Top 20 IT Risks for the Healthcare Industry and How to Mitigate Them

Top 20 IT Risks for the Healthcare Industry and How to Mitigate Them Top 20 IT Risks for the Healthcare Industry and How to Mitigate Them By Raj Chaudhary, CRISC, CGEIT, and Robert L. Malarkey, CISSP, CISA Moving into 2015, the healthcare industry continues to undergo dramatic

More information

John Essner, CISO Office of Information Technology State of New Jersey

John Essner, CISO Office of Information Technology State of New Jersey John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management

More information

How To Choose A Cloud Computing Solution

How To Choose A Cloud Computing Solution WHITE PAPER How to choose and implement your cloud strategy INTRODUCTION Cloud computing has the potential to tip strategic advantage away from large established enterprises toward SMBs or startup companies.

More information

How To Transform Insurance Through Digital Transformation

How To Transform Insurance Through Digital Transformation Digital transformation can help you tame the perfect storm. The digital future for insurance. Following the 2008 financial crisis, the insurance sector has faced tighter regulation, which has made it harder

More information

Italy. EY s Global Information Security Survey 2013

Italy. EY s Global Information Security Survey 2013 Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

Information Security Management System for Microsoft s Cloud Infrastructure

Information Security Management System for Microsoft s Cloud Infrastructure Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System

More information

INFORMATION TECHNOLOGY FLASH REPORT

INFORMATION TECHNOLOGY FLASH REPORT INFORMATION TECHNOLOGY FLASH REPORT ISACA Releases COBIT 5: Updated Framework for the Governance and Management of IT May 18, 2012 In April, ISACA released COBIT 5 as a replacement for its current globally

More information

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Information Security Policy and Handbook Overview. ITSS Information Security June 2015 Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information

More information

Real-Time Security for Active Directory

Real-Time Security for Active Directory Real-Time Security for Active Directory Contents The Need to Monitor and Control Change... 3 Reducing Risk and Standardizing Controls... 3 Integrating Change Monitoring... 4 Policy Compliance... 4 The

More information

ICSA Labs Risk and Privacy Cloud Computing Series Part I : Balancing Risks and Benefits of Public Cloud Services for SMBs

ICSA Labs Risk and Privacy Cloud Computing Series Part I : Balancing Risks and Benefits of Public Cloud Services for SMBs ICSA Labs Risk and Privacy Cloud Computing Series Part I : Balancing Risks and Benefits of Public Cloud Services for SMBs The security challenges cloud computing presents are formidable, including those

More information

Log Management Solution for IT Big Data

Log Management Solution for IT Big Data Log Management Solution for IT Big Data 1 IT Big Data Solution A SCALABLE LOG INTELLIGENCE PLATFORM FOR SECURITY, COMPLIANCE, AND IT OPERATIONS More than 1,300 customers across a variety of industries

More information

State Governments at Risk: The Data Breach Reality

State Governments at Risk: The Data Breach Reality State Governments at Risk: The Data Breach Reality NCSL Legislative Summit August 5, 2015 Doug Robinson, Executive Director National Association of State Chief Information Officers (NASCIO) About NASCIO

More information

Project Management and ITIL Transitions

Project Management and ITIL Transitions Project Management and ITIL Transitions April 30 th 2012 Linda Budiman Director CSC 1 Agenda Thought Leadership: Linda Budiman What is ITIL & Project Management: Applied to Transitions Challenges & Successes:

More information

Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare

Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare Strengthening Cybersecurity Defenders #ISC2Congress Healthcare and Security "Information Security is simply a personal

More information

Top Priorities for Internal Auditors in U.S. Healthcare Provider Organizations

Top Priorities for Internal Auditors in U.S. Healthcare Provider Organizations Top Priorities for Internal Auditors in U.S. Healthcare Provider Organizations Key Areas for Improvement Include Compliance, Social Media and Quality Assurance Activities INTRODUCTION In January 01, healthcare

More information

Intel Enhanced Data Security Assessment Form

Intel Enhanced Data Security Assessment Form Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized

More information

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become

More information