IT Risks and New Technology

Size: px
Start display at page:

Download "IT Risks and New Technology"

Transcription

1 IT Risks and New Technology Phil Gesner, CPA.CITP, CISA Audit Supervisor and IT Auditor / Consultant Ocala, FL Florida Government Finance Officer s Association (FGFOA) July 25, 2013

2 Disclaimer The views expressed by the presenters do not necessarily represent the views, positions, or opinions of the presenter s respective organizations or any associated organizations cited. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client or attorney-client relationship.

3 WHY IT MATTERS Pervasiveness of IT throughout the organization, particularly in accounting and financial reporting IT is often critical to manage (plan, organize, direct, and control) the organization s: Business model, plans, competiveness, etc. Business risks Transaction flow and reporting Accounting and reporting related risks Source: AICPA IT Audit Training School

4 WHY IT MATTERS Today s business process environment 24/7 requirement becoming more common Focus on early error detection (Prevent rather than Detective) More highly automated - reducing reliance on manual controls Integrated with complex and highly efficient IT systems Electronic workflow with paperless trails Increased business partner involvement through direct access to process - the network extends beyond the company Source: AICPA IT Audit Training School

5 WHY IT MATTERS AICPA Auditing Standards Board Risk Based Auditing Standards Released in 2006 COSO Updated Internal Control Integrated Framework Released in 2013 COSO PowerPoint Presentation on Internal Control Integrated Framework (Free) COSO Guidance on Internal Control (For Purchase) Supersedes the Original Framework as of December 15, 2014 Update considers use of, and reliance on, evolving technologies (explicitly) Control Environment Suggests that Boards of Directors should have proper understanding of relevant systems and technology (or appropriate skills and expertise) to evaluate management s approach to managing new technology innovations, critical systems, and the opportunities and associated challenges Source: Parthun, Janis COSO Framework ED Places Emphasis on IT Controls. Information Technology Corner. AICPA IT Section. March

6 WHY IT MATTERS COSO Internal Control Integrated Framework Released in 2013 Update considers use of, and reliance on, evolving technologies (explicitly) Risk Assessment Suggests that external risk factors, such as technological developments that can impact the availability and use of data should be considered. Control Activities To be discussed in next two slides Information and Communication Suggests that management must be able to rely on relevant and quality information generated from both internal and external sources to effectively support the functioning of the other internal control components. Such information is very often obtained through information technology Source: Parthun, Janis COSO Framework ED Places Emphasis on IT Controls. Information Technology Corner. AICPA IT Section. March

7 #1: Complexity of IT Used should be considered. #2: IT may be involved in business processes and may be involved in the performance of control activities at the transaction level Application Controls IT-Dependent Manual Controls Source: Parthun, Janis COSO Framework ED Places Emphasis on IT Controls. Information Technology Corner. AICPA IT Section. March 2012.

8 #3: The effectiveness of Application and IT- Dependent Manual control depends upon the effectiveness of IT General Controls #4: IT General Controls (ITGC) aka. General Computer Controls (GCC) Source: Parthun, Janis COSO Framework ED Places Emphasis on IT Controls. Information Technology Corner. AICPA IT Section. March 2012.

9 WHY IT MATTERS Why is IT such a challenge? Unlike the certification of financial statements there is no universally accepted principle or standard for IT audit or risk assessment The concept of compliance to best practice Rapid change in IT is at times too rapid for best practices to fully develop or be recognized as such Lack of education and awareness Limited resources force organizations to select the pieces of IT security that they feel are absolutely necessary Things happen! Anti-virus are not updated timely viruses strike Source: AICPA IT Audit Training School

10 IT Risk Perception Source: AICPA Cyber Security Web Seminar Series Security Framework and Risk Assessment May 9, 2013

11 IT Risk Reality Source: AICPA Cyber Security Web Seminar Series Security Framework and Risk Assessment May 9, 2013

12 Risk Definition A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: the adverse impacts that would arise if the circumstance or event occurs; and How significant is the impact? Material Misstatement Assets Reputation Business the likelihood of occurrence. What are the chances that a risk will materialize? The probability that a given threat is capable of exploiting a given vulnerability. Source: Committee on Nation Security Systems (CNSS) Instruction No. 4009

13 Threat and Impact Definition Threat: Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, or modification of information, and/or denial of service. Impact: The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability. Source: Committee on Nation Security Systems (CNSS) Instruction No. 4009

14 Threat Sources Source: National Institute of Standards and Technology (NIST) Publication : Guide for Conducting Risk Assessments

15 Threat Sources Source: National Institute of Standards and Technology (NIST) Publication : Guide for Conducting Risk Assessments

16 Threat Catalogs Source: AICPA Cyber Security Web Seminar Series Security Framework and Risk Assessment May 9, 2013

17 Impact Considerations Level of classification of the impacted information asset Breaches of information security (e.g. loss of confidentiality, integrity and availability) Impaired operations (internal or third parties) Loss of business and financial value Disruption of plans and deadlines Damage of reputation Breaches of legal, regulatory or contractual requirements Source: AICPA Cyber Security Web Seminar Series Security Framework and Risk Assessment May 9, 2013

18 Risk Likelihood Considerations Experience and statistics for threat likelihood Threat sources: motivation and capabilities Availability to possible attackers Possible attackers Accident sources: geographical /weather factors Human errors and equipment malfunction Vulnerabilities, individually and aggregation Effectiveness of existing controls Source: AICPA Cyber Security Web Seminar Series Security Framework and Risk Assessment May 9, 2013

19 Vulnerability Definition Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source. Source: Committee on Nation Security Systems (CNSS) Instruction No. 4009

20 Generic Risk Model (NIST ) Source: AICPA Cyber Security Web Seminar Series Security Framework and Risk Assessment May 9, 2013

21 Risk IT Risk Factors Source: AICPA Cyber Security Web Seminar Series Security Framework and Risk Assessment May 9, 2013

22 Risk IT Complexity The nature and extent of IT risks are dependent on the level of complexity. Generally, as complexity increases, the type and number of potential IT risks increase. The manner in which IT is used in conducting business also has a direct relationship with the potential IT risks. Significant changes made to existing systems, or implementation of new system increase the potential IT risks. Shared data between systems increases the potential IT risks. Usage of emerging technologies (cloud computing, mobile - BYOD) increases the potential IT risks. Availability of evidence only in electronic formats increases the potential IT risks. Including reports Source: AICPA IT Audit Training School

23 Risk Complexity of IT Security Like Ogres And Onions Data & Business Processes IT Security Has Layers IT Security Also Involves People (Employees); therefore, Training is Critical

24 IT Security Protects the Data and Business Process Data & Business Processes Controls should be in place to protect the data and business processes. Data is an organizational asset Value of Data May not be readily ascertainable Not recorded on Books Varies Depending on Perspective Your Organization Other Organizations Employees External Individuals Vendors Your garbage is another individual s or organization s treasure!!!!

25 Risk IT Complexity Low Medium High Servers > 3 Network O/S COTS Nonstandard or >1 Multiple / WAN Workstations ~ 1 15 ~ > 30 Application COTS Some customization Remote Locations None ~ 1 2 > 2 ICFR In COTS or Few Medium number and/or manual Emerging/ Advanced IT ERP and/or customization Large number None to few Few to moderate Moderate to many Online Transaction None Few Many COTS = Commercial Off The Shelf (ie. Intuit Quickbooks) ERP = Enterprise Resource Planning (Ie. Oracle, PeopleSoft, SAP) Source: Singleton, Tommie W. The Minimum IT Controls to Assess in a Financial Audit (Part I). ISACA Journal. Volume I

26 Applications Purchased Systems Commercial Off The Shelf (COTS) and/or configurable systems Advantages Generally cheaper for general business use applications On-going support and maintenance Disadvantages Some limitations related to customizations Vendor dependence Example: Quickbooks Source: AICPA IT Audit Training School

27 Applications Configurable Packages Configurable mid-tier system Not as expensive as an ERP System or Custom Developed Application Found in small, mid or large organizations Increased capabilities when compared to Commercial Off the Shelf Purchased Systems: Configuration changes Customizations Examples: Microsoft Dynamics (Great Plains/Solomon), MAS/90, Navision, Munis, Eden, etc. Most Prevalent Source: AICPA IT Audit Training School

28 Applications Enterprise Resource Planning (ERP) System Integrates all facets of financial processing with operations, marketing, HR Requires specialized knowledge to setup (usually with the vendor and outside consultants) Generally, found in large organizations Very expensive to purchase & maintain Very complex security Examples: SAP, JD Edwards, PeopleSoft, Oracle Financials, Lawson, etc. Source: AICPA IT Audit Training School

29 Applications Custom Developed Custom Developed Application those applications that are designed and developed in-house to meet a specific business need for internal use (not resale) Advantages Customized to meet specific business need Independence from vendors Disadvantages No outside vendor support all by on-staff personnel (higher costs) Often longer deployment times and less controls Less prevalent, and becoming more so each day Source: AICPA IT Audit Training School

30 Risk IT Complexity Low Medium High Servers > 3 Network O/S COTS Nonstandard or >1 Multiple / WAN Workstations ~ 1 15 ~ > 30 Application COTS Some customization Remote Locations None ~ 1 2 > 2 ICFR (Internal Control over Financial Reporting) Emerging/ Advanced IT In COTS or Few Medium number and/or manual ERP and/or customization Large number None to few Few to moderate Moderate to many Online Transaction None Few Many COTS = Commercial Off The Shelf (ie. Intuit Quickbooks) ERP = Enterprise Resource Planning (Ie. Oracle, PeopleSoft, SAP) Source: Singleton, Tommie W. The Minimum IT Controls to Assess in a Financial Audit (Part I). ISACA Journal. Volume I

31 Source: AICPA Information Management and Technology Assurance (IMTA) Section. IT Audits and What to Pay Attention To. The CITP Body of Knowledge Series Webcast. 2013

32 Source: AICPA Information Management and Technology Assurance (IMTA) Section. IT Audits and What to Pay Attention To. The CITP Body of Knowledge Series Webcast. 2013

33 Risks IT Risk Factors for Internal Control Include Reliance on systems or programs that are processing data inaccurately, processing inaccurate data, or both Unauthorized access to data that may result in destruction of data or improper changes to data, including the recording of unauthorized or nonexistent transactions or inaccurate recording of transactions Unauthorized changes to data in master files Unauthorized changes to systems or programs Failure to make necessary changes to systems or programs Inappropriate manual intervention Potential loss of data or inability to access data as required Source: AICPA IT Audit Training School

34 Relationship of IT Risks to Financial Statements Risk of Material Misstatement (RMM) RMM Low IT Relevant FS Audit Procedure Unnecessary Financial Reporting RMM High IT Relevant FS Audit Procedure Necessary Risk High (Non-RMM) IT Relevant FS Audit Procedure Unnecessary Operational Audit Procedure Necessary Information Technology Risk or RMM RMM High IT NOT Relevant FS Audit Procedure Necessary Source: AICPA IT Audit Training School

35 Examples of Potential RMM Financial statement level Use of a highly customized / configurable application for financial processing where the entity does not also have effective controls as to how program changes or configuration changes are authorized, tested, approved, and deployed Assertion level Use of customized / configurable application for valuation of accounts receivable. Source: AICPA IT Audit Training School 35

36 Examples of Potential Risk of Material Misstatement Inherent Risks (IR) Complexity of Calculations The financial application has been programmed to perform complex calculations. Payroll Utility Billing Control Risk (CR) Risk or What Could Go Wrong?: Human error in coding or computer error in set up could result in amounts posted to wrong accounts or in wrong amounts. Are Controls In Place?: General ledger postings are automatic through computer set up codes; however, accounting staff are not familiar with the system set up and rely totally on outside computer service. Source: AICPA IT Audit Training School 36

37 How Does Use of IT Pose a RMM? An Example - Billing Inherent Risk The entity utilizes a customized application for its billing process. The billing process requires complex calculations and/or rate structures. The billing application automatically posts billings to the financial application. The entity s IT or financial personnel make frequent changes to the billing application. The revenue stream processed by the billing application represents a significant revenue source for the entity. Source: AICPA IT Audit Training School 37

38 Control Risk How Does Use of IT Pose a RMM? An Example - Billing The billing application may not calculate the customer s bill correctly. The billing application may not utilize the correct rates. The billing application may post inaccurate or incomplete information in to the financial application. Entity personnel may make inaccurate or unauthorized changes to the billing application. Entity personnel may have excessive access to the rate master file. Source: AICPA IT Audit Training School 38

39 IT Risks Entity Level Inadequate Oversight IT Strategic Plan does not align with Organization Strategic Plan Organization Strategic Plan does not align with IT Strategic Plan Parts of the organization pulling in different directions Lack of Risk Assessment Lack of Risk Management If management doesn t know what the risks are, how can they manage them? Vendor Oversight Is management monitoring outsourced services (IT or other-wise) to ensure that the controls and processes are operating as the organization intended?

40 IT Risks Logical Access / User Access User is not an employee or authorized user Authentication Risk Unauthorized or Excessive User Access Authorization Risk Data Functions Unauthorized/Authorized or Excessive Access Segregation of Duties Risks Data Functions Personnel processing transactions should not have Direct access to administer user access (setup, change user accounts, groups, and functions) Access to administer user access (application security) should be handled by IT Direct access to the database Inquiry only to the database is fine; however, generally users should be accessing the data through the application or a report writing application only.

41 IT Risks Program Change / Change Management Configuration Changes Functional Changes how the functionality of the application changes Business Processes Embedded in the Application Security Setup Changes Changing from Group/Role-based access (Ideal) to User Account-levelbased access (Not Ideal) Interface Changes how two applications transfer data between each other Report Changes how reports accumulate data

42 IT Risks Program Change / Change Management Change is not Authorized Authorization Risk A Business Unit has not Authorized the Change Risk that a change does not function the way the business intends Risk that a change is made to commit fraud or otherwise harm the business Access by Developers to the Live Production Environment Segregation of Duties Risk Allowing Developers Access to the Live Production Environment presents a risk that they could implement unauthorized program changes at any time without anyone s knowledge Ideally, someone that is not tasked w/ Development would be the only individual with access to make implement changes in the Live Production Environment Realistically, peer reviews or periodic review of all changes made to the production environment should be done, if the ideal situation

43 IT Risks Program Change / Change Management Change is not Tested Business Process Risk Risk that a change does not function the way the business intends Change is not approved for implementation Implementation Risk

44 Operational Risk The CIA Triad Confidentiality Assets must be protected from unauthorized access, use or disclosure while in storage, use and transit. Integrity Assets must be modified only by authorized users. Security The system is protected against unauthorized access (both physical and logical). Processing Integrity System processing is complete, accurate, timely, and authorized. Availability Authorized users are granted timely and uninterrupted access to assets.

45 Operational Risks Privacy Privacy Personal information is collected, used, retained, disclosed, and destroyed in conformity with the commitments in the entity s privacy notice and with criteria set forth in generally accepted privacy principles (GAPP) issued by the AICPA and CICA. Personal information is information that is about or can be related to an identifiable individual. GAPP on Use and Retention: The entity limits the use of personal information to the purposes identified in the notice and for which the individual has provided implicit or explicit consent. The entity retains personal information for only as long as necessary to fulfill the state purposes.

46 Risk Treatment Source: AICPA Cyber Security Web Seminar Series Security Framework and Risk Assessment May 9, 2013

47 Risk Mitigation Internal Controls: a practice approved by management to produce a desired outcome in a process Preventive - controls to stop the problem from occurring Detective - controls to find the problem Corrective - controls to repair the problem after detection Administrative - policies, standards, guidelines, and procedures Technical - controls using hardware or software for processing and analysis Physical - controls to implement barriers or deterrents Design > Document > Implement Test the controls prior to implementation to validate expectations Monitor results Re-test controls periodically. Source: AICPA Cyber Security Web Seminar Series Security Framework and Risk Assessment May 9, 2013

48 IT Security, Control, and Risk Assessment Frameworks Security Program Development ISO 31000/27005 International Standards Organization Security Controls Development COBIT (Control OBjectives for IT) 5 Information Systems Audit and Control Association ISACA IT Governance Institute ITGI NIST Security and Privacy Controls for Federal Information Systems and Organizations National Institute of Standards and Technology Risk Assessment NIST Guide for Conducting Risk Assessments National Institute of Standards and Technology OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) by CERT (Computer Emergency Response Team) Source: AICPA Cyber Security Web Seminar Series Security Framework and Risk Assessment May 9, 2013

49 Corporate Governance IT Security, Control, and Risk Assessment Frameworks COSO TOGAF (The Open Group Enterprise Architecture Framework) Process Management ITIL (Information Technology Infrastructure Library) Six Sigma CMMI (Capability Maturity Model Integration)

50 New Technologies Mobile Computing Tablets Smartphones Laptops Readers Removable Devices Remote Connections Cloud Services Source: AICPA Cyber Security Web Seminar Series Mobile Computing May 14, 2013

51 Risks Mobile Computing Mobile Device Platform Android, ios, Windows Mobile, Blackberry, etc. all have unique bugs and security vulnerabilities Malware, Trojan, virus, worms, spyware Authentication bypass Lost or stolen devices Substandard Cryptography Removable device storage Jail breaking Configuration errors and defaults Device service vulnerabilities Shared or common authentication (same passwords) Source: AICPA Cyber Security Web Seminar Series Mobile Computing May 14, 2013

52 Risks Mobile Computing Mobile Applications Attack vectors for each device type Integrated malware, Trojan, virus, worms, spyware delivery and execution Malicious application functionality Insecure application programming Data leakage and remote access compromises Launch pad for pivot attacks Mobile devices are subject to the same traditional application based attacks Source: AICPA Cyber Security Web Seminar Series Mobile Computing May 14, 2013

53 Risk Mobile Computing Mobile Networks Attacks against each mobile network type (WiFi, Bluetooth, Carrier) Synchronization Each network type requires different security protections Services are enabled by default or left on Mobile devices are subject to the same traditional network based attacks Source: AICPA Cyber Security Web Seminar Series Mobile Computing May 14, 2013

54 Risks Mobile Computing Backend Applications and Storage Attacks against web, dbase, & storage servers Data leakage and compromise from backend services Vulnerabilities can be used to attack devices All data is potentially one click/touch away on cloud storage Source: AICPA Cyber Security Web Seminar Series Mobile Computing May 14, 2013

55 Risks Mobile Computing Backend Applications and Storage Device and data compromise (unauthorized Bluetooth connections) BluePrinting BlueJacking BlueSnarfing NFC Mobile forensics Removable media theft BYOD/BYOT Source: AICPA Cyber Security Web Seminar Series Mobile Computing May 14, 2013

56 Risk Mobile Computing BYOD Risks Unknown third-party access via mobile apps Challenges in tracking data Data management, segregation difficult for compliance Stolen, lost mobile devices leak data Disgruntled employees a risk Source: AICPA Cyber Security Web Seminar Series Mobile Computing May 14, 2013

57 Risk Mobile Computing Privacy Concerns Applications that monitor traffic and history Applications that have access to all your contacts, calendar, etc. Location services and geolocation Single sign-on security Malware that uses the camera and mic to spy (scary!) Voic access Call history, browser history Trusted connections Ease drop on phone conversations & SMS Source: AICPA Cyber Security Web Seminar Series Mobile Computing May 14, 2013

58 Mobile Mitigation Device Authentication Require secure authentication Multi-factor authentication Device encryption Transport encryption SSL, VPN, TLS Wireless authentication and encryption WPA, WPA2, WPA Enterprise, RADIUS Don t leave devices unattended Device timeouts Privacy screens Secure enclosures Source: AICPA Cyber Security Web Seminar Series Mobile Computing May 14, 2013

59 Mobile Mitigation Download apps from trusted sources Secure application development methodology Mobile device management (icloud, Find iphone, MobileMe, Lookout Mobile Security) Control application permissions Device OS and firmware updates AV and Malware software Secure mobile browsing Disable service when not in use (Bluetooth, WiFi, gps, etc.) Device and media decommissioning Do not access corporate or sensitive websites over public wireless Use secure technology for remote access to backend systems (SSH, VPN, SSL, TLS) Source: AICPA Cyber Security Web Seminar Series Mobile Computing May 14, 2013

60 Mobile Mitigation Download apps from trusted sources Secure application development methodology Mobile device management (icloud, Find iphone, MobileMe, Lookout Mobile Security) Control application permissions Device OS and firmware updates AV and Malware software Secure mobile browsing Disable service when not in use (Bluetooth, WiFi, gps, etc.) Device and media decommissioning Do not access corporate or sensitive websites over public wireless Use secure technology for remote access to backend systems (SSH, VPN, SSL, TLS) Source: AICPA Cyber Security Web Seminar Series Mobile Computing May 14, 2013

61 Mobile Enterprise Mitigation Mobile device inventory management Mobile security and privacy governance Mobile computing policies and procedures Incorporate data classification standards Mobile device central management consoles Central policy based management (authentication, encryption, remote wiping, etc.) Blackberry Enterprise Server Active Sync (Android, ios) Mobile device synchronization standards Source: AICPA Cyber Security Web Seminar Series Mobile Computing May 14, 2013

62 Mobile Enterprise Mitigation Mobile device application management Sandboxes or virtual phone technology Vmware Good Mobile Security Central endpoint protection (AV, malware, software installation, service and device control) Wireless authentication and encryption WPA, WPA2, RADIUS Don t leave devices unattended Privacy screens Device and media decommissioning Mobile incident response Employee training and awareness Source: AICPA Cyber Security Web Seminar Series Mobile Computing May 14, 2013

63 New Technologies Cloud Computing Cloud Computing Models Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

64 Risk New Technologies Mobile Computing Cloud Computing Models Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

65 Risk New Technologies Mobile Computing Cloud Computing Models Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

66 Risks Cloud Computing Cloud Technical Threats Vulnerable access management Data visible to other tenants Multi-tenancy visibility Hypervisor attacks Hypervisor: A computer tool allowing various software applications running on different OSs to coexist on the same server at the same time thereby enabling server virtualization Application attacks Application compatibility Collateral damage SaaS access security Outdated Virtual Machine (VM) security Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

67 Risks Cloud Computing Cloud Security Concerns Hypervisor exploit to compromise VMs Data leakage / data storage Insecure Application Programming Interfaces (API s) Improper access configuration Malicious Insiders / Subcontractors Storage and memory allocation / reallocation / clearing Maintenance of secure infrastructure: Hypervisor level Guest Machine / OS level Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

68 Risks Cloud Computing Cloud Governance Threats Regulatory Threats Asset ownership Asset disposal Asset location Information Security Governance Threats Physical security on all premises where data are stored Visibility of the security measures put in place by the CSP Media management Secure software SDLC Common security policy for community clouds Service termination issues Solid enterprise governance Support for audit and forensic investigations Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

69 Risk Mitigation Cloud Computing Cloud Security Essentials Contractual musts Definition of rights / ownership Right to audit / right to obtain assurance Cloud Service Provider (CSP) Security Program Management Information Security Policy Information Security Management System Personnel Management (vetting, training, monitoring) Perimeter/Internal defense and monitoring (DPI/ IDS/IPS, and DLP) Incident management Hardening and Change Control Redundancy DRP / BCP policies / procedures Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

70 Risk Mitigation Cloud Computing Cloud Security Frameworks Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

71 Risk Mitigation Cloud Computing Assess the Competency of Cloud Service Provider (CSP) CSP should be clear about their roles and responsibilities, the risks they represent to the end user, and be able to provide evidence of mitigating controls. Strong independent monitoring and auditing program and effective assurance reporting. Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

72 Risk Mitigation Cloud Computing Understand Inherent Security Risks What exactly are the scope of services? What are the CSPs responsibilities? What are the end users responsibilities? What infrastructure components does the CSP have control over? What components does the CSP have access to and does this enable access to data and/or applications? Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

73 Risk Mitigation Cloud Computing Understand Inherent Security Risks What data and applications are involved? Confidential? Personal? Compliance? Impact of security breaches to compliance, operations, etc.? What are the CSP s terms of agreement? What is the jurisdiction of data? Cross-border transfer of personal data? Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

74 Risk Mitigation Cloud Computing Specify security requirements during evaluation based on inherent risks Personnel requirements, including clearances, roles, and responsibilities Identity & Access Management Monitoring & Incident Management Information handling and disclosure agreements and procedures Network access control, connectivity, and filtering System configuration and patch management Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

75 Risk Mitigation Cloud Computing Specify security requirements during evaluation based on inherent risks Change Management Backup and recovery Data retention and sanitization Vulnerability scanning / penetration tests Risk assessment Independent auditing. Perimeter security Penetration Detection Data Loss Prevention Data erasure for PaaS / SaaS Physical Security Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

76 Risk Mitigation Cloud Computing Cloud Service Provider Agreement Key Terms The process for assessing the cloud provider s compliance with the service level agreement, including independent audits and testing Compensating controls the end-user may carry out at their discretion. Procedures, protections, and restrictions for collocating or commingling organizational data and for handling sensitive data The cloud provider s obligations upon contract termination, such as the return and expunging of data. Ownership rights over data Security and privacy performance visibility Data backup and recovery Incident response coordination and information sharing Disaster recovery. Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

77 Risk Mitigation Cloud Computing Cloud Service Provider Agreement Key Terms The process for assessing the cloud provider s compliance with the service level agreement, including independent audits and testing Compensating controls the end-user may carry out at their discretion. Procedures, protections, and restrictions for collocating or commingling organizational data and for handling sensitive data The cloud provider s obligations upon contract termination, such as the return and expunging of data. Ownership rights over data Security and privacy performance visibility Data backup and recovery Incident response coordination and information sharing Disaster recovery. Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

78 Risk Mitigation Cloud Computing How can I be sure that the Cloud Service Provider s controls are effective? CPA (Independent) Attestation Reporting: For Internal Control Over Financial (ICFR) Reporting Purposes: Statement on Standards for Attestation Engagement (SSAE) 16 Service Organization Control (SOC) 1 Reports Formerly SAS 70 Reports For Operational / Compliance Risk Scenarios SOC 2 Reports Other Attestations AT 101 Examinations AT 201 Agreed Upon Procedures AT 601 Compliance Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

79 Risk Mitigation Cloud Computing How do I evaluate Cloud Service Provider Reporting? Confirm Scope / System Description aligns to agreements and service level agreements (SLAs) Does the subject matter being reported on align to the user entity control requirements and risk management needs? Do the controls defined by the CSP prevent or detect risks represented by the CSP related to compliance with laws and regulations, and the efficiency and effectiveness of operations? Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

80 Risk Mitigation Cloud Computing How do I evaluate Cloud Service Provider Reporting? Do the controls provide sufficient information for users to understand how that control may affect the their entity? Frequency Responsible party Nature of activity performed Subject matter to which the control is applied Is timing, nature, extent of testing adequate to meet risk management needs. Is period of coverage of testing adequate. Do testing results indicate performance of controls is sufficient? Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

81 SOC Reports from User s Perspectives Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

82 SOC 2 Principle and Control Objectives Security e.g., protection of the system from unauthorized access, both logical and physical Confidentiality - system s ability to protect the information designated as confidential, as committed or agreed Processing Integrity e.g., completeness, accuracy, validity, timeliness, and authorization of system processing Availability accessibility to the system, products, or services as advertised or committed by contract, service-level, or other agreements Privacy personal information is collected, used, retained, disclosed, and destroyed in conformity with the entity s privacy notice and with criteria set forth in generally accepted privacy principles Request Expansion of Principles and Control Objectives When in Doubt User entities can request that the Cloud Service Provider / Service Organization extend the above criteria to address additional criteria related to regulatory requirements, service level agreements, etc. Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

83 Additional Cloud Computing Information / References Cloud Security Alliance: Security Guidance for critical areas of focus in cloud computing, 3.0 NIST Special Publication , Guidelines on Security and Privacy in Public Cloud Computing NIST : Information Security AICPA Service Organization Control: www. aicpa.org/soc Source: AICPA Cyber Security Web Seminar Series Cloud Security Considerations June 6, 2013

84 Why do we even use IT? Consistently apply predefined business rules and perform complex calculations in processing large volumes of transactions or data Enhance the timeliness, availability, and accuracy of information Facilitate the additional analysis of information Enhance the ability to monitor the performance of the entity s activities and its polices and procedures Reduce the risk that controls will be circumvented Enhance the ability to achieve effective segregation of duties by implementing security controls In applications, databases, and operating systems

85 Source: Woodard, Jocelyn TTI Survey Lists Top 10 Technology Initiatives in U.S. and Canada. AICPA Insights. May 1, AICPA Top Technology Initiatives for CPA s Survey Managing and retaining data 2. Securing the IT environment 3. Managing IT risk and compliance 4. Ensuring privacy 5. Managing system implementations

86 Source: Woodard, Jocelyn TTI Survey Lists Top 10 Technology Initiatives in U.S. and Canada. AICPA Insights. May 1, AICPA Top Technology Initiatives for CPA s Survey Preventing and responding to computer fraud 7. Enabling decision support and analytics 8. Governing and managing IT investment/spending 9. Leveraging emerging technologies 10. Managing vendors and service providers

87 Source: Woodard, Jocelyn TTI Survey Lists Top 10 Technology Initiatives in U.S. and Canada. AICPA Insights. May 1, AICPA Top Technology Initiatives for CPA s Survey 2013 Ranges of 22% to 57% of survey respondents indicated that they were confident that their organizations were addressing these initiatives. Overall, this confidence was down from the 2012 survey. The decline in confidence levels may mean professionals are making more knowledgeable assessments of the ability of organizations to achieve technology goals. This more realistic assessment indicates that the goals may be more challenging than originally thought, and that organizations must have the focus, commitment and drive to achieve them. Donny Shimamoto, CPA, CITP, CGMA, Chair of the AICPA s Information Management and Technology Assurance (IMTA) Executive Committee

88 Source: Woodard, Jocelyn TTI Survey Lists Top 10 Technology Initiatives in U.S. and Canada. AICPA Insights. May 1, AICPA Top Technology Initiatives for CPA s Survey Managing and retaining data Key Risk Factors Data management is integral to an organization s ability to mitigate risks. An organization whose data management policies and procedures are insufficient or ineffective is exposed to the consequences of poor data management. Business decisions or client advice may be based on incomplete or inaccurate data. Data may be stored in outdated or incompatible formats for retrieval or improperly backed up, resulting in irrevocable loss of data.

89 Source: Woodard, Jocelyn TTI Survey Lists Top 10 Technology Initiatives in U.S. and Canada. AICPA Insights. May 1, AICPA Top Technology Initiatives for CPA s Survey Managing and retaining data Key Risk Management Factors An organization needs to develop a strategic plan for managing data in order to realize the most value from its investment in data acquisition and usage. An organization must develop policies and procedures to meet the internal, legal and compliance-related requirements for data retention and usage. An organization must be able to back up data and restore data in the event of a data loss (or a need to access historical data).

90 AICPA Top Technology Initiatives for CPA s Survey 2013 Title: Type: 2013 North America Top Technology Survey Analysis Video Webcast Date: Tuesday, July 16, 2013 Time: CPE: 2:00pm to 3:15pm ET 1.5 hrs ldevelopment/prdovr~pc-wbc13128i/pc-wbc13128i.jsp

91 Resources AICPA s Information Management and Technology Assurance (IMTA) Interest Area: Located under Interest Areas Tab on AICPA s Home Page Sponsor of the Certified Information Technology Professional (CITP) credential which recognizes CPA s for their ability to leverage technology to effectively manage information while ensuring the data s reliability, security, accessibility and relevance. Various Webcasts, Whitepapers, Newsletters, Etc. Much of the material discussed today was developed by the AICPA. 91

92 Resources Information Systems Audit and Control Association (ISACA): Sponsor of the Certified Information Systems Auditor (CISA), Certified Information Systems Manager (CISM), and Certified in Risk and Information Systems Control (CRISC) Exams IT Governance Institute Designed CoBIT (Control Objectives for Information and related Technology) w/ ISACA, AICPA, and Other Interested Parties to serve as a framework for IT governance and control to fit with and support COSO s Internal Control Integrated Framework 92

93 Contact Information Phil Gesner, CPA.CITP, CISA Audit Supervisor and IT Auditor / Consultant Ocala, FL pgesner@purvisgray.com Mobile: Company Website: LinkedIn: Florida Government Finance Officer s Association (FGFOA) July 25, 2013

Effectively Assessing IT General Controls

Effectively Assessing IT General Controls Effectively Assessing IT General Controls Tommie Singleton UAB AGENDA Introduction Five Categories of ITGC Control Environment/ELC Change Management Logical Access Controls Backup/Recovery Third-Party

More information

Vendor Management Best Practices

Vendor Management Best Practices 23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

John Essner, CISO Office of Information Technology State of New Jersey

John Essner, CISO Office of Information Technology State of New Jersey John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management

More information

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP 2010 AICPA Top Technology Initiatives Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP Georgia Society of CPAs Annual Convention June 16, 2010 About the Presenter Partner-in-Charge, Habif,

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations

More information

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud

More information

SECURITY RISK MANAGEMENT

SECURITY RISK MANAGEMENT SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation

Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation The Central Florida Chapter of The Florida Government Finance Officers Association 2/7/2014 K. Adam Glover,

More information

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

Conducting a Risk Assessment for Mobile Devices

Conducting a Risk Assessment for Mobile Devices Conducting a Assessment for Mobile Devices May 9, 2012 David Frei Director, Digital/Information Security Specialist The Changing Environment Today s Discussion Available Industry Assessment Models Unique

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014

Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014 Aalborg Universitet Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication

More information

UF IT Risk Assessment Standard

UF IT Risk Assessment Standard UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Italy. EY s Global Information Security Survey 2013

Italy. EY s Global Information Security Survey 2013 Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Risks and Challenges

Risks and Challenges Cloud and Mobile Security: Risks and Challenges Chong Sau Wei (CISM) chong@scan associates.net General Manager Managed Security Services SCAN Associates Berhad Seminar e Kerajaan Negeri Pulau Pinang 14

More information

Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101

Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101 Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro

More information

2 0 1 4 F G F O A A N N U A L C O N F E R E N C E

2 0 1 4 F G F O A A N N U A L C O N F E R E N C E I T G OV E R NANCE 2 0 1 4 F G F O A A N N U A L C O N F E R E N C E RAJ PATEL Plante Moran 248.223.3428 raj.patel@plantemoran.com This presentation will discuss current threats faced by public institutions,

More information

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s 1 Agenda Data Security Trends Root causes of Cyber Attacks How can we fix this? Secure Infrastructure Security Practices

More information

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA

Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA HANS HENRIK BERTHING Married with Louise and dad for Dagmar and Johannes CPA, CRISC, CGEIT, CISA and CIA ISO 9000 Lead Auditor Partner and owner for Verifica

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

Mobile Application Security Sharing Session May 2013

Mobile Application Security Sharing Session May 2013 Mobile Application Security Sharing Session Agenda Introduction of speakers Mobile Application Security Trends and Challenges 5 Key Focus Areas for an mobile application assessment 2 Introduction of speakers

More information

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch SSAE 16 for Transportation & Logistics Companies Chris Kradjan Kim Koch 1 The material appearing in this presentation is for informational purposes only and should not be construed as advice of any kind,

More information

Considerations for Outsourcing Records Storage to the Cloud

Considerations for Outsourcing Records Storage to the Cloud Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage

More information

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015 Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity

More information

Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF

Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration

More information

VA Office of Inspector General

VA Office of Inspector General VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND

More information

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

External Penetration Assessment and Database Access Review

External Penetration Assessment and Database Access Review External Penetration Assessment and Database Access Review Performed by Protiviti, Inc. At the request of Internal Audit April 25, 2012 Note: This presentation is intended solely for the use of the management

More information

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com {ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.) Organizational risks 1 Lock-in Risk of not being able to migrate easily from one provider to another 2 Loss of Governance Control and influence on the cloud providers, and conflicts between customer hardening

More information

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Data Protection Safeguards Page 1 Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Purpose: The purpose of the Data Protection Safeguards is to provide guidelines for the appropriate

More information

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.

More information

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

How to Secure Your Environment

How to Secure Your Environment End Point Security How to Secure Your Environment Learning Objectives Define Endpoint Security Describe most common endpoints of data leakage Identify most common security gaps Preview solutions to bridge

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Cloud Computing An Auditor s Perspective

Cloud Computing An Auditor s Perspective Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP sgadia@kpmg.com December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,

More information

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Addressing Cloud Computing Security Considerations

Addressing Cloud Computing Security Considerations Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft

More information

Mobile Device Security and Audit

Mobile Device Security and Audit Mobile Device Security and Audit ISACA Chapter Meeting February 2012 Alex Stamps Manager Security & Privacy Services Deloitte & Touche LLP astamps@deloitte.com Session Objectives Define mobile devices

More information

Ayla Networks, Inc. SOC 3 SysTrust 2015

Ayla Networks, Inc. SOC 3 SysTrust 2015 Ayla Networks, Inc. SOC 3 SysTrust 2015 SOC 3 SYSTRUST FOR SERVICE ORGANIZATIONS REPORT July 1, 2015 To December 31, 2015 Table of Contents SECTION 1 INDEPENDENT SERVICE AUDITOR S REPORT... 2 SECTION 2

More information

Course: Information Security Management in e-governance

Course: Information Security Management in e-governance Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security

More information

RSS Cloud Solution COMMON QUESTIONS

RSS Cloud Solution COMMON QUESTIONS RSS Cloud Solution COMMON QUESTIONS 1 Services... 3 Connectivity... 5 Support... 6 Implementation... 7 Security... 8 Applications... 9 Backups... 9 Email... 10 Contact... 11 2 Services What is included

More information

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER 1 Agenda Audits Articles/Examples Classify Your Data IT Control

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

The Information Systems Audit

The Information Systems Audit November 25, 2009 e q 1 Institute of of Pakistan ICAP Auditorium, Karachi Sajid H. Khan Executive Director Technology and Security Risk Services e q 2 IS Environment Back Office Batch Apps MIS Online Integrated

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

Use of tablet devices in NHS environments: Good Practice Guideline

Use of tablet devices in NHS environments: Good Practice Guideline Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood

More information

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical

More information

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia jason.lawrence@ey.com Twitter: @ethical_infosec

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia jason.lawrence@ey.com Twitter: @ethical_infosec Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia jason.lawrence@ey.com Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

SRA International Managed Information Systems Internal Audit Report

SRA International Managed Information Systems Internal Audit Report SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...

More information

Third Party Security: Are your vendors compromising the security of your Agency?

Third Party Security: Are your vendors compromising the security of your Agency? Third Party Security: Are your vendors compromising the security of your Agency? Wendy Nather, Texas Education Agency Michael Wyatt, Deloitte & Touche LLP TASSCC Annual Conference 3 August 2010 Agenda

More information

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

10 Smart Ideas for. Keeping Data Safe. From Hackers

10 Smart Ideas for. Keeping Data Safe. From Hackers 0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000

More information

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations kpmg.com b Section or Brochure name Effectively using SOC 1, SOC 2, and SOC 3 reports for increased

More information

About the Presenter. Presentation Objectives. SaaS / Cloud Computing Risk Management AICPA Attest Alternatives

About the Presenter. Presentation Objectives. SaaS / Cloud Computing Risk Management AICPA Attest Alternatives SaaS / Cloud Computing Risk Management AICPA Attest Alternatives Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP Georgia Society of CPAs Annual Convention June 16, 2010 About the Presenter

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Guidelines for Website Security and Security Counter Measures for e-e Governance Project and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online

More information

Logging In: Auditing Cybersecurity in an Unsecure World

Logging In: Auditing Cybersecurity in an Unsecure World About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that

More information

BYOD and Mobile Device Dependency

BYOD and Mobile Device Dependency BYOD and Mobile Device Dependency Thursday, November 8, 2012 Brian Thomas, CISA, CISSP & Shohn Trojacek, CISSP Brian Thomas, CISA, CISSP Partner, IT Advisory Services at Weaver Provides security, IT audit

More information

WIND RIVER SECURE ANDROID CAPABILITY

WIND RIVER SECURE ANDROID CAPABILITY WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion

More information

Klickstart Business Solutions & Services

Klickstart Business Solutions & Services About us With an Engineering background & vast experience spanning across two decades with an expertise in Technology Marketing, Branding, Business development & Sales we set out to create a platform every

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

How to Practice Safely in an era of Cybercrime and Privacy Fears

How to Practice Safely in an era of Cybercrime and Privacy Fears How to Practice Safely in an era of Cybercrime and Privacy Fears Christina Harbridge INFORMATION PROTECTION SPECIALIST Information Security The practice of defending information from unauthorised access,

More information

Cybersecurity: What CFO s Need to Know

Cybersecurity: What CFO s Need to Know Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction

More information