Texas A&M AgriLife Computer Incident Response Plan
|
|
- Margery Dawson
- 7 years ago
- Views:
Transcription
1 Texas A&M AgriLife Computer Incident Response Plan Last Revision: November 1, 2012 Version: 1.03 Prepared and approved by: Alan Kurk Director AgriLife Communications and IT
2 Executive Summary The purpose of this Computer Incident Response Plan (IRP) is to provide the AgriLife Agencies with a process that addresses computer security incidents. These are defined as incidents that threaten confidentiality, integrity or availability of agency information resources with high impact. Roles and responsibilities for incident response team members and definitions of incident severity levels and response procedures are outlined in this plan. This plan may be utilized in parallel to major disaster events where the agency disaster recovery plan has been enacted. The responsibility for declaring a computer incident is managed by the agency Information Security Officer (ISO) who is required to notify the agency Chief Information Officer (CIO). All activities in the plan will be directed by the ISO with appropriate coordination and notification to the CIO. Page 2
3 Table of Contents Executive Summary... 2 Purpose and Scope... 4 Objectives... 4 Accountabilities / Responsibilities Incident Classifications Incident Review Report Details Page 3
4 Purpose and Scope The IRP applies to all computer systems and networks managed by the Texas A&M AgriLife Agencies. The IRP is required to ensure that all required actions are taken to protect the AgriLife Information resources and overall agency reputation. Objectives The objectives of this plan are as follows: Assess the overall impact of an incident Assess the financial, reputational and or technology implications of the incident Identify the scope of the vulnerability created by the incident Communicate findings Initiate appropriate procedures to contend with the incident Page 4
5 Accountabilities / Responsibilities The following describes key roles in the implementation of the IRP and their responsibilities. Chief Information Officer (CIO) The CIO will play a key role in verifying appropriate procedures are performed during an incident response. The CIO is responsible for performing and/or delegating the following tasks Establishing priorities based upon the incident Notifying agency directors Notify agency public relation contacts and administrative services director Notify Human Resources as required Notify legal counsel as required Overseeing post incident response review Information Security Officer The ISO for each respective AgriLife Agency will be primarily responsible for the following: Notifying the CIO and/or key team leads of incident Managing incident procedural process Determining if the incident is a critical classified event Update communications with CIO Managing required incident response tasks and data collection Verify the impacted systems and/or data is properly secured Develop recommendation to CIO to alleviate possible future events Page 5
6 Incident Response Team During an incident key members of the IRT will be engaged. Members activated will depend upon skill sets and are of function. Members of this team will be responsible for any response and or remediation efforts performed. Following are duties to be typically performed by this team: Assist in data collection effort Recommendation of course of action to remediate impacted systems Documenting incident remediation efforts Root cause analysis Be available for any reviews conducted by any third parties (i.e. Police, FBI, etc.) Provide guidance to ISO and CIO during the course of the incident remediation and assessment Initiates employee related investigations along with TAMU System Counsel Manages internal and external communications as necessary Handles external media relation inquiries Incident Response Team Members Name Office Phone number Alternate Phone Numbers(home/mobile) Position/Title Alan Kurk (H) CIO/IRM (C) Chuck Braden (C) ISO Jay Carper (C) /AD Administrator Gene Curtiss (C) Enterprise Systems Mgr. Mike Alani (C) Sr. Network Engineer Tom Lyster (C) (H) IT Coordinator College/Research Jim Segers (C) (H) IT Coordinator - Extension John Chivvis (C) Assoc. Dir. AgriLife Communications. John Willis (C) Chief Architect Steve Schulze Asst. VC for Administration Page 6
7 Incident Classifications Incidents can occur in many different ways and have different levels of impact and scope. The following describes the various levels of incident classification: In order for the incident response plan to be initiated the incident must meet the definition of a critical event. If the incident does meet the standards for a critical event the ISO will assess at what level the event is classified per the below definitions. CRITICAL EVENT DESCRIPTION: Any incident defined as an unplanned or unauthorized change, disclosure or interruption of Texas A&M AgriLife information resources that could impact the reputation or viability of staff operations. LEVEL CLASSIFICATIONS High Level An incident that is difficult to control or alleviate in a short time period A large number of information resources have been compromised A significant loss of confidential data has occurred Significant financial or public relations impact is likely High Level Incident Procedures IRT LEAD: Identify procedures to contain incident / attack IRT LEAD: Provide real time update status to ISO and CIO ISO: Notify CIO ISO Begin Log of Incident Details and Remediation Actions ISO: If impacting employees in real time send communications to Agency Heads and Help Desk for internal notification initiation CIO: Notify HR and or TAMUS General Counsel based upon situation Medium Level: Incident is easy to control and remediate in a short time frame Minimal loss of confidential information Minimal impact to information resources Page 7
8 This is little to no risk of public relation for financial impact Medium Level Incident Procedures: IRT LEAD: Determine defensive action to remediate incident IRT LEAD: Notify ISO ISO: Begin log of Incident Details and Remediation Actions ISO : Report status to CIO Low Level: Signs of an attack are being seen but no actual threat or penetration to information resources has occurred Isolated computer virus that are remediated by anti virus software Low Level Incident Procedures: IRT LEAD: Monitor situation until potential threat subsides Incident Review Report Details All Incident reports of any level are to be filed by the ISO in the AgriLife IT CRM System (FirstCall). Within this event/ticket the following information should be contained once the incident has been fully remediated. WHO: Who was involved in the discovery and remediation of the incident? WHAT: What was the nature of the incident, cause, and damage and remediation effort? WHERE: What was the degree of impact? How many users? WHEN: Date and time frame of the event. HOW: How did the incident occur? What variables allowed it to occur? How can the incident of this type be avoided in the future. Page 8
IT Security Incident Management Policies and Practices
IT Security Incident Management Policies and Practices Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Feb 6, 2015 i Document Control Document
More informationUtica College. Information Security Plan
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
More informationCyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
More informationComputer Security Incident Response Plan. Date of Approval: 23- FEB- 2015
Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...
More informationThe statements in this policy document establish HEALTHeLINK's expectations with respect to incident management.
1 Introduction The statements in this policy document establish HEALTHeLINK's expectations with respect to incident management. 2 Policy Statement 2.1 Incident Response Authority 2.1.1 Single Point of
More informationThe intended audience is system administrators, Directors, and Department Heads.
INFORMATION TECHNOLOGY STANDARD ADMINISTRATIVE PROCEDURES SAP No. 24.99.99.W1.10 Information Resources Incident Management Approved: April 15, 2005 Last Revised: August 30, 2011 Next Scheduled Review:
More informationInformation Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
More informationUBC Incident Response Plan
UBC Incident Response Plan Contents 1. Rationale... 1 2. Objective... 1 3. Application... 1 4. Definitions... 1 4.1 Types of Incidents... 1 4.2 Incident Severity... 2 4.3 Information Security Unit... 2
More informationStandard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
More informationINFORMATION SECURITY STRATEGIC PLAN
INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information
More informationInformation Resource Management Directive 5000.12 USAP Information Security Incident Management
The National Science Foundation Office of Polar Programs United States Antarctic Program Information Resource Management Directive 5000.12 USAP Information Security Incident Management Organizational Function
More informationDUUS Information Technology (IT) Incident Management Standard
DUUS Information Technology (IT) Incident Management Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-E 1.0 Purpose and Objectives Computer systems
More informationAUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN. 1250 Siskiyou Boulevard Ashland OR 97520
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN 1250 Siskiyou Boulevard Ashland OR 97520 Revision History Revision Change Date 1.0 Initial Incident Response Plan 8/28/2013 Official copies
More informationSupporting information technology risk management
IBM Global Technology Services Thought Leadership White Paper October 2011 Supporting information technology risk management It takes an entire organization 2 Supporting information technology risk management
More informationExecutive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
More informationCITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard
CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information
More informationData Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
More informationInformation Technology Policy
ITP Number ITP-SEC024 Category Security Contact RA-ITCentral@pa.gov Information Technology Policy IT Security Incident Policy Effective Date August 2, 2012 Supersedes Scheduled Review Annual 1. Purpose
More informationAgriLife Information Technology IT General Session January 2010
AgriLife Information Technology IT General Session January 2010 Agenda Topics Year in Review Enterprise IT Services Update FirstCall Overview and Next Steps Sophos Antivirus Initiative Update Information/
More information787 Wye Road, Akron, Ohio 44333 P 330-666-6200 F 330-666-7801 www.keystonecorp.com
Introduction Keystone White Paper: Regulations affecting IT This document describes specific sections of current U.S. regulations applicable to IT governance and data protection and maps those requirements
More informationYour Agency Just Had a Privacy Breach Now What?
1 Your Agency Just Had a Privacy Breach Now What? Kathleen Claffie U.S. Customs and Border Protection What is a Breach The loss of control, compromise, unauthorized disclosure, unauthorized acquisition,
More informationCredit Card (PCI) Security Incident Response Plan
Credit Card (PCI) Security Incident Response Plan To address credit cardholder security, the major credit card brands (Visa, MasterCard, American Express, Discover & JCB) jointly established the PCI Security
More informationUCF Security Incident Response Plan High Level
UCF Security Incident Response Plan High Level Chris Vakhordjian Information Security Officer Computer Services & Telecommunications Division of IT&R Revision 1.1, 7 June 2007 Information Security Office
More informationBradley University Credit Card Security Incident Response Team (Response Team)
Credit Card Security Incident Response Plan Bradley University has a thorough data security policy 1. To address credit cardholder security, the major card brands (Visa, MasterCard, American Express, Discover
More informationIDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Security - Security Incident Response 10330
IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Security - Security Incident Response 10330 POLICY INFORMATION Major Functional Area (MFA): MFA X - Office of General Counsel & Compliance Policy
More informationIT Security Standard: Computing Devices
IT Security Standard: Computing Devices Revision History: Date By Action Pages 09/30/10 ITS Release of New Document Initial Draft Review Frequency: Annually Responsible Office: ITS Responsible Officer:
More informationEnvironmental Management Consolidated Business Center (EMCBC) Subject: Cyber Security Incident Response
Date 06/10/10 Environmental Management Consolidated Business Center (EMCBC) Subject: Cyber Security Incident Response 1.0 PURPOSE Implementing Procedure APPROVED: (Signature on File) EMCBC Director ISSUED
More informationCHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)
CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT) PURPOSE: The purpose of this procedure is to establish the roles, responsibilities, and communication procedures for the Computer Security Incident
More informationWelcome to Today s NACUBO Webcast. Our program will begin shortly with a brief introduction on how to use the desktop interface.
Welcome to Today s NACUBO Webcast Our program will begin shortly with a brief introduction on how to use the desktop interface. Desktop Interface Media Player Element Display Element Toolbar Quick Question
More informationThreat Management: Incident Handling. Incident Response Plan
In order to meet the requirements of VCCS Security Standards 13.1 Reporting Information Security Events, and 13.2 Management of Information Security Incidents, SVCC drafted an (IRP). Incident handling
More informationRUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology
RUTGERS POLICY Section: 70.2.20 Section Title: Legacy UMDNJ policies associated with Information Technology Policy Name: Information Security: Incident Management Formerly Book: 95-01-09-02:00 Approval
More informationInformation Security Incident Management Guidelines. e-governance
Information Security Incident Management Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India.
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine
More informationMontana Tech Escalation Procedures for. Security Incidents
Montana Tech Escalation Procedures for Security Incidents 1.0 Introduction This procedure describes the steps which are to be taken for physical and computer security incidents which occur within the Montana
More informationComputer Security Incident Response Team
Computer Security Incident Response Team Operational Standards The University of Scranton Information Security Office August 2014 Table of Contents 1.0 Operational Standards Document Overview... 3 2.0
More informationC. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
More informationTop Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology
More informationBUSINESS CONTINUITY POLICY
BUSINESS CONTINUITY POLICY Last Review Date Approving Body n/a Audit Committee Date of Approval 9 th January 2014 Date of Implementation 1 st February 2014 Next Review Date February 2017 Review Responsibility
More informationIncident Response Guidance for Unclassified Information Systems
Mandatory Reference: 545 File Name: 545mad_051503_cd32 Revision: 05/15/2003 Effective Date: 05/23/2003 Incident Response Guidance for Unclassified Information Systems Recent Government Information Security
More informationDEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
More informationCLASSIFICATION SPECIFICATION FORM
www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information
More informationNorwich University Information Assurance Security Policy. Final Version 10.0 for Implementation
Norwich University Information Assurance Security Policy Final Version 10.0 for Implementation Table of Contents Norwich University... 0 Information Assurance Security Policy... 0 1.0 Introduction... 2
More informationComputer Security Incident Reporting and Response Policy
SECTION: 3.8 SUBJECT: Computer Security Incident Reporting and Response Policy AUTHORITY: Executive Director; Chapter 282.318, Florida Statutes - Security of Data and Information Technology Resources;
More informationAttachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
More informationDefensible Strategy To. Cyber Incident Response
Cyber Incident Response Defensible Strategy To Cyber Incident Response Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack
More informationIT Security Incident Response Protocol McGill University
1 of 5 Issued: November 15, 2008 Issued by: Chief Information Officer IT Security Incident Response Protocol McGill University November 15, 2008 applying to IT facilities run by administrative units March
More informationInformation Technology Services Information Security Incident Response Plan
Information Technology Services Information Security Incident Response Plan Authors: Peter Hamilton Security Manager Craig Collis Head of Risk, Quality and Continuity Date:1/04/2014 Version:1.3 Status:Final
More informationIMS-ISA Incident Response Guideline
THE UNIVERSITY OF TEXAS HEALTH SCIENCE CENTER AT SAN ANTONIO IMS-ISA Incident Response Guideline Incident Response Information Security and Assurance 12/31/2009 This document serves as a guideline for
More informationINFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
More informationImplementing an Incident Response Team (IRT)
1.0 Questions about this Document CSIRT 2362 Kanegis Dr Waldorf, MD 20603 Tel: 1-301-275-4433 - USA 24x7 Incident Response: Martinez@csirt.org Text Message: Text@csirt.org Implementing an Incident Response
More informationCONTENTS. Introduction Page 2. Scope.Page 2. Policy Statements Pages 2-3. Major IT Security Incidents Defined... Page 3
POLICY TITLE: Policy POLICY #: CIO-ITSecurity 09.1 Initial Draft By - Position / Date: D. D. Badger - Dir. PMO /March-2010 Initial Draft reviewed by ITSC/June 12-2010 Approved By / Date: Final Draft reviewed
More informationREGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
More informationOverview TECHIS60441. Carry out security testing activities
Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being
More informationThe PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
More informationInformation Security Incident Management Policy
Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation
More informationTop Considerations for Incident Response
Top Considerations for Incident Response INTRODUCTION Incident response is a key part of any comprehensive security plan. However, many firms are not even sure where to begin to create an incident response
More informationBOARD OF GOVERNORS MEETING JUNE 25, 2014
CYBER RISK UPDATE BOARD OF GOVERNORS MEETING JUNE 25, 2014 EXECUTIVE SUMMARY Cyber risk has become a major threat to organizations around the world, as highlighted in several well-publicized data breaches
More informationWho Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5
Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose
More informationExecutive Overview...4. Importance to Citizens, Businesses and Government...5. Emergency Management and Preparedness...6
Securing the State Of Michigan Information Technology Resources Table of Contents Executive Overview...4 Importance to Citizens, Businesses and Government...5 Emergency Management and Preparedness...6
More informationAddressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
More informationCritical Incident Management Policy
Name of Policy Critical Incident Management Policy Description of Policy This policy outlines ACU s commitment to effectively respond and manage incidents and critical incidents. Students, staff, contractors
More informationHealthcare and IT Working Together. 2013 KY HFMA Spring Institute
Healthcare and IT Working Together 2013 KY HFMA Spring Institute Introduction Michael R Gilliam Over 7 Years Experience in Cyber Security BA Telecommunications Network Security CISSP, GHIC, CCFE, SnortCP,
More informationMassachusetts MA 201 CMR 17.00. Best Practice Guidance on How to Comply
Massachusetts MA 201 CMR 17.00 Best Practice Guidance on How to Comply Massachusetts MA 201 CMR 17.00 Best Practices for Compliance 1 Overview MA 201 CMR 17.00 has been in the news for the last 18 months.
More informationApplication Development and Support
Service Description The Application Development & Support (AD&S) service provides high-end design and the latest Web technologies to North Carolina government at the lowest possible rates. The service
More informationIncident Response Plan for PCI-DSS Compliance
Incident Response Plan for PCI-DSS Compliance City of Monroe, Georgia Information Technology Division Finance Department I. Policy The City of Monroe Information Technology Administrator is responsible
More informationPublic Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
More informationClient Update SEC Releases Updated Cybersecurity Examination Guidelines
Client Update September 18, 2015 1 Client Update SEC Releases Updated Cybersecurity Examination Guidelines NEW YORK Jeremy Feigelson jfeigelson@debevoise.com Jim Pastore jjpastore@debevoise.com David Sarratt
More informationHow Much Do I Need To Do to Comply? Vice president SystemExperts Corporation
How Much Do I Need To Do to Comply? Richard E. Mackey, Jr. Vice president SystemExperts Corporation Agenda Background Requirements and you Risk language Risk Factors Assessing risk Program elements and
More informationThe University of Texas at Tyler. Audit of Compliance with Texas Administrative Code 202
Audit of Compliance with Texas Administrative Code 202 August 2015 OFFICE OF AUDIT AND CONSULTING SERVICES 3900 UNIVERSITY BOULEVARD TYLER, TEXAS 75799 BACKGROUND Texas Administrative Code (TAC) Title
More informationInformation Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
More informationStatement of Guidance: Outsourcing All Regulated Entities
Statement of Guidance: Outsourcing All Regulated Entities 1. STATEMENT OF OBJECTIVES 1.1. 1.2. 1.3. 1.4. This Statement of Guidance ( Guidance ) is intended to provide guidance to regulated entities on
More informationWATER RESOURCES MANAGEMENT MASTER PROGRAM Water Utility Administration and Management Course LECTURE 13
WATER RESOURCES MANAGEMENT MASTER PROGRAM Water Utility Administration and Management Course LECTURE 13 Water Service Crises and Emergency Management Dr. Nahed Ghbn, Eng. Rebhi El-Shiekh Palestinian Water
More informationDOCUMENT HISTORY LOG. Description
Effective Date: 02/26/2013 Page 2 of 16 DOCUMENT HISTORY LOG Status (Baseline/ Revision/ Canceled) Document Revision Effective Date Baseline 1.0 02/19/2003 Revision 1.1 03/12/2003 Description Revision
More informationAudit Report. Information Technology Email Service. May 2014. Angela M. Darragh, CPA, CISA, CFE Audit Director AUDIT DEPARTMENT
Audit Report AUDIT DEPARTMENT Information Technology Email Service May 2014 Angela M. Darragh, CPA, CISA, CFE Audit Director AUDIT COMMITTEE: Commissioner Steve Sisolak Commissioner Chris Giunchigliani
More informationINFORMATION SECURITY INCIDENT REPORTING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
More informationBALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management
More informationDoes it state the management commitment and set out the organizational approach to managing information security?
Risk Assessment Check List Information Security Policy 1. Information security policy document Does an Information security policy exist, which is approved by the management, published and communicated
More informationRISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
More informationPanel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices
Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers
More informationInfasme Support. Incident Management Process. [Version 1.0]
Infasme Support Incident Management Process [Version 1.0] Table of Contents About this document... 1 Who should use this document?... 1 Summary of changes... 1 Chapter 1. Incident Process... 3 1.1. Primary
More informationCan Your Diocese Afford to Fail a HIPAA Audit?
Can Your Diocese Afford to Fail a HIPAA Audit? PETULA WORKMAN & PHIL BUSHNELL MAY 2016 2016 ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS Agenda Overview Privacy Security Breach Notification Miscellaneous
More informationInformation Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
More informationHELP DESK MANAGEMENT PLAN
AT&T Help Desk Overview: DIR Platinum Customer Status AT&T is committed to continuous process improvement to meet DIR requirements and expectations, and to improve the end user experience. Today s process
More informationSTATE OF ARIZONA Department of Revenue
STATE OF ARIZONA Department of Revenue Douglas A. Ducey Governor September 25, 2015 David Raber Director Debra K. Davenport, CPA Auditor General Office of the Auditor General 2910 North 44 th Street, Suite
More informationState of Vermont. Intrusion Detection and Prevention Policy. Date: 11-02-10 Approved by: Tom Pelham Policy Number:
State of Vermont Intrusion Detection and Prevention Policy Date: 11-02-10 Approved by: Tom Pelham Policy Number: 1 Table of Contents 1.0 Introduction... 3 1.1 Authority... 3 1.2 Purpose... 3 1.3 Scope...
More informationIncident Response Team Responsibilities
Scope Any incidents that originate from, are directed towards, or transit Department of Earth and Planetary Sciences controlled computer or network resources will fall under the purview of this Incident
More informationCISM Certified Information Security Manager
CISM Certified Information Security Manager Firebrand Custom Designed Courseware Chapter 4 Information Security Incident Management Exam Relevance Ensure that the CISM candidate Establish an effective
More informationInformation Security: Roles, Responsibilities, and Data Classification. Technology Services 1/4/2013
Information Security: Roles, Responsibilities, and Data Classification Technology Services 1/4/2013 Roles, Responsibilities, and Data Classification The purpose of this session is to: Establish that all
More informationDomain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services
Service Level Agreement Page 1 of 7 Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services 1. Agreement This agreement is to define Domain Name Service (DNS) provided
More informationCal Poly Information Security Program
Policy History Date October 5, 2012 October 5, 2010 October 19, 2004 July 8, 2004 May 11, 2004 January May 2004 December 8, 2003 Action Modified Separation or Change of Employment section to address data
More informationFACT SHEET: Ransomware and HIPAA
FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000
More informationFour Top Emagined Security Services
Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security
More informationComputer Security Incident Response Team
University of Scranton Computer Security Incident Response Team Operational Standards Information Security Office 1/27/2009 Table of Contents 1.0 Operational Standards Document Overview... 3 2.0 Establishment
More informationTop Five Things You Need to Know About Cybersecurity. Larry Mattox, VC3 Session #7
Top Five Things You Need to Know About Cybersecurity Larry Mattox, VC3 Session #7 Cyber breaches are more sophisticated and can happen to any size organization. Victims of Cyber-espionage CNN, Washington
More informationCLOUD SERVICES FOR EMS
CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery
More informationInformation Technology Internal Audit Report
Information Technology Internal Audit Report Report #2013-03 August 9, 2013 Table of Contents Page Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives... 4 Scope... 5 Testing
More informationInformation Technology Security and Privacy Incident Response and Reporting Procedures
Information Technology Security and Privacy Incident Response and Reporting Procedures Florida State University Information Security and Privacy Office (ISPO) 2014 1 F S U I n c i d e n t R e s p o n s
More informationUniversity of Liverpool
University of Liverpool Information Security Incident Response Policy Reference Number Title CSD-012 Information Security Incident Response Policy Version Number 1.2 Document Status Document Classification
More informationStepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
More information