Security Planning for Small Businesses: A Service- Learning Course

Size: px
Start display at page:

Download "Security Planning for Small Businesses: A Service- Learning Course"

Transcription

1 Security Planning for Small Businesses: A Service- Learning Course Todd Burri and Susan J Lincke University of Wisconsin-Parkside, burri004@uwp.edu, lincke@uwp.edu Abstract - Experiential, real-world problems results in higher impact learning. However, security planning is a complex process to learn. The Small Business Security Workbook was developed as part of an NSF CCLI grant to enable students to help small businesses in planning for security. The Workbook leads students and small business management through the security planning process, via a top-down (or bottom-up) approach and step-by-step procedures. Students learn concepts in lecture, which are just-in-time reviewed in the Workbook. The students practice with a case study, and then do actual security planning with a community partner. The Workbook is rated highly by both community partners and students in improving security in cooperating organizations. This paper describes the experience that a student team had with the Workbook and their community partner, as well as summarizing the overall perspective of the class. Index Terms Security planning, service learning, information security, small business security, SMB. INTRODUCTION The Information Systems Security course prepares students to become security analysts, and to achieve certification in the security field. The lecture aspect of the course emphasizes material from ISACA s Certified Information Security Manager (CISM) [1] and Certified Information Systems Auditor (CISA) [2]. The practical and project aspect of the course enables students to learn about security by helping a small businesses plan their security. Students use the specially-designed Small Business Security Workbook to practice with a case study before working with a community partner. This paper describes the process by focusing on the experience of one typical project group working with a local business manager. Barlett and Fomen [3] summarize in their literature review that Small-Medium Enterprises (SMEs) have been found to lack security, often because of lack of expertise and time. Over 80% of French SMEs have no business continuity plan or disaster recovery plan. SMEs lack internal IS expertise and security awareness, and are not aware of the security regulation they must adhere to. They often need to outsource security competencies, which they cannot afford. Thus, small businesses can appreciate the help that students can provide them assuming the students are competent. Also, students benefit, because SME s security problems are smaller, more manageable, and more understandable than what they would see at a larger organization. They could positively impact the organization. Service learning can help both small businesses and students gain competence in security. Service learning is established in engineering projects and software engineering development [4-7]. In the technology areas, service learning has helped students gain valuable job experience and group and communication skills, and assisted students in clarifying career goals [4]. It also has been useful in teaching ethics and standardized documentation techniques for ABET accreditation [5]. Not only do the students benefit, but also the instructor and community partners [6]. Service learning has been shown to attract women/minorities, who are attracted to helping people [8]. Service learning projects in security include evaluating organizational security maturity [9-10], and performing audits [11]. Service learning in audits enables students to learn to configure security experiments and interpret results, in addition to the traditional running of the tools in a security lab. Our experience with maturity evaluation and audits is that small businesses lack policies, and therefore it is difficult to do a professional audit. To our best knowledge, there is no other Workbook that helps students plan security. While the need for security in small businesses is obvious, the challenge is to provide competent materials simple enough for new security students to understand. Existing security recommendations, including ISO [12], COBIT [13], and the FIPS set of standards [14], are indeed expert sources. However, they are not easy to use, since they describe full-feature security, designed to handle large security problems. They must be read, deciphered, prioritized, designed, and implemented by full time staff (not commonly available to small businesses). Study guides for security certifications: CISA, CISM, and CISSP [1,2,15] likewise provide competency, but are equally difficult and time-consuming to digest. In contrast, our Small Business Security Workbook was designed to lead students and small business managers through the security planning process as an active learning or homework exercise, providing easy-to-follow procedures and just-in-time vocabulary and concepts. The Workbook is in digital form, enabling students to plan and document F1E-1

2 Implementation Requirements Session F1E security by completing tables, editing existing proposed text, and preparing diagrams as necessary. The learn-asyou-go and ease of use is what separates this Workbook from other standards, documentation, and textbooks. NSF CCLI has funded the development of this Information Security course that would enable students to help small businesses plan and audit security, via service learning. The Workbook is professional, since it is built on material defined by the CISA/CISM study guides. Although the Workbook covers all major aspects of security planning, the organization can choose to prioritize their most critical security components. This course is offered to computer science and MIS undergraduates and CIS graduate students, with no previous security coursework. The instructor first lectures on a topic (e.g., risk). The lecture includes sample completed workbook tables for students to refer to. Students practice using the Workbook and a case study as an active learning exercise. The Health First Case Study deals with a fictional doctor s office that is planning their security. After practice, students are then prepared to work with their community partner. The instructor attends the first community partner meeting, and may attend additional harder topic sections, depending on the student group background. (Harder sections include risk and network security.) The instructor provides feedback to the students on each completed section, and students correct sections before a final grade is issued. The partner gets a digital copy of their filled-in Workbook at the semester end. The Workbook has four main sections: Chapter 3, the strategic/policy Level: this high level is the responsibility of upper-level management, and involves defining policies and goals in a broad way that will keep them aligned with overall business objectives. Example sections: risk, policy. Chapter 4, tactical/architecture level: this middle level is still a management task, which maps out how those high level policies will be met. Example sections: information security, physical security, metrics. Chapter 5, operational level: this low or day-to-day level defines procedures to implement the tactical level. This is where the detailed security procedures and standards are built and maintained. Chapter 6, audits: defines outlines and procedures for auditing security systems to ensure they are meeting their objectives. Figure 1 shows the layout of strategic/tactical sections of the Workbook, which address security requirements and high level design. Concepts and vocabulary are introduced just before they are needed. Then, students are asked to complete tables or modify skeleton text, etc. At the end of each section is a description of how professionals should use the defined security requirements to implement security (e.g., program firewalls). Skeleton Text Introduce Concepts & Definitions Do Workbook Components Recommend Professional Help FIGURE 1: WORKBOOK PROCESSES Tables Policies & Standards Color-coded Maps The service learning aspect will be further described by outlining a typical experience of one student team working with the Workbook. THE STUDENT TEAM For the purpose of the community project the class was divided into groups of two-three students and each group assigned to a partner. Our group consisted of one undergraduate and two graduate students. Our partner, here renamed Joanne for confidentiality reasons, was running a small local business and agreed to help with our project as a way to examine and improve the security of her network. In addition, there were some HIPAA issues that were relevant to her business, which made the case study that much more interesting and useful. HIPAA (Health Insurance Portability and Accountability Act) is serious regulation that is meant to protect patient privacy [16]. The penalty of Wrongful disclosure of individually identifiable health information can result in fines to $50,000 and one year in jail. If false pretenses are involved, fines can increase to $100,000 and five years in jail. HIPAA is very detailed in its requirements, and Joanne needed not only to pay attention to those areas where HIPAA is applicable, but to have her solution well-documented for legal reasons. Due to time constraints, we were only able to cover parts of Chapters 3-4 of the Workbook in our meetings. I should note that, although the class guidelines suggested a meeting every other week, we agreed to schedule one per week. That helped considerably; we got off to a very fast start and were able to be much more flexible dealing with schedule conflicts. During the semester, we managed to cover from Chapter 3: security policy, risk, and business continuity, and from Chapter 4: data security and network security, as well as security awareness training. Note that security awareness training is a presentation for use in employee orientations, and is separate from the Workbook. USING THE WORKBOOK F1E-2

3 We did not always cover the material sequentially in the Workbook. However, I will discuss the sections in order for sake of simplicity. The Strategic Level Chapter 3 of the Workbook covers information security at the strategic or policy level. Ethics, policies and standards, asset valuation and prioritization, and contingency planning all begin with broad, high-level statements that set the organization s goals and priorities. Code of Ethics: The first section includes a formal code of ethics. It contains a number of examples of policy statements regarding proper employee conduct in various aspects of a business enterprise general behavior, confidentiality, conflicts of interest, and so on. Joanne s organization already had an employee handbook containing its own code of ethics that, after reviewing this section, she felt was already adequate. We noted that and moved on. Policy: We evaluated the COBIT maturity level of her organization using a 1-hour questionnaire, contained in a Workbook appendix. The organization rated low (similar to most of our partner organizations), between COBIT levels 1 and 2. Then, we addressed the Workbook section on policy, which is a required element of HIPAA. The Workbook defines some terms policy, standard, guideline, procedure. It s important to understand the exact meaning of each in order to develop a cohesive, systematic program (this is why the Workbook is organized the way it is). We spent some time discussing these concepts and discussing the COBIT standard on which the policy section is based. Joanne was already somewhat familiar with the concepts of a process maturity model (unlike other partners). The policy section includes a number of subsections; each contains an example of a policy addressing a particular subject (such as Risk, Human Resources, Business Continuity ), and one or more sample standards that could be defined for following the policy. For example, the policy for Access Control invokes the concept of least privilege (that an employee shall have access only to the information that is relevant to his or her job), and states that access to hardware and software shall be properly controlled. A standard accompanying that policy includes specific requirements for identity authentication (username and password) and for automatically locking workstations when not in use. There are 16 policy subsections in the Workbook. Not all applied to Joanne, and some policies were already in place at her business. We discussed each section, especially the ones she did not have a policy for, and added notes where appropriate. Risk Analysis: Risk analysis is a mandatory element of HIPAA. Therefore, we considered this to be a very important topic and spent a lot of time on it. The Workbook section describes a systematic method for identifying, prioritizing and addressing the risks an organization faces. The first step is to determine the value of the organization s assets. Assets include both the physical items needed to conduct business computer equipment and office furniture, for example, and the data to be stored in her files, both paper and electronic. We made a list of Joanne s assets and estimated the value of each, including the direct cost of replacing an asset, as well as other potential financial impacts associated with a loss, such as legal liabilities and interruption of operations. Next we considered possible threats to the assets enumerated above. There are two ways to go about this analysis: qualitative and quantitative. Quantitative risk analysis can be used when the monetary cost of an adverse event is easily calculated; the loss or destruction of a particular piece of hardware, for example. When the cost and frequency is not so straightforward, qualitative analysis must be used. A lost database will have to be reconstructed, and the time required to do so may be estimated. However, if a fire puts a business out for days, the amount of damage, lost business days, and loss of customers may be unknown. Educated guesswork is sometimes the only way to estimate the total impact of the event. In each case we estimated the likelihood of the threats, calculated the total cost of an occurrence of each (as best we could), and used those figures to calculate the annual loss expectancy (ALE) for each. The ALE is useful for threat mitigation; if a particular event is predicted to occur once every ten years, and the cost of repairing the damage is ten thousand dollars, an organization could reduce the impact of the event by setting aside one thousand dollars per year to amortize the cost or pay for a control to reduce its likelihood or impact. Joanne was particularly interested in this area; the results of the analysis, albeit rudimentary, are very useful for prioritizing how one deals with risk (essentially the higher the ALE, the higher the priority), and for planning how to mitigate exposure through insurance, procedures, technological controls, or other means. Since Joanne was concerned with HIPAA, and HIPAA involves precise fine and jail time, this made the cost of a security breach easier to estimate. Finally, using the list of assets and threats, we considered what steps would be appropriate to protect the one and minimize or avoid the other. The security control measures we decided on were necessarily high-level and nonspecific. Therefore a cost/benefit analysis was outside the scope of the discussion. We left that for Joanne to handle at her own convenience. Business Impact Analysis & Business Continuity: This section (also mandatory for HIPAA) considers how an organization should plan ahead to continue operating after a serious mishap. We read through it as a group and discussed the concepts of impact, continuity, and disaster F1E-3

4 recovery as they applied to our results in risk analysis. However we decided that what we had already accomplished was sufficient for the time being and didn t go into too much detail. Joanne already had a good grasp of recovery point objective (the amount of data you can afford to lose and still function; basically defines how often you need to back up your files) and recovery time objective (the amount of time between the occurrence of an adverse event and the recovery/resumption of operations) and how she would apply them to her business. The Tactical Level Chapter 4 goes on to the tactical level how to accomplish the goals set by policy. Issues such as access control levels, data handling, and protective measures are worked out at this level. Information Security: This section begins with introductory definitions of concepts like need-to-know (an employee should only have access to the data needed to do his or her job), least privilege (likewise an employee s ability to manipulate data should be limited to job requirements) and data owner (the person in an organization who is primarily responsible for an asset). Also included is information about Wisconsin s laws regarding personally identifiable information and what a business needs to do to protect it. Joanne selected this Workbook section because information security is required for protection of health information, and authentication and access control are important aspects of HIPAA s Security Rule. After reviewing that material we started on the Criticality Classification Systems and Sensitivity Classification Systems (Sections and 4.1.2). It can be easy to mix these up. We did, several times. Criticality has to do with the importance of the data to the business how long it can keep going without a particular asset, before affecting income. Sensitivity has to do with permissions and access to data within an organization who should be able to see, use or change the information in files. We added statements defining the criticality and sensitivity of certain types of data to Joanne s business. Joanne s organization had confidential techniques and processes, in addition to personal health information. Treatment of Sensitive Data includes a table describing how data should be stored, handled, disposed of, and categorized by sensitivity level. The table was already populated with suggested procedures what areas need to be locked, what data needs to be encrypted, how old data should be disposed of, and so on. We amended it to reflect Joanne s more stringent requirements. For Asset Inventory, we listed important electronically-stored data along with some substantial information about each. Data does not always refer only to information; it covers anything stored on a computer to include programs and applications, without which a business couldn t function. We listed a variety of data types needed for Joanne s business along with descriptions, usage requirements and read/write permissions for all relevant employees. We were able to be very thorough on this section, as Joanne was very confident about what she wanted to include and had decision-making authority regarding classifications and permissions. The last part of 4.1 defines Role Based Access Control. We identified the specific roles that existed in the organization (again, Joanne had a very clear idea of what she wanted), defined them, named employees who held them, and specified what types of data could be accessed by each. Network Security: There are two parts to the Network Security section: defense in depth, and the network diagram. We listed several computer applications that Joanne would be using, the server they would be located on, and what protective measures were required for each. Next there is a color-coded Network Diagram, which we altered to reflect Joanne s configuration. The diagram shows paths of logical access to the network and is accompanied by text describing protective controls. Student Perspective The students were gratified at the effort Joanne put into the project. As students, we were routinely expected to work as late as necessary. She was not a student, and I had some misgivings about her willingness to spend all evening once a week working on something that I regarded as our school assignment. However, other than a few meetings she missed due to other obligations, she was very reliable and interested in the material. In our group, I was the one who owned a laptop computer, so it was my job to follow the Workbook as we talked and to make whatever changes were agreed upon (after each meeting I ed the updated version to the group with new changes highlighted in blue). I therefore spent some amount of time in each meeting haggling with Joanne and the others to ensure that I understood exactly what was meant and that I entered it correctly. Perhaps for that reason, I tended to focus narrowly on the precise topic under discussion at the time, rather than keeping in mind the overall picture. In retrospect, it might have been more useful to think of each section as it fit into the whole, rather than as a separate thing. However Joanne seemed to have a good grasp of the material and how it would apply to her business overall. Our graduate student leader, James, did a very good job of running the meetings (somebody had to) and breaking down the chapters into manageable parts while still keeping it coherent. Gabriel and I contributed to the discussion largely from our personal experience; he had worked as a network administrator, while I was (at the time) a manager for a private security company and already had a fair understanding of basic security principles. As a result of our project, we recommended tying the Workbook material more closely to the lecture notes and to F1E-4

5 the case study. The case study involved a fictional doctor s office, which brought up many of the same specific HIPAA issues that concerned Joanne s business. The lecture notes contained plenty of pertinent information. In a second semester, the lecture notes were enhanced to include example completed tables and diagrams to help tie the materials together better. Going through the case study in class was sometimes more awkward, compared to working with a real-world partner, because we found ourselves trying to make decisions regarding a business none of us had any experience with. We broke into groups for the case study as well; I had different partners there than for the community project which had both good and bad aspects. On one hand, I was able to hear different perspectives on the material. On the other, working with the same group on both parts of the class material might have benefitted us by aligning our understanding of the material, and benefitted Joanne by offering her better-prepared partners in our meetings together. COURSE OUTCOMES The experience of this student group was representative of four other student groups in two separate semesters, accomplishing similar security planning tasks. All groups worked with small business management, who generally used an IT service consultant for their IT needs. While most student groups worked with security planning and the Workbook, other student groups were involved with an extended audit (also defined by the Workbook), and/or security awareness training or testing. Their results are also included in the evaluations discussed below. Results are shown for two semesters. The first semester the course was offered in the evening, and working students, including graduate students, enrolled. The second semester, the course was offered during the day, and had no in-class graduate students or students with extensive working experience participating with the community project. This lack of experience in the second semester did require the instructor to be more involved during the beginning of the semester. Experienced/graduate students also added more to the inclass discussion during the first semester. After both semesters, both students and cooperating community partners rated the community-based learning experience highly. Table 1 shows student responses to community project evaluation. During this survey, students were asked using a 4-point scale: Strongly Disagree, Disagree, Agree, and Strongly Agree, and the results show the percentage of students replying Agree / Strongly Agree. Students who marked Agree or Strongly Agree are counted in the Agreed category. It is interesting to note that in the second course offering 100% of students agreed that they had helped their community partner. TABLE I STUDENT ASSESSMENT OF COMMUNITY-BASED LEARNING Student Survey (Results show Agree / Strongly Agree ) The community project helped me to better understand the course lectures and readings. Community projects should be part of more classes at this university I felt that the community project I did through this course benefited the community partner s organization 1 st 2 nd 90/10% 85/0% 80/10% 85/14% 80/0% 100/28.6% Student comments included: Working with the community partner, however, did help with understanding and knowing the course material. The workbook was a clear application of the topics discussed throughout the class and an extension of them. The documentation and resources involved in the project with the community partner were immeasurably helpful. Some of the simplest things for us was amazing for our partner Table 2 shows the results where community partners were asked four questions, which could be answered with Very Satisfied, Satisfied, Not Satisfied, or Not Applicable. All partners were Satisfied, and most partners were Very Satisfied with the quality of students work. Their reaction was initially split between Satisfied and Very Satisfied for scope and timing of the project. Groups often encounter scheduling challenges with their very busy manager interface. After the first semester, students were encouraged to try to meet weekly with their partner. TABLE II PARTNER ASSESSMENT OF COMMUNITY-BASED LEARNING Partner Survey (Results show Satisfied / Very Satisfied ) 1 st 2 nd The quality of students work 100/100% 100/75% Scope and timing of the project 100/50% 100/100% Level and quality of 100/75% 100/75% communication with faculty/staff Level and quality of 100/75% 100/50% communication with students. Community partners comments, including both positive and negative aspects included: I loved your class. I resented that they took up so much time on Thursdays I would do this again. The results were really excellent. They were both a pleasure to work with, respectful and engaged, professional. This was a great exercise the ways of shoring up security. Concerning student communication, sometimes there was a lag time in responsiveness in coordinating schedules. Rescheduling F1E-5

6 when a meeting was cancelled was challenging and took time. It is interesting to note that the simulated case study was not as liked by the students as the real world project. After the first semester, the case study was re-written to be in conversational format and provide more details. Although the case study still is not as liked as the service learning aspect, the students do recognize the importance of the case study before meeting with the community partner. ACKNOWLEDGEMENTS The development of this course (including Workbook) was funded by the National Science Foundation (NSF) Course, Curriculum and Laboratory Improvement (CCLI) grant : Information Security: Audit, Case Study, and Service Learning. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author and/or source(s) and do not necessarily reflect the views of the NSF. We would like to thank NSF for making this work possible, and also thank the students who participated in the course, thereby helping to improve it! CONCLUSION This Information Systems Security course uses service learning, with lecture materials based on the CISA/CISM certifications. A Small Business Security Workbook was used first with a case study, then a community partner. This Workbook leads inexperienced security students through the security planning process. The communitybased learning aspect of the course was found to be successful by both community partners and students. These materials are available for teaching or general use by contacting the instructor (lincke@uwp.edu). The student author, Todd Burri, successfully passed his CISM exam one semester later, with additional study. [8] Bair, B. and Cohoon, J. M. TWiCE Undergraduate Experience in Research and Community Service, Grace Hopper Women in Computing Conf., [9] Schnieder, H. & Wagner, L. Information Assurance Awareness: Partnership between Students and Community. Proc. 13 th Colloquium for Information Systems Security Education, Seattle WA, June 1-3, [10] Lincke, S., Kumar, R. & Tiwari, V. (2011). Security of Information Systems in Schools: An Evaluation using Audit and COBIT Interviews. Journal of Information Security (JISSEC), vol. 6, no. 3, Dec [11] Lincke, S.J. Network Security Auditing as a Community-Based Learning Project. Proc. 38 th SIGCSE Tech. Symp. on Computer Science Education, March 7-10, 2007, pp [12] ISO/IEC. ISO/IEC 27002:2005 Information Technology Security techniques Code of practice for information security management, DOI= [13] IT Governance Institute. COBIT 4.1, Arlington Heights IL, DOI= [14] NIST, Federal Information Processing Standards Publications, DOI= [15] Harris, S. CISSP All-in-One Exam Guide, 5th Ed., McGraw-Hill, NY, [16] U.S. Dept. of Health and Human Services. Health Insurance Portability and Accountability Act (HIPAA) DOI= ml, REFERENCES [1] ISACA. CISM Review Manual 2010, Arlington Heights IL. DOI= [2] ISACA. CISA Review Manual 2010, Arlington Heights IL. DOI= [3] Barlette, Y., and Fomin, V. V. Exploring the suitability of IS security management standards for SMEs, Proc. 41 st Hawaii International Conf. on System Sciences, IEEE, 2008, pp [4] Carter, L. The Business of Service Learning, 39 th ASEE/IEEE Frontiers in Education Conf., Oct 18-21, 2009, pp. T3G-1-T3G-6. [5] DeRego, F. R., Zoltowski, C., Jamieson, L. & Oakes, W. Teaching Ethics and the Social Impact of Engineering within a Capstone Course, 35 th ASEE/IEEE Frontiers in Education Conf., Oct , 2005, pp. S3D-1-S3D-5. [6] Mikelic, N. & Boras, D. Service Learning: Can our students learn how to become successful student?, Conf. Information Technology Interface, June 10, 2006, pp [7] Alkadi, G., Beaubouef, T., & Schroeder, R. The Sometimes Harsh Reality of Real World Computer Science Projects, ACM Inroads, Dec. 2010, vol. 1, no. 4, pp F1E-6

Network Security: A Case Study

Network Security: A Case Study Network Security: A Case Study Susan J. Lincke Computer Science Department University of Wisconsin-Parkside Kenosha, WI lincke@uwp.edu Abstract This paper reviews 3 case studies related to network security.

More information

The Small Business Security Workbook. Susan Lincke PhD CISA Assoc Prof Computer Science University of Wisconsin-Parkside

The Small Business Security Workbook. Susan Lincke PhD CISA Assoc Prof Computer Science University of Wisconsin-Parkside The Small Business Security Workbook Susan Lincke PhD CISA Assoc Prof Computer Science University of Wisconsin-Parkside NetSecure 2011 Acknowledgments Material is from: CISA Review Manual, 2009 CISM Review

More information

SECURITY RISK MANAGEMENT

SECURITY RISK MANAGEMENT SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department

More information

How To Pass An Assurance Course

How To Pass An Assurance Course FALL 2004 C.W. POST CAMPUS OF LONG ISLAND UNIVERSITY COLLEGE OF MANAGEMENT SCHOOL OF PROFESSONAL ACCOUNTANCY ACC 753 ADVANCED ASSURANCE SERVICES AND COMPUTER AUDITING Instructor: Joel Lanz, CPA, CISA,

More information

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business. S 2 ERC Project: A Review of Return on Investment for Cybersecurity Author: Joe Stuntz, MBA EP 14, McDonough School of Business Date: 06 May 2014 Abstract Many organizations are looking at investing in

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy

More information

Domain 5 Information Security Governance and Risk Management

Domain 5 Information Security Governance and Risk Management Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association

More information

ISMS Implementation Guide

ISMS Implementation Guide atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE TECHNICAL PROPOSAL DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE A White Paper Sandy Bacik, CISSP, CISM, ISSMP, CGEIT July 2011 7/8/2011 II355868IRK ii Study of the Integration Cost of Wind and Solar

More information

Guide to Vulnerability Management for Small Companies

Guide to Vulnerability Management for Small Companies University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

Computer Security Lecture 13

Computer Security Lecture 13 Computer Security Lecture 13 Risk Analysis Erland Jonsson (based on material from Lawrie Brown) Department of Computer Science and Engineering Chalmers University of Technology Sweden Security Management

More information

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

The Second National HIPAA Summit

The Second National HIPAA Summit HIPAA Security Regulations: Documentation and Procedures The Second National HIPAA Summit Healthcare Computing Strategies, Inc. John Parmigiani Practice Director, Compliance Programs Tom Walsh, CISSP Practice

More information

Making Database Security an IT Security Priority

Making Database Security an IT Security Priority Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases

More information

MIS 460 Project Management

MIS 460 Project Management Ursuline College Accelerated Program CRITICAL INFORMATION! DO NOT SKIP THIS LINK BELOW... BEFORE PROCEEDING TO READ THE UCAP MODULE, YOU ARE EXPECTED TO READ AND ADHERE TO ALL UCAP POLICY INFORMATION CONTAINED

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

TABLE OF CONTENTS INTRODUCTION... 1

TABLE OF CONTENTS INTRODUCTION... 1 TABLE OF CONTENTS INTRODUCTION... 1 Overview...1 Coordination with GLBA Section 501(b)...2 Security Objectives...2 Regulatory Guidance, Resources, and Standards...3 SECURITY PROCESS... 4 Overview...4 Governance...5

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Guide for the Role and Responsibilities of an Information Security Officer Within State Government

Guide for the Role and Responsibilities of an Information Security Officer Within State Government Guide for the Role and Responsibilities of an Information Security Officer Within State Government Table of Contents Introduction 3 The ISO in State Government 4 Successful ISOs Necessary Skills and Abilities

More information

Using Web-based Tools to Enhance Student Learning and Practice in Data Structures Course

Using Web-based Tools to Enhance Student Learning and Practice in Data Structures Course Using Web-based Tools to Enhance Student Learning and Practice in Data Structures Course 1. Introduction Chao Chen January 2014 The purpose of this project is to enhance student learning and practice in

More information

How to Use the NYeC Privacy and Security Toolkit V 1.1

How to Use the NYeC Privacy and Security Toolkit V 1.1 How to Use the NYeC Privacy and Security Toolkit V 1.1 Scope of the Privacy and Security Toolkit The tools included in the Privacy and Security Toolkit serve as guidance for educating stakeholders about

More information

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. rok.bojanc@zzi.si Abstract: The paper presents a mathematical model to improve our knowledge of information security and

More information

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical

More information

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Internal Audit Report on. IT Security Access. January 2010. 2010 January - English - Information Technology - Security Access - FINAL.

Internal Audit Report on. IT Security Access. January 2010. 2010 January - English - Information Technology - Security Access - FINAL. Internal Audit Report on January 2010 2010 January - English - Information Technology - Security Access - FINAL.doc Contents Background...3 Introduction...3 IT Security Architecture,Diagram 1...4 Terms

More information

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: (wahlgren@dsv.su.se), 2: (stewart@dsv.su.se) ABSTRACT

More information

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR Chris Apgar, CISSP 2015 OVERVIEW Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

TABLE OF CONTENTS. University of Northern Colorado

TABLE OF CONTENTS. University of Northern Colorado TABLE OF CONTENTS University of Northern Colorado HIPAA Policies and Procedures Page # Development and Maintenance of HIPAA Policies and Procedures... 1 Procedures for Updating HIPAA Policies and Procedures...

More information

Key Components of a Risk-Based Security Plan

Key Components of a Risk-Based Security Plan Key Components of a Risk-Based Security Plan How to Create a Plan That Works Authors: Vivek Chudgar Principal Consultant Foundstone Professional Services Jason Bevis Director Foundstone Professional Services

More information

Applying ITIL v3 Best Practices

Applying ITIL v3 Best Practices white paper Applying ITIL v3 Best Practices to improve IT processes Rocket bluezone.rocketsoftware.com Applying ITIL v. 3 Best Practices to Improve IT Processes A White Paper by Rocket Software Version

More information

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA PRIVACY AND SECURITY AWARENESS HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect

More information

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman

More information

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant Brochure More information from http://www.researchandmarkets.com/reports/3302152/ Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT /

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33

More information

Better secure IT equipment and systems

Better secure IT equipment and systems Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government

More information

CISM ITEM DEVELOPMENT GUIDE

CISM ITEM DEVELOPMENT GUIDE CISM ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS CISM ITEM DEVELOPMENT GUIDE Content Page Purpose of the CISM Item Development Guide 2 CISM Exam Structure 2 Item Writing Campaigns 2 Why Participate as a CISM

More information

Information Security Program

Information Security Program Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security

More information

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

CISM ITEM DEVELOPMENT GUIDE

CISM ITEM DEVELOPMENT GUIDE CISM ITEM DEVELOPMENT GUIDE Updated January 2015 TABLE OF CONTENTS Content Page Purpose of the CISM Item Development Guide 3 CISM Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps

More information

CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Capstone experience for the security curriculum. Synthesizes technical

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Master of Science in Healthcare Informatics and Analytics Program Overview

Master of Science in Healthcare Informatics and Analytics Program Overview Master of Science in Healthcare Informatics and Analytics Program Overview The program is a 60 credit, 100 week course of study that is designed to graduate students who: Understand and can apply the appropriate

More information

Chapter 4 Information Security Program Development

Chapter 4 Information Security Program Development Chapter 4 Information Security Program Development Introduction Formal adherence to detailed security standards for electronic information processing systems is necessary for industry and government survival.

More information

(Refer Slide Time: 01:52)

(Refer Slide Time: 01:52) Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This

More information

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business S 2 ERC Project: Cyber Threat Intelligence Exchange Ecosystem: Economic Analysis Report: An Analysis of US Government Proposed Cyber Incentives Author: Joe Stuntz, MBA EP 14, McDonough School of Business

More information

Week 09 Assignment 9-3. William Slater. CYBR 625 Business Continuity Planning and Recovery. Bellevue University

Week 09 Assignment 9-3. William Slater. CYBR 625 Business Continuity Planning and Recovery. Bellevue University Business Continuity Planning and the Small Business 1 Week 09 Assignment 9-3 William Slater CYBR 625 Business Continuity Planning and Recovery Bellevue University Business Continuity Planning and the Small

More information

CISM (Certified Information Security Manager) Document version: 6.28.11

CISM (Certified Information Security Manager) Document version: 6.28.11 CISM (Certified Information Security Manager) Document version: 6.28.11 Important Note About CISM PDF techexams CISM PDF is a comprehensive compilation of questions and answers that have been developed

More information

ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles and Responsibilities

ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles and Responsibilities Policy Title: Information Security Roles Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles Approval Date: 05/28/2014 Revised Responsible Office:

More information

AP CS Principles Pilot at University of California, San Diego

AP CS Principles Pilot at University of California, San Diego AP CS Principles Pilot at University of California, San Diego Authors: Beth Simon (UCSD) and Quintin Cutts (University of Glasgow) Course Name: CSE3 Fluency with Information Technology Pilot: Fall 2010

More information

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Director, IT Security District Office Kern Community College District JOB DESCRIPTION Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,

More information

Whitepaper. Best Practices for Securing Your Backup Data. BOSaNOVA Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3.com

Whitepaper. Best Practices for Securing Your Backup Data. BOSaNOVA Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3.com Whitepaper Best Practices for Securing Your Backup Data BOSaNOVA Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3.com DATA PROTECTION CHALLENGE Encryption, the process of scrambling information

More information

Vendor Management Best Practices

Vendor Management Best Practices 23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

CMS Information Security Risk Assessment (RA) Methodology

CMS Information Security Risk Assessment (RA) Methodology DEPARTMENT OF HEALTH & HUMAN SERVICES Centers for Medicare & Medicaid Services 7500 Security Boulevard, Mail Stop N2-14-26 Baltimore, Maryland 21244-1850 CENTERS FOR MEDICARE & MEDICAID SERVICES (CMS)

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all

More information

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING IS AUDITING GUIDELINE G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply

More information

IT Auditing and. Discussion Topics. What is IT Auditing?

IT Auditing and. Discussion Topics. What is IT Auditing? IT Auditing and Computer Forensics Kevin H. Doar, CISA Auditor Discussion Topics What is IT Auditing? IT Auditor Skillset IT Auditing Standards & Frameworks IT Controls with Case Examples The Direction

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

CLASSIFICATION SPECIFICATION FORM

CLASSIFICATION SPECIFICATION FORM www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information

More information

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 -------------- w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------

More information

4 Testing General and Automated Controls

4 Testing General and Automated Controls 4 Testing General and Automated Controls Learning Objectives To understand the reasons for testing; To have an idea about Audit Planning and Testing; To discuss testing critical control points; To learn

More information

Compliance and Industry Regulations

Compliance and Industry Regulations Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

Instructions for Completing the Information Technology Officer s Questionnaire

Instructions for Completing the Information Technology Officer s Questionnaire Instructions for Completing the The (Questionnaire) contains questions covering significant areas of a bank s information technology (IT) function. Your responses to these questions will help determine

More information

IT SECURITY PROGRAM MANAGEMENT

IT SECURITY PROGRAM MANAGEMENT G O E B E L A S S O C I A T E S IT Management with Value and Purpose IT SECURITY PROGRAM MANAGEMENT HOW TO ADD VALUE AND GIVE PURPOSE TO YOUR INFORMATION SECURITY PROGRAM (Suarez, K. 2007) DANIEL C GOEBEL,

More information

Business Continuity and Disaster Recovery Planning

Business Continuity and Disaster Recovery Planning Business Continuity and Disaster Recovery Planning Jennifer Brandt, CISA A p r i l 16, 2015 HISTORY OF STINNETT & ASSOCIATES Stinnett & Associates (Stinnett) is a professional advisory firm offering services

More information

HIPAA and Mental Health Privacy:

HIPAA and Mental Health Privacy: HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association

More information

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS Thank you for taking the time to fill out the privacy & security checklist. Once completed, this checklist will help us get a better

More information

An Information Assurance and Security Curriculum Implementation

An Information Assurance and Security Curriculum Implementation Issues in Informing Science and Information Technology Volume 3, 2006 An Information Assurance and Security Curriculum Implementation Samuel P. Liles and Reza Kamali Purdue University Calumet, Hammond,

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

Information Security @ Blue Valley Schools FEBRUARY 2015

Information Security @ Blue Valley Schools FEBRUARY 2015 Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that

More information

PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview

PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview Sante Torino PMI-RMP, IPMA Level B Head of Risk Management Major Programmes, Selex ES / Land&Naval Systems Division

More information

Does Your Information Security Program Measure Up? Session #74

Does Your Information Security Program Measure Up? Session #74 Does Your Information Security Program Measure Up? Session #74 DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily represent official policy

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

What Should IS Majors Know About Regulatory Compliance?

What Should IS Majors Know About Regulatory Compliance? What Should IS Majors Know About Regulatory Compliance? Working Paper Series 08-12 August 2008 Craig A. VanLengen Professor of Computer Information Systems/Accounting Northern Arizona University The W.

More information

Disaster Recovery and Business Continuity Plan

Disaster Recovery and Business Continuity Plan Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix

More information

CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS Prerequisites: CIS 175 Course Description This course is designed to give students a fundamental understanding of computer and network

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

ACTS an ABET Compliance Tracking System for Assessing Engineering Outcomes

ACTS an ABET Compliance Tracking System for Assessing Engineering Outcomes ACTS an ABET Compliance Tracking System for Assessing Engineering Outcomes Abstract There is nearly universal agreement among engineering educators that the ABET2000 rules, although very well intentioned,

More information

White Paper The Return on Investment of Automated Patch Management

White Paper The Return on Investment of Automated Patch Management White Paper The Return on Investment of Automated Patch Management July 2006 Introduction It s a simple truth: applying patches is the only definitive way to keep vulnerable systems from being exploited.

More information

Security Defense Strategy Basics

Security Defense Strategy Basics Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and

More information

So Why on Earth Would You WANT To be a CISO?

So Why on Earth Would You WANT To be a CISO? So Why on Earth Would You WANT To be a CISO? SESSION ID: PROF-M05A Todd Fitzgerald CISSP, CISA, CISM, CRISC, CGEIT, PMP, ISO27000, CIPP, CIPP/US, ITILV3f Global Director of Information Security Grant Thornton

More information

Information Protection Readiness for Securing Personal Information

Information Protection Readiness for Securing Personal Information for Securing Personal Information Information Protection Readiness for Securing Personal Information May 23, 2014 Office of the City Auditor The Office of the City Auditor conducted this project in accordance

More information

REAL SECURITY IS DIRTY

REAL SECURITY IS DIRTY REAL SECURITY IS DIRTY INFORMATION SECURITY AND RISK MANAGEMENT ARE PURSUITS OF BRUTAL SELF- REFLECTION. The most logical business decisions come from facing ugly truths. Before any business spends a dime

More information

-Blue Print- The Quality Approach towards IT Service Management

-Blue Print- The Quality Approach towards IT Service Management -Blue Print- The Quality Approach towards IT Service Management The Qualification and Certification Program in IT Service Management according to ISO/IEC 20000 TÜV SÜD Akademie GmbH Certification Body

More information

Overview 1. Coordination with GLBA Section 501(b) 1. Security Objectives 2. Regulatory Guidance, Resources, and Standards 2. Overview 3.

Overview 1. Coordination with GLBA Section 501(b) 1. Security Objectives 2. Regulatory Guidance, Resources, and Standards 2. Overview 3. Table of Contents Introduction 1 Overview 1 Coordination with GLBA Section 501(b) 1 Security Objectives 2 Regulatory Guidance, Resources, and Standards 2 Security Process 3 Overview 3 Governance 4 Management

More information