Van risico analyse naar security plan
|
|
|
- Bertina Carroll
- 10 years ago
- Views:
Transcription
1 Van risico analyse naar security plan. Small step (for man) or Giant leap (for mankind) Aart Bitter 9 september 2009 [email protected] About me Technische Informatica & Computerkunde 1991 ITIL Service Management, incl. Capacity & Performance Management Postdoctoraal EDP Audit - RE Postdoctoraal Electronic Business ISO/IEC Lead Auditor Van risico analyse naar security plan. 2 Aart Bitter, 9 september
2 Agenda Risks: terms & definitions Meet the family ISMS Risk analysis Security Plan Beer Trial Van risico analyse naar security plan. 3 Van Risico Analyse Risk Analysis Systematic use of information to identify sources and to estimate the risk Note 1: Risk analysis provides a basis for risk evaluation, risk treatment and risk acceptance. Note 2: Information can include historical data, theoretical analysis, informed opinions, the concerns of stakeholders, and so on. Risk Combination of the probability (KANS) of an event and its consequence (IMPACT) Van risico analyse naar security plan. 4 Aart Bitter, 9 september
3 naar Security plan Security plan Generic term representing various plans relating to information security. Note: A security plan may include but not limited to risk treatment plan, resource management plan, and so on. Risk Treatment plan A plan that identifies the appropriate management action, resources, responsibilities and priorities for managing information security risks. Van risico analyse naar security plan. 5 Risk (terms) Risk Criteria Risk Management Risk Communication Risk Analysis Risk Estimation Risk Evaluation Risk Assessment Risk Identification Risk Level Risk Treatment Plan Risk Avoidance Risk reduction Risk Transfer Risk Retention Risk Acceptance Residual Risk Information Security preservation of confidentiality, integrity and availability of information; in addition, other properties, such as authenticity, accountability, nonrepudiation, and reliability can also be involved. NOTE: The aim of information security is to assure that information and information processes are free from unacceptable risks. As in ISO (draft) Van risico analyse naar security plan. 6 Aart Bitter, 9 september
4 Meet the family ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC Up to ISO Fundamentals and vocabulary Information Security Management Systems Requirements Code of Practice for information security management (ISO-17799) Implementation Guidance Information security management measurements Information security risk management Requirements for certification bodies Guidelines for Information security management systems auditing Information security management guidelines for telecommunications Business Continuity Guidelines for cybersecurity IT network security Guidelines for application security Security Management in Health Reserved for future standards Van risico analyse naar security plan. 7 ISO/IEC & ISO/IEC ISO/IEC Requirements for Information Security Management Systems ISO/IEC Code of Practice for Information Security Management Van risico analyse naar security plan. 8 Aart Bitter, 9 september
5 Evolution of Standards 1993 Code of practice 1995 British Standard BS BS BS revised BS revised 2000 ISO BS : ISO/IEC 17799: /11 ISO/IEC /07 ISO/IEC Van risico analyse naar security plan. 9 Van risico analyse naar security plan. 10 Aart Bitter, 9 september
6 ISO certificering desktop review of the existence and completeness of key documentation such as the organization's security policy, Statement of Applicability (SoA) and Risk Treatment Plan (RTP). in-depth audit involving testing the existence and effectiveness of the ISMS and information security controls stated in the SoA and RTP, as well as their supporting documentation. is a reassessment audit to confirm that a previously-certified organization remains in compliance with the standard. Aanvraag Pre-assessment Stage 1 Stage 2 Stage 3 Documentation Risk Assessment Risk Treatment Plan Van risico analyse naar security plan. 11 Van risico analyse naar security plan. 12 Aart Bitter, 9 september
7 ISMS Definition An Information Security Management System is the part of the overall management system that, based on a business risk approach, is intended to ensure the availability, confidentiality & integrity of information and associated assets. Management system: a system to establish and achieve policy and objectives. System: a set of interrelated or interacting elements. Van risico analyse naar security plan. 13 The Quest Interested Parties Plan Establish ISMS Interested Parties Information security requirements and expectations Do Implement and operate the ISMS ISO/IEC Information Security Management System Monitor and review the ISMS Maintain and improve the ISMS Act Managed information security Check Van risico analyse naar security plan. 14 Aart Bitter, 9 september
8 Deming Cycle voor InfoSecurity Plan (Establish the ISMS): Policies & Objectives - Risk Assessment Controls Do (Implement & Operate): Risk Treatment Plan Training & Awareness - Security Incident Procedure Check (Monitor & Review): Measure effectiveness - Review Risk Assessments Conduct ISMS audits Undertake Management Reviews Act (Maintain & Improve): Improvements Implement & Verify Corrective & Preventive Actions Van risico analyse naar security plan Establish the ISMS c) Define a systematic approach to risk assessment Identify method of risk assessment and acceptable risk levels d) Identify the risks Identify assets, threats, vulnerabilities, impact e) Assess the risks Assess the business harm, likelihood, levels of risk f) Identify and evaluate options for the treatment of risks g) Select control objectives and controls for the treatment of risks from Annex A Van risico analyse naar security plan. 16 Aart Bitter, 9 september
9 Risk treatment Identify risk treatment options: risk avoidance: remove threat or vulnerability risk transfer: third party (insurance, outsourcing, managed services) risk reduction (apply appropriate controls) risk acceptance: make decisions concerning all risks remained impact Transfer Reduce Accept Avoid likelihood Van risico analyse naar security plan. 17 ISO/IEC controls 5.Security Policy 6. Organization of IS 7. Asset management 12. System dev. 11. Access control 10. Operations mgt. 9. Physical security 8. HR security 13. IS incident Mgt 14. Continuity management 15. Compliance Van risico analyse naar security plan. 18 Aart Bitter, 9 september
10 Risico Analyse How to conduct a good risk assessment? Van risico analyse naar security plan. 19 ISO/IEC 27005: Info Sec Risk Mgt. ESTABLISH CONTEXT RISK ASSESSMENT RISK COMMUNICATION RISK TREATMENT RISK AVOIDANCE RISK ANALYSIS RISK IDENTIFICATION RISK ESTIMATION RISK EVALUATION RISK TRANSFER RISK REDUCTION RISK ACCEPTANCE RISK MONITORING AND REVIEW RISK ACCEPTANCE Van risico analyse naar security plan. 20 Aart Bitter, 9 september
11 Risk estimation = calculation Risk = f(a,l,i) Asset Value Threat Vulnerability Existing Controls Likelihood Impact Van risico analyse naar security plan. 21 Asset valuation example Impact Criteria Financial loss, cost of disruption, legal cost, corporate embarrassment, customer satisfaction Value Financial Loss Cost of Disruption Legal Costs Corporate Embarrassment Customer Satisfaction (# of complaints per day) Less than 1 Less than 10, ,000 Less than 10,000 Workgroup Less than ,000 to 100, ,000 to 1,000,000 10,000 to 1,000,000 Departmental ,000 to 1,000,000 1,000,000 to 10,000,000 1,000,000 to 10,000,000 Borough ,000,000 to 10,000,000 10,000,000 to 100,000,000 10,000,000 to 100,000,000 (inc. Possible Prosecution of CISO) National More than 10,000,000 More than 100,000,000 More than 100,000,000 (inc. Possible Prosecution of Directors) International Van risico analyse naar security plan. 22 Aart Bitter, 9 september
12 RIJSWIJK, maandag Bijna negen op de tien Nederlanders is voor de invoering van een zogenoemd strafpuntenrijbewi js. Driekwart hiervan wil dat dit voor alle rijbewijsbezitters gaat gelden, de rest heeft alleen bepaalde categorieën bestuurders op het oog, zoals jonge bestuurders, mensen met weinig rijervaring en iedereen van 65 jaar en ouder. Zo blijkt uit een onderzoek dat is uitgevoerd in opdracht van het Centraal Bureau Rijvaardigheidsbe wijzen (CBR). RIJSWIJK, maandag Bijna negen op de tien Nederlanders is voor de invoering van een zogenoemd strafpuntenrijbewi js. Driekwart hiervan wil dat dit voor alle rijbewijsbezitters gaat gelden, de rest heeft alleen bepaalde categorieën bestuurders op het oog, zoals jonge bestuurders, mensen met weinig rijervaring en iedereen van 65 jaar en ouder. Zo blijkt uit een onderzoek dat is uitgevoerd in opdracht van het Centraal Bureau Rijvaardigheidsbe wijzen (CBR). Van risico analyse naar security plan Assets Advertentiebedrijf Fotografen Ingezonden mededelingen Beeld Scanners FTP server Opmaak Graphics Modempool Fotoredactie Fax Reuters AP Schotels, decoders, Routerings PC s Tekst Beeld EPD Redactie Mail server ANP Tekst Kabel Modempool Mail relay server Web proxy Ge-isoleerde PC s op de redactie Beurs X.25 (Datanet) BRS Externe redacteur Iedereen Internet Van risico analyse naar security plan. 23 Asset valuation example Owner Asset type Make Model Serial No Location Cost C I A Highest Sum Multiply Average IT Server Sun Sparc III Blade Valuation Calculation Methods IT Office , ,00 IT Server Sun X86 Blade IT Office , ,00 IT Server Sun Sun Fire III IT Office , ,00 IT Server Sun Sun Fire x IT Office , ,00 IT Worksation Dell P IT Office 740, ,00 Board Laptop Dell LI Directors 680, ,00 HR Workstation Dell P HR Office 680, ,00 Admin Workstation Dell P Front Office 560, ,33 Valuation provided by owners and users of assets Consistency required across organisation Van risico analyse naar security plan. 24 Aart Bitter, 9 september
13 Impact & Likelihood Likelihood Threat Definition Level 1 Less than twice a year 2 Between 3-5 times a year 3 Over 5 times a year Vulnerability Impact Definition Level If the vulnerability is exploited, up to 1 33% of the asset will be lost If the vulnerability is exploited, up to 2 66% of the asset will be lost If the vulnerability is exploited, the 3 asset will be completely lost Van risico analyse naar security plan. 25 RA Methode Asset (value) Impact Likelihood Risk Control Control Control Van risico analyse naar security plan. 26 Aart Bitter, 9 september
14 De Risico's Asset x Likelihood x Impact Risk Van risico analyse naar security plan. 27 The (Risk) Matrix Threat Vulnerability Asset Value ZL ZL ZL L L L M M M H H H ZH ZH ZH L M H L M H L M H L M H L M H Aart Bitter, 9 september
15 Risk Assessment / Mgt methods AUSTRIAN IT SECURITY HANDBOOK CRAMM DUTCH A&K ANALYSIS EBIOS ISF METHODS FOR RISK ASSESSMENT AND RISK MANAGEMENT ISO/IEC IS (ISO/IEC IS 27005) ISO/IEC IS 17799:2005 ISO/IEC IS (BS7799-2:2002) IT-GRUNDSCHUTZ (IT BASELINE PROTECTION MANUAL) MARION MEHARI OCTAVE V2.0 (AND OCTAVE-S V1.0 FOR SMALL AND MEDIUM BUSINESSES) SP (NIST) Van risico analyse naar security plan. 29 Risk management Tools CALLIO CASIS COBRA COUNTERMEASURES CRAMM EBIOS GSTOOL ISAMM OCTAVE PROTEUS RA2 RISKWATCH Van risico analyse naar security plan. 30 Aart Bitter, 9 september
16 Risk Assessment Risico s verschillen per situatie Zorg voor eenduidige criteria en termen Van risico analyse naar security plan. 31 Security Plan Security policies & objectives Maintain & Improve Risk assessment & Controls Implement Risk Treatment plan Monitor & Review ISMS Van risico analyse naar security plan. 32 Aart Bitter, 9 september
17 Implement = Changing Behaviour Kennis in de organisatie (zichtbaar) Kennis & Vaardigheden Politiek Cultuur in de organisatie (onzichtbaar) Energie En dan is er Beer Trial Volume Indicator: Shows how much beer is left in the keg Freshness Indicator: Beer stays fresh 30 days from tapping Temperature Indicator: Shows actual Beer temperature Temperature Control: choose from 3 temperature settings. Van risico analyse naar security plan. 34 Aart Bitter, 9 september
18 Asset valuation Assumptions for the valuation of CIA: C: the amount of tapped beer could be revealed I: the indicators for beer temperature and freshness can be manipulated A: someone steals the beertender display Value Financial Loss Embarrassment Disruption of business activities Public Order 1 < Department < 10% Shrug shoulders Corporate 10 % - 50 % Grumble 3 > CNN > 50 % Strike Valuation Owner Asset type C I A IT Beertender Van risico analyse naar security plan. 35 Threats and vulnerabilities Amount of BEER revealed Network Intrusion Insecure Network Architecture Wrong BEER (Overdue/Warm) Unauthorised System Access Use of weak passwords No BEER Theft of the Beertender display - Inadequate use of physical access controls Van risico analyse naar security plan. 36 Aart Bitter, 9 september
19 Impact & Likelihood Likelihood Threat Definition Level 1 Less than twice a year 2 Between 3-5 times a year 3 Over 5 times a year Vulnerability Impact Definition Level If the vulnerability is exploited, up to 1 33% of the asset will be lost If the vulnerability is exploited, up to 2 66% of the asset will be lost If the vulnerability is exploited, the 3 asset will be completely lost Van risico analyse naar security plan. 37 Threat - Vulnerabilities Amount of BEER revealed (Asset Value C=1) Threat: Network Intrusion Vulnerability: Insecure Network Architecture (routers, firewalls, etc.) Likelihood: 1 Impact: 2 Risk = 1x1x2=2 Possible control: Network Routing Control Van risico analyse naar security plan. 38 Aart Bitter, 9 september
20 Threat - Vulnerabilities Wrong BEER (Overdue/Warm) (Asset Value I=3) Threat: Unauthorised System Access Vulnerability: Use of weak passwords Likelihood: 2 Impact: 3 Risk = 3x2x3=18 Possible control: Password Use Van risico analyse naar security plan. 39 Threat - Vulnerabilities No BEER (Asset Value A=2) Threat: Theft of the Beertender: Vulnerability: Inadequate use of physical access controls Likelihood: 2 Impact: 3 Risk = 2x2x3=12 Possible control: Security Awareness, education & training Van risico analyse naar security plan. 40 Aart Bitter, 9 september
21 Security Plan Risk=18: Password Use Risk=12: Security Awareness, Education & Training Risk=2: Network Routing Control Van risico analyse naar security plan. 41 Conclusies De Iso-27k standaarden geven voldoende richting aan Informatie Security, risico analyse, en certificering. De aanpak uit ISO zorgt voor een herhaalbare risico analyse methode. Met het ISMS kunnen we Information Security in een organisatie continu onderhouden en verbeteren. Van risico analyse naar security plan. 42 Aart Bitter, 9 september
22 ISO Information Security That's one small step for a man, a giant leap for mankind. Neil Armstrong, Apollo 11, 21 july 1969 Van risico analyse naar security plan. 43 Readings Van risico analyse naar security plan. 44 Aart Bitter, 9 september
23 Further reference Van risico analyse naar security plan. 45 Dank voor uw aandacht! Vragen Opmerkingen Suggesties Van risico analyse naar security plan. 46 Aart Bitter, 9 september
Information Security Team
Title Document number Add document Document status number Draft Owner Approver(s) CISO Information Security Team Version Version history Version date 0.01-0.05 Initial drafts of handbook 26 Oct 2015 Preface
Risk Management: Implementation principles and Inventories for Risk Management/Risk Assessment methods and tools
Risk Management: Implementation principles and Inventories for Risk Management/Risk Assessment methods and tools (Parts of this report constitute the deliverable defined in the ENISA Work Programme 2006
Information Security Governance
Information Security Governance Aart Bitter [email protected] Agenda Governance & Compliance Information Security Governance Aanpak om information security governance in organisaties
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
Outsourcing and Information Security
IBM Global Technology Services Outsourcing and Information Security Preparation is the Key However ultimately accountability cannot be outsourced February 2009 page 2 1. Introduction 3 1.1 Reason for outsourcing
IT Governance: The benefits of an Information Security Management System
IT Governance: The benefits of an Information Security Management System Katerina Cai, CISSP Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to
Practical implementation of ISO 27001 / 27002
Practical implementation of ISO 27001 / 27002 Lecture #2 Security in Organizations 2011 Eric Verheul 1 Main literature for this lecture: 1. ISO 27001 and ISO 27002 Literature 2. How to Achieve 27001 Certification,
COMPARISON OF TOOLS FOR INFORMATION SECURITY MANAGEMENT SYSTEM
COMPARISON OF TOOLS FOR INFORMATION SECURITY MANAGEMENT SYSTEM Štefan Antolík Abstract: The article deals with the analysis of risks in information security management system, briefly describes the current
UoB Risk Assessment Methodology
[Type here] UoB Risk Assessment Methodology The Risk Assessment Methodology describes how information security risk will be managed, including guidance for assessing, scoring, choosing acceptance or treatment
Understanding Management Systems Concepts
Understanding Management Systems Concepts Boğaç ÖZGEN Lead Auditor 1 管 理 计 划 初 始 化 做 实 施 检 查 控 制 过 程 行 动 改 善 活 动 系 统 监 视 2 Management (PLAN) Planning and Organizing (DO) Implementing and realization of
How To Implement An Information Security Management System
ISO/IEC 27001 Informa2on Security Management System Presented by Daminda Perera 26/07/2008 ISO/IEC 27001:2005 Informa@on technology Security techniques Informa@on security management systems Requirements
Information Security Awareness Training
Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information
How To Write A Book On The Internet Security
Datum 27-11-2011 1 Bedrijfszekerheid in ketens Risk Towards Trustworthy ICT Service Chains Control Assurance Integrated Assurance framework for ICT enabled service chains Drs Y.W. (Ype) van Wijk RE RA
Private Equity Survey 2011
Private Equity Survey 2011 Success of portfolio companies through quality of management and organization. Herman D. Koning Ron Jansen February 9, 2011 1 This afternoon 14.30 Reception 15.00 Welcome by
Inventory of risk assessment and risk management methods
ENISA ad hoc working group on risk assessment and risk management Inventory of risk assessment and risk management methods Deliverable 1 Final version Version 1.0 30/03/2006 Content Preamble...4 1. Executive
Platform voor Informatiebeveiliging IB Governance en management dashboards
Platform voor Informatiebeveiliging IB Governance en management dashboards Johan Bakker MSc CISSP ISSAP Principal Policy Advisor KPN Corporate Center Information Security Governance Agenda Drivers voor
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Risk-Based Monitoring
Risk-Based Monitoring Evolutions in monitoring approaches Voorkomen is beter dan genezen! Roelf Zondag 1 wat is Risk-Based Monitoring? en waarom doen we het? en doen we het al? en wat is lastig hieraan?
Managing e-health data: Security management. Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: [email protected].
Managing e-health data: Security management Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: [email protected] Structure of the presentation Data management: need for a clear
Informatiebeveiliging volgens ISO/IEC 27001:2013
Informatiebeveiliging volgens ISO/IEC 27001:2013 Dave Hagenaars, directeur BSI Group Nederland Copyright 2012 BSI. All rights reserved. Inhoud Wie zijn wij? Waarom informatiebeveiliging? Wat is de relevantie
Information Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
INFORMATION SECURITY MANAGEMENT IN IRANIAN SMART METERING PROJECT (FAHAM)
INFORMATION SECURITY MANAGEMENT IN IRANIAN SMART METERING PROJECT (FAHAM) Meisam Rezaeian Nader Salek Gilani Hadi Modaghegh Iran Energy Efficiency Organization Iran Energy Efficiency Organization Iran
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
(Optioneel: We will include the review report and the financial statements reviewed by us in an overall report that will be conveyed to you.
1.2 Example of an Engagement Letter for a Review Engagement N.B.: Dit voorbeeld van een opdrachtbevestiging voor een beoordelingsopdracht is gebaseerd op de tekst uit Standaard 2400, Opdrachten tot het
Information security management systems Specification with guidance for use
BRITISH STANDARD BS 7799-2:2002 Information security management systems Specification with guidance for use ICS 03.100.01; 35.020 This British Standard, having been prepared under the direction of the
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
Risk Management. Januari, 28/29th 2014 6th CENTR Security Workshop Brussels Bert ten Brinke
Risk Management Januari, 28/29th 2014 6th CENTR Security Workshop Brussels Bert ten Brinke Goals Participants are able to design their own RM process Participants understand the ISO27001 requirements Participants
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
How to manage Business Apps - Case for a Mobile Access Strategy -
How to manage Business Apps - Case for a Mobile Access Strategy - Hans Heising, Product Manager Gábor Vida, Manager Software Development RAM Mobile Data 2011 Content Introduction 2 Bring your own device
Secure Web Applications. The front line defense
Secure Web Applications The front line defense Agenda Web Application Security Threat Overview Exploiting Web Applications Common Attacks & Preventative techniques Developing Secure Web Applications -Security
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for DHS Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General, has redacted
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
ISO 31000 de internationale richtlijn voor risicomanagement
ISO 31000 de internationale richtlijn voor risicomanagement Dick Hortensius NEN-Managementsystemen Agenda Achtergrond en ontwikkeling ISO Guide 73 en ISO 31000 De betekenis voor risicomanagers 1 overheid
A Structured Comparison of Security Standards
A Structured Comparison of Security Standards Kristian Beckers 1, Isabelle Côté 3, Stefan Fenz 2, Denis Hatebur 1,3, and Maritta Heisel 1 1 paluno - The Ruhr Institute for Software Technology - University
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
Information Security is not an IT problem! Enterprise Risk & Security Management
Information Security is not an IT problem! Enterprise Risk & Security Management Raymond Slot Security Seminar 20 maart 2015 Some Security Incidents in 2014 Anthem 80 million customer records exposed JPMorgan
Principle of Information Security. Asst. Prof. Kemathat Vibhatavanij Ph.D.
Principle of Information Security Asst. Prof. Kemathat Vibhatavanij Ph.D. Security Challenges Evolution of technology focused on ease of use Compliance to government laws and regulations Direct impact
Polish Financial Supervision Authority. Guidelines
Polish Financial Supervision Authority Guidelines on the Management of Information Technology and ICT Environment Security for Insurance and Reinsurance Undertakings Warsaw, 16 December 2014 Table of Contents
Information technology Security techniques Information security management systems Overview and vocabulary
INTERNATIONAL STANDARD ISO/IEC 27000 Third edition 2014-01-15 Information technology Security techniques Information security management systems Overview and vocabulary Technologies de l information Techniques
Information Security Incident Management Policy and Procedure
Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure
Information Security Management Systems
Information Security Management Systems Information Security Management Systems Conformity Assessment Scheme ISO/IEC 27001:2005 (JIS Q 27001:2006) ITMangement Center Japan Information Processing Development
PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution
PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution 1. The Challenge Large enterprises are experiencing an ever increasing burden of regulation and legislation against which they
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5), 46-49.
Safeguards Frameworks and Controls Theory of Secure Information Systems Features: Safeguards and Controls Richard Baskerville T 1 F 1 O 1 T 2 F 2 O 2 T 3 F 3 O 3 T 4... T n...... F l O m T F O Security
Selling Cyber Security to the Finance Officers
Selling Cyber Security to the Finance Officers Presented by, Phil Bertolini, Deputy County Executive & CIO Oakland County, MI www.oakgov.com/it/presentations September 2015 Agenda Introduction Business
IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION
48 IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION MATÚŠ HORVÁTH, MARTIN JAKUB 1 INTRODUCTION Managerial work is directly dependent on information, it is therefore
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy
Bolsover District Council North East Derbyshire District Council & Rykneld Homes Ltd Information Security Incident Management Policy September 2013 Version 1.0 Page 1 of 13 CONTROL SHEET FOR Information
An Overview of ISO/IEC 27000 family of Information Security Management System Standards
What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information
Security Standards. 17.1 BS7799 and ISO17799
17 Security Standards Over the past 10 years security standards have come a long way from the original Rainbow Book series that was created by the US Department of Defense and used to define an information
Governance and Management of Information Security
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
Human Factors in Information Security
University of Oslo INF3510 Information Security Spring 2014 Workshop Questions Lecture 2: Security Management, Human Factors in Information Security QUESTION 1 Look at the list of standards in the ISO27000
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.
Table of Contents PART I. IS Audit Process. CHAPTER 1. Technology and Audit. Technology and Audit. Batch and On-Line Systems. CHAPTER 2. IS Audit Function Knowledge. Information Systems Auditing. What
Information security risk management using ISO/IEC 27005:2008
Information security risk management using ISO/IEC 27005:2008 Hervé Cholez / Sébastien Pineau Centre de Recherche Public Henri Tudor [email protected] [email protected] March, 29 th 2011 1
Build yourself a risk assessment tool
1 Build yourself a risk assessment tool The plan: 25 min theory 20 min practice 5 min questions Vlado Luknar CISSP, CISM, CISA, CSSLP, BSI ISO 27001 Lead Implementer di-sec.com Do you need your own tool?
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) 1. Approval and Authorisation Completion of the following signature blocks signifies
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
Birmingham City Council Internet Monitoring Standard
If you have inquiries about this Standard, contact the Business Policy Team of the ICF on 0121 675 1431 or 0121 464 2877. Standard Owner: Author: Version: 2.0 Date: 22/04/2009 Classification Unclassified
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza
Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank
Information Security Management System (ISMS) Policy
Information Security Management System (ISMS) Policy April 2015 Version 1.0 Version History Version Date Detail Author 0.1 18/02/2015 First draft Andy Turton 0.2 20/02/2015 Updated following feedback from
Information Security Guideline for NSW Government Part 1 Information Security Risk Management
Department of Commerce Guidelines Information Security Guideline for NSW Government Part 1 Information Security Risk Management Issue No: 3.2 First Published: Sept 1997 Current Version: Jun 2003 Table
Security and Privacy Controls for Federal Information Systems and Organizations
NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication
Exam 1 - CSIS 3755 Information Assurance
Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information
The new 27000 Family of Standards & ISO/IEC 27001
ISO/IEC 27000 Family of Standards by Dr. Angelika Plate 07-09 June 2011, Beirut, Lebanon June 2011 The new 27000 Family of Standards & ISO/IEC 27001 June 2011 ISO/IEC 27000 Family of Standards 2 The new
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
Fortinet Solutions for Compliance Requirements
s for Compliance Requirements Sarbanes Oxley (SOX / SARBOX) Section / Reference Technical Control Requirement SOX references ISO 17799 for Firewall FortiGate implementation specifics IDS / IPS Centralized
Better secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
ISACA Roundtable. Cobit and Grab@Pizza 7 september 2015
1 ISACA Roundtable 7 september 2015 ISACA Roundtable Cobit and Grab@Pizza 7 september 2015 2015 KPN Corporate Market B.V. ISACA, is a registered trademark of the Information Systems Audit and Control Association
Four Top Emagined Security Services
Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Current Established Risk Assessment Methodologies and Tools
MASTER THESIS Current Established Risk Assessment Methodologies and Tools Dan Ionita Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS) Department of Computer Science - Information
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
Penetration Testing. Presented by
Penetration Testing Presented by Roadmap Introduction to Pen Testing Types of Pen Testing Approach and Methodology Side Effects Demonstration Questions Introduction and Fundamentals Penetration Testing
INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY
INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY 1. PURPOSE In respect to this policy the term physical and environmental security refers to controls taken to protect
External Penetration Assessment and Database Access Review
External Penetration Assessment and Database Access Review Performed by Protiviti, Inc. At the request of Internal Audit April 25, 2012 Note: This presentation is intended solely for the use of the management
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives
AUD105-2nd Edition Auditor s Guide to IT - 20 hours Objectives More and more, auditors are being called upon to assess the risks and evaluate the controls over computer information systems in all types
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
