Automating Control Frameworks: A Tool for Managing Compliance and Risk in Government Services

Size: px
Start display at page:

Download "Automating Control Frameworks: A Tool for Managing Compliance and Risk in Government Services"

Transcription

1 : A Tool for Managing Compliance and Risk in Government Services November 19, 2008 Slide 1

2 Agenda Problem Space Solution Space Describe the compliance and risk management problem Why is this relevant for the BC Government? What makes it difficult to solve? Overview of the GRC software market Describe our work: Control Framework Development tool Thoughts on future direction Purpose: Connect and exchange ideas with others facing the same problems. Slide 2

3 Manager, Control Practices Unit Manager, BCeID Manager, Mainframe Services Compliance and risk practice development BCeID Corporate Authentication Project Manage outsourced data centre services About me Developing and demonstrating compliance and control in IT shared services Policy and legislation compliance for authentication in e- services Compliance management in external providers Slide 3

4 Definition: Control and Framework Framework Compliance Requirement Program Standard Controls Organizes IT governance objectives and practices and links them to business requirements and controls. Legislation, policy, or industry standard from an external source. A program policy, standard or guideline, developed internally. A means by which an organization's resources are directed, monitored, and measured. A means to protect the organization's physical and intangible resources by preventing and detecting fraud. Slide 4

5 Why manage policy and compliance? Up to 174 vehicles were repaired without proper documentation or disclosure. If some fly-bynight mechanic did that he d be running a chop shop and ICBC would land on him with all its might. While the sale of vehicles to employees is standard practice at some companies, ICBC has no policies in place to govern this process. It also admitted the facility and staff time were used for non-business purposes such as repairing employee vehicles. Slide 5

6 Why manage risk & compliance? Head of BC Lottery Corporation Fired UK politicians want to criminalize data leaks Tainted blood scandal at Red Cross Despite reassuring the public five months ago that everything was fine, the Lottery Corporation knew there were problems and did little to correct them. (Times-Colonist) There is evidence of a widespread problem with government relating to establishing systems for data protection and operating them adequately [the Cabinet Office report] proposed that government officials could face jail if they were found to be grossly negligent in any failure to protect citizens data. (InterGovWorld) Allegations of criminal conduct utterly disproved. The conduct examined in detail over one and a half years confirms reasonable, responsible and professional actions during a difficult time, said the judge. (Times Colonist) Slide 6

7 Compliance Management Problem Space Threats Increasing public accountability expectations Evolving legislation for confidentiality, discovery, identity Technology change: mobile computing, payment agents Evolving standards: PCI, ISO, COBIT Vulnerabilities Accountability obscured by shared services. Accountability obscured by E-commerce and data sharing. Unstructured risk and control information. Dynamic organizations, PPPs, outsourcing, cross jurisdiction partnerships Slide 7

8 Owns BCeID Control Environment Identity Management Policy Owner Government Chief Information Officer (GCIO) - Owner of the Information Security Policy - Identity Management Standards and Long-Range Planning - IM/IT Standards and Legislation and Policy to adhere to privacy legislation Manages Manages Document Disposal Act Owns Information Security Policy Business Objectives Program Owner ADM, Workplace Technology Services - Linkage to WTS Objectives - Responsible for compliance to WTS policies and standards Directs Program Manager Director BCeID Program - Owner of BCeID Policies - Authoritative Source Management Core Policy Manual Income Tax Act Partnership Act FIOPPA Electronic Transaction Act Business Number Act (Bill ) Business Corporation Act Government-CIO Workplace Technology Services BCeID Auditors Service Delivery Partners Program Customers Program Clients Retention & Disposition Compliance Requirements Electronic Records Assurance Levels Collect, Validate and Store Business Numbers BC Corporate Registry Privacy Requirements Collect, Validate and Store Business Numbers Authoritative Source Responsibilities Requirements Program Clients Online Service Owners - Responsible for the security and integrity of the online services Business Objectives Compliance BCeID Operating Policies Operational Procedures Owns Executed by Program Customers Account Holding Businesses and Individuals - Enter into agreements with BCeID Requirements Requirements Implemented by Measure Compliance Report Compliance Compliance by Agreement or Contract Program Activities Compliance by policy Compliance by Agreement or Contract Business Objectives Compliance by policy Maintained by Risk and Compliance Auditors - Measure compliance - Governance issues Service Delivery Partner - WTS Internal - Delivery Units reporting to the Service Owner - Hosting compliance with infrastructure Service Delivery Partner - Government Internal - Delivery Units reporting to other parts of government Service Delivery Partner - External Suppliers - Private sector organizations Service Delivery Partners - Registration Authorities - Establish and vouch for the identity of an entity - Performs registration - Defines the identity - Provides policy content Program Staff (Employees, Contractors) - Execute operating procedures - Maintain and deploy program standards Slide 8

9 Policy and procedure management Risk and control management Loss and investigation management GRC analytics Facilitate policy/procedure life cycle Publish policies/procedures across roles Map policies/procedures to risks, controls, and compliance requirements Risk and controls assessment automation Manage & model risk data Business rules enforcement Audit management Support corporate investigations into loss Track loss metrics & facilitate remediation Support anonymous whistleblower apps Measure control preparedness/ effectiveness Report GRC data across the organization GRC Software Functions* PO6 PO6.4 PO6, AI2.3, AI2.4 PO9, DS5.5 ME4.5 ME2.4, ME2.5, ME2.6 DS8, DS10 ME2.5, ME3, ME4.5 * Forrester Research Inc, Forrester Wave: Enterprise Governance, Risk, And Compliance Platforms, Q4 2007, 2008 Slide 9

10 Current Province GRC Tools Policy and procedure management Healthcheck Risk and control management Loss and investigation management GRC analytics Facilitate policy/procedure life cycle Publish policies/procedures across roles Map policies/procedures to Citicus risks, controls, and compliance requirements Risk and controls assessment automation Manage & model risk data Business rules enforcement Audit management ACL Support corporate investigations into loss Track loss metrics & facilitate remediation Support anonymous whistleblower apps Measure control preparedness/ effectiveness Report GRC data across the organization PO6 PO6.4 PO6, AI2.3, AI2.4 PO9, DS5.5 ME4.5 ME2.4, ME2.5, ME2.6 DS8, DS10 ME2.5, ME3, ME4.5 Slide 10

11 Project Focus: Policy/Procedure Management Policy and procedure management Map policies/procedures to controls and compliance requirements Publish policies/procedures across roles Facilitate policy/procedure life cycle AI2.3, AI2.4 PO6.4 Risk and control management Loss and investigation management GRC analytics Risk and controls assessment automation Manage & model risk data Business rules enforcement Audit management Support corporate investigations into loss Track loss metrics & facilitate remediation Support anonymous whistleblower apps Report compliance gap PO9, DS5.5 ME4.5 ME2.4, ME2.5, ME2.6 DS8, DS10 ME2.4, ME3 * Forrester Research Inc, Forrester Wave: Enterprise Governance, Risk, And Compliance Platforms, Q4 2007, 2008 Slide 11

12 GRC Suppliers Governance, Risk & Compliance Package Vendors* Libraries: controls, risks, compliance Content Workflow Management Engine Relational Database * Forrester Research Inc, Forrester Wave: Enterprise Governance, Risk, And Compliance Platforms, Q4 2007, 2008 Slide 12

13 GRC Software Benefit: Big Business & Government IT Systems Profile Jurisdictions Compliance Accountability Big Business Fewer, larger Complementary applications Multiple Wide geographic spread enterprise level Public Sector Many, smaller Silo applications One primary Potential cross jurisdiction program level GRC packages have potential benefit for government, but likely higher (relative) implementation costs. Readiness: Policy, standards & controls ready? Clear accountability? Slide 13

14 Compliance & Control Environment Strategic Policy Core Policy Manual Authorities: Legislation, high-level policy directives, laws. Tactical Policy I.E. Information Security Policy, Risk Management Ministry policy & IM/IT standards Project Scope Program Standards & Guidelines Program and Service Standards: Policy interpretations, program standards & guidelines Program standards + linkages Operating procedures Role Descriptions Controls & Performance Management User Agreements Supplier Agreements Slide 14

15 Control Framework Data Model Core Info Compliance Electronic FOIPPA Security Policy & Requirements Trans Policy ProcAct Target Business Service Service Cost Contraints Levels Client Objectives Definition Risks Program Standards Activities Control Objectives Roles Business Objectives define the program deliverables. Compliance requirements and business objectives are interpreted to create the local program standards and program activities. Risks are used to define control objectives and specify control activities. Accountabilities are assigned. Slide 15

16 Software Functions Slide 16

17 Global Library & Admin Functions Program design functions Content & Compliance Reports Slide 17

18 Build a global library of compliance requirements. Example: Core Policy & Procedures. Slide 18

19 Build a global library of compliance requirements. Example: Payment Card Industry Slide 19

20 Select the compliance requirements that apply to the program. Slide 20

21 Create program standards (program policy) and link to compliance, roles, processes Slide 21

22 Detail accessible via double-click. Slide 22

23 Document responsibility for program standards, processes. Slide 23

24 Compliance status = + Program Standard status (approved, implemented, discontinued) + Relationship status (conforms, non-conform, exempt) Slide 24

25 Report on Program Standards and related Compliance Requirements Slide 25

26 Detailed report on Program Standards and related Compliance Requirements Slide 26

27 Summary report of Compliance Requirements showing the related Program Standards Slide 27

28 Who Uses a Control Framework? Management sees how operational procedures relate to laws & policies. Electronic Core Info Compliance FOIPPA Security Policy Trans & Service Cost Target Business Service Contraints Levels Client Requirements Policy Proc Act Objectives Definition Risks Employees know their tasks and responsibilities. Program Standards Roles Activities Control Objectives Employees know which policies and standards apply to their deliverables and workplace activities. Business analysts, architects, accountants, legal and HR can design procedures and controls to address changing risks. Management and audit can affirm that appropriate controls and accountabilities are in place. Slide 28

29 Related Areas For Improvement Interpretation Compliance Components Control Expertise Policy translation to standards, standards to standard controls. Grouping by risk categories. Rationalization of legislation, policy, guidelines, etc. to provide single source for program owners. Include compliance in shared services. Clear compliance accountabilities between service provider and receiver. Expertise to match program needs to appropriate frameworks. Expertise to draft control objectives, link policy to procedures and controls. Slide 29

30 Project Summary? Vision Problem Our Focus Benefits Barriers Sustainable, demonstrated compliance and control. Dynamic policy environment Unstructured, complex information Interpretation gaps Step 1 - Equipping the experts (policy analysts, business analysts, program management) to effectively manage compliance-related information. Manage and communicate complex information. Relate requirements to outcomes to interpret & bridge gaps. Accommodate change. Data collection effort. Policy and control objective development expertise. Fragmented internal policy. Slide 30

Enhancing IT Governance, Risk and Compliance Management (IT GRC)

Enhancing IT Governance, Risk and Compliance Management (IT GRC) Enhancing IT Governance, Risk and Compliance Management (IT GRC) Enabling Reliable eservices Tawfiq F. Alrushaid Saudi Aramco Agenda GRC Overview IT GRC Introduction IT Governance IT Risk Management IT

More information

Governance, Risk, and Compliance (GRC) White Paper

Governance, Risk, and Compliance (GRC) White Paper Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:

More information

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE TECHNICAL PROPOSAL DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE A White Paper Sandy Bacik, CISSP, CISM, ISSMP, CGEIT July 2011 7/8/2011 II355868IRK ii Study of the Integration Cost of Wind and Solar

More information

Vendor Risk Management Financial Organizations

Vendor Risk Management Financial Organizations Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current

More information

Information Management and Protection Policy

Information Management and Protection Policy Document Title: Information Management and Protection Policy Document Type: Policy No. Of Pages (11) Scope: Government of Newfoundland and Labrador and Public Bodies supported by the Office of the Chief

More information

Identity & Access Management new complex so don t start?

Identity & Access Management new complex so don t start? IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach

More information

14 October 2015 ISACA Curaçao Conference By: Paul Helmich

14 October 2015 ISACA Curaçao Conference By: Paul Helmich Governance, Risk & Compliance A practical approach 14 October 2015 ISACA Curaçao Conference By: Paul Helmich Topics today What is GRC? How much of all the GRC literature, tools, etc. do I need to study

More information

How To Ensure Financial Compliance

How To Ensure Financial Compliance Evolving from Financial Compliance to Next Generation GRC Gary Prince Principal Solution Specialist - GRC Agenda Business Challenges Oracle s Leadership in Governance, Risk and Compliance Solution Overview

More information

Role Profile. Ministry of Technology, Innovation and Citizens Services. Assistant Deputy Minister Integrated Workplace Solutions.

Role Profile. Ministry of Technology, Innovation and Citizens Services. Assistant Deputy Minister Integrated Workplace Solutions. Ministry of Technology, Innovation and Citizens Services Assistant Deputy Minister Integrated Workplace Solutions Victoria Ministry Overview The Ministry of Technology, Innovation and Citizens Services

More information

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013 State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council

More information

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. TECHNOLOGY BRIEF: REDUCING COST AND COMPLEXITY WITH GLOBAL GOVERNANCE CONTROLS CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. Table of Contents Executive

More information

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to

More information

STREAM Cyber Security

STREAM Cyber Security STREAM Cyber Security Management Software Governance, Risk Management & Compliance (GRC) Security Operations, Analytics & Reporting (SOAR) Fast, flexible, scalable, easy to use and affordable software

More information

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization

More information

Information & Asset Protection with SIEM and DLP

Information & Asset Protection with SIEM and DLP Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the

More information

A Flexible and Comprehensive Approach to a Cloud Compliance Program

A Flexible and Comprehensive Approach to a Cloud Compliance Program A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility

More information

RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES

RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES Purpose and Scope The purpose of the Security Code of Management Practices is to help protect people, property, products, processes, information and

More information

Cloud Computing An Auditor s Perspective

Cloud Computing An Auditor s Perspective Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP [email protected] December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,

More information

The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004

The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 The USA Patriot Act Government Briefing Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 Agenda Background Overview of Government Responses and Approach Mitigation

More information

Maintaining PCI-DSS compliance. Daniele Bertolotti [email protected] Antonio Ricci [email protected]

Maintaining PCI-DSS compliance. Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com Maintaining PCI-DSS compliance Daniele Bertolotti [email protected] Antonio Ricci [email protected] Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance

More information

Privacy Governance and Compliance Framework Accountability

Privacy Governance and Compliance Framework Accountability Privacy Governance and Framework Accountability Agenda Global Data Protection and Privacy (DPP) Organization Structure Privacy The 3 Lines of Defense (LOD) Model: Overview Privacy The 3 Lines of Defense

More information

OCC 98-3 OCC BULLETIN

OCC 98-3 OCC BULLETIN To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel

More information

White Paper: The Seven Elements of an Effective Compliance and Ethics Program

White Paper: The Seven Elements of an Effective Compliance and Ethics Program White Paper: The Seven Elements of an Effective Compliance and Ethics Program Executive Summary Recently, the United States Sentencing Commission voted to modify the Federal Sentencing Guidelines, including

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security, Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security, streamline compliance reporting, and reduce the overall

More information

Registration Information for Lottery Retailers Including Frequently Asked Questions

Registration Information for Lottery Retailers Including Frequently Asked Questions Including Frequently Asked Questions The purchase of lottery tickets is a popular form of gambling for many British Columbians. To help ensure the integrity of gaming in British Columbia, all lottery retailers

More information

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations

More information

E-Commerce at Wells Fargo. SF IIA/ISACA Presentation

E-Commerce at Wells Fargo. SF IIA/ISACA Presentation E-Commerce at Wells Fargo SF IIA/ISACA Presentation By Wells Fargo Audit Services October 17, 2000 2 Discussion Topics E-Commerce at Wells Fargo - Our Story E-Commerce Risks General Conclusions Q&A Afternoon

More information

Governance, Risk & Compliance for Public Sector

Governance, Risk & Compliance for Public Sector Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment

More information

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.

More information

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations Achieving Control: The Four Critical Success Factors of Change Management Technology Concepts & Business Considerations T e c h n i c a l W H I T E P A P E R Table of Contents Executive Summary...........................................................

More information

MASSIVE NETWORKS Online Backup Compliance Guidelines... 1. Sarbanes-Oxley (SOX)... 2. SOX Requirements... 2

MASSIVE NETWORKS Online Backup Compliance Guidelines... 1. Sarbanes-Oxley (SOX)... 2. SOX Requirements... 2 MASSIVE NETWORKS Online Backup Compliance Guidelines Last updated: Sunday, November 13 th, 2011 Contents MASSIVE NETWORKS Online Backup Compliance Guidelines... 1 Sarbanes-Oxley (SOX)... 2 SOX Requirements...

More information

ISO 14001 & ISO 18001 Legal Compliance Know Your Risk - Reduce your Risk"

ISO 14001 & ISO 18001 Legal Compliance Know Your Risk - Reduce your Risk American Society For Quality -Toronto Section ISO 14001 & ISO 18001 Legal Compliance Know Your Risk - Reduce your Risk" Copyright: Coudenys Management Systems Inc. RISK DEFINED Occurrence of the event

More information

Microsoft s Compliance Framework for Online Services

Microsoft s Compliance Framework for Online Services Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft

More information

Designing a Data Governance Framework to Enable and Influence IQ Strategy

Designing a Data Governance Framework to Enable and Influence IQ Strategy Designing a Data Governance Framework to Enable and Influence IQ Strategy Elizabeth M. Pierce University of Arkansas at Little Rock PG 135 Overview of Corporate and Key Asset Governance (Reproduced from

More information

Security aspects of e-tailing. Chapter 7

Security aspects of e-tailing. Chapter 7 Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing

More information

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009 Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Office of the Auditor General of Canada. Internal Audit of Document Management Through PROxI Implementation. July 2014

Office of the Auditor General of Canada. Internal Audit of Document Management Through PROxI Implementation. July 2014 Office of the Auditor General of Canada Internal Audit of Document Management Through PROxI Implementation July 2014 Practice Review and Internal Audit Her Majesty the Queen in Right of Canada, represented

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

ITC 19 th November 2015 Creation of Enterprise Architecture Practice

ITC 19 th November 2015 Creation of Enterprise Architecture Practice ITC 19.11.15 ITC 19 th November 2015 Creation of Enterprise Architecture Practice C Description of paper 1. As part of a wider strategy of Digital Transformation of the University s core services, ISG

More information

Enabling Data Quality

Enabling Data Quality Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &

More information

<Insert Picture Here> Oracle Identity And Access Management

<Insert Picture Here> Oracle Identity And Access Management Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.

More information

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision

More information

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance

More information

Generally Accepted Recordkeeping Principles

Generally Accepted Recordkeeping Principles Generally Accepted Recordkeeping Principles Information Governance Maturity Model Information is one of the most vital strategic assets any organization possesses. Organizations depend on information to

More information

Service Alberta BUSINESS PLAN 2010 13

Service Alberta BUSINESS PLAN 2010 13 Service Alberta BUSINESS PLAN 2010 13 Service Alberta BUSINESS PLAN 2010-13 ACCOUNTABILITY STATEMENT The business plan for the three years commencing April 1, 2010 was prepared under my direction in accordance

More information

Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer

Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer Information Security Management Systems Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer atsec information security, 2013 ISO/IEC 27001 and related

More information

December 21, 2012. The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS.

December 21, 2012. The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS. Justification for a Contract Amendment to Contract 2012-01: Interim Hosting and Jurisdiction Functionality for the Compliance Instrument Tracking System Service (CITSS) December 21, 2012 Introduction WCI,

More information

Key Trends, Issues and Best Practices in Compliance 2014

Key Trends, Issues and Best Practices in Compliance 2014 Key Trends, Issues and Best Practices in Compliance 2014 What Makes This Survey Different Research conducted by independent third party Clients and non-clients 301 executive decision makers 35 qualitative

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Domain 5 Information Security Governance and Risk Management

Domain 5 Information Security Governance and Risk Management Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association

More information

Supporting Effective Compliance Programs

Supporting Effective Compliance Programs October 2015 Supporting Effective Compliance Programs The Oversight Roles of the Board Audit and Risk Committees in Regulatory Compliance By Paul Osborne, CPA, CAMS, AMLP, and Peggy Sepp, CIA To be effective,

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Taking the pain out of Risk and Compliance Management Systems. Presented by Andrew Batten 23 April 2015

Taking the pain out of Risk and Compliance Management Systems. Presented by Andrew Batten 23 April 2015 Taking the pain out of Risk and Compliance Management Systems Presented by Andrew Batten 23 April 2015 Operational Improvement Technology Solutions Providing consultancy services Gap assessments Food standard

More information

IT Governance Charter

IT Governance Charter Version : 1.01 Date : 16 September 2009 IT Governance Network South Africa USA UK Switzerland www.itgovernance.co.za [email protected] 0825588732 IT Governance Network, Copyright 2009 Page 1 1 Terms

More information

PRESENTATION TOPICS 2/27/2014. Why Update Policies? 21st Century Best Practices for Information Governance & Policies. Why update policies??

PRESENTATION TOPICS 2/27/2014. Why Update Policies? 21st Century Best Practices for Information Governance & Policies. Why update policies?? 21st Century Best Practices for Information Governance & Policies Presented by: John Isaza, CEO- Information Governance Solutions, LLC Partner - Rimon PC ARMA NOVA Chapter Friday, February 28, 2014 12:30

More information

CATSA Screening Contractor Management System Standard (2015)

CATSA Screening Contractor Management System Standard (2015) Public Works and Government Services Canada Canadian General Standards Board Travaux publics et Services gouvernementaux Canada Office des normes générales du Canada CATSA Screening Contractor Management

More information

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices A Forrester Consulting Thought Leadership Paper Commissioned By Xively By LogMeIn August 2015 Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices Table

More information

IT Security & Compliance Risk Assessment Capabilities

IT Security & Compliance Risk Assessment Capabilities ATIBA Governance, Risk and Compliance ATIBA provides information security and risk management consulting services for the Banking, Financial Services, Insurance, Healthcare, Manufacturing, Government,

More information

NetIQ FISMA Compliance & Risk Management Solutions

NetIQ FISMA Compliance & Risk Management Solutions N E T I Q C O M P L I A N C E S E R I E S NetIQ FISMA Compliance & Risk Management Solutions The Federal Information Security Management Act (FISMA) requires federal agencies to create and implement a

More information

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes

More information

Developing National Frameworks & Engaging the Private Sector

Developing National Frameworks & Engaging the Private Sector www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

Ann Geyer Tunitas Group. CGEIT Domains

Ann Geyer Tunitas Group. CGEIT Domains 1 CGEIT Exam Prep May 17, 2011 Ann Geyer Tunitas Group CGEIT Domains 2 Job Practice Areas by Domain 25% IT Gov Frameworks 20% Risk Mgmt 15% Strategic Alignment 15% Value Delivery 13% Resource Mgmt 12%

More information

SAFEGUARDS FOR PROTECTING PRIVATE DATA - SERVICE PROVIDERS AND CONTRACTORS

SAFEGUARDS FOR PROTECTING PRIVATE DATA - SERVICE PROVIDERS AND CONTRACTORS SAFEGUARDS FOR PROTECTING PRIVATE DATA - SERVICE PROVIDERS AND CONTRACTORS THE UNIVERSITY OF NEW MEXICO October 17, 2013 Audit Committee Members J.E. Gene Gallegos, Chair Lt. General Bradley Hosmer, Vice

More information

GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001

GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001 1 GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001 Tolga MATARACIOGLU 1 and Sevgi OZKAN 2 1 TUBITAK National Research Institute of Electronics and Cryptology (UEKAE), Department of

More information

Metrics that Matter Security Risk Analytics

Metrics that Matter Security Risk Analytics Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa [email protected] April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

Information Management

Information Management G i Information Management Information Management Planning March 2005 Produced by Information Management Branch Open Government Service Alberta 3 rd Floor, Commerce Place 10155 102 Street Edmonton, Alberta,

More information

Security audit advice For holders of all remote gambling operator licences including specified remote lottery licences

Security audit advice For holders of all remote gambling operator licences including specified remote lottery licences Security audit advice For holders of all remote gambling operator licences including specified remote lottery licences July 2015 1 Introduction 1.1 This July 2015 advice is updated from the previously

More information

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks; Enterprise Content Management (ECM) Policy Version Information A. Introduction Purpose 1. Outline and articulate the strategy for enterprise content management across Redland City Council (RCC). This document

More information

ISMS Implementation Guide

ISMS Implementation Guide atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation

More information

How To Improve Your Business

How To Improve Your Business IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Implementing and monitoring effective compliance policies & procedures. charlesrussellspeechlys.com

Implementing and monitoring effective compliance policies & procedures. charlesrussellspeechlys.com Implementing and monitoring effective compliance policies & procedures charlesrussellspeechlys.com Robert Bond Partner Robert Bond has over 36 years' experience in advising national and international clients

More information

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT PAGE 6 of 51 SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Statement of Work This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and

More information

NERC-CIP S MOST WANTED

NERC-CIP S MOST WANTED WHITE PAPER NERC-CIP S MOST WANTED The Top Three Most Violated NERC-CIP Standards What you need to know to stay off the list. www.alertenterprise.com NERC-CIP s Most Wanted AlertEnterprise, Inc. White

More information

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Certified Identity and Access Manager (CIAM) Overview & Curriculum Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management

More information

Interagency Science Working Group. National Archives and Records Administration

Interagency Science Working Group. National Archives and Records Administration Interagency Science Working Group 1 National Archives and Records Administration Establishing Trustworthy Digital Repositories: A Discussion Guide Based on the ISO Open Archival Information System (OAIS)

More information

Ensuring Cloud Security Using Cloud Control Matrix

Ensuring Cloud Security Using Cloud Control Matrix International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 933-938 International Research Publications House http://www. irphouse.com /ijict.htm Ensuring

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

How to Ensure IT Compliance Without Compromising Innovation. Nik Teshima, IBM Phil Odence, Black Duck

How to Ensure IT Compliance Without Compromising Innovation. Nik Teshima, IBM Phil Odence, Black Duck How to Ensure IT Compliance Without Compromising Innovation Nik Teshima, IBM Phil Odence, Black Duck Black Duck 2013 Speakers Phil Odence VP of Business Development Black Duck Software Nik Teshima Senior

More information

Security Services. 30 years of experience in IT business

Security Services. 30 years of experience in IT business Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3

More information

Convercent Predictive Analytics

Convercent Predictive Analytics September 2015 Convercent Predictive Analytics Innovation in User Experience for Issue Reporting & Management SOLUTIONPERSPECTIVE Governance, Risk Management & Compliance Insight 2015 GRC 20/20 Research,

More information

Information Technology Security Review April 16, 2012

Information Technology Security Review April 16, 2012 Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

ISO20000: What it is and how it relates to ITIL v3

ISO20000: What it is and how it relates to ITIL v3 ISO20000: What it is and how it relates to ITIL v3 John DiMaria; Certified Six Sigma BB, HISP BSI Product Manager; ICT (ISMS,ITSM,BCM) Objectives and Agenda To raise awareness, to inform and to enthuse

More information