Automating Control Frameworks: A Tool for Managing Compliance and Risk in Government Services
|
|
|
- Eugene Shelton
- 10 years ago
- Views:
Transcription
1 : A Tool for Managing Compliance and Risk in Government Services November 19, 2008 Slide 1
2 Agenda Problem Space Solution Space Describe the compliance and risk management problem Why is this relevant for the BC Government? What makes it difficult to solve? Overview of the GRC software market Describe our work: Control Framework Development tool Thoughts on future direction Purpose: Connect and exchange ideas with others facing the same problems. Slide 2
3 Manager, Control Practices Unit Manager, BCeID Manager, Mainframe Services Compliance and risk practice development BCeID Corporate Authentication Project Manage outsourced data centre services About me Developing and demonstrating compliance and control in IT shared services Policy and legislation compliance for authentication in e- services Compliance management in external providers Slide 3
4 Definition: Control and Framework Framework Compliance Requirement Program Standard Controls Organizes IT governance objectives and practices and links them to business requirements and controls. Legislation, policy, or industry standard from an external source. A program policy, standard or guideline, developed internally. A means by which an organization's resources are directed, monitored, and measured. A means to protect the organization's physical and intangible resources by preventing and detecting fraud. Slide 4
5 Why manage policy and compliance? Up to 174 vehicles were repaired without proper documentation or disclosure. If some fly-bynight mechanic did that he d be running a chop shop and ICBC would land on him with all its might. While the sale of vehicles to employees is standard practice at some companies, ICBC has no policies in place to govern this process. It also admitted the facility and staff time were used for non-business purposes such as repairing employee vehicles. Slide 5
6 Why manage risk & compliance? Head of BC Lottery Corporation Fired UK politicians want to criminalize data leaks Tainted blood scandal at Red Cross Despite reassuring the public five months ago that everything was fine, the Lottery Corporation knew there were problems and did little to correct them. (Times-Colonist) There is evidence of a widespread problem with government relating to establishing systems for data protection and operating them adequately [the Cabinet Office report] proposed that government officials could face jail if they were found to be grossly negligent in any failure to protect citizens data. (InterGovWorld) Allegations of criminal conduct utterly disproved. The conduct examined in detail over one and a half years confirms reasonable, responsible and professional actions during a difficult time, said the judge. (Times Colonist) Slide 6
7 Compliance Management Problem Space Threats Increasing public accountability expectations Evolving legislation for confidentiality, discovery, identity Technology change: mobile computing, payment agents Evolving standards: PCI, ISO, COBIT Vulnerabilities Accountability obscured by shared services. Accountability obscured by E-commerce and data sharing. Unstructured risk and control information. Dynamic organizations, PPPs, outsourcing, cross jurisdiction partnerships Slide 7
8 Owns BCeID Control Environment Identity Management Policy Owner Government Chief Information Officer (GCIO) - Owner of the Information Security Policy - Identity Management Standards and Long-Range Planning - IM/IT Standards and Legislation and Policy to adhere to privacy legislation Manages Manages Document Disposal Act Owns Information Security Policy Business Objectives Program Owner ADM, Workplace Technology Services - Linkage to WTS Objectives - Responsible for compliance to WTS policies and standards Directs Program Manager Director BCeID Program - Owner of BCeID Policies - Authoritative Source Management Core Policy Manual Income Tax Act Partnership Act FIOPPA Electronic Transaction Act Business Number Act (Bill ) Business Corporation Act Government-CIO Workplace Technology Services BCeID Auditors Service Delivery Partners Program Customers Program Clients Retention & Disposition Compliance Requirements Electronic Records Assurance Levels Collect, Validate and Store Business Numbers BC Corporate Registry Privacy Requirements Collect, Validate and Store Business Numbers Authoritative Source Responsibilities Requirements Program Clients Online Service Owners - Responsible for the security and integrity of the online services Business Objectives Compliance BCeID Operating Policies Operational Procedures Owns Executed by Program Customers Account Holding Businesses and Individuals - Enter into agreements with BCeID Requirements Requirements Implemented by Measure Compliance Report Compliance Compliance by Agreement or Contract Program Activities Compliance by policy Compliance by Agreement or Contract Business Objectives Compliance by policy Maintained by Risk and Compliance Auditors - Measure compliance - Governance issues Service Delivery Partner - WTS Internal - Delivery Units reporting to the Service Owner - Hosting compliance with infrastructure Service Delivery Partner - Government Internal - Delivery Units reporting to other parts of government Service Delivery Partner - External Suppliers - Private sector organizations Service Delivery Partners - Registration Authorities - Establish and vouch for the identity of an entity - Performs registration - Defines the identity - Provides policy content Program Staff (Employees, Contractors) - Execute operating procedures - Maintain and deploy program standards Slide 8
9 Policy and procedure management Risk and control management Loss and investigation management GRC analytics Facilitate policy/procedure life cycle Publish policies/procedures across roles Map policies/procedures to risks, controls, and compliance requirements Risk and controls assessment automation Manage & model risk data Business rules enforcement Audit management Support corporate investigations into loss Track loss metrics & facilitate remediation Support anonymous whistleblower apps Measure control preparedness/ effectiveness Report GRC data across the organization GRC Software Functions* PO6 PO6.4 PO6, AI2.3, AI2.4 PO9, DS5.5 ME4.5 ME2.4, ME2.5, ME2.6 DS8, DS10 ME2.5, ME3, ME4.5 * Forrester Research Inc, Forrester Wave: Enterprise Governance, Risk, And Compliance Platforms, Q4 2007, 2008 Slide 9
10 Current Province GRC Tools Policy and procedure management Healthcheck Risk and control management Loss and investigation management GRC analytics Facilitate policy/procedure life cycle Publish policies/procedures across roles Map policies/procedures to Citicus risks, controls, and compliance requirements Risk and controls assessment automation Manage & model risk data Business rules enforcement Audit management ACL Support corporate investigations into loss Track loss metrics & facilitate remediation Support anonymous whistleblower apps Measure control preparedness/ effectiveness Report GRC data across the organization PO6 PO6.4 PO6, AI2.3, AI2.4 PO9, DS5.5 ME4.5 ME2.4, ME2.5, ME2.6 DS8, DS10 ME2.5, ME3, ME4.5 Slide 10
11 Project Focus: Policy/Procedure Management Policy and procedure management Map policies/procedures to controls and compliance requirements Publish policies/procedures across roles Facilitate policy/procedure life cycle AI2.3, AI2.4 PO6.4 Risk and control management Loss and investigation management GRC analytics Risk and controls assessment automation Manage & model risk data Business rules enforcement Audit management Support corporate investigations into loss Track loss metrics & facilitate remediation Support anonymous whistleblower apps Report compliance gap PO9, DS5.5 ME4.5 ME2.4, ME2.5, ME2.6 DS8, DS10 ME2.4, ME3 * Forrester Research Inc, Forrester Wave: Enterprise Governance, Risk, And Compliance Platforms, Q4 2007, 2008 Slide 11
12 GRC Suppliers Governance, Risk & Compliance Package Vendors* Libraries: controls, risks, compliance Content Workflow Management Engine Relational Database * Forrester Research Inc, Forrester Wave: Enterprise Governance, Risk, And Compliance Platforms, Q4 2007, 2008 Slide 12
13 GRC Software Benefit: Big Business & Government IT Systems Profile Jurisdictions Compliance Accountability Big Business Fewer, larger Complementary applications Multiple Wide geographic spread enterprise level Public Sector Many, smaller Silo applications One primary Potential cross jurisdiction program level GRC packages have potential benefit for government, but likely higher (relative) implementation costs. Readiness: Policy, standards & controls ready? Clear accountability? Slide 13
14 Compliance & Control Environment Strategic Policy Core Policy Manual Authorities: Legislation, high-level policy directives, laws. Tactical Policy I.E. Information Security Policy, Risk Management Ministry policy & IM/IT standards Project Scope Program Standards & Guidelines Program and Service Standards: Policy interpretations, program standards & guidelines Program standards + linkages Operating procedures Role Descriptions Controls & Performance Management User Agreements Supplier Agreements Slide 14
15 Control Framework Data Model Core Info Compliance Electronic FOIPPA Security Policy & Requirements Trans Policy ProcAct Target Business Service Service Cost Contraints Levels Client Objectives Definition Risks Program Standards Activities Control Objectives Roles Business Objectives define the program deliverables. Compliance requirements and business objectives are interpreted to create the local program standards and program activities. Risks are used to define control objectives and specify control activities. Accountabilities are assigned. Slide 15
16 Software Functions Slide 16
17 Global Library & Admin Functions Program design functions Content & Compliance Reports Slide 17
18 Build a global library of compliance requirements. Example: Core Policy & Procedures. Slide 18
19 Build a global library of compliance requirements. Example: Payment Card Industry Slide 19
20 Select the compliance requirements that apply to the program. Slide 20
21 Create program standards (program policy) and link to compliance, roles, processes Slide 21
22 Detail accessible via double-click. Slide 22
23 Document responsibility for program standards, processes. Slide 23
24 Compliance status = + Program Standard status (approved, implemented, discontinued) + Relationship status (conforms, non-conform, exempt) Slide 24
25 Report on Program Standards and related Compliance Requirements Slide 25
26 Detailed report on Program Standards and related Compliance Requirements Slide 26
27 Summary report of Compliance Requirements showing the related Program Standards Slide 27
28 Who Uses a Control Framework? Management sees how operational procedures relate to laws & policies. Electronic Core Info Compliance FOIPPA Security Policy Trans & Service Cost Target Business Service Contraints Levels Client Requirements Policy Proc Act Objectives Definition Risks Employees know their tasks and responsibilities. Program Standards Roles Activities Control Objectives Employees know which policies and standards apply to their deliverables and workplace activities. Business analysts, architects, accountants, legal and HR can design procedures and controls to address changing risks. Management and audit can affirm that appropriate controls and accountabilities are in place. Slide 28
29 Related Areas For Improvement Interpretation Compliance Components Control Expertise Policy translation to standards, standards to standard controls. Grouping by risk categories. Rationalization of legislation, policy, guidelines, etc. to provide single source for program owners. Include compliance in shared services. Clear compliance accountabilities between service provider and receiver. Expertise to match program needs to appropriate frameworks. Expertise to draft control objectives, link policy to procedures and controls. Slide 29
30 Project Summary? Vision Problem Our Focus Benefits Barriers Sustainable, demonstrated compliance and control. Dynamic policy environment Unstructured, complex information Interpretation gaps Step 1 - Equipping the experts (policy analysts, business analysts, program management) to effectively manage compliance-related information. Manage and communicate complex information. Relate requirements to outcomes to interpret & bridge gaps. Accommodate change. Data collection effort. Policy and control objective development expertise. Fragmented internal policy. Slide 30
Enhancing IT Governance, Risk and Compliance Management (IT GRC)
Enhancing IT Governance, Risk and Compliance Management (IT GRC) Enabling Reliable eservices Tawfiq F. Alrushaid Saudi Aramco Agenda GRC Overview IT GRC Introduction IT Governance IT Risk Management IT
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE
TECHNICAL PROPOSAL DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE A White Paper Sandy Bacik, CISSP, CISM, ISSMP, CGEIT July 2011 7/8/2011 II355868IRK ii Study of the Integration Cost of Wind and Solar
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
Information Management and Protection Policy
Document Title: Information Management and Protection Policy Document Type: Policy No. Of Pages (11) Scope: Government of Newfoundland and Labrador and Public Bodies supported by the Office of the Chief
Identity & Access Management new complex so don t start?
IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach
14 October 2015 ISACA Curaçao Conference By: Paul Helmich
Governance, Risk & Compliance A practical approach 14 October 2015 ISACA Curaçao Conference By: Paul Helmich Topics today What is GRC? How much of all the GRC literature, tools, etc. do I need to study
How To Ensure Financial Compliance
Evolving from Financial Compliance to Next Generation GRC Gary Prince Principal Solution Specialist - GRC Agenda Business Challenges Oracle s Leadership in Governance, Risk and Compliance Solution Overview
Role Profile. Ministry of Technology, Innovation and Citizens Services. Assistant Deputy Minister Integrated Workplace Solutions.
Ministry of Technology, Innovation and Citizens Services Assistant Deputy Minister Integrated Workplace Solutions Victoria Ministry Overview The Ministry of Technology, Innovation and Citizens Services
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.
TECHNOLOGY BRIEF: REDUCING COST AND COMPLEXITY WITH GLOBAL GOVERNANCE CONTROLS CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. Table of Contents Executive
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
STREAM Cyber Security
STREAM Cyber Security Management Software Governance, Risk Management & Compliance (GRC) Security Operations, Analytics & Reporting (SOAR) Fast, flexible, scalable, easy to use and affordable software
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization
Information & Asset Protection with SIEM and DLP
Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the
A Flexible and Comprehensive Approach to a Cloud Compliance Program
A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility
RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES
RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES Purpose and Scope The purpose of the Security Code of Management Practices is to help protect people, property, products, processes, information and
Cloud Computing An Auditor s Perspective
Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP [email protected] December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,
The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004
The USA Patriot Act Government Briefing Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 Agenda Background Overview of Government Responses and Approach Mitigation
Maintaining PCI-DSS compliance. Daniele Bertolotti [email protected] Antonio Ricci [email protected]
Maintaining PCI-DSS compliance Daniele Bertolotti [email protected] Antonio Ricci [email protected] Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance
Privacy Governance and Compliance Framework Accountability
Privacy Governance and Framework Accountability Agenda Global Data Protection and Privacy (DPP) Organization Structure Privacy The 3 Lines of Defense (LOD) Model: Overview Privacy The 3 Lines of Defense
OCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
White Paper: The Seven Elements of an Effective Compliance and Ethics Program
White Paper: The Seven Elements of an Effective Compliance and Ethics Program Executive Summary Recently, the United States Sentencing Commission voted to modify the Federal Sentencing Guidelines, including
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,
Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security, streamline compliance reporting, and reduce the overall
Registration Information for Lottery Retailers Including Frequently Asked Questions
Including Frequently Asked Questions The purchase of lottery tickets is a popular form of gambling for many British Columbians. To help ensure the integrity of gaming in British Columbia, all lottery retailers
IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
E-Commerce at Wells Fargo. SF IIA/ISACA Presentation
E-Commerce at Wells Fargo SF IIA/ISACA Presentation By Wells Fargo Audit Services October 17, 2000 2 Discussion Topics E-Commerce at Wells Fargo - Our Story E-Commerce Risks General Conclusions Q&A Afternoon
Governance, Risk & Compliance for Public Sector
Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment
Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister
Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.
Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations
Achieving Control: The Four Critical Success Factors of Change Management Technology Concepts & Business Considerations T e c h n i c a l W H I T E P A P E R Table of Contents Executive Summary...........................................................
MASSIVE NETWORKS Online Backup Compliance Guidelines... 1. Sarbanes-Oxley (SOX)... 2. SOX Requirements... 2
MASSIVE NETWORKS Online Backup Compliance Guidelines Last updated: Sunday, November 13 th, 2011 Contents MASSIVE NETWORKS Online Backup Compliance Guidelines... 1 Sarbanes-Oxley (SOX)... 2 SOX Requirements...
ISO 14001 & ISO 18001 Legal Compliance Know Your Risk - Reduce your Risk"
American Society For Quality -Toronto Section ISO 14001 & ISO 18001 Legal Compliance Know Your Risk - Reduce your Risk" Copyright: Coudenys Management Systems Inc. RISK DEFINED Occurrence of the event
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Designing a Data Governance Framework to Enable and Influence IQ Strategy
Designing a Data Governance Framework to Enable and Influence IQ Strategy Elizabeth M. Pierce University of Arkansas at Little Rock PG 135 Overview of Corporate and Key Asset Governance (Reproduced from
Security aspects of e-tailing. Chapter 7
Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Office of the Auditor General of Canada. Internal Audit of Document Management Through PROxI Implementation. July 2014
Office of the Auditor General of Canada Internal Audit of Document Management Through PROxI Implementation July 2014 Practice Review and Internal Audit Her Majesty the Queen in Right of Canada, represented
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
ITC 19 th November 2015 Creation of Enterprise Architecture Practice
ITC 19.11.15 ITC 19 th November 2015 Creation of Enterprise Architecture Practice C Description of paper 1. As part of a wider strategy of Digital Transformation of the University s core services, ISG
Enabling Data Quality
Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &
<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance
Generally Accepted Recordkeeping Principles
Generally Accepted Recordkeeping Principles Information Governance Maturity Model Information is one of the most vital strategic assets any organization possesses. Organizations depend on information to
Service Alberta BUSINESS PLAN 2010 13
Service Alberta BUSINESS PLAN 2010 13 Service Alberta BUSINESS PLAN 2010-13 ACCOUNTABILITY STATEMENT The business plan for the three years commencing April 1, 2010 was prepared under my direction in accordance
Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer
Information Security Management Systems Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer atsec information security, 2013 ISO/IEC 27001 and related
December 21, 2012. The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS.
Justification for a Contract Amendment to Contract 2012-01: Interim Hosting and Jurisdiction Functionality for the Compliance Instrument Tracking System Service (CITSS) December 21, 2012 Introduction WCI,
Key Trends, Issues and Best Practices in Compliance 2014
Key Trends, Issues and Best Practices in Compliance 2014 What Makes This Survey Different Research conducted by independent third party Clients and non-clients 301 executive decision makers 35 qualitative
1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Domain 5 Information Security Governance and Risk Management
Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association
Supporting Effective Compliance Programs
October 2015 Supporting Effective Compliance Programs The Oversight Roles of the Board Audit and Risk Committees in Regulatory Compliance By Paul Osborne, CPA, CAMS, AMLP, and Peggy Sepp, CIA To be effective,
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Taking the pain out of Risk and Compliance Management Systems. Presented by Andrew Batten 23 April 2015
Taking the pain out of Risk and Compliance Management Systems Presented by Andrew Batten 23 April 2015 Operational Improvement Technology Solutions Providing consultancy services Gap assessments Food standard
IT Governance Charter
Version : 1.01 Date : 16 September 2009 IT Governance Network South Africa USA UK Switzerland www.itgovernance.co.za [email protected] 0825588732 IT Governance Network, Copyright 2009 Page 1 1 Terms
PRESENTATION TOPICS 2/27/2014. Why Update Policies? 21st Century Best Practices for Information Governance & Policies. Why update policies??
21st Century Best Practices for Information Governance & Policies Presented by: John Isaza, CEO- Information Governance Solutions, LLC Partner - Rimon PC ARMA NOVA Chapter Friday, February 28, 2014 12:30
CATSA Screening Contractor Management System Standard (2015)
Public Works and Government Services Canada Canadian General Standards Board Travaux publics et Services gouvernementaux Canada Office des normes générales du Canada CATSA Screening Contractor Management
Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices
A Forrester Consulting Thought Leadership Paper Commissioned By Xively By LogMeIn August 2015 Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices Table
IT Security & Compliance Risk Assessment Capabilities
ATIBA Governance, Risk and Compliance ATIBA provides information security and risk management consulting services for the Banking, Financial Services, Insurance, Healthcare, Manufacturing, Government,
NetIQ FISMA Compliance & Risk Management Solutions
N E T I Q C O M P L I A N C E S E R I E S NetIQ FISMA Compliance & Risk Management Solutions The Federal Information Security Management Act (FISMA) requires federal agencies to create and implement a
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes
Developing National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
Ann Geyer Tunitas Group. CGEIT Domains
1 CGEIT Exam Prep May 17, 2011 Ann Geyer Tunitas Group CGEIT Domains 2 Job Practice Areas by Domain 25% IT Gov Frameworks 20% Risk Mgmt 15% Strategic Alignment 15% Value Delivery 13% Resource Mgmt 12%
SAFEGUARDS FOR PROTECTING PRIVATE DATA - SERVICE PROVIDERS AND CONTRACTORS
SAFEGUARDS FOR PROTECTING PRIVATE DATA - SERVICE PROVIDERS AND CONTRACTORS THE UNIVERSITY OF NEW MEXICO October 17, 2013 Audit Committee Members J.E. Gene Gallegos, Chair Lt. General Bradley Hosmer, Vice
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001
1 GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001 Tolga MATARACIOGLU 1 and Sevgi OZKAN 2 1 TUBITAK National Research Institute of Electronics and Cryptology (UEKAE), Department of
Metrics that Matter Security Risk Analytics
Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa [email protected] April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk
Cyber intelligence exchange in business environment : a battle for trust and data
Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building
Information Management
G i Information Management Information Management Planning March 2005 Produced by Information Management Branch Open Government Service Alberta 3 rd Floor, Commerce Place 10155 102 Street Edmonton, Alberta,
Security audit advice For holders of all remote gambling operator licences including specified remote lottery licences
Security audit advice For holders of all remote gambling operator licences including specified remote lottery licences July 2015 1 Introduction 1.1 This July 2015 advice is updated from the previously
3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;
Enterprise Content Management (ECM) Policy Version Information A. Introduction Purpose 1. Outline and articulate the strategy for enterprise content management across Redland City Council (RCC). This document
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
How To Improve Your Business
IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
Implementing and monitoring effective compliance policies & procedures. charlesrussellspeechlys.com
Implementing and monitoring effective compliance policies & procedures charlesrussellspeechlys.com Robert Bond Partner Robert Bond has over 36 years' experience in advising national and international clients
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT
PAGE 6 of 51 SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Statement of Work This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and
NERC-CIP S MOST WANTED
WHITE PAPER NERC-CIP S MOST WANTED The Top Three Most Violated NERC-CIP Standards What you need to know to stay off the list. www.alertenterprise.com NERC-CIP s Most Wanted AlertEnterprise, Inc. White
Certified Identity and Access Manager (CIAM) Overview & Curriculum
Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management
Interagency Science Working Group. National Archives and Records Administration
Interagency Science Working Group 1 National Archives and Records Administration Establishing Trustworthy Digital Repositories: A Discussion Guide Based on the ISO Open Archival Information System (OAIS)
Ensuring Cloud Security Using Cloud Control Matrix
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 933-938 International Research Publications House http://www. irphouse.com /ijict.htm Ensuring
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
How to Ensure IT Compliance Without Compromising Innovation. Nik Teshima, IBM Phil Odence, Black Duck
How to Ensure IT Compliance Without Compromising Innovation Nik Teshima, IBM Phil Odence, Black Duck Black Duck 2013 Speakers Phil Odence VP of Business Development Black Duck Software Nik Teshima Senior
Security Services. 30 years of experience in IT business
Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3
Convercent Predictive Analytics
September 2015 Convercent Predictive Analytics Innovation in User Experience for Issue Reporting & Management SOLUTIONPERSPECTIVE Governance, Risk Management & Compliance Insight 2015 GRC 20/20 Research,
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
ISO20000: What it is and how it relates to ITIL v3
ISO20000: What it is and how it relates to ITIL v3 John DiMaria; Certified Six Sigma BB, HISP BSI Product Manager; ICT (ISMS,ITSM,BCM) Objectives and Agenda To raise awareness, to inform and to enthuse
