Risk & Audit Committee California Public Employees Retirement System
|
|
|
- Brianna Rodgers
- 10 years ago
- Views:
Transcription
1 California Public Employees Retirement System Consent Agenda Item 4d ITEM NAME: Enterprise Risk Management Division Status Report PROGRAM: Risk Management ITEM TYPE: Consent Information EXECUTIVE SUMMARY This reporting item provides a current status update of key activities and accomplishments of the Enterprise Risk Management Division (ERMD), as of October 15, STRATEGIC PLAN This agenda item supports CalPERS Strategic Plan Goal B: Cultivate a high-performing, risk-intelligent and innovative organization. ERMD is actively implementing the following Business Plan initiatives: Information Security Roadmap ERMD provides risk assessment, policy guidance, and recommends control standards, and processes to enhance security measures designed to protect information assets and reduce information security risk. Policy Management ERMD is developing a policy management framework to establish an enterprise-wide oversight approach for managing internal policies and compliance function. To further promote risk management and compliance within CalPERS, ERMD has now fully staffed the new policy management unit. Strategic Risk Measures ERMD is coordinating with the Enterprise Strategic Planning Division (ESPD) in the development of risk indicators for the strategic measures to support achievement of the CalPERS Strategic Plan Goals and Objectives. BACKGROUND As part of the CalPERS Integrated Assurance Model, the ERMD conducts risk assessments, promotes risk awareness, provides assurance regarding information security policies, conducts a privacy program, and facilitates emergency management activities.
2 Page 2 of 6 An effective enterprise-wide risk management program provides a holistic approach to the identification of organizational risks, creates an appropriate risk response, develops internal control activities, and continuously monitors and reviews the risks. CalPERS Board of Administration (Board) approved Fiscal Year (FY) Annual Risk Assessment Plan outlines the specific risk assessments to be performed along with an allocation of resources for ad hoc requests. ANALYSIS The following topics were addressed during this reporting period to further mature the risk management processes providing executive management and the Board reasonable assurances that key risks are being identified and mitigated. Information Security Roadmap The Information Security Management Section (ISMS) provides oversight and serves as a trusted advisor for the six Information Security Roadmap Program (SRP) Phase 2 projects. This is a multiyear series of individual projects that will reduce the risk to the confidentiality, integrity, and availability of CalPERS information assets. ISMS is now working with other stakeholders on the execution of SRP Phase 2 which includes the following projects: Network Access Control, Remote Access Assessment, Patch Management, Data Loss Prevention, ediscovery, and Identity Management. As a trusted advisor, ISMS provides guidance and assessments in its role as the second line of defense for information security integrated assurance. ISMS created new Security Policies and Control Standards necessary to govern the SRP Phase 2 projects and technologies to ensure the projects conform to current CalPERS Information Security Policies and industry best practices to protect CalPERS information assets. These measures include: Examining electronic files to discover confidential information that requires better governance and controls, Blocking unauthorized devices from connecting to the CalPERS network, Managing hundreds of security updates to thousands of components in the information technology infrastructure which includes all CalPERS laptops, workstations, and mobile devices, and Implementing new technology that will increase the maturity of CalPERS legal ediscovery processes resulting in cost reductions and many other benefits. ISMS also created new information security awareness training to support the SRP Phase 2 Data Loss Prevention project. This awareness training is focused on increasing CalPERS staff s understanding of the value of protecting CalPERS
3 Page 3 of 6 information. This new awareness training is integrated into the required ISMS annual information security awareness training. Work has already started on Phase 3 of the SRP that will be executed in FY Together with other stakeholders ISMS participated in a risk assessment to identify what projects need to be executed during the SRP Phase 3. This enables the project team to identify and prioritized projects in response to evolving information security threats and risks. ISMS and Information Technology Services Branch are currently preparing budget requests to support those Phase 3 projects that are being proposed for completion in FY Policy Management To implement Business Plan initiative for Policy Management, ERMD has created a new Enterprise Policy Administration Section (EPAS) and completed recruitment of staff to support development of a policy management framework. This framework delineates a policy life-cycle governance process that defines how a policy is created, maintained and retired. The framework includes a policy, tools, and a proposed governance process for the management of enterprise policies. The Division Chief Council reviewed the draft policy and it will be presented to executive staff for final review and approval during the second quarter. EPAS is creating a communication plan and training plan to promote awareness of the new policy framework. These plans will be fully implemented by June 2014, consistent with the Business Plan. Additionally, EPAS has begun identifying authoritative sources and control standards for existing policies to enhance compliance monitoring. In advance of stable industry standards in September 2013 ISMS identified those CalPERS information security Policy/Control Standards that enable CalPERS information security governance for Bring Your Own Device (BYOD). ISMS predicts that industry standards for BYOD will stabilize during FY and then ISMS will select and adopt the industry defined standards by June Strategic Risk Measures ERMD is coordinating ESPD in the development of risk indicators for the Board approved strategic measures to support achievement of the CalPERS Strategic Plan Goals and Objectives. The risk indicators are designed to prevent variability from anticipated performance and achievement of the Strategic Plan Goals and Objectives. ERMD will continue to collaborate with ESPD on the development of these strategic risk measures. Annual Risk Assessment Plan The Risk Assessment and Intelligence Section (RAIS) are performing the risk assessments as outlined in the FY Annual Risk Assessment Plan.
4 Page 4 of 6 Specifically, RAIS began conducting risk assessments for the following risk domains and developed risk registers to support the domain ratings: Pension Funding, Human Resources Management, Municipal Bankruptcy, and Pension Reform Implementation. An information security risk assessment was also initiated by the Enterprise Compliance Division to assess compliance with CalPERS information security policies and standards. RAIS is conducting a risk assessment of Cloud Computing Services in response to an audit finding on this topic. In August 2013, ISMS adopted the industry standards for cloud computing defined by the Cloud Security Alliance. Subsequently in September 2013, the CalPERS information security Policy/Control Standards were updated to govern CalPERS adoption of cloud computing to support the risk assessment. These assessments are conducted jointly with executive and division management further supporting the cultivation of a high-performing, risk intelligent and innovative organization. The Enterprise Risk Dashboard will be updated to reflect the results of these risk assessments. To further promote the strategic goal to Cultivate a high performing, risk intelligent and innovative organization, ERMD provided a series of progressive training to the Division Chief Council regarding risk governance, risk identification, and risk assessment. The Division Chiefs performed a more active role in risk governance, development of risk registers, emerging risk reports, top risk reports, and recalibrated the Enterprise Risk Dashboard. This initiative is planned to be to be fully integrated by end of FY second quarter. Training and Awareness To cultivate a risk intelligent culture, RAIS continues with its internal Governance Risk and Compliance (GRC) training program for staff development. This training program commenced June 2013 and will be completed this month. ISMS completed a refresh of the current information security awareness training to both reflect new information security risks and technologies. This refreshed training will be available to all CalPERS staff this month and delivered during their mandatory annual information security awareness training throughout the remaining months of FY Emergency Management The Emergency Management (EMAN) unit assisted in conducting a full-scale offsite evacuation drill to Crocker Park to increase awareness and training in the event of an
5 Page 5 of 6 actual emergency or disaster. The Floor Warden and Emergency response teams were activated to test and evaluate segments of the CalPERS Emergency Response Plan. EMAN is evaluating lessons learned from the offsite drill to make improvements to CalPERS emergency response plans. Additionally, CalPERS joined over 9 million Californians in the Great Shakeout drill, a simulated earthquake-based disaster. EMAN also completed a review and analysis of the updated Business Continuity Plans for each division. A draft Business Impact Analysis and Gap Analysis was completed to identify opportunities for improvement, primarily in alignment of the plans. EMAN will continue working with management to update the plans to ensure proper alignment and address any gaps between the plans. The Business Continuity Plans are critical to ensure all operations are up and running at full capacity in the event of a major incident. Projects egrc Platform - To improve efficiency, an Enterprise Governance Risk and Compliance (egrc) solution is being implemented to automate certain risk management, compliance, incident management, business continuity, and policy management functions. During this reporting period, the business use cases were prioritized and a roadmap and blueprint for implementing the solution was developed. Phase I will focus on automating the enterprise risk dashboard and the supporting risk registers, incident management, and standardizing compliance assessments. The ERMD egrc initiative provides additional capabilities that ISMS will use to deliver new and improved information security services to CalPERS. Specifically, ISMS created twelve use cases to expand the current data classification program that will include aspects of data quality. These use cases were submitted to the egrc project team in September 2013 and currently planned to be implemented by June My CalPERS Access Project - ISMS is working with other stakeholders to update the my CalPERS system so that staff can access only those functions necessary to perform their specific job duties. All CalPERS divisions have been contacted and their identification of the required my CalPERS functions to support their business processes was completed. Some changes were made to my CalPERS during the 3 rd quarter of FY and others are scheduled to be completed by the end of FY which strengthens security by limiting access to confidential and sensitive member information. BUDGET AND FISCAL IMPACTS Resources for the initiatives outlined in this ERMD status report are funded by existing internal resources. No additional funds are being requested at this time.
6 Page 6 of 6 LARRY JENSEN, Risk Officer Enterprise Risk Management Division KATHLEEN K. WEBB Chief Risk and Compliance Officer CHERYL EASON Chief Financial Officer
Risk & Audit Committee California Public Employees Retirement System
California Public Employees Retirement System Consent Agenda Item 5d ITEM NAME: Enterprise Risk Management Division Status Report PROGRAM: Risk Management ITEM TYPE: Information Consent EXECUTIVE SUMMARY
Proposed Audit Plan for Fiscal Year 2015-16 and Preliminary Audit Plan for Fiscal Year 2016-17
Page 1 of 13 Proposed Audit Plan for Fiscal Year 2015-16 and Preliminary Audit Plan for Fiscal Year 2016-17 A June 2015 Page 2 of 13 Table of Contents Section I FY 2015-16 Proposed Audit Plan Pension and
CalPERS Budget Policy
California Public Employees Retirement System Agenda Item 6a Attachment 2 Page 1 of 6 CalPERS Budget Policy Purpose This document sets forth the budget policy (Policy) to ensure CalPERS budgeting practices
Final Audit Report. Audit of the Human Resources Management Information System. December 2013. Canada
Final Audit Report Audit of the Human Resources Management Information System December 2013 Canada Table of Contents Executive summary... i A - Introduction... 1 1. Background... 1 2. Audit objective...
How To Transform It Risk Management
The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Internal Audit Report on. IT Security Access. January 2010. 2010 January - English - Information Technology - Security Access - FINAL.
Internal Audit Report on January 2010 2010 January - English - Information Technology - Security Access - FINAL.doc Contents Background...3 Introduction...3 IT Security Architecture,Diagram 1...4 Terms
UIIPA - Security Risk Management. June 2015
UIIPA - Security Risk Management June 2015 1 Introduction Tim Hastings, Chief Information Security Officer State of Utah - Department of Technology Services Tim Hastings has more than 16 years of experience
Agency for State Technology
Agency for State Technology 2015-2018 Statewide Information Technology Security Plan The Way Forward Rick Scott, Governor Jason M. Allison, State CIO Table of Contents From the Desk of the State Chief
Office of the Chief Information Officer
Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business
GRC Program Best Practices & Lessons Learned
GRC Program Best Practices & Lessons Learned Steps to Establishing and Maturing a GRC program Carl Sawicki, American Express Kathleen Randall, RSA Archer 1 Abstract In today s world, few organization s
February 15, 2011. I. SUBJECT: CalPERS 2010-11 Business Plan Update. III. RECOMMENDATION: Approval of change to the CalPERS 2010-11 Business Plan.
C Strategic Management Services Division P.O. Box 898 Sacramento, CA 94229-0898 TTY: For Speech and Hearing Impaired - (916) 795-3240 (916) 795-3976, FAX (916) 795-1279 AGENDA ITEM 6a TO: MEMBERS OF THE
Enterprise Projects Fiscal Year 2011/2012 Third Quarter Report
Enterprise Projects Fiscal Year 2011/2012 Third Quarter Report Enterprise Projects Fiscal Year 2011/2012 Third Quarter Report The Enterprise Program Investment Council (EPIC) is responsible for governance
ENTERPRISE RISK MANAGEMENT FRAMEWORK
ENTERPRISE RISK MANAGEMENT FRAMEWORK COVENANT HEALTH LEGAL & RISK MANAGEMENT CONTENTS 1.0 PURPOSE OF THE DOCUMENT... 3 2.0 INTRODUCTION AND OVERVIEW... 4 3.0 GOVERNANCE STRUCTURE AND ACCOUNTABILITY...
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
Audit of the Test of Design of Entity-Level Controls
Audit of the Test of Design of Entity-Level Controls Canadian Grain Commission Audit & Evaluation Services Final Report March 2012 Canadian Grain Commission 0 Entity Level Controls 2011 Table of Contents
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
2015 List of Major Management Challenges for the CFPB
September 30, 2015 MEMORANDUM TO: FROM: SUBJECT: Richard Cordray Director Consumer Financial Protection Bureau Mark Bialek Inspector General 2015 List of Major Management Challenges for the CFPB We are
Taking Information Security Risk Management Beyond Smoke & Mirrors
Taking Information Security Risk Management Beyond Smoke & Mirrors Evan Wheeler Omgeo Session ID: GRC-107 Insert presenter logo here on slide master. See hidden slide 4 for directions Session Classification:
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
ISE Northeast Executive Forum and Awards
ISE Northeast Executive Forum and Awards October 3, 2013 Company Name: Project Name: Presenter: Presenter Title: University of Massachusetts Embracing a Security First Approach Larry Wilson Chief Information
Audit Report. Management of Naval Reactors' Cyber Security Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 Department of Energy Washington,
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA
RSA, The Security Division of EMC Zamanta Anguiano Sales Manager RSA The Age of the Hyperextended Enterprise BUSINESS ISSUES IMPACT Innovation Collaboration Exploding Information Supply Chain Customer
How RSA has helped EMC to secure its Virtual Infrastructure
How RSA has helped EMC to secure its Virtual Infrastructure A new solution, the RSA solution for Cloud Security and Compliance, has been developed and is now available to all of our customers. Luciano
Third-Party Risk Management for Life Sciences Companies
April 2016 Third-Party Risk Management for Life Sciences Companies Five Leading Practices for Data Protection By Mindy Herman, PMP, and Michael Lucas, CISSP Audit Tax Advisory Risk Performance Crowe Horwath
MANAGEMENT AUDIT REPORT DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION
MANAGEMENT AUDIT REPORT OF DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION REPORT NO. 13-101 City of Albuquerque Office of Internal Audit
Better Data is Everyone s Job! Using Data Governance to Accelerate the Data Driven Organization
Better Data is Everyone s Job! Using Data Governance to Accelerate the Data Driven Organization Intros - Name - Interest / Challenge - Role Data Governance is a Business Function Data governance should
Cybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor [email protected] National Institute of Standards
Why you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
Ms. Debbie Davenport Auditor General Office of the Auditor General 2910 North 44 th Street, Suite 410 Phoenix, Arizona 85018. Dear Ms.
Janet Napolitano Governor ARIZONA DEPARTMENT OF ECONOMIC SECURITY 1717 W. Jefferson P.O. Box 6123 Phoenix, AZ 85005 David A. Berns Director Ms. Debbie Davenport Auditor General Office of the Auditor General
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
Enhancing IT Governance, Risk and Compliance Management (IT GRC)
Enhancing IT Governance, Risk and Compliance Management (IT GRC) Enabling Reliable eservices Tawfiq F. Alrushaid Saudi Aramco Agenda GRC Overview IT GRC Introduction IT Governance IT Risk Management IT
ICT Strategy 2 0 1 4-2 0 1 6
2 0 1 4-2 0 1 6 Document revision history Date Version Revision Comment Author / Editor 0 1 Initial draft Gregory Peacock 04/07/2014 0 2 General revision Alan Hough 10/7/2014 0 3 Minor additions Gregory
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division
AUDIT OF IT SECURITY Corporate Internal Audit Division Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council of Canada September 20, 2012 Corporate
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
Audit of the Disaster Recovery Plan
Audit of the Disaster Recovery Plan Report # 11-05 Prepared by Office of Inspector General J. Timothy Beirnes, CPA, Inspector General Kit Robbins, CISA, CISM, CRISC, Lead Information Systems Auditor TABLE
Governance and Management of Information Security
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
U.S. Nuclear Regulatory Commission
U.S. Nuclear Regulatory Commission 2011 Data Center Consolidation Plan and Progress Report Version 2.0 September 30, 2011 Enclosure Contents 1 Introduction... 2 2 Agency Goals for Data Center Consolidation...
Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
Microsoft Services Premier Support. Security Services Catalogue
Microsoft Services Premier Support Security Services Catalogue 2014 Microsoft Services Microsoft Services helps you get the most out of your Microsoft Information Technology (IT) investment with integrated
IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski
IT AUDIT Current Trends and Top Risks of 2015 2 02 Eric Vyverberg WHO WE ARE David Kupinski Randy Armknecht Associate Director Internal Audit Protiviti 317.510.4661 [email protected] Managing
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
Information Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
IT Governance. What is it and how to audit it. 21 April 2009
What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis
Using Enterprise Governance, Risk, And Compliance (EGRC) Tools For Improved Management Of Security And Privacy. June 23, 2015
Using Enterprise Governance, Risk, And Compliance (EGRC) Tools For Improved Management Of Security And Privacy June 23, 2015 What is egrc? A management system for compliance requirements, policies, risk
Cisco Data Center Optimization Services
Cisco Data Center Optimization Services Evolve your data center solutions to support business growth, deliver nextgeneration services, and maintain competitive advantage with Cisco Data Center Optimization
Small Business. Leveraging SBA IT resources to support America s small businesses
Small Business Administration Information Technology Strategic Plan ( ITSP) 2012-2016 Leveraging SBA IT resources to support America s small businesses Message from the Chief Information Officer The Small
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
AUDIT OF READINESS FOR THE IMPLEMENTATION OF THE POLICY ON INTERNAL CONTROL
AUDIT OF READINESS FOR THE IMPLEMENTATION OF THE POLICY ON INTERNAL CONTROL AUDIT REPORT JUNE 2010 TABLE OF CONTENTS EXCUTIVE SUMMARY... 3 1 INTRODUCTION... 5 1.1 AUDIT OBJECTIVE. 5 1.2 SCOPE...5 1.3 SUMMARY
IT Governance Overview
IT Governance Overview Contents Executive Summary... 3 What is IT Governance?... 4 Strategic Vision and IT Guiding Principles... 4 Campus-Wide IT Strategic Vision... 4 IT Guiding Principles... 4 The Scope
RSA ARCHER OPERATIONAL RISK MANAGEMENT
RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume
Information Technology Strategic Plan 2014-2017
Information Technology Strategic Plan 2014-2017 Leveraging information technology to create a competitive advantage for UW-Green Bay Approved December 2013 (Effective January 2014 December 2017) Contents
CLASSIFICATION SPECIFICATION FORM
www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information
DTCC RISK COMMITTEE CHARTER
DTCC RISK COMMITTEE CHARTER Purpose The ability to identify, manage and mitigate risk is fundamental to the services that The Depository Trust & Clearing Corporation ( DTCC ) provides to its members and
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
EPA Can Better Assure Continued Operations at National Computer Center Through Complete and Up-to-Date Documentation for Contingency Planning
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology EPA Can Better Assure Continued Operations at National Computer Center Through Complete and Up-to-Date Documentation
RSA Archer Risk Intelligence
RSA Archer Risk Intelligence Harnessing Risk to Exploit Opportunity June 4, 2014 Steve Schlarman GRC Strategist 1 Risk and Compliance Where is it today? 2 Governance, Risk, & Compliance Today 3 4 A New
Information Security Managing The Risk
Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview
Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data
Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA
Volume 3, July 2014 Come join the discussion! Alberto León Lozano will respond to questions in the discussion area of the COBIT 5 Use It Effectively topic beginning 21 July 2014. Mapping COBIT 5 with IT
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN
Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010 Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
Cybersecurity@RTD Program Overview and 2015 Outlook
Cybersecurity@RTD Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD Information Technology Department of Finance & Administration
Infrastructure consulting. Global Infrastructure
Infrastructure consulting Global Infrastructure Services Operational costs systems availability compliance and security energy and power usage disaster recovery all contribute to today s increasingly complex
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
BMC Remedyforce Asset Management. Frequently Asked Questions
BMC Remedyforce Frequently Asked Questions Table of Contents BMC Remedyforce 2 Overview 2 Frequently Asked Questions 2 Definitions 2 1. What is Configuration Management? 2 2. What is IT? 2 3. What is a
Cloud Computing and Data Center Consolidation
Cloud Computing and Data Center Consolidation Charles Onstott, PMP Chief Technology Officer, Enterprise IT Services SAIC Steven Halliwell General Manager for State and Local and Education Sales Amazon
