TOP SECRET//COMINT//NOFORN
|
|
|
- Henry Tucker
- 9 years ago
- Views:
Transcription
1 UNITED STATES GOVERNMENT Memorandum OC DATE: 3 May 2012 REPLY TO ATTN OF: SUBJECT: TO: SID Oversight & Compliance () NSAW SID Intelligence Oversight (IO) Quarterly Report First Quarter Calendar Year 2012 (1 January 31 March 2012) EXECUTIVE SUMMARY SIGINT Director I. (U) Overview () The attached NSAW SID Intelligence Oversight (IO) Quarterly Report for the First Quarter Calendar Year 2012 (1 January 31 March 2012) identifies NSAW SID compliance with E.O , DoD Regulation R, NSA/CSS Policy 1-23, USSID SP0018, and all related policies and regulations. () Detailed incident narratives are provided in the attached annexes. The number of incidents in each category and a reference to the annex related to each incident category are contained in the body of the report. () As part of SID Oversight and Compliance s (SV) charge to provide comprehensive trends and analysis information as it pertains to incidents of non-compliance, this Executive Summary provides analysis and evaluation of incidents reported throughout the current quarter to better address the whys and hows behind NSAW SID s compliance posture. () Section II, Metrics, has been broken down into several sub-sections: metrics and analysis of NSAW SID-reported incidents by authority, type, root cause, and organization. Also included is an assessment of how incidents were discovered (i.e., methods of discovery) for SID-reported incidents (see Figure 7). () Significant Incidents of Non-compliance and Report Content follow in Sections III and IV, respectively. (S//REL) Overall, the number of incidents reported during 1QCY12 increased by 11% as compared to the number of incidents reported during 4QCY11. This included a rise in the number of E.O incidents, as well as for incidents across all FISA authorities. The majority of incidents in all authorities were database query incidents due to human error. Of note, S2 continued to be the NSAW SID organization with the largest number of reported incidents (89%), although S2 experienced an overall decrease in reported incidents. SV noted an overall improvement in timeliness regarding 1QCY12 IO Quarterly Report submissions from the SID elements. Page 1 of 13
2 II. (U) Metrics a. () NSAW SID-reported Incidents by Authority (TS//SI//REL TO USA, FVEY) Figures 1a-b compares all categories of NSAW SID-reported incidents (collection, dissemination, unauthorized access, and retention) by Authority for 2QCY11 1QCY12. From 4QCY11 to 1QCY12, there was an overall increase in incidents of 11%. There was also an increase of 11% for both E.O and FISA incidents. The increase in incidents reported for 1QCY12 was due to an increase in the number of reported Global System for Mobile Communications (GSM) roamer 1 incidents, which may be attributed to an increase in Chinese travel to visit friends and family for the Chinese Lunar New Year holiday. () () Figure 1a: Table of the Number of NSAW SID-reported Incidents by Authority 2QCY11 3QCY11 4QCY11 1QCY12 E.O FISA TOTAL () () Figure 1b: Line Graph of the Number of NSAW SID-reported Incidents by Authority Number of Incidents E.O FISA 0 2QCY11 3QCY11 4QCY11 1QCY12 Quarter (TS//SI//NF) FISA Incidents: As reflected in Figures 1a-b, during 1QCY12, NSAW SID reported a total of 195 FISA incidents, 185 of which were associated with unintentional collection. NSAW SID also reported 6 incidents of unintentional dissemination under FISA authority and 4 incidents of unauthorized access to Raw 1 () Roaming incidents occur when a selector associated with a valid foreign target becomes active in the U.S. Page 2 of 13
3 SIGINT FISA data. Figure 2 illustrates the most common root causes for incidents involving FISA authorities as determined by SV. 63% (123) of 1QCY12 FISA incidents can be attributed to Operator Error as the root cause, and involved: o Resources ( i.e., inaccurate or insufficient research information and/or workload issues (60); o Lack of due diligence (i.e., failure to follow standard operating procedures) (39); o Human error (21) which encompassed: Broad syntax (i.e., no or insufficient limiters / defeats / parameters) (12); Typographical error (6); Query technique understood but not applied (2); and Incorrect option selected in tool (1); and o Training and guidance (i.e., training issues) (3). () The Resources root cause category accounted for the largest percentage of Operator Error incidents under FISA authorities for 1QCY12. Analysis identified that these incidents could be reduced if analysts had more complete and consistent information available about selectors and/or targets at the time of tasking and if analysts consistently applied rules for conducting queries. 37% (72) of 1QCY12 FISA incidents can be attributed to System Error as the root cause, and involved: o System limitations (i.e., system lacks the capability to push real-time travel data out to analysts, system/device unable to detect changes in user) (67); o System engineering (i.e., system/database developed without the appropriate oversight measures, data flow issues, etc.) (4); and, o System disruptions (i.e., glitches, bugs, etc.) (1). () The System Limitations root cause category accounted for the largest percentage of System Error incidents under FISA authorities for 1QCY12. The largest number of incidents in the System Limitations category account for roamers where there was no previous indications of the planned travel. These incidents are largely unpreventable. Consistent discovery through the Visitor Location Register (VLR) occurs every quarter and provides analysts with timely information to place selectors into candidate status or detask. Analysis identified that these incidents could be reduced if analysts removed/detasked selectors more quickly upon learning that the status of the selector had changed and more regularly monitored target activity. This analysis indicates that continued research on ways to exploit new technologies and researching the various aspects of personal communications systems to include GSM, are an important step for NSA analysts to track the travel of valid foreign targets. Page 3 of 13
4 () Figure 2: 1QCY12 FISA Incidents Root Causes 11% 20% Operator Human Error (21) Operator Due Diligence (39) Operator Resources (60) 34% 31% Operator Training (3) System Disruptions (1) System Engineering (4) 2% 2% Total: 195 System Limitations (67) (TS//SI//REL TO USA, FVEY) Delayed Detasking FISA Incidents: As reflected in Figures 1a-b, during 1QCY12, NSAW SID reported a total of 195 FISA incidents. 19 (10%) of the total FISA incidents were associated with detasking delays. Of the 19 delayed detasking incidents, 12 (63%) of these incidents occurred under NSA FISA Authority, 5 (27%) occurred under FAA 702 Authority, 1(5%) occurred under FAA 704 Authority, and 1 (5%) occurred under FAA 705(b) Authority. Figure 3a illustrates the detasking delay incidents versus all other FISA incidents reported during 1QCY12. Figure 3b illustrates the detasking delay incidents by FISA Authority reported during 1QCY12. () Figure 3a: 1QCY12 Detasking FISA Incidents vs. All other FISA incidents () Figure 3b: 1QCY12 FISA Incidents by Authority Delayed Detaskings 90% 10% Delayed Detasking (19) Other Incidents (176) 5% 5% 27% 63% NSA Establishment FISA (12) FAA 702 (5) FAA 704 (1) FAA 705(b) (1) Total: 195 Total: 19 Page 4 of 13
5 (TS//SI//REL TO USA, FVEY) As depicted in Figures 3a and 3b, of the 19 delayed detasking FISA incidents, 15 (79%) resulted from a failure to detask all selectors, 2 (11%) resulted from analyst not detasking when required, 1 (5%) resulted from partner agency error, and 1 (5%) resulted from all tasking not terminated (e.g., dual route). b. NSAW SID-reported Collection Incidents by Sub-Type and Authority () Figures 4a-b depicts NSAW SID-reported collection incidents by Authority (E.O and all FISA Authorities), and identifies the primary sub-types for those incidents. An explanation of the more prominent collection incident sub-types follows the graphs. () Figure 4a: NSAW SID-reported Collection Incidents Under E.O Authority QCY11 3QCY11 4QCY11 1QCY Roamers No FISC/AG Auth Computer Network Exploitation (CNE) Database Queries Task/Detask Delays/Errors USP Transit Program* 5 Other Inadvertent () Figure 4a: During 1QCY12, NSAW SID reported a 39% increase of database query incidents under E.O Authority. Human Error accounted for 74% of E.O database query incidents. (TS//SI//REL TO USA, FVEY) International Transit Switch Collection*: International Transit switches, FAIRVIEW (US-990), STORMBREW (US-983), ORANGEBLOSSOM (US-3251), and SILVERZEPHYR (US-3273), are Special Source Operations (SSO) programs authorized to collect cable transit traffic passing through U.S. gateways with both ends of the communication being foreign. When collection occurs with one or both communicants inside the U.S., this constitutes inadvertent collection. From 4QCY11 to 1QCY12, there was an increase of transit program incidents submitted from 7 to 27, due to the change in our methodology for reporting and counting of these types of incidents. (*See Annex G in SID s 1QCY12 IO Quarterly Report for additional details regarding these incidents.) Page 5 of 13
6 Roamers 95 () Figure 4b: NSAW SID-reported Collection Incidents Under All FISA Authorities No FISC/AG Auth 2QCY11 3QCY11 4QCY11 1QCY12 Computer Network Exploitation (CNE) Database Queries () Figure 4b: During 1QCY12, NSAW SID reported an increase of 9% of roamer incidents under all FISA Authorities. There was also a 260% increase in database query FISA Authority incidents during 1QCY12. Human Error accounted for the majority of all FISA Authorities database query incidents (74%) Task/Detask Delays/Errors USP Other Inadvertent () Roamers: Roaming incidents occur when valid foreign target selector(s) are active in the U.S. Roamer incidents continue to constitute the largest category of collection incidents across E.O and FAA authorities. Roamer incidents are largely unpreventable, even with good target awareness and traffic review, since target travel activities are often unannounced and not easily predicted. (S//SI//NF) Other Inadvertent Collection: Other inadvertent collection incidents account for situations where targets were believed to be foreign but who later turn out to be U.S. persons and other incidents that do not fit into the previously identified categories. (TS//SI//REL TO USA, FVEY) Database Queries: During 1QCY12, NSAW SID reported a total of 115 database query incidents across all Authorities, representing a 53% increase from 4QCY11. E.O Authority database query incidents accounted for 84% (97) of the total, and all FISA Authorities database query incidents accounted for 16% (18). () Figure 5 illustrates the most common root causes for incidents involving database queries as determined by SV. 99% (114) of the 1QCY12 database query incidents are attributed to Operator Error as the root cause, and involved: o Human error (85) which encompassed: Broad syntax (i.e., no or insufficient limiters / defeats / parameters) (55); Typographical error (17); Boolean operator error (6); Query technique understood but not applied (4); Not familiar enough with the tool used for query (2); and Page 6 of 13
7 Incorrect option selected in tool (1) o Lack of due diligence (i.e., failure to follow standard operating procedure) (13) o Training and guidance (i.e., training issues) (9); and o Resources (i.e., inaccurate or insufficient research information and/or workload issues) (7). () The remaining 1 database query incident can be attributed to System Error as the root cause and occurred due to a mechanical error with the tool. () Analysis identified that the number of database query incidents could be reduced if analysts more consistently applied rules/standard operating procedures (SOPs) for conducting queries. (S//SI//NF) Auditors continue to play an important role in the discovery of database query incidents, identifying 70 (61%) of the 115 reported database query incidents. () Figure 5: 1QCY12 Database Query Incidents Root Causes 1% 6% 8% Operator Human Error (85) 11% 74% Operator Due Diligence (13) Operator Resources (7) Operator Training (9) System Disruptions (1) Total: 115 (TS//SI//REL TO USA, FVEY) Of the 115 database query incidents reported for 1QCY12, Figure 6 identifies the database involved and the associated percentage of the total. Databases considered to be Source Systems of Record (SSR) have been labeled as such. (TS//SI//REL TO USA, FVEY) Note that the total number of databases involved in the database query incidents in Figure 6 does not equal the number of database query incidents reflected in Figure 5 or in the 1QCY12 SID IO Quarterly Report because a database query incident may occur in more than one database. Page 7 of 13
8 () Figure 6: 1QCY11 Database Query Incidents Database(s) Involved 1% 2% 3% 2% 1% 20% 28% 1% 7% Total: % 1% 20% 1% CLOUD/ABR DISHFIRE FASTSCOPE MARINA (SSR) OCTAVE PINWALE (SSR) SIGINT NAVIGATOR TRACFIN TRANSX TUNINGFORK UTT XKEYSCORE Unknown (8) (16) (1) (24) (1) (34) (1) (2) (2) (4) (1) (24) (1) () NSAW SID-reported Incidents Method of Discovery () Figure 7 depicts the most prominent method(s) of discovery for incidents reported by NSAW SID elements for 1QCY12. As SV s assessment of root causes matures, and as corrective measures are implemented, identification of how incidents are discovered will provide additional insight into the effectiveness of those methods () Figure 7: 1QCY12 Incidents How Discovered Total: 865 Page 8 of 13
9 () For 1QCY12, of the 865 reported incidents, 553 (64%) were discovered by automated alert. 444, (80%) of the 553 incidents that were discovered by automated alert occurred via the VLR and other analytic tools, such as SPYDER, CHALKFUN, and TransX. c. () NSAW SID-reported Incidents by Organization () Figure 8 illustrates the total 1QCY12 NSAW SID-reported incidents by primary SID Deputy Directorate (DD) level organization. S2, having the largest NSAW SID contingent of reported incidents, accounted for 89% of the total incidents for the quarter, a proportion consistent with the overall size of the S2 organization. As compared to 4QCY11, S2 experienced an overall 8% reduction in incidents occurrences. () Figure 8: 1QCY12 Incidents by NSAW SID Organization 7% 2% 2% 89% S1 1 S2 772 S3 56 F74 MOC 4 SSG 14 ST 1 2nd Party /Various 17 Total: 865 () Figure 9 provides a look into S2 (by Product Line) as the NSAW SID organization with the largest number of reported incidents. For 1QCY12, three Product Lines accounted for 72% of S2 s reported incidents. These Product Lines were: the and Korea Division (S2B) with 28% of the reported incidents, the International Security Issues Division (S2C) with 23% of the reported incidents, and the China, and the Office of Middle East & Africa (S2E) with 21% of the incidents. As compared to 4QCY11, this resulted in an increase of 16% for S2B, a reduction of 35% for S2C, and an increase of 9% for S2E. The number of incidents reported by the remaining seven Product Lines held relatively steady from 4QCY11 to 1QCY12. Page 9 of 13
10 () () Figure 9: 1QCY12 S2 Incidents by Product Line 4% 3% 2% 21% 8% 8% 4% 23% 28% Total: 772 S2A S2B S2C S2D S2E S2F S2G S2H S2I S2J () () Figures 10a-b illustrates the operator related (Figure 10a) and system related (Figure 10b) root causes associated with the 772 incidents reported by S2. 30% of the incidents were due to operator related errors that resulted in an incident. 70% of the incidents were due to system related issues that resulted in an incident. () Figure 10a: 1QCY12 S2 Incidents Operator Related Root Causes () 1% 4% Human Error 71 70% 30% 29% 35% 31% Information Resources Lack of Due Diligence Personnel Resources 2 Training&Guidance 9 Total: 230 () () 30% of the S2-reported incidents during 1QCY12 are attributed to Operator Error as the root cause, and involved: Resources (i.e., inaccurate or insufficient research information and/or workload issues, and personnel resource issues) (82); Page 10 of 13
11 Human error (i.e., selector mistypes, incorrect realm, or improper query) (71); Lack of due diligence (i.e., failure to follow standard operating procedures) (68); and Training and guidance (i.e., training issues) (9). () Analysis found that analysts could reduce the number of incidents if there was more comprehensive research information available at the time of tasking as well as through better use of defeats, more careful review of data entry to avoid typographical errors and omissions, and by following SOPs more consistently. () () Figure 10b: 1QCY12 S2 Incidents System Related Root Causes < 1% 70% 30% 99% System Engineering 1 System Limitations 541 Total: 542 () () 70% of the S2-reported incidents during 1QCY12 are attributed to system issues as the root cause, and involved: System limitations (i.e., system lacks the capability to push real-time travel data out to analysts, system/device unable to detect changes in user) (541); and System engineering (i.e., data tagging, configuration, design flaws, etc.) (1). (TS//SI//REL TO USA, FVEY) System Limitations, the largest percentage of System Error root cause, can be attributed to situations where a valid foreign target is found roaming in the United States without indication in raw traffic. III. (U) Significant Incidents of Non-compliance (TS//SI//NF) Business Record (BR) FISA. As of 16 February 2012, NSA determined that approximately 3,032 files containing call detail records potentially collected pursuant to prior BR Orders were retained on a server and been collected more than five years ago in violation of the 5-year retention period established for BR collection. Specifically, these files were retained on a server used by technical personnel working with the Business Records metadata to maintain documentation of provider feed data formats and performed background analysis to document why certain contain chaining rules were created. In addition to the BR Page 11 of 13
12
13
TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND
All redacted information exempt under (b)(1) and (b) (3) except as otherwise noted. JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND ASSOCIATE DEPUTY DIRECTOR
UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C.
TOP 8ECRET//COMJNTt/NOFOR..~ UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C. IN RE APPLICATION OF THE FEDERAL BUREAU OF INVESTIGATION FOR AN ORDER REQUIRING THE PRODUCTION IB TH
Improved Business Process Through XBRL: A Use Case for Business Reporting
Improved Business Process Through : A Use Case for Business Reporting CONTENTS PAGE FOREWORD. 3 THE PROBLEM: SIGNIFICANT REPORTING AND BUSINESS PROCESS CHALLENGES FACING BANKING REGULATORS... 4 THE RESULTS:
National Security Agency
National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Industrial Cyber Security Risk Industrial Attacks Continue to Increase in Frequency & Sophistication Today, industrial organizations
Managed Objects Service Configuration Management
Managed Objects Service Configuration Management >> Table of Contents INTRODUCTION 1 BACKGROUND 1 SERVICE MANAGEMENT 3 SERVICE CONFIGURATION 4 BENEFITS 6 SUMMARY 6 MANAGED OBJECTS - SERVICE CONFIGURATION
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE
JOINT STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE STUART J. EVANS DEPUTY ASSISTANT ATTORNEY GENERAL FOR INTELLIGENCE NATIONAL SECURITY DIVISION DEPARTMENT
White Paper April 2006
White Paper April 2006 Table of Contents 1. Executive Summary...4 1.1 Scorecards...4 1.2 Alerts...4 1.3 Data Collection Agents...4 1.4 Self Tuning Caching System...4 2. Business Intelligence Model...5
l\j UDI1, I. (U) PURPOSE
l\j UDI1, MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE NATIONAL SECURITY SECURITY SERVICE AND THE ISRAELI SIGINT NATIONAL UNIT (ISNU) PERTAINING TO THE PROTECTION OF U.S. PERSONS I. (U) PURPOSE 3. This
Automated Firewall Change Management. Ensure continuous compliance and reduce risk with secure change management workflows
Automated Firewall Change Management Ensure continuous compliance and reduce risk with secure change management workflows JANUARY 2015 Executive Summary Firewall management has become a hot topic among
ITIL, the CMS, and You BEST PRACTICES WHITE PAPER
ITIL, the CMS, and You BEST PRACTICES WHITE PAPER Table OF CONTENTS executive Summary............................................... 1 What Is a CMS?...................................................
CISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS CISM ITEM DEVELOPMENT GUIDE Content Page Purpose of the CISM Item Development Guide 2 CISM Exam Structure 2 Item Writing Campaigns 2 Why Participate as a CISM
LANDesk Service Desk Certified in All 15 ITIL. v3 Suitability Requirements. LANDesk demonstrates capabilities for all PinkVERIFY 3.
LANDesk Service Desk LANDesk Service Desk Certified in All 15 ITIL v3 Suitability Requirements PinkVERIFY is an objective software tool assessment service that validates toolsets that meet a set of functional
EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE
EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE A reliable, high-performance network is critical to your IT infrastructure and organization. Equally important to network performance
HIPAA Compliance Evaluation Report
Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Five Fundamental Data Quality Practices
Five Fundamental Data Quality Practices W H I T E PA P E R : DATA QUALITY & DATA INTEGRATION David Loshin WHITE PAPER: DATA QUALITY & DATA INTEGRATION Five Fundamental Data Quality Practices 2 INTRODUCTION
IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet
IBM PowerSC Security and compliance solution designed to protect virtualized datacenters Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
SAP Solution Brief SAP Technology SAP IT Infrastructure Management. Unify Infrastructure and Application Lifecycle Management
SAP Brief SAP Technology SAP IT Infrastructure Management Objectives Unify Infrastructure and Application Lifecycle Management Supercharge your IT infrastructure Supercharge your IT infrastructure What
Department of Homeland Security
Implementation Status of EINSTEIN 3 Accelerated OIG-14-52 March 2014 Washington, DC 20528 / www.oig.dhs.gov March 24, 2014 MEMORANDUM FOR: FROM: SUBJECT: Bobbie Stempfley Acting Assistant Secretary Office
WHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Report on. 2009 Inspection of PricewaterhouseCoopers LLP. Public Company Accounting Oversight Board
1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8433 www.pcaobus.org Report on 2009 (Headquartered in New York, New York) Issued by the Public Company Accounting
Microsoft SharePoint: A Powerful Solution for Environmental Health and Safety Programs
Microsoft SharePoint: A Powerful Solution for Environmental Health and Safety Programs Prepared By: Robert Foster, M.S. Environmental Health & Engineering, Inc. Environmental Health & Safety (EHS) programs,
I D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T Capitalizing on the Future with Data Solutions December 2015 Adapted from IDC PeerScape: Practices for Ensuring a Successful Big Data and Analytics Project,
RUNNING A HELPDESK CONTENTS. using HP Web Jetadmin
RUNNING A HELPDESK using HP Web Jetadmin CONTENTS Overview... 2 Helpdesk examples... 2 Viewing devices... 2 Quick Device Discovery... 3 Search... 3 Filters... 3 Columns... 4 Device Groups... 4 Troubleshooting
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
UNLOCK YOUR IEC 61850 TESTING EXCELLENCE
IMPROVE EFFICIENCY TEST WITH CONFIDENCE OF KNOW-HOW LEARN AND EXPAND YOUR IEC 61850 SKILLS MASTER YOUR NETWORK KNOWLEDGE GENERATE TEST RESULTS UNLOCK YOUR IEC 61850 TESTING EXCELLENCE Connect To & Read
Deltek Touch Time & Expense for GovCon. User Guide for Triumph
Deltek Touch Time & Expense for GovCon User Guide for Triumph November 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or
Sonatype CLM Server - Dashboard. Sonatype CLM Server - Dashboard
Sonatype CLM Server - Dashboard i Sonatype CLM Server - Dashboard Sonatype CLM Server - Dashboard ii Contents 1 Introduction 1 2 Accessing the Dashboard 3 3 Viewing CLM Data in the Dashboard 4 3.1 Filters............................................
Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.
Security management solutions White paper IBM Tivoli and Consul: Facilitating security audit and March 2007 2 Contents 2 Overview 3 Identify today s challenges in security audit and compliance 3 Discover
Understanding changes to the Trust Services Principles for SOC 2 reporting
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding changes to the Trust Services Principles for SOC 2 reporting
A blueprint for an Enterprise Information Security Assurance System. Acuity Risk Management LLP
A blueprint for an Enterprise Information Security Assurance System Acuity Risk Management LLP Introduction The value of information as a business asset continues to grow and with it the need for effective
The ITIL v.3. Foundation Examination
The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 3, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.
(U) TABLE OF CONTENTS
TOP SECRETIISTLW//COMINT/ORCONINOFORN OFFICE OF THE INSPECTOR GENERAL NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE 24 March 2009 (U) TABLE OF CONTENTS I. (U) INTRODUCTION:... 1 II. REVIEW CATEGORIES...
Pursuant to section 1.7(i) of Executive Order 12333, as amended, the FBI is authorized to:
PRESIDENTIAL POLICY DIRECTIVE 28 POLICIES AND PROCEDURES I. Introduction Presidential Policy Directive 28 regarding signals intelligence activities (hereinafter PPD-28 ), issued January 17, 2014, articulates
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Hanh Do, Director, Information System Audit Division, GAA. SUBJECT: Review of HUD s Information Technology Contingency Planning and Preparedness
Issue Date: August 31, 2006 Audit Report Number 2006-DP-0005 TO: Lisa Schlosser, Chief Information Officer, A FROM: Hanh Do, Director, Information System Audit Division, GAA SUBJECT: Review of HUD s Information
2016 OCR AUDIT E-BOOK
!! 2016 OCR AUDIT E-BOOK About BlueOrange Compliance: We specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that
V1.0 - Eurojuris ISO 9001:2008 Certified
Risk Management Manual V1.0 - Eurojuris ISO 9001:2008 Certified Section Page No 1 An Introduction to Risk Management 1-2 2 The Framework of Risk Management 3-6 3 Identification of Risks 7-8 4 Evaluation
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
Increase Revenues with Channel Sales Management
Increase Revenues with Channel Sales Management Executive Summary Why is it so difficult to grow revenue, identify emerging customers and partners, and expand into new markets through the indirect sales
Security Compliance and Data Governance: Dual problems, single solution CON8015
Security Compliance and Data Governance: Dual problems, single solution CON8015 David Wolf Director of Product Management Oracle Development, Enterprise Manager Steve Ries Senior Systems Architect Technology
for SharePoint Analytics SharePoint 2013 Spaces Data Sheet Webtrends Data Sheet SharePoint 2013. 2016 Webtrends, Inc.
Analytics SharePoint 2013 Spaces for SharePoint Data Sheet Analytics for SharePoint SharePoint 2013 Spaces Use Webtrends Analytics to get a clear picture of how SharePoint 2013 is being used at your organization
Some Key (SSO) Cyber Milestone Dates Since Fall 2005
> > > > > > > > > > > > > > > > > > > > > TOP SECRET//SI//NOFORN Some Key (SSO) Cyber Milestone Dates Since Fall 2005 2006 - DNI Processing 622 Mbps. Spring (?) 2007 - Comprehensive National Cybersecurity
ProSAFE 8-Port and 16-Port Gigabit Click Switch
ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.
BREACH NOTIFICATION FOR UNSECURED PROTECTED HEALTH INFORMATION
BREACH NOTIFICATION FOR UNSECURED PROTECTED HEALTH INFORMATION Summary November 2009 On August 24, 2009, the Department of Health and Human Services (HHS) published an interim final rule (the Rule ) that
Intelligent Process Management & Process Visualization. TAProViz 2014 workshop. Presenter: Dafna Levy
Intelligent Process Management & Process Visualization TAProViz 2014 workshop Presenter: Dafna Levy The Topics Process Visualization in Priority ERP Planning Execution BI analysis (Built-in) Discovering
How To Choose A Business Intelligence Toolkit
Background Current Reporting Challenges: Difficulty extracting various levels of data from AgLearn Limited ability to translate data into presentable formats Complex reporting requires the technical staff
GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS
GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS A White Paper by i2c, Inc. 1300 Island Drive Suite 105 Redwood City, CA 94065 USA +1 650-593-5400 [email protected] www.i2cinc.com Table of
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
Test du CISM. Attention, les questions, comme l'examen, ne sont disponibles qu'en anglais.
Test du CISM Attention, les questions, comme l'examen, ne sont disponibles qu'en anglais. 1. Which of the following would BEST ensure the success of information security governance within an organization?
EURIBOR - CODE OF OBLIGATIONS OF PANEL BANKS
D2725D-2013 EURIBOR - CODE OF OBLIGATIONS OF PANEL BANKS Version: 1 October 2013 1. Objectives The European Money Markets Institute EMMI previously known as Euribor-EBF, as Administrator for the Euribor
Embracing Microsoft Vista for Enhanced Network Security
Embracing Microsoft Vista for Enhanced Network Security Effective Implementation of Server & Domain Isolation Requires Complete Network Visibility throughout the OS Migration Process For questions on this
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
MAILGUARD, WEBGUARD AND EMAIL ARCHIVING SERVICE SCHEDULE
MAILGUARD, WEBGUARD AND EMAIL ARCHIVING SERVICE SCHEDULE 1. APPLICABILITY This Service Schedule is applicable only to the COF for the purchase of Mail Guard, Web Guard and Mail Archiving Services, to the
Guidance on Risk Analysis Requirements under the HIPAA Security Rule
Guidance on Risk Analysis Requirements under the HIPAA Security Rule Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
Maintenance Station Software Suite
January 2013 Page 1 You can easily engineer and operate your process automation system from the Maintenance Station, Graphical view and annunciation of intelligent device alerts Fieldbus and HART Powerful
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Annex B. The Proposed Amendments AMENDMENTS TO NATIONAL INSTRUMENT 21-101 MARKETPLACE OPERATION
Annex B The Proposed Amendments AMENDMENTS TO NATIONAL INSTRUMENT 21-101 MARKETPLACE OPERATION 1. National Instrument 21-101 Marketplace Operation is amended by this Instrument. 2. National Instrument
Dell OpenManage Mobile Version 1.4 User s Guide (Android)
Dell OpenManage Mobile Version 1.4 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION
Northcraft Analytics. Overview
Northcraft Analytics Overview Metrics Discovery Advanced Analytical Capabilities Simple for Anyone Unlimited User Licenses Quick Implementation 2 Why Northcraft? What s in the catalog? Metrics Catalog
Lesson 4 What Is a Plant s Life Cycle? The Seasons of a Tree
Lesson 4 What Is a Plant s Life Cycle? The Seasons of a Tree STUDENT SKILLS: predicting, communicating prior observations and knowledge, listening, cooperating, observing, sequencing, communicating, reasoning,
REPORT 2016/066 INTERNAL AUDIT DIVISION. Audit of management of technical cooperation projects in the Economic Commission for Africa
INTERNAL AUDIT DIVISION REPORT 2016/066 Audit of management of technical cooperation projects in the Economic Commission for Africa Overall results relating to the effective management of technical cooperation
Schenectady City School. Request for Proposal for Website Design and Content Management System RFP #0620 16
Schenectady City School District Request for Proposal for Website Design and Content Management System RFP #0620 16 Proposals to be received: Time: 9am Date: June 20, 2016 Place: Schenectady City School
Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute
Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name
A Marketer's Guide. to Facebook Metrics
A Marketer's Guide to Facebook Metrics 2 Whether you ve invested big in social or are starting to consider a new strategy for 2014, one of the key aspects to think about is social media metrics - namely
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
End-to-end Field Service Management
End-to-end Field Service Management Building end-to-end field service management solutions around your unique business processes Customer Self-Service Service Desk Software Workforce Scheduling Mobile
Job Management Software. Integrated Job Management Solution for Sage 100 ERP
Job Management Software Integrated Job Management Solution for Sage 100 ERP Getting The Job Done Right One Business Solution When your business data is housed in disparate systems, efficiency plummets
Position Classification Standard for Management and Program Clerical and Assistance Series, GS-0344
Position Classification Standard for Management and Program Clerical and Assistance Series, GS-0344 Table of Contents SERIES DEFINITION... 2 EXCLUSIONS... 2 OCCUPATIONAL INFORMATION... 3 TITLES... 6 EVALUATING
SQF 2000 Guidance. Guidance for Developing, Documenting and Implementing SQF 2000 Systems for General Food Processing. 6th Edition NOVEMBER 2008
SQF 2000 for Developing, Documenting and Implementing SQF 2000 Systems for General Food Processing 6th Edition NOVEMBER 2008 Safe Quality Food Institute 2345 Crystal Drive, Suite 800 Arlington, VA 22202
ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists
Incident ITSM Maturity Model 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident process exists Incident policies governing incident Incident urgency, impact and priority
HP Virtualization Performance Viewer
HP Virtualization Performance Viewer Efficiently detect and troubleshoot performance issues in virtualized environments Jean-François Muller - Principal Technical Consultant - [email protected] HP Business
