Performance Audit of the San Diego Convention Center s Information Technology Infrastructure JULY 2012
|
|
|
- Kenneth Bridges
- 10 years ago
- Views:
Transcription
1 Performance Audit of the San Diego Convention Center s Information Technology Infrastructure JULY 2012 Audit Report Office of the City Auditor City of San Diego
2 This Page Intentionally Left Blank
3 July 19, 2012 Carol Wallace, President and Chief Executive Officer San Diego Convention Center Transmitted herewith is an audit report on the San Diego Convention Center s IT Infrastructure. We have completed this report as requested by the Convention Center. This report is presented in accordance with City Charter Section Management s response to the report is presented on page 8. We would like to thank the Convention Center s staff for their assistance and cooperation during this audit. All of their valuable time and efforts spent providing us information is greatly appreciated. The audit staff responsible for this audit report are Stephen Gomez, Toufic Tabshouri, and Chris Constantin. Respectfully submitted, Eduardo Luna City Auditor cc: City of San Diego Audit Committee Members OFFICE OF THE CITY AUDITOR 1010 SECOND AVENUE, SUITE 1400 SAN DIEGO, CA PHONE (619) FAX (619) TO REPORT FRAUD, WASTE, OR ABUSE, CALL OUR FRAUD HOTLINE (866)
4 This Page Intentionally Left Blank
5 Table of Contents Introduction 1 Objectives, Scope, and Methodology 2 Audit Results 3 SDCC Has Reduced Internal IT Risks Through Outsourcing 3 Conclusion 7 Management s Comments 8
6 This Page Intentionally Left Blank
7 Introduction The City Auditor s Office (OCA) conducted a performance audit of the San Diego Convention Center s (SDCC) information technology network infrastructure. We performed this audit at the request of SDCC and in accordance with the terms of a Service Level Agreement with SDCC. This audit was the first of four potential audits identified by a high-level risk assessment that we had previously performed for SDCC. The purpose of this audit was to evaluate some of the primary risk areas in SDCC s information technology (IT) environment. Those risk areas are: 1. IT infrastructure operations and security; 2. The financial system; 3. The outsourced human resources system contract; and 4. The management of IT system implementations; specifically, the implementation of the customer relationship management system. OCA Page 1
8 Objectives, Scope, and Methodology Our main audit objective was to identify security and operational risks to SDCC s IT infrastructure. We performed a risk assessment of SDCC s IT environment, including a high-level review of the main applications, operating systems, and network infrastructure. We performed a more detailed assessment SDCC s infrastructure security and operations. We reviewed SDCC s IT infrastructure as of June 14, We conducted this performance audit in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. OCA Page 2
9 Audit Results SDCC Has Reduced Internal IT Risks Through Outsourcing Our audit did not have any significant findings, but we noted several opportunities for improving IT controls and enhancing IT security. We evaluated existing IT practices at SDCC against established professional guidelines for IT management. 1 The main reason why we did not find any significant issues is that SDCC has pursued a strategy of outsourcing its high-risk IT functions, including its human resources system and the IT maintenance and support for its financial system. While SDCC has lowered its in-house risks through outsourcing, we identified some minor issues that SDCC management should address to further improve network security regarding IT documentation, segregation of duties, and network activity logs. SDCC Has Limited Governing Documentation for Information Technology Security Policy We noted several opportunities for creating or improving existing IT documentation. Documentation of policies is important for several reasons. The first is that documentation serves to preserve institutional knowledge, which is crucial in the event of employee turnover. The second reason is that policy review and approval by management educates management on information technology issues and provides them an opportunity to shape the policies. Lastly, having formal policies facilitates the enforcement of good security practices across the organization. The Information Systems Department (IS Department) has created a security policy, but this policy is not dated and has not been formally approved by SDCC management. Professional guidance on IT policies recommends that policies be approved by management and dated. Dating policies is important in order to facilitate tracking effective policy dates, changes, and revisions. Furthermore a review of the record of changes provides insight into the frequency at which policies are being 1 Most of our audit criteria were derived from Control Objectives for Information and Related Technologies (COBIT), which is a framework for IT governance and management published by the Information Systems Audit and Control Association (ISACA). OCA Page 3
10 updated to meet the changing needs of an organization. This is particularly important in information technology, where change is constant. Security Strategy SDCC does not have a documented security strategy. Professional guidance recommends the creation of a security strategy to insure that threats to information have been identified, that risks have been evaluated, and that the organization has either accepted these risks or taken measures to prevent or mitigate them. Key Daily Operations For the same reasons of knowledge management mentioned earlier, all required tasks pertaining to the daily IT operations of SDCC should be documented. Examples of these tasks include the activities of the network engineer, such as monitoring network traffic, ensuring backup runs are performed, updating and patching servers and desktops, reviewing network logs, and trending issues and problems to identify common causes. Server States Although SDCC servers are now virtualized, 2 the information technology function should still provide documentation on the state of key servers such as the ones that operate the financial system and store nightly backups. Such information includes a listing of all the software that is installed on the server, special or specific configuration settings, and the services (such as programs that run in the background) that run on it. Server state documentation entails an allow list showing which services are permitted to run and which are run. This documentation is important to enable verification that a server is configured correctly and not running unauthorized programs. Additional Segregation of Information Technology Functions Can Enhance Controls Segregation of duties is an important control principle that reduces the likelihood that a single employee can hijack critical processes and make changes without approval or detection. Small IS Departments normally find it difficult to implement checks by segregating high-risk employee duties, because they do not have not enough employees to share the work. The SDCC IS Department employs one senior network engineer who 2 Virtualization is a trend in information technology management that utilizes software to present the appearance of discrete pieces of hardware to computer users. In reality, there is no separate physical hardware component. Virtualization is popular because it reduces hardware purchase costs facilitates management of various IT processes. OCA Page 4
11 supervises two junior staffers, all of whom have the same level of access to SDCC systems. The Department has taken steps to mitigate risk by outsourcing critical functions such as IT support for SDCC s financial system. However, the Department should take additional measures and implement compensating controls and alerts. For example, backup of network activity is currently performed by the network engineer. To improve controls, periodic testing and restoration of the backups should be performed by one of the junior employees to ensure the backup systems work. The IS Department should document all critical processes such as backup, server updates, security monitoring, and then attempt to assign responsibility for each process to more than one employee. Full segregation of duties is not a realistic goal, since employees in small departments are cross trained and need access to perform the duties of other employees who are on leave or otherwise unavailable. In such cases, however, critical or high risk activities should be logged in a secure location and reviewed by the IS Director on a regular basis. Network Activity Logs Operate At Default Settings The logging of network activity at SDCC has been left at default server settings, and the retention period for logs is at the default setting as well. Professional guidance indicates that logging should be tailored to environmental risks in order to capture important events and minimize the amount of data that is logged. Minimizing logged data is important because large log files are difficult to review and consequently less likely to be reviewed. Logging activities can be further divided into security and troubleshooting logs, based on the particular activity or event. Examples of events that should be logged are remote access logins (especially outside normal business hours) and logins to the financial system. The logs should include enough information to be useful for security analysis, containing information such as the user who logged in, systems accessed, and core activities while accessing these systems. In addition, log files should be stored in a restricted location. Where possible, Segregation of Duties should be enforced for the access to the logs, where the IT personnel responsible for performing certain high risk activities should not monitor that activity or have the ability to modify the logs. At this time, all IT OCA Page 5
12 employees have access to the activity logs, which are stored locally and appear to be geared more for troubleshooting than for security. In addition to establishing the optimal logging activity for SDCC, the logs should be reviewed on a regular basis and the appropriate monitoring reports should be created. If a log is not monitored or used, it should not be activated as it is only consuming resources without a benefit. Monitoring activities is an important element of network security to insure that highrisk events are reviewed by the appropriate IT personnel. OCA Page 6
13 Conclusion We would like to thank SDCC and the IS Department staff for their help on this audit; we could not have conducted our audit in such a short timeframe without their assistance. Our suggestions for improvement involve documenting current practices and enhancing certain control and monitoring activities. Implementing those suggestions will improve the security of network operations, and bring SDCC practices in line with professional guidelines. We look forward to working with you in the future. OCA Page 7
14 Management s Comments The San Diego Convention Center Corporation s management would like to thank the City Auditors for their thorough audit of our information systems technology infrastructure. We are certainly pleased that the audit did not have any significant findings. Based on the auditor s recommendations, the Information Systems (IS) department will take to opportunity to make enhancements in the following areas. Information Technology documentation for the security policy, security strategy, and daily operations will be enhanced in order to preserve institutional knowledge. Regarding server state, since Microsoft Windows Server 2008 R2 is based on least access roles. We only install the role or roles necessary for an application or service to operate correctly and we currently separate applications by assigning them to a unique virtual server. We have created a server and application list which will be used as a baseline. We can then compare any new services or applications to the baseline and ensure that any changes are identifiable. Additional Segregation of Information Technology Functions has been achieved due to a recent staffing change that allowed the IS department to segregate the information technology functions. Network Activity Logs Operating at Default Settings: The network activity logs produced by the Microsoft 2008 R2 operating system although set at its default level are appropriate for the high level of post event activity that the IS department has deemed necessary in order to investigate server issues. The logs will continue to be monitored on a daily basis by the network engineer and all critical or high risk activities will continue to be reviewed by the IS Director. Again thank you and we look forward to working with you again in the future. OCA Page 8
Performance Audit of the San Diego Convention Center s HR Systems AUGUST 2014
Performance Audit of the San Diego Convention Center s HR Systems HUMAN RESOURCES SOFTWARE AS A SERVICE SYSTEM RISKS ARE APPROPRIATELY MITIGATED AUGUST 2014 Audit Report Office of the City Auditor City
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance
Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance Table of Contents 3 10 Essential Steps 3 Understand the Requirements 4 Implement IT Controls that Affect your
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
Managed Services. Business Intelligence Solutions
Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services
OFFICE OF AUDITS & ADVISORY SERVICES SHAREPOINT SECURITY AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES SHAREPOINT SECURITY AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Senior Audit Manager: Lynne Prizzia, CISA, CRISC Senior
5 Reasons Your Business Needs Network Monitoring
5 Reasons Your Business Needs Network Monitoring Intivix.com (415) 543 1033 5 REASONS YOUR BUSINESS NEEDS NETWORK MONITORING Your business depends on the health of your network for office productivity.
Audit of NRC s Network Security Operations Center
Audit of NRC s Network Security Operations Center OIG-16-A-07 January 11, 2016 All publicly available OIG reports (including this report) are accessible through NRC s Web site at http://www.nrc.gov/reading-rm/doc-collections/insp-gen
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
Security aspects of e-tailing. Chapter 7
Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing
Security for NG9-1-1 SYSTEMS
The Next Generation of Security for NG9-1-1 SYSTEMS The Challenge of Securing Public Safety Agencies A white paper from L.R. Kimball JANUARY 2010 866.375.6812 www.lrkimball.com/cybersecurity L.R. Kimball
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
BKDconnect Security Overview
BKDconnect Security Overview 1 Introduction 1.1 What is BKDconnect 1.2 Site Creation 1.3 Client Authentication and Access 2 Security Design 2.1 Confidentiality 2.1.1 Least Privilege and Role Based Security
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Prepared by: OIC OF SOUTH FLORIDA. May 2013
OIC OF SOUTH FLORIDA REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by OIC of South Florida for Information Technology Support Services. Interested vendors should
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Enhanced Configuration Controls and Management Policies Can Improve USCG Network Security (Redacted) Notice: The Department of Homeland Security,
SANS Institute First Five Quick Wins
#1 QUICK WIN- APPLICATION WHITELISTING SANS Critical Controls: #2: Inventory of Authorized and Unauthorized Software 1) Deploy application whitelisting technology that allows systems to run software only
CounselorMax and ORS Managed Hosting RFP 15-NW-0016
CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting
Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
Information and Communication Technology. Firewall Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
10 Steps to Establishing an Effective Email Retention Policy
WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION
Information Technology Services
Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
PeopleSoft IT General Controls
PeopleSoft IT General Controls Performance Audit December 2009 Office of the Auditor Audit Services Division City and County of Denver Dennis J. Gallagher Auditor The Auditor of the City and County of
Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.
Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.
Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m. Topics: Explain why it is important for firms of all sizes to address cybersecurity risk. Demonstrate awareness
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Guidance for Industry Computerized Systems Used in Clinical Investigations
Guidance for Industry Computerized Systems Used in Clinical Investigations U.S. Department of Health and Human Services Food and Drug Administration (FDA) Office of the Commissioner (OC) May 2007 Guidance
Hardware Inventory Management Greater Boston District
Hardware Inventory Management Greater Boston District Audit Report Report Number IT-AR-15-004 March 25, 2015 Highlights Management does not have an accurate inventory of hardware assets connected to the
Summary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
CYBER SECURITY POLICY For Managers of Drinking Water Systems
CYBER SECURITY POLICY For Managers of Drinking Water Systems Excerpt from Cyber Security Assessment and Recommended Approach, Final Report STATE OF DELAWARE DRINKING WATER SYSTEMS February 206 Kash Srinivasan
¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India
CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )
Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Overview: The Bring Your Own Device (BYOD) program allows employees to use their own computing
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB 2014-05. Cyber Risk Management Guidance. Purpose
FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB 2014-05 Cyber Risk Management Guidance Purpose This advisory bulletin provides Federal Housing Finance Agency (FHFA) guidance on cyber risk management.
Department of Public Utilities Customer Information System (BANNER)
REPORT # 2010-06 AUDIT of the Customer Information System (BANNER) January 2010 TABLE OF CONTENTS Executive Summary..... i Comprehensive List of Recommendations. iii Introduction, Objective, Methodology
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
PC Proactive Solutions Technical View
PC Proactive Solutions Technical View PC Proactive Solutions Technicians View The following pages briefly describe our technicians view of our proactive management utility. Our software application is
Corporate Leadership Council Metrics
for the Corporate Leadership Council Metrics Contact Point Chris Cejka Director, Strategic Planning and Evaluation Division Human Capital Innovation Office of the Chief Human Capital Officer Department
Securing Oracle E-Business Suite in the Cloud
Securing Oracle E-Business Suite in the Cloud November 18, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda The
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
Information and Communication Technology. Patch Management Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
June 2008 Report No. 08-038. An Audit Report on The Department of Information Resources and the Consolidation of the State s Data Centers
John Keel, CPA State Auditor An Audit Report on The Department of Information Resources and the Consolidation of the State s Data Centers Report No. 08-038 An Audit Report on The Department of Information
Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance
WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Next. CDS 2015 Survey Module 7 Information Security Survey Errata
1 CDS 2015 Survey Survey Errata This module includes questions about the IT security organization, staffing, policies, and practices related to information technology security. This is an optional module.
Remote Infrastructure Support Services & Managed IT Services
Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology
l Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology Overview The final privacy rules for securing electronic health care became effective April 14th, 2003. These regulations require
SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA
SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...
Next. CDS 2015 Survey Module 7 Information Security Survey Errata
CDS 2015 Survey Survey Errata This module includes questions about the IT security organization, staffing, policies, and practices related to information technology security. This is an optional module.
Version: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
Firewall Change Management
White Paper 2010 Firewall Change Management Improve IT Efficiency by Automating Firewall Change Workflow Processes w w w.sk yboxsecurity.com Executive Summary Firewall management has become a hot topic
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.com 844-644-4600 This publication describes the implications of HIPAA (the Health
Tailored Technologies LLC
685 Third Avenue New York, NY 10017 Tel: (212) 503-6300 Fax: (212) 503-6312 Date: January 9, 2014 To: The Audit File of the Hugh L. Carey Battery Park City Authority From: Tailored Technology Observations
Austin Fire Department Worker Safety Audit
City of Austin AUDIT REPORT A Report to the Austin City Council Mayor Lee Leffingwell Mayor Pro Tem Sheryl Cole Austin Fire Department Worker Safety Audit Council Members Chris Riley Mike Martinez Kathie
Table of Contents. 2015 Cicero, Inc. All rights protected and reserved.
Desktop Analytics Table of Contents Contact Center and Back Office Activity Intelligence... 3 Cicero Discovery Sensors... 3 Business Data Sensor... 5 Business Process Sensor... 5 System Sensor... 6 Session
Southern Law Center Law Center Policy #IT0004. Title: Email Policy
Southern Law Center Law Center Policy #IT0004 Title: Email Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/2012 1.0 Purpose: To provide members of
Namibia Internal Audit Survey
Namibia Internal Audit Survey October 2014 www.kpmg.com/na 1 Foreword KPMG in Namibia is proud to have conducted the first Internal Audit survey featuring only Namibian entities. This study aims to obtain
The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation
The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation Copyright, AlgoSec Inc. All rights reserved The Need to Ensure Continuous Compliance Regulations
Foundstone ERS remediation System
Expediting Incident Response with Foundstone ERS Foundstone Inc. August, 2003 Enterprise Risk Solutions Platform Supports Successful Response and Remediation Introduction The Foundstone Enterprise Risk
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
