Governance Simplified
|
|
|
- Amberlynn Wells
- 10 years ago
- Views:
Transcription
1 Information Security Governance Simplified From the Boardroom to the Keyboard TODD FITZGERALD, cissp; cisa, cism Foreword by Tom Peltier CRC Press Taylor & Francis Croup Boca Raton London NewYork CRC Press is an imprint of the Taylor & Francis Croup, an Informs business AN AUERBACH BOOK
2 Contents Foreword Acknowledgments Introduction About the Author xvii xxi xxiii xxvii Chapter 1 Getting Information Security Right:Top to Bottom 1 Information Security Governance 2 Tone at the Top 5 Tone at the Bottom 5 Governance, Risk, and Compliance (GRC) 6 The Compliance Dilemma 7 Suggested Reading 10 Chapter 2 Developing Information Security Strategy 11 Evolution ofinformation Security Organization Historical Perspective 16 Fear, Uncertainty, Doubt, Fear, Uncertainty, Doubt 16 Understand the External Environment 17 Regulatory 17 Competition 18 Emerging Threats 19 Technology Cost Changes 19 External Independent Research 20 The Internal Company Culture 20 Risk Appetite 21 Speed 22 IS VII
3 VIII CONTENTS Collaborative versus Authoritative 22 Trust Level 23 Growth Seeker or Cost Cutter 24 Company Size 25 Outsourcing Posture 25 Prior Security Incidents, Audits 26 Security Strategy Development Techniques 28 Mind Mapping 28 SWOT Analysis 30 Balanced Scorecard 32 Face-to-Face Interviews 32 Security Planning 34 Strategic 34 Tactical 35 Operational/Project Plans 35 Suggested Reading 36 Chapter 3 Defining the Security Management Organization 37 History of the Security Leadership Role Is Relevant 37 The New Security Officer Mandate 40 Day 1: Hey, I Got the Job! 41 Security Leader Titles 42 Techie versus Leader 43 The Security Leaders Library 44 Security Leadership Defined 45 Security Leader Soft Skills 46 Seven Competencies for Effective Security Leadership 46 Security Functions 52 Learning from Leading Organizations 52 Assess Risk and Determine Needs 53 Implement Policies and Controls 54 Promote Awareness 56 Monitor and Evaluate 56 Central Management 56 What Functions Should the Security Officer Be Responsible For? 57 Assessing Risk and Determining Needs Functions 58 Risk Assessment/Analysis 58 Systems Security Plan Development 59 External Penetration Testing 60 Implement Policies and Control Functions 61 Security Policy Development 61 Security Architecture 61 Security Control Assessment 62
4 CONTENTS IX Identity and Access Management 62 Business Continuity and Disaster Recovery 63 Promote Awareness Functions 64 End User Security Awareness Training 64 Intranet Site and Policy Publication 65 Targeted Awareness 65 Monitor and Evaluate Functions 65 Security Baseline Configuration Review 66 Logging and Monitoring 67 Vulnerability Assessment 67 Internet Monitoring/Management of Managed Services 68 Incident Response 68 Forensic Investigations 69 Central Management Functions 69 Reporting Model 70 Business Relationships 71 Reporting to the CEO 71 Reporting to the Information Systems Department 72 Reporting to Corporate Security 72 Reporting to the Administrative Services Department 73 Reporting to the Insurance and Risk Management Department 73 Reporting to the Internal Audit Department 74 Reporting to the Legal Department 74 Determining the Best Fit 75 Suggested Reading 75 Chapter 4 Interacting with the C-Suite 77 Communication between the CEO, CIO, Other Executives, and CI SO "Lucky" Questions to Ask One Another 80 The CEO, Ultimate Decision Maker 81 The CEO Needs to KnowWhy 87 The CIO, Where Technology Meets the Business 87 CIO's Commitment to Security Is Important 94 The Security Officer, Protecting the Business 95 The CEO, CIO, and CISO Are Business Partners 100 Building Grassroots Support through an Information Security Council 101 Establishing the Security Council 101 Oversight of Security Program 103 Decide on Project Initiatives 103 Prioritize Information Security Efforts 103 Review and Recommend Security Policies 103 Champion Organizational Security Efforts 104 Recommend Areas Requiring Investment 104
5 X CONTENTS Appropriate Security Council Representation 104 "-Ingmg" the Council: Forming, Storming, Norming, and Performing 107 Forming 107 Storming 108 Norming 108 Performing 109 Integration with Other Committees 109 Establish Early, Incremental Success 111 Let Go of Perfectionism 112 Sustaining the Security Council 113 End User Awareness 114 Security Council Commitment 116 Suggested Reading 117 Chapter 5 Managing Risk to an Acceptable Level 119 Risk in Our Daily Lives 120 Accepting Organizational Risk 121 JustAnother Set of Risks 122 Management Owns the Risk Decision 122 Qualitative versus Quantitative Risk Analysis 123 Risk Management Process 124 Risk Analysis Involvement 124 Step 1: Categorize the System 125 Step 2: Identify Potential Dangers (Threats) 128 Human Threats 128 Environmental/Physical Threats 128 Technical Threats 129 Step 3: Identify Vulnerabilities That Could Be Exploited 129 Step 4: Identify Existing Controls 130 Step 5: Determine Exploitation Likelihood Given Existing Controls 131 Step 6: Determine Impact Severity 132 Step 7: Determine Risk Level 134 Step 8: Determine Additional Controls 135 Risk Mitigation Options 135 Risk Assumption 135 Risk Avoidance 136 Risk Limitation 136 Risk Planning 136 Risk Research 136 Risk Transference 137 Conclusion 137 Suggested Reading 137
6 CONTENTS XI Chapter 6 Chapter 7 Creating Effective Information Security Policies 139 Why Information Security Policies Are Important 139 Avoiding Shelfware 140 Electronic Policy Distribution 141 Canned Security Policies 142 Policies, Standards, Guidelines Definitions 143 Policies Are Written at a High Level 143 Policies 145 Security Policy Best Practices 145 Types of Security Policies 147 Standards 149 Procedures 150 Baselines 151 Guidelines 152 Combination of Policies, Standards, Baselines, Procedures, and Guidelines 153 Policy Analogy 153 An Approach for Developing Information Security Policies 154 Utilizing the Security The Policy Review Process 156 Information Security Policy Process 161 Suggested Reading 161 Council for Policies 155 Security Compliance Using Control Frameworks 163 Security Control Frameworks Defined 163 Security Control Frameworks and Standards Examples 164 Heath Insurance Portability and Accountability Act (HIPAA) 164 Federal Information Security Management Act of 2002 (FISMA) 164 National Institute of Standards and Technology (NIST) Recommended Security Controls for Federal Information Systems (800-53) 164 Federal Information System Controls Audit Manual (FISCAM) 165 ISO/IEC 27001:2005 Information Security Management Systems Requirements 165 ISO/IEC 27002:2005 Information Technology- Security Techniques Code of Practice for Information Security Management 166 Control Objectives for Information and Related Technology (COBIT) 167 Payment Card Industry Data Security Standard (PCI DSS) 167
7 XII CONTENTS Information Technology Infrastructure Library (ITIL) 168 Security Technical Implementation Guides (STIGs) and National Security Agency (NSA) Guides 168 Federal Financial Institutions Examination Council (FFIEC) IT Examination Handbook 169 The World on Operates Standards 169 Standards Are Dynamic 171 The How Is Typically Left Up to Us 171 Key Question: Why Does the Standard Exist? 173 Compliance Is Not Security, But It Is a Good Start 173 Integration of Standards and Control Frameworks 174 Auditing Compliance 175 Adoption Rate of Various Standards 175 ISO 27001/2 Certification 176 NIST Certification 177 Control Framework Convergence 177 The 11-Factor Compliance Assurance Manifesto 178 The Standards/Framework Value Proposition 183 Suggested Reading 183 Chapter 8 Chapter 9 Managerial Controls: Practical Security Considerations 185 Security Control Convergence 185 Security Control Methodology 188 Security Assessment and Authorization Controls 188 Planning Controls 189 Risk Assessment Controls 190 System and Services Acquisition Controls 191 Program Management Controls 193 Suggested Reading 211 Technical Controls: Practical Security Considerations 213 Access Control Controls 213 Audit and Accountability Controls 214 Identification and Authentication 215 System and Communications Protections 215 Suggested Reading 238 Chapter 10 Operational Controls: Practical Security Considerations 239 Awareness and Training Controls 239 Configuration Management Controls 240 Contingency Planning Controls 240 Incident Response Controls 241 Maintenance Controls 241 Media Protection Controls 242 Physical and Environmental Protection Controls 243
8 CONTENTS XIII Personnel Security Controls 244 System and Information Integrity Controls 245 Suggested Reading 276 Chapter 11 The Auditors Have Arrived, Now What? 277 Anatomy of an Audit 278 Audit Planning Phase 279 Preparation of Document Request List 280 Gather Audit Artifacts 284 Provide Information to Auditors 285 On-Site Arrival Phase 287 Internet Access 287 Reserve Conference Rooms 288 Physical Access 289 Conference Phones 290 Schedule Entrance, Exit, Status Meetings 290 Set Up Interviews 291 Audit Execution Phase 292 Additional Audit Meetings 293 Establish Auditor Communication Protocol 293 Establish Internal Company Protocol 294 Media Handling 296 Audit Coordinator Quality Review 298 The Interview Itself 298 Entrance, Exit, and Status Conferences 299 Entrance Meeting 299 Exit Meeting 301 Status Meetings 301 Report Issuance and Finding Remediation Phase 302 Suggested Reading 304 Chapter 12 Effective Security Communications 305 Why a Chapter Dedicated to Security Communications? 305 End User Security Awareness Training 306 Awareness Definition 307 Delivering the Message 308 Step 1: SecurityAwareness Needs Assessment 308 New or Changed Policies 308 Past Security Incidents 309 Systems Security Plans 309 Audit Findings and Recommendations 309 Event Analysis IndustryTrends 310 Management Concerns 310 Organizational Changes 311 Step 2: Program Design 311 Target Audience Frequency of Sessions 311
9 XIV CONTENTS Number of Users 312 Method of Delivery 312 Resources Required 312 Step 3: Develop Scope 312 Determine Participants Needing Training 312 Business Units 313 Select Theme 313 Step 4: Content Development 314 Step 5: Communication and Logistics Plan 315 Step 6: Awareness Delivery 316 Step 7: Evaluation/Feedback Loops 317 Security Awareness Training Does Not Have to Be Boring 317 Targeted Security Training 317 Continuous Security Reminders 319 Utilize Multiple SecurityAwareness Vehicles 319 Security Officer Communication Skills 320 Talking versus Listening 320 Roadblocks to Effective Listening 321 Generating a Clear Message 323 Influencing and Negotiating Skills 323 Written Communication Skills 324 Presentation Skills 325 Applying Personality Type to Security Communications 326 The Four Myers-Briggs Type Indicator (MBTI) Preference Scales 326 Extraversion versus Introversion Scale 327 versus Sensing Intuition Scale 327 Thinking versus Feeling Scale 328 Judging versus Perceiving Scale 328 Determining Individual MBTI Personality 329 Summing Up the MBTI for Security 334 Suggested Reading 334 Chapter 13 The Law and Information Security 337 Civil Law versus Criminal Law 339 Electronic Communications Privacy Act of 1986 (ECPA) 340 The Computer Security Act of The Privacy Act of Sarbanes-Oxley Act of2002 (SOX) 342 Gramm-Leach-Bliley Act (GLBA) 344 Health Insurance Portability and Accountability Act of Health Information Technology for Economic and Clinical Health (HITECH) Act 348 Federal Information Security Management Act of 2002 (FISMA) 348 Summary 350 Suggested Reading 350
10 CONTENTS XV Chapter 14 Learning from Information Security Incidents 353 Recent Security Incidents 355 Texas State Comptroller 355 Sony PlayStation Network 356 Student Loan Social Security Numbers Stolen 358 Social Security Numbers Printed on Outside of Envelopes 359 Valid Addresses Exposed 360 Office Copier Hard Disk Contained Confidential Information 362 Advanced Persistent Threat Targets Security Token 362 Who Will Be Next? 364 Every Control Could Result in an Incident 365 Suggested Reading 366 Chapter Ways to Dismantle Information Security Governance Efforts 369 Final Thoughts 379 Suggested Reading 381 Index 383
Ctfo MANAGEMENT SECURITY PATCH. Felicia M. Nicastro. Second Edition. CRC Press. VC#*' J Taylor & Francis Group / Boca Raton London New York
SECURITY PATCH MANAGEMENT Second Edition Felicia M. Nicastro Ctfo CRC Press VC#*' J Taylor & Francis Group / Boca Raton London New York CRC Press Is an imprint of the Taylor & Francis Croup, an Informa
THE COMPLETE PROJECT MANAGEMENT METHODOLOGY AND TOOLKIT
THE COMPLETE PROJECT MANAGEMENT METHODOLOGY AND TOOLKIT GERARD M. HILL CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an informa business
SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK. A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL
SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Implementing the Project Management Balanced Scorecard
Implementing the Project Management Balanced Scorecard Jessica Keyes CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an informa business
Compiled by; Mark E.S. Bernard, ISO 27001 Lead Auditor, CISSP, CISM, SABSA-F2, CISA, CRISC, CGEIT
Compiled by; Mark E.S. Bernard, ISO 27001 Lead Auditor, CISSP, CISM, SABSA-F2, CISA, CRISC, CGEIT Introduction Current Known Threats Potential Impacts to Enterprise Assets Legal Risks Managing Compliance
Developing National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
Executive's Guide to
Executive's Guide to IT Governance Improving Systems Processes with Service Management, COBIT, and ITIL ROBERT R. MOELLER WILEY John Wiley & Sons, Inc. Contents Preface xiii PART I: IT GOVERNANCE CONCEPTS
Information Technology and Organizational Learning
Information Technology and Organizational Learning Managing Behavioral Change through Technology and Education Second Edition Arthur M. Langer CRC Press Taylor & Francis Group Boca Raton London New York
The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach
The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach by Philippe Courtot, Chairman and CEO, Qualys Inc. Information Age Security Conference - London - September 25
RESILIENT. SECURE and SOFTWARE. Requirements, Test Cases, and Testing Methods. Mark S. Merkow and Lakshmikanth Raghavan. CRC Press
SECURE and RESILIENT SOFTWARE Requirements, Test Cases, and Testing Methods Mark S. Merkow and Lakshmikanth Raghavan CRC Press Taylor & Francis Group Boca Raton London New York CRC Press Is an imprint
Management. ITIL Release. Dave Howard. A Hands-on Guide. CRC Press. Taylor & Francis Group. Taylor St Francis Croup, an Informa business
ITIL Release Management A Hands-on Guide Dave Howard CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Croup, an Informa business AN AUERBACH
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Improving Business Process Performance
Improving Business Process Performance Gain Agility, Create Value, and Achieve Success JOSEPH RAYNUS CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor &
Welcome to Modulo Risk Manager Next Generation. Solutions for GRC
Welcome to Modulo Risk Manager Next Generation Solutions for GRC THE COMPLETE SOLUTION FOR GRC MANAGEMENT GRC MANAGEMENT AUTOMATION EASILY IDENTIFY AND ADDRESS RISK AND COMPLIANCE GAPS INTEGRATED GRC SOLUTIONS
SOFTWARE TESTING AS A SERVICE
SOFTWARE TESTING AS A SERVICE ASHFAQUE AHMED (g) CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business AN AUERBACH BOOK
IBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security
IBM Internet Security Systems October 2007 FISMA Compliance A Holistic Approach to FISMA and Information Security Page 1 Contents 1 Executive Summary 1 FISMA Overview 3 Agency Challenges 4 The IBM ISS
I n f o r m a t i o n S e c u r i t y
We help organizations protect INFORMATION The BorderHawk Team has significant experience assessing, analyzing, and designing information protection programs especially in Critical Infrastructure environments.
Project Management Concepts, Methods, and Techniques
Project Management Concepts, Methods, and Techniques Claude H. Maley Uffi\ CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa
The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant
THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1
PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman
PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA
Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand
Harmonizing Your Compliance and Security Objectives. Bonnie A. Goins Adjunct Professor, Illinois Institute of Technology
Harmonizing Your Compliance and Security Objectives Bonnie A. Goins Adjunct Professor, Illinois Institute of Technology Make sure efforts serve multiple purposes Use standards to guide effort Repeatable
NetIQ FISMA Compliance & Risk Management Solutions
N E T I Q C O M P L I A N C E S E R I E S NetIQ FISMA Compliance & Risk Management Solutions The Federal Information Security Management Act (FISMA) requires federal agencies to create and implement a
Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza
Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank
Self-Service SOX Auditing With S3 Control
Self-Service SOX Auditing With S3 Control The Sarbanes-Oxley Act (SOX), passed by the US Congress in 2002, represents a fundamental shift in corporate governance norms. As corporations come to terms with
^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS. KOGAN PAGE London and Sterling, VA
^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS KOGAN PAGE London and Sterling, VA Contents Foreword by Nigel Turnbull How to use this book
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security
Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant
Brochure More information from http://www.researchandmarkets.com/reports/3302152/ Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT /
igrc: Intelligent Governance, Risk, and Compliance White Paper
igrc: Intelligent Governance, Risk, and Compliance White Paper 2013 2013 Edgile, Inc. All Rights Reserved Executive Overview This whitepaper discusses the business needs addressed by Edgile s igrc solution,
How To Improve Your Business
IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends
HITRUST CSF Assurance Program
HITRUST CSF Assurance Program Simplifying the information protection of healthcare data 1 May 2015 2015 HITRUST LLC, Frisco, TX. All Rights Reserved Table of Contents Background CSF Assurance Program Overview
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance
CISO's Guide to. Penetration Testing. James. S. Tiller. A Framework to Plan, Manage, and Maximize Benefits. CRC Press. Taylor & Francis Group
CISO's Guide to Penetration Testing A Framework to Plan, Manage, and Maximize Benefits James S. Tiller CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor
TABLE OF CONTENTS INTRODUCTION... 1
TABLE OF CONTENTS INTRODUCTION... 1 Overview...1 Coordination with GLBA Section 501(b)...2 Security Objectives...2 Regulatory Guidance, Resources, and Standards...3 SECURITY PROCESS... 4 Overview...4 Governance...5
Implementation. Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Andrew T. Pham and David K. Pham. An Action Guide for Business and IT Leaders
Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Implementation An Action Guide for Business and IT Leaders Andrew T. Pham and David K. Pham Foreword by Jack Bergstrand, Former CFO of the Coca-Cola
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
Information Security Risk Management
Information Security Risk Management June 11, 2013 Patrick Perreault Daniel Gaudreau Agenda Current State of Affairs Why Information Security? The Role of Risk Management Information Security Threats,
ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA. ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York
ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an
INFORMATION SECURITY STRATEGIC PLAN
INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
Information Security Risk Management
Information Security Risk Management Based on ISO/IEC 17799 Houman Sadeghi Kaji Spread Spectrum Communication System PhD., Cisco Certified Network Professional Security Specialist BS7799 LA [email protected]
Guide for the Role and Responsibilities of an Information Security Officer Within State Government
Guide for the Role and Responsibilities of an Information Security Officer Within State Government Table of Contents Introduction 3 The ISO in State Government 4 Successful ISOs Necessary Skills and Abilities
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
Vendor Management Panel Discussion. Managing 3 rd Party Risk
Vendor Management Panel Discussion Managing 3 rd Party Risk Vendor Risk at its Finest Vendor Risk at its Finest CVS Care Mark Corporation announced that it had mistakenly sent letters to approximately
TABLE OF CONTENTS CHAPTER TITLE PAGE
viii TABLE OF CONTENTS CHAPTER TITLE PAGE TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF APPENDICES I II III IV VI VII VIII
Think like an MBA not a CISSP
Think like an MBA not a CISSP Embracing University Culture to Achieve Security Initiatives' Matt Malone Security Services Director 512-650-0179 [email protected] Goals Security is a business
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
IT Manager's Handbook
IT Manager's Handbook Getting your new job done Third Edition Bill Holtsnider Brian D. Jaffe AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
SCAC Annual Conference. Cybersecurity Demystified
SCAC Annual Conference Cybersecurity Demystified Me Thomas Scott SC Deputy Chief Information Security Officer PMP, CISSP, CISA, GSLC, FEMA COOP Practitioner [email protected] 803-896-6395 What is Cyber
Computing. Federal Cloud. Service Providers. The Definitive Guide for Cloud. Matthew Metheny ELSEVIER. Syngress is NEWYORK OXFORD PARIS SAN DIEGO
Federal Cloud Computing The Definitive Guide for Cloud Service Providers Matthew Metheny ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO
KLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT
1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT About Kyle Lai 2 Kyle Lai, CIPP/G/US, CISSP, CISA, CSSLP, BSI Cert. ISO 27001 LA President of KLC Consulting, Inc. Over 20 years in IT and Security Security
Warning Signs and the Red Flag System
Fraud Prevention and Detection Warning Signs and the Red Flag System Rodney T. Stamler Hans J. Marschdorf Mario Possamai CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
Securing the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER
Securing the Cloud Cloud Computer Security Techniques and Tactics Vic (J.R.) Winkler Technical Editor Bill Meine ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
CORE Security and GLBA
CORE Security and GLBA Addressing the Graham-Leach-Bliley Act with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected] www.coresecurity.com
Information Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Department of Management Services. Request for Information
Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley
IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014
IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security
Management. Project. Software. Ashfaque Ahmed. A Process-Driven Approach. CRC Press. Taylor Si Francis Group Boca Raton London New York
Software Project Management A Process-Driven Approach Ashfaque Ahmed CRC Press Taylor Si Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Croup, an Informa business
for Research and Guiding Innovation for Positive R&D Outcomes Lory Mitchell Wingate
Project Management for Research and Development Guiding Innovation for Positive R&D Outcomes Lory Mitchell Wingate CRC Press Taylor & Francis Group BocaRaton London New York CRC Press is an imprint of
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Consolidated Audit Program (CAP) A multi-compliance approach
Consolidated Audit Program (CAP) A multi-compliance approach ISSA CONFERENCE Carlos Pelaez, Director, Coalfire May 14, 2015 About Coalfire We help our clients recognize and control cybersecurity risk,
IT Security & Compliance Risk Assessment Capabilities
ATIBA Governance, Risk and Compliance ATIBA provides information security and risk management consulting services for the Banking, Financial Services, Insurance, Healthcare, Manufacturing, Government,
Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.
Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE
TECHNICAL PROPOSAL DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE A White Paper Sandy Bacik, CISSP, CISM, ISSMP, CGEIT July 2011 7/8/2011 II355868IRK ii Study of the Integration Cost of Wind and Solar
Achieving Security through Compliance
Achieving Security through Compliance Policies, plans, and procedures Table of Contents This white paper was written by: McAfee Foundstone Professional Services Overview...3 The Rock Foundation...3 Governance...3
The Intersection of Internal Controls and Cyber Security
The Intersection of Internal Controls and Cyber Security Ralph Mosios Chief Information Security Officer Federal Housing Finance Agency ISACA NCAC Conference November 18, 2014 The Federal Housing Finance
Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire
Compliance, Security and Risk Management Relationship Advice Andrew Hicks, Director Coalfire Housekeeping You may submit questions throughout the webinar using the question area in the control panel on
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Advances in Network Management
Advances in Network Management Jianguo Ding UC) CRC Press >5^ J Taylor & Francis Croup ^""""^ Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business AN AUERBACH
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
Achieving Governance, Risk and Compliance Requirements with HISP Certification Course
Achieving Governance, Risk and Compliance Requirements with HISP Certification Course in corporation with A unique information security and regulatory compliance certification course that provides IT security
Maximizing Configuration Management IT Security Benefits with Puppet
White Paper Maximizing Configuration Management IT Security Benefits with Puppet OVERVIEW No matter what industry your organization is in or whether your role is concerned with managing employee desktops
QRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
Dr. Anton Chuvakin @ Security Warrior Consulting
Dr. Anton Chuvakin @ Consulting Services Summary Updated: February 2010 Introduction provides strategic consulting services focused on Security Information and Event Management (SIEM) and log management
