Compliance Risk Assessment Measures of Financial Information Security using System Dynamics
|
|
|
- Laurel Carroll
- 10 years ago
- Views:
Transcription
1 Compliance Risk Assessment Measures of Financial Information Security using System Dynamics Ae Chan Kim 1, Su Mi Lee 2 and Dong Hoon Lee 3 1, 3 Graduate School of Information Security, Korea University 2 Financial Security Agency, Korea { 1 holytemple, 3 donghlee}@korea.ac.kr, 2 [email protected] Abstract In this paper, we analyze relationships between EFT (Electronic Financial Transaction) Act of Korea and risk assessment standards and propose the map that helps financial institutions determine the priority of security control areas. It is a new method for financial information security risk identification and assessment through correlation analysis between the variety security standards and requirements. We attempt to integrate different information security standards and propose risk assessment measures specializing in financial companies based on the mixed methods of quantitative and qualitative methods to determine the priority through the calculation of weights. From the results of correlation analysis, three main security control areas are found to be more important than other areas and it can be utilized as a risk management measure about security countermeasures. In addition, financial companies should improve three main security control areas in an interval of at least 10 months. We expect that our result can be provided to security manager and IT auditor for establishment of risk mitigation strategies as basic data. Keywords: Risk Assessment, Financial Information Security, System Dynamics 1. Introduction The reason why information technology has its significant implications in financial sector is that financial business is an information industry, and information production technology is an important source of the competitiveness of financial institutions. However, IT systems have widely been applied to the financial companies, security incidents of financial IT services such as internet banking hacking against the financial companies have occurred continuously, resulting in a loss of the financial IT systems. In this regard, it was required to apply the enhanced compliance regulations of Sarbanes- Oxley Act: 2002, Basel Ⅱ and PCI DSS: 2010 to financial IT systems. In Korea, to respond effectively to the financial IT security incidents, policy institutions, supervisory agencies and related businesses have suggested countermeasures to minimize the extent of damages. And yet, there are limitations in information security budget and workforce despite the presence of numerous standards, policies and regulations for information security compliance in each organization [4]. Accordingly, security managers and executives will strive to comply with information protection from high-risk portions depending on the situations of each organization. For risk management, systematic and exact risk identification should be preceded, and the effectiveness of risk management is most noticeable when the threats and security requirements corresponding to it are properly reflected in the analysis. Our study deals with risk assessment measures of financial companies based on ISO27001, KISA ISMS Certification system and EFT Act [3]. 191
2 2. Background and Approach 2.1. IS (Information Security) Standards The international ISMS (Information Security Management Systems) standards were disseminated through determination of the British standard BS7799 on the ISM, and certification system on the ISMS was first established based on BS7799 Part2 (certification standards) in After that, through the international organization for standardization (ISO), BS7799 Part1 (ISM best practices) became ISO17799, then ISO 27002, and BS7799 Part2 became ISO through several revisions. ISO sets out specific requirements related to ISMS, and ISO consists of codes of practice for ISM [7]. ISO is composed of a total of 11 control areas, 39 control objectives and 133 control items. The international standards for ISMS include ISO 27001, and the new ISO27000 series is to be updated by 2012 [6]. Among them, ISO is about risk management, and it serves as general guidelines to meet the requirements of ISO In Korea, ISMS certification scheme was established based on the Article 47 of ICI Act [5] (ICI: Act on Promotion of Information and Communications Network Utilization and Information Protection) for the establishment of ISMS, and KISA has examined and issued certificates to private companies. As a certification system based on the TTA standards, KISA ISMS includes all ISO international standards, and it has strengthened security requirements of incident prevention, encryption and electronic trading to fit the situation of Korea. Accordingly, KISA ISMS certification guarantees that ISMS is established in accordance with domestic information security environment, while satisfying all standards required by ISO certification criteria [1, 2]. Meanwhile, Korea Financial Services Commission and the FSS (Financial Supervisory Service) established the information security best practices that meet the situation of financial companies in Korea based on The Regulation on Supervision of EFT and distributed the FISS (Financial Information Security Standards) to each financial company [4] Risk Management Risk refers to the possibility of threats using the vulnerability that have a negative impact on the organization. The main goal of risk management is to reduce the risk to an acceptable level. Risk management is a process to improve problematic elements based on the security check items presented in ISO27002, and it is dealt with in various ways, not limited to information system. Managing risks mean considering not only technical aspects that identify and remove technical vulnerabilities, but also administrative and physical aspects of organization. In addition, the risk management procedures include process to predict the scale of resources to be inputted to reduce the possibility of security incidents and level of risks to be improved after the input in addition to passive administration duties. Risk Management goes through the process of (i) Risk Identification (ii) Risk Analysis (iii) Risk Mitigation(Choose the appreciate safe-guard). Risk Assessment is the process of identifying risks to organizational operations (including mission, functions, image and reputation), organizational assets, individuals, other organizations, and the Nation, resulting from the operation of an information system. Part of risk management, incorporates threat and vulnerability analysis, and considers mitigations provided by security-controls planned or in place. 192
3 Synonymous with risk analysis, Risk Assessment can justify security safeguard by providing the management with statements needed to determine which risks are mitigated, imputed and accepted. Risk analysis is to analyze which threats exist in the assets after giving values to assets in which support is required and calculate risk by identifying threats and evaluating the impact through correlation analysis. The main objectives of the risk analysis are to measure risks on the IT assets and provide a basis to judge whether the level of the measured risks is acceptable or not. The next step is to quantify the effects of the potential threats and provide an economic balance between the impact of the risk and the costs of the countermeasure (cost / benefit justification) [9]. Figure 1 illustrates the entire process of risk management [8] System Dynamics Figure 1. Risk Management Overview System Dynamics is one of simulation methodologies that defines the system composed of variables directly or indirectly related to the problems presented and solves the problems by identifying dynamic characteristics of the system through simulation after analyzing the relationship between variables quantitatively. In other words, it is suitable for exploring ways to resolve problems as one of the optimization techniques to analyze how system behaviors lead as a whole rather than to analyze them in detail. It is expressed in the form of causal map using system dynamics techniques, and + represents positive effect, and - negative effect. In this study, the risk is identified by analyzing the causal relationship between the compliance factors using Vensim known as a System Dynamics tool. 3. Risk Assessment of Financial IS Compliance 3.1. Compliance Risk Identification Figure 2 shows mapping results of the correlation on the security control areas of ISO 27001, KISA ISMS and FISS. 193
4 Figure 2. Mapping Results of Security Control Areas between ISO 27001, KISA ISMS and FISS The results of correlation analysis of Figure 2 show that areas of Human Resources Security (mapped into 3 pieces), System Development Security (3), Access Control (3), Review, Monitoring and Audit (4) of KISA ISMS are more important than the rest, and areas of IPS Protection Countermeasures (3), Hacking, Incident Protection Countermeasures (5), IT Planning and Operating (4) and IT Internal Control (6) are more important than others in FISS. Table 1 shows the results of analysis in which the defect cases of ISMS occurred before 2008 are reflected as basic data. 194
5 Table 1. Results in Estimating the Importance of Security Control Areas Security Control Areas Number of Relations (N) Defect Ratio (%) Importance Order Human Resources and Budget Vulnerability Analysis, Evaluation IDC Protection & Countermeasures Terminal Protection Countermeasures IPS(Information Processing Systems) Protection Countermeasures Hacking, Incident Protection Countermeasures IT Planning and Operating IT Internal Control Emergency Plans and Continuity Incident Response Total and Average Compliance Risk Assessment Figure 3. Correlation Analysis on the Security Control Areas (causal map) The risk mitigation strategies for specific security control areas were established by means of correlation analysis through a causal map using system dynamics techniques, targeting 3 security control areas identified to be ranked first, second and third in importance with the highest relevance from the analysis results. Models in this study mainly show positive (+) 195
6 affects since they are designed not to take costs into consideration. In addition, Figure 4 shows the structural analysis results of the security control areas in Figure 2, 3. Figure 4. Causes Tree Structure: IT Internal Control (ranked 1 st ) From the analysis results of Figure 4, Information Security Policy is found to be the cause that has the largest effect on IT Internal Control, and the analysis results of Figure 5 revealed that Access Control area is the cause that has the largest effect on Hacking, Incident Protection Countermeasures. From the analysis results of Figure 6, IT Planning and Operating is identified to be affected most by Information Security Policy. Figure 5. Causes Tree Structure: Hacking, Incident Protection Countermeasures (ranked 2 nd ) 196
7 Figure 6. Causes Tree Structure: IT Planning and Operating (ranked 3 rd ) In this regard, the utilization of system dynamics techniques to strengthen the security measures of Access Control when costs are not considered helps to establish risk mitigation strategies by making complex causal relationship between the factors known intuitively. In this study, it is concluded from the case connected with FISS that security measures of Access Control and Information Security Policy should be strengthened Policy Assessment Figure 7. Simple Policy Assessment Analysis Model Figure 7 illustrates the simple policy assessment analysis model to compare the policy each other. It can be used as correlation analysis between countermeasure costs and compliance violation costs that established by the three main security control areas. Each weight of security controls is on the basis of the defect ratio [2]; the value of results depends on the costs. However, this applied model in accordance with the security countermeasures does not reflect the variety costs. A simple cost-effectiveness analysis has limitations. 197
8 Figure 8. Graph for Risk Reduction Strategy Figure 9. Graph for Risk Acceptance Strategy From the analysis results of Figure 8, 9, when the critical level (75 Points) is reached, the risk for the common Risk Decreasing (Positive) has shown a steady decline by the security countermeasures. In this model, the cycle of applied security countermeasures is about 10 months, the risk is found to coverage to 30 Points (%). Therefore, Depending on risk management strategy and Negative selection, the transition of a risk indicator is a little different. In Figure 8 (Risk Reduction Strategy), the risk continuously decreased by applying security countermeasures, but the risk increased exponentially after 2 months, in Figure 9 (Risk Acceptance Strategy). In conclusion, financial companies should improving act three main security control areas (IT Internal Control, Hacking and Incident Protection Countermeasures, IT Planning and Operating) in an interval of at least 10 months continuously. 4. Conclusion and Future Work We focus on compliance-oriented risk assessment of financial companies. Basic-data used to implement the analysis was based on the defect cases before 2008 found in KISA ISMS certification of private institutions. If this study is carried out based on the recent IT audit result data on the financial companies, more significant results will be deduced. However, this study has its significance in that we propose the new risk assessment methods specialized for financial companies through attempting to integrate different information security standards. Therefore, The FSS will perform to audit depending on the compliance assessment results. Additionally, Security managers and executives of financial companies will strive to comply with information security from high-risk portions depending on the situations of each organization. In the future, it is required to research GRC (Governance, Risk Management and Compliance) integration and execution methods of [10] as extended models through specifying the previously presented causal relationship-centered risk assessment measures into the case studies on the financial company's risk management practices considering the cost. Acknowledgments This work is supported by the Korea Information Security Agency (H ). 198
9 References [1] J. S. Kim, S. Y. Lee and J. I. Lim, Comparison of the ISMS Difference for Private and Public Sector, Journal of the Korea Institute of Information Security and Cryptology, vol. 20, no. 2, (2010). [2] H. M. Ko, J. S. Kim and S. S. Jang, Analysis on a case study of the defects that appear typically build upon Information Security Management System (ISMS), Korea Information Security Journal, vol. 17, no. 4, (2007). [3] Electronic Financial Transaction (EFT) Act, Korea, (2012). [4] Electronic Financial Transaction (EFT) Supervision and Regulations, Financial Supervisory Service, Korea, (2011). [5] Act on Promotion of Information and Communications Network Utilization and Information Protection (ICI), Korea, (2012). [6] JTC 1/SC 27 IT Security Techniques, Standards for the establishment, implementation, control and improvement of the Information Security Management System, ISO/IEC 27001, Geneva, (2005). [7] JTC 1/SC 27 IT Security Techniques, Code of the practice providing good practice advice on ISMS, ISO/IEC 27002, Geneva, (2005). [8] NIST, Risk Management Guideline for Information Technology Systems, NIST Special Publication , Rev. 3, Gaithersburg, National Institute of Standards and Technology, (2011). [9] W. Boehmer, Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001, Proceedings of the 2009 International Conference on Availability, Reliability and Security (ARES), (2009) March 16-19, Fukuoka, Japan. [10] D. Cheremushkin, N. Andreeva and S. Shustikov, Information Security Integral Engineering Technique and its Application in ISMS Design, Proceedings of the 2011 International Conference on Availability, Reliability and Security (ARES), (2011) August 22-26, Vienna, Austria. Authors Ae Chan Kim He is a Masters Course Student at Graduate School of Information Security (GSIS) in Korea University. He received B.S degree in Industrial and Information Systems Engineering from Seoul National University of Science and Technology (Seoultech) in He served as Intelligence and Communication Officer, 1LT in the Republic of Korea Army (ROKA) from 2009 to His current interests are Financial Information Security, IT Auditing Techniques and Hacking/Virus. Su Mi Lee She is a Team Leader at Financial Security Agency (FSA) in Korea. She received M.S. and Ph.D. degrees in Information Security at Graduate School of Information Security (GSIS) from Korea University in 2003, 2007 respectively. Since 2007, she has been a Researcher at FSA. Her current interests are Financial Information Security, Encryption Protocols and Information Security Evaluation. 199
10 Dong Hoon Lee He is a Full Professor and Vice President at Graduate School of Information Security (GSIS). He received B.S degree in Economics from Korea University in 1983 and his M.S. and Ph. D. degrees in Computer Science from University of Oklahoma in 1987, 1992 respectively. He worked as Assistant Professor at Department of Computer Science in Korea University from 1993 to Also, he worked as Associate Professor at Department of Computer Science in Korea University from 1997 to Since 2001, he has been a Full Professor at GSIS in Korea University. His research interests include Encryption Protocol, Cryptology and Embedded Security. 200
A Study of Effect of Information Security Management System[ISMS] Certification on Organization Performance
10 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.3, March 2010 A Study of Effect of Information Security Management System[ISMS] Certification on Organization Performance
Information Security Risk Management
Information Security Risk Management Based on ISO/IEC 17799 Houman Sadeghi Kaji Spread Spectrum Communication System PhD., Cisco Certified Network Professional Security Specialist BS7799 LA [email protected]
Educational Requirement Analysis for Information Security Professionals in Korea
Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea [email protected]
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Information Security Management Systems
Information Security Management Systems Information Security Management Systems Conformity Assessment Scheme ISO/IEC 27001:2005 (JIS Q 27001:2006) ITMangement Center Japan Information Processing Development
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Welcome to Modulo Risk Manager Next Generation. Solutions for GRC
Welcome to Modulo Risk Manager Next Generation Solutions for GRC THE COMPLETE SOLUTION FOR GRC MANAGEMENT GRC MANAGEMENT AUTOMATION EASILY IDENTIFY AND ADDRESS RISK AND COMPLIANCE GAPS INTEGRATED GRC SOLUTIONS
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals Ae Chan Kim 1, Won Hyung Park 2 and Dong Hoon Lee 3 1 Dept. of Financial Security, Graduate School of Information Security,
Using Information Shield publications for ISO/IEC 27001 certification
Using Information Shield publications for ISO/IEC 27001 certification In this paper we discuss the role of information security policies within an information security management program, and how Information
A Study of Key management Protocol for Secure Communication in Personal Cloud Environment
, pp.51-58 http://dx.doi.org/10.14257/ijsia.2014.8.4.05 A Study of Key management Protocol for Secure Communication in Personal Cloud Environment ByungWook Jin 1 and Keun-Wang Lee 2,* 1 Dept. of Computer
Applied Security Metrics
Applied Security Metrics Planning, design and implementation of security metrics Doug Streit, ODU Dan Han, VCU Designing a Security Metrics Framework Doug Streit, ODU Metrics Program Getting Started 1.
Harmonizing Your Compliance and Security Objectives. Bonnie A. Goins Adjunct Professor, Illinois Institute of Technology
Harmonizing Your Compliance and Security Objectives Bonnie A. Goins Adjunct Professor, Illinois Institute of Technology Make sure efforts serve multiple purposes Use standards to guide effort Repeatable
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE
Our Commitment to Information Security
Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as
Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches
Chinese Business Review, ISSN 1537-1506 December 2011, Vol. 10, No. 12, 1106-1110 D DAVID PUBLISHING Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches Stroie Elena
Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza
Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Secure Cloud Hosting for Healthcare Organizations
Secure Cloud Hosting for Healthcare Organizations OUR MISSION FIREHOST MISSION Our core is an unshakable, no compromise commitment to protect our customer's digital assets with integrity and innovation
PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution
PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution 1. The Challenge Large enterprises are experiencing an ever increasing burden of regulation and legislation against which they
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Security metrics to improve information security management
Security metrics to improve information security management Igli TASHI, Solange GHERNAOUTIHÉLIE HEC Business School University of Lausanne Switzerland Abstract The concept of security metrics is a very
How To Test A Robot Platform And Its Components
An Automated Test Method for Robot Platform and Its Components Jae-Hee Lim 1, Suk-Hoon Song 1, Jung-Rye Son 1, Tae-Yong Kuc 2, Hong-Seong Park 3, Hong-Seok Kim 4 1,2 School of Information and Communication,
Il nuovo standard ISO 22301 sulla Business Continuity Scenari ed opportunità
Il nuovo standard ISO 22301 sulla Business Continuity Scenari ed opportunità Massimo Cacciotti Business Services Manager BSI Group Italia Agenda BSI: Introduction 1. Why we need BCM? 2. Benefits of BCM
HKCAS Supplementary Criteria No. 8
Page 1 of 12 HKCAS Supplementary Criteria No. 8 Accreditation Programme for Information Security Management System (ISMS) Certification 1 INTRODUCTION 1.1 HKAS accreditation for information security management
CSMS. Cyber Security Management System. Conformity Assessment Scheme
CSMS Cyber Security Management System Conformity Assessment Scheme for the CSMS Certification Criteria IEC 62443-2-1:2010 Cyber Security Management Syste 1 Purpose of the CSMS Conformity Assessment Scheme
Fujitsu Enterprise Security Architecture
Fujitsu Enterprise Security Architecture V Tetsuo Shiozaki V Masayuki Okuhara V Nobuo Yoshikawa (Manuscript received November 9, 2006) Recently, there has been a growing need for enterprises to respond
Information technology Security techniques Information security management systems Overview and vocabulary
INTERNATIONAL STANDARD ISO/IEC 27000 Third edition 2014-01-15 Information technology Security techniques Information security management systems Overview and vocabulary Technologies de l information Techniques
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Security Measures of Personal Information of Smart Home PC
, pp.227-236 http://dx.doi.org/10.14257/ijsh.2013.7.6.22 Security Measures of Personal Information of Smart Home PC Mi-Sook Seo 1 and Dea-Woo Park 2 1, 2 Department of Integrative Engineering, Hoseo Graduate
ISO 27001: Information Security and the Road to Certification
ISO 27001: Information Security and the Road to Certification White paper Abstract An information security management system (ISMS) is an essential part of an organization s defense against cyberattacks
Information Security Awareness Training
Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information
Transition Method into Alternate Symbols of Korean Option Market by Expiration Date
Transition Method into Alternate Symbols of Korean Option Market by Expiration Date Young-Hoon Ko Department of Computer Engineering, Hyupsung University, Suwon, Korea [email protected] Abstract This paper
ISO/IEC 27001:2013 webinar
ISO/IEC 27001:2013 webinar 11 June 2014 Dr. Mike Nash Gamma Secure Systems Limited UK Head of Delegation, ISO/IEC JTC 1/SC 27 Introducing ISO/IEC 27001:2013 and ISO/IEC 27002:2013 New versions of the Information
State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
How To Implement Data Loss Prevention
Data Loss Prevention Implementation Initiatives THE HITACHI WAY White Paper By HitachiSoft America Security Solutions Group September, 2009 HITACHI SOFTWARE ENGINEERING AMERICA, LTD. Executive Summary
The Information Security Management System According ISO 27.001 The Value for Services
I T S e r v i c e M a n a g e m e n t W h i t e P a p e r The Information Security Management System According ISO 27.001 The Value for Services Author: Julio José Ballesteros Garcia Introduction Evolution
A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification
, pp. 131-142 http://dx.doi.org/10.14257/ijseia.2015.9.10.13 A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification Min-gyu Lee 1, Hyo-jung Sohn 2, Baek-min Seong
Cyber Security solutions
Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside
NIST National Institute of Standards and Technology
NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Advancing Access to Restricted Data: Regulations, Compliance, Continuous Monitoring. OH MY!!!
Advancing Access to Restricted Data: Regulations, Compliance, Continuous Monitoring. OH MY!!! Cornell Institute for Social and Economic Research and Cornell Restricted Access Data Center CISER s Mission:.anticipate
Guide for the Role and Responsibilities of an Information Security Officer Within State Government
Guide for the Role and Responsibilities of an Information Security Officer Within State Government Table of Contents Introduction 3 The ISO in State Government 4 Successful ISOs Necessary Skills and Abilities
Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project
Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project Introduction This Advice provides an overview of the steps agencies need to take
ITU-T X.805 based Vulnerability Analysis Method for Security Framework of End-to-End Network Services
ITU-T X.805 based Vulnerability Method for Security Framework of End-to-End Network Services YOUNGDUK CHO YOOJAE WON BYONGJIN CHO Information Security Technology Division Korea Information Security Agency
Compliance, Audits and Fire Drills: In the Way of Real Security?
Compliance, Audits and Fire Drills: In the Way of Real Security? Mark Estberg and John Howie Microsoft Corporation Session ID: SP01-203 Session Classification: Intermediate Introduction Microsoft s Global
Fast Device Discovery for Remote Device Management in Lighting Control Networks
J Inf Process Syst, Vol.11, No.1, pp.125~133, March 2015 http://dx.doi.org/10.3745/jips.03.0011 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Fast Device Discovery for Remote Device Management in
A Research on Security Awareness and Countermeasures for the Single Server
, pp.31-42 http://dx.doi.org/10.14257/ijsia.2013.7.6.04 A Research on Security Awareness and Countermeasures for the Single Server Hyuk-Jin Son 1 and Seungdo Jeong 2,* 1 IT MBA, Graduate School of Business
Some 4 500 organizations implement ISO/IEC 27001. Information security INTERNATIONAL
Some 4 500 organizations implement ISO/IEC 27001 for information security The author reports on global progress in the implementation of the international information security management system standard
Executive Management of Information Security
WHITE PAPER Executive Management of Information Security _experience the commitment Entire contents 2004, 2010 by CGI Group Inc. All rights reserved. Reproduction of this publication in any form without
Cybersecurity@RTD Program Overview and 2015 Outlook
Cybersecurity@RTD Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD Information Technology Department of Finance & Administration
IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION
48 IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION MATÚŠ HORVÁTH, MARTIN JAKUB 1 INTRODUCTION Managerial work is directly dependent on information, it is therefore
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
Korea IT Security Evaluation and Certification Scheme
Korea IT Security Evaluation and Certification Scheme 2005. 9. 28 Korea Certification Body Dae Ho, Lee Agenda I KECS Introduction II Role and Responsibility of CB III Evaluation and Certification Procedure
ISO 27001 Information Security Management Services (Lot 4)
ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
DEVELOPING THE KNOWLEDGE MANAGEMENT SYSTEM BASED ON BUSINESS PROCESS
DEVELOPING THE KNOWLEDGE MANAGEMENT SYSTEM BASED ON BUSINESS PROCESS Sung Ho Jung 1, Ki Seok Lee 1, Young Woong Song 2, Hyoung Chul Lim 3, and Yoon Ki Choi 4 * 1 Ph.D., Candidate, Department of Architectural
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
By. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd
BS 25999 Business Continuity Management By. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd 1 Contents slide BSI British Standards 2006 BS 25999(Business Continuity) 2002 BS 15000
Global Statement of Business Continuity
Business Continuity Management Version 1.0-2014 Date October 18, 2014 Status Author Business Continuity Management (BCM) Page 1 of 8 Table of Contents 1. Credit Suisse Business Continuity Statement 3 2.
Achieving Security through Compliance
Achieving Security through Compliance Policies, plans, and procedures Table of Contents This white paper was written by: McAfee Foundstone Professional Services Overview...3 The Rock Foundation...3 Governance...3
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,
12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013
Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
In Brief. Smithsonian Institution Office of the Inspector General
In Brief Smithsonian Institution Office of the Inspector General Smithsonian Institution Network Infrastructure (SINet) Report Number A-09-01, September 30, 2009 Why We Did This Audit Under the Federal
Compliance Risk Management IT Governance Assurance
Compliance Risk Management IT Governance Assurance Solutions That Matter Introduction to Federal Information Security Management Act (FISMA) Without proper safeguards, federal agencies computer systems
Who should submit the application
Operational risk: Application to use an Advanced Measurement Approach February 2007 1 Contents This document contains Finansinspektionen s requirements regarding the content and structure of an application
Integrated Information Management Systems
Integrated Information Management Systems Ludk Novák [email protected] ANECT a.s. Brno, Czech Republic Abstract The article tries to find consensus in these tree different types of the systems the
IT Security Governance for e-business
Vol. 2, No. 3, July, 2008 IT Security Governance for e-business Rosslin John Robles, Na-Yun Kim, Tai-hoon Kim School of Multimedia, Hannam University, Daejeon, Korea [email protected], [email protected],
Security Requirements for Wireless Networking
Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END
Competency Unit: Exemplar Global SCY Security Management Systems Auditing
Please visit: www.exemplarglobal.org for your region s Principal Office contact details. Email: [email protected] Competency Unit: Exemplar Global SCY Security Management Systems Auditing How to
MEDIA RELEASE. IOSCO reports on business continuity plans for trading venues and intermediaries
IOSCO/MR/54/2015 Madrid, 22 December 2015 IOSCO reports on business continuity plans for trading venues and intermediaries The Board of the (IOSCO) today published two reports that seek to enhance the
WEST YORKSHIRE FIRE & RESCUE SERVICE. Business Continuity Management Strategy
WEST YORKSHIRE FIRE & RESCUE SERVICE Business Continuity Management Strategy Date Issued: 12 November 2012 Review Date: 12 November 2015 Version Control Version Number Date Author Comment 0.1 June 2011
Moving from ISO/IEC 27001:2005 to ISO/IEC 27001:2013
Transition guide Moving from ISO/IEC 27001:2005 to ISO/IEC 27001:2013 The new international standard for information security management systems ISO/IEC 27001 - Information Security Management - Transition
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Performing Effective Risk Assessments Dos and Don ts
Performing Effective Risk Assessments Dos and Don ts % Gary Braglia Security Specialist GreyCastle Security TCTC March 18, 2013 Introduction Who am I? Why Risk Management? Because you have to Because
Feature. Log Management: A Pragmatic Approach to PCI DSS
Feature Prakhar Srivastava is a senior consultant with Infosys Technologies Ltd. and is part of the Infrastructure Transformation Services Group. Srivastava is a solutions-oriented IT professional who
Customer-Facing Information Security Policy
Customer-Facing Information Security Policy Global Security Office (GSO) Version 2.6 Last Updated: 03/23/2015 Symantec Corporation Table of Contents Compliance Framework... 1 High-Level Information Security
CSF Support for HIPAA and NIST Implementation and Compliance
CSF Support for HIPAA and NIST Implementation and Compliance Presented By Bryan S. Cline, Ph.D. Presented For HITRUST Why does HITRUST exist? Multitude of challenges Significant government oversight Evolving
Risk Management Studio:
Risk Management Studio: An efficient and effective approach to risk assessment By Knútur Birgir Otterstedt, M.Sc., Matthew Arnold, MBA & Svana Helen Bjornsdottir, Dipl.-Ing. / M.Sc. January 9, 2012 What
UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter
Pennsylvania State System of Higher Education California University of Pennsylvania UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter Version [1.0] 1/29/2013 Revision History
Information security management systems Specification with guidance for use
BRITISH STANDARD BS 7799-2:2002 Information security management systems Specification with guidance for use ICS 03.100.01; 35.020 This British Standard, having been prepared under the direction of the
