Developing and Maintaining a World-Class Third Party Risk Assessment Program
|
|
|
- Marylou French
- 10 years ago
- Views:
Transcription
1 Developing and Maintaining a World-Class Third Party Risk Assessment Program Presented by: Tom Garrubba, Senior Director, The Santa Fe Group/Shared Assessments Program Monday, September 15, IIA Pittsburgh
2 Agenda Why the sudden focus on third party risk? Increased regulatory and standards focus Increased targeting of service providers How a Premier integrated pharmacy services provider built their TPR Management Program Laying the ground work for using vendor questionnaires Vendor identification Vendor classification TPR Program Lifecycle Phase I Pre-assessment Phase II Assessment Phase III Post-Assessment Phase IV Criteria Evaluation 2
3 Agenda Discussion of Tools to Use The VRMMM (Vendor Risk Management Maturity Model) The SIG and SIG Lite (Standard Information Gathering) Questionnaires Key take-aways 3
4 Regulatory Pressure Increasing 1996 Jul 01 Nov 01 May 02 Aug 03 May 07 Nov 09 Jan 10 Mar 10 Jul 10 Jan 11 Mar 12 Mar 13 Oct 13 May 14 HIPA A GLBA OCC Bulletin OCC Bulletin CS Privacy SB 1386 HF 1758 MN Plastic Card Security Act Protected Data Types Intellectual Property (IP) Personally Identifiable Information (PII) Payment Card Industry (PCI) Protected Health Information (PHI) HITECH Act NRS 603 NV Data Security 201 MA Code Reg 17 WA HB 1149 PCI DSS 2 CFPB Bulletin Omnibus HIPAA Rule OCC Bulletin PCI DSS 3 Source: Prevalent
5 Mega Breaches Breaches Identities Exposed 232M 93M 552M Breaches >10M was the Year of the Mega Breach 5
6 Breaches by Sector Data Breaches by Sector, 2013 Source: Symantec Data Breaches by Sector, Percent of Identities Exposed, 2013 Source: Symantec 12% Government Education 16% Healthcare 44% Other 12% 7% Accounting 5% Retail 4% Computer Software 3% Financial 3% 3% 3% Transportation Insurance Hospitality Computer Software 16% Financial 19% Retail 30% Social Networking 9% 4% 4% 2% 2% 1% 1% Information Technology Hospitality Telecom Accounting Healthcare Other Healthcare, education and the public sectors accounted for 58% of all data breaches But, the retail, computer software and financial sectors accounted for 77% of all identities exposed in
7 Costs Associated with a Breach companies had to spend more on their investigations, notification and response when their sensitive and confidential information was lost or stolen. As revealed in the 2014 Cost of Data Breach Study: Global Analysis, sponsored by IBM, the average cost to a company was $3.5 million in US dollars and 15 percent more than what it cost last year (2013). - Source: Ponemon Institute; Cost of Data Breach: Global Analysis; (May 5, 2014) 7
8 Case Study: How a Premier integrated pharmacy services provider build their TPR Management Program 8
9 Case Study: How a Premier integrated pharmacy services provider build their TPR Management Program Program Initiation and Alignment Use this formula for a successful implementation P = p1(p2 + p3) Garrubba-Mortensen Theorem* * the o rem/ˈthēərəm/ 1. Noun: A general proposition not self-evident but proved by a chain of reasoning; a truth established by means of accepted truths. 2. A rule in algebra or other branches of mathematics expressed by symbols or formulae. (Source: Wikipedia Dictionary) 9
10 Case Study: How a Premier integrated pharmacy services provider build their TPR Management Program Program Initiation and Alignment Use this formula for a successful implementation P = p1(p2 + p3) Process - series of documented actions or operations; streamlined! Questionnaires, audit steps, internal & external resources; documentation to review; Turnaround times; Communication protocol, reporting P = p1(p2 + p3) Practices - your way of doing things Daily tasks: must be consistent and understood by your management! p2 + p3 = your operating procedures to execute assessments! P = p1(p2 + p3) Policy Written and Communicated by the C-suite; may even be an executive Proclamation (Must have in first position!) 10
11 Case Study: How a Premier integrated pharmacy services provider build their TPR Management Program Program developed to ensure vendors that collect, store, transmit, use, process, interface, or destroy data on behalf of CVS Caremark have an adequate information security program and privacy controls in place to protect confidential information: Protected Health Information (PHI) Personally Identifiable Information (PII) Payment Card Industry - Data Security Standard (PCI) - Cardholder Data (aka, CHD ) Strategic (proprietary), operational or financial information of CVS Caremark 11
12 Case Study: How a Premier integrated pharmacy services provider build their TPR Management Program The CVS Caremark VAP is based on the BITS Shared Assessment framework Covers both existing vendors and potential new vendor relationships if they are to have access to confidential or strategic information: Any of their subcontractors that may have access to CVS Caremark data Off-Shore vendors/subcontractors Vendors with MED-D impact 12
13 Case Study: How a Premier integrated pharmacy services provider build their TPR Management Program Assesses Business Partners who associate with CVS Caremark to address an objective of CVS Caremark: Clinical research partners Universities (healthcare studies) 13
14 Case Study: How a Premier integrated pharmacy services provider build their TPR Management Program Quantified our risk with Third Party Service Providers via Exposure Ranking (performed before a new assessment) Number of Records Type of Data (Basic PII, Sensitive PII, PHI, CHD, IP) Annual Spend (in $$$) VARR (Vendor Assessment Risk Rating) Score (performed after a net-new assessment for the purposes of scheduling a reassessment) Exposure Ranking SIG Score Assessor Score 14
15 Types of Implementation TPRP Operations can be implemented in one of two structures: Centralized Decentralized 2011 The Shared Assessments Program. All Rights Reserved. 15
16 Centralized Structure Centralized operations tend to have the following: Contained within a single business unit reporting to a CxO Is known to all stakeholders (i.e., BU s) across the enterprise Offers a one-stop shop for other stakeholders to go to Applies consistent assessment methodologies and execution strategies Tend to have more structure in their processes and practices Tends to apply the P = p1(p2+p3) formula More smoothly run operationally 16
17 Centralized Structure (Challenges) It s often difficult for VAP assessors to know all that is going on with larger third party service providers (i.e., multiple scopes, project, applications being supported, etc.) Getting timely participation by smaller TPSP s who are managed by large business partners/vendors to cooperate, that is; the assessment tends to get lost in the shuffle by the parent vendor overseeing the relationship May not truly understand the needs of every BU and why they have selected or are using a particular TPSP If an assessment doesn t go well bad blood may occur to have to force the BU to cut the TPSP off! 17
18 Example: Centralized Structure CISO/ CPO/ CIO/ CCO/ COO/CRO/CA VP/ Managing Director Director/Manager Third Party Risk Program (Administration) Director/Manager Third Party Risk Program (Security Assessments) External Assessment Augmentation VAP Analyst Security Assessor VAP Analyst Security Assessor VAP Analyst Security Assessor 18
19 Decentralized Structure TPR Assessors reside in multiple business units, reporting up to multiple Business Unit VP s; silo-ed operations Solid-line up to the BU VP Dotted-line to a VAP Manager/Director Stakeholders (i.e., BU VP s) want control over their TPSP s, thereby handling the assessment of the TPSP gives them a form of control BU s who tend to maintain an IT services team in their group usually have someone dedicated to TPR tasks 19
20 Decentralized Structure (Challenges) Tend not to have a centralized policy and apply inconsistent assessment methodologies and execution strategies (that is; not utilize P = p1(p2+p3) ) Inconsistent assessment methods likely occur as assessors tend to use different tools for assessments (i.e., using tools other that the SIG) May pose little knowledge sharing outside of the BU with respect to their TPSP s or the results of the assessments May have inconsistent report distribution of assessments to appropriate levels of management Assessment reports do not always get to other Stakeholders who may utilize the TPSP for other projects 20
21 Example: Decentralized Structure 21
22 Types of Implementations What Method is right for your organization? Centralized Decentralized YOU NEED TO DECIDE! 2011 The Shared Assessments Program. All Rights Reserved. 22
23 Laying the Groundwork for Using TPSP Questionnaires Know your TPSP Identification who are they and want do they do? Who are your third party service providers? What services do they provide? Classification what risk do they present to your organization? Vendor risk rating and classification 23
24 TPSP Identification Who are your third party service providers? Shared services Software providers Cloud providers and other hosted services Outsourced services (e.g., certain HR functions) Vendors Any entity who provides you with goods/services 24
25 TPSP Classification Define your TPSP s by what they do (i.e. scope of work) and what they can access (e.g., data): What data/systems do they have access to? PII? PHI? CHD (PCI)? Corporate confidential/intellectual property? What is the risk to that data/system? What is the risk exposure (or ranking ) to that data? What is your tolerance of risk? How is it calculated? Is it the same across the board (i.e., same for PII, PHI, CHD, IP/strategic, etc.)? 25
26 TPSP Classification TPSP risk classification/rating Established standards for risk tiers/classifications based on corporate risk tolerance Contract requirements Level/type of assessment Frequency of assessment Consistent assignment of vendor risk classifications Validation of TPSP risk classification included in periodic assessment 26
27 TPSP Assessment Program Lifecycle TPSP Self-assessments Define scope Define data in use Distribute SIG Phase 1: Pre- Assessment Phase 2: Assessment Perform kickoff Obtain BU and vendor docs Acquire SIG responses TPSP risk rating Change(s) in services Risk scoring Phase 4: TPSP Criteria Evaluation Phase 3: Post- Assessment Update BU and vendor management Track CI s ( issues ) BU/vendor docs Remediate CI s 27
28 Phase 1 Pre-Assessment Who? Who exactly do we assess? What? What are we to assess? Where? Where should we assess them (i.e., what locations?) When? When do we assess? When do we re-assess? 28
29 Who Do We Assess? Any vendor that performs the following to our data: Collect Store Transmit/transport Use Process Interface Destroy 29
30 What are we to Assess? At what level do we look at the vendor? Enterprise? Geographic? Business line (i.e., service)? Scope/solution specific? Combination of one or more of the above? 30
31 What are we to Assess? Determine the scope of the assessment TPSP risk rating Standard corporate requirements Type of services provided Type of data Periodic or event triggered Determine appropriate assessment questionnaire to be utilized Provide instructions to TPSP Specific requirements Assessment timeline 31
32 Where do we Assess them? State-side: Any place handling your sensitive information that if a breach occurs it could result in significant damage or unnecessary costs to your organization Offshore: Any country; but certainly one that is not bound by a safe-harbor agreement 32
33 When do we Assess and Re-assess? Assess: When you are notified of: A new TPSP or an existing TPSP that experiences a change to their business An existing vendor with a modification of their current scope of work An existing vendor with a new/different scope of work Re-assess: When you are notified of: A scheduled point in time for the reassessment to begin based on predetermined criteria 33
34 Phase 2 - Conducting The Assessment Who should conduct the assessment? Type of Governance Centralized Decentralized Business Unit TPSP management organization TPSP relationship manager(s) Risk management Corporate compliance Procurement IT security Training 34
35 Phase 2 - Conducting The Assessment Who should conduct the assessment? Resource considerations Training Budget External 35
36 Phase 2 - Conducting The Assessment Phase 2 tasks Kickoff meeting with vendor Contacts? Deliverables? Timelines? Request/review pertinent documentation: Documentation Contracts, SOW s, NDA s TPSP internal docs Follow up on any discrepancies regarding services/locations Identify any potential critical items/contingent items (CI s) i.e., audit issues/findings Have exit interview to ensure CI s are accurate Compose the assessment report Report presented to vendor and internal business owner 36
37 Phase 2 - Conducting The Assessment How to effectively use assessment results Use your assessment results Prioritize risk rank areas and/or specific questions Establish a process to define and identify TPSP performance issues Report vendor performance issues to appropriate levels of management 37
38 Phase 3 - The Post-Assessment Remediating vendor performance issues All issues should be risk ranked and prioritized for corrective action Assign appropriate individual(s) responsible for closing issues Timeline for closing issues should be established and communicated to vendor Monitor prioritized issues to ensure corrective action is taken in a timely manner Escalate to management if timelines not met When termination is unavoidable 38
39 Phase 4 Criteria Evaluation TPSP termination without business interruption Well defined termination/exit strategy must be fair to both parties Ongoing services during winding down period Work product and IP transition Same TPSP team to remain in place (unless they are the issue) Cooperation with new vendor Parallel services Cost Data security and transfer/destruction (with applicable assertion) Recovery/destruction of data from subcontractors Ability to audit/validate requirements met 39
40 Phase 4 - Criteria Evaluation How frequently should a TPSP be assessed? Scheduled/periodic review schedule should be developed during requirements phase and based on the TPSP risk rating, and other prioritized factors Event triggered reviews/assessments are based on specifically identified events Data breach/incident Merger/acquisition Act of God Contract breach Performance failure Location changes 40
41 Discuss: the Full SIG Lite and SIG Lite Full SIG When to use the full SIG SIG Lite When to use it in lieu of the full SIG 41
42 The Shared Assessments Vendor Risk Management Maturity Model (VRMMM) The focus of the VRMMM is to provide third party risk managers with a tool they can use to evaluate their program against a comprehensive set of best practices. Using governance as the foundational element, the model identifies the framework elements critical to a successful program. 42
43 The Shared Assessments Vendor Risk Management Maturity Model (VRMMM) High-level components are broken down into subcomponents in a manner that makes the model adaptable across a wide spectrum of industry groups. Being able to identify specific areas for improvement the VRMMM allows companies to make well-informed decisions on how to spend limited resources to most effectively manage vendor related risks. 43
44 The Finish Line Your Take-Away s 1. Have a general understanding what it takes to implement and maintain a TPR assessment program 2. Make sure you have developed a thorough framework for using vendor questionnaires 3. Know your W s the who, what, where and when of vendor assessment 4. Make sure that completed TPSP questionnaires are properly reviewed and mitigation plans are developed and tracked for completion 44
45 For More Information Resources FAQs and tips for getting started Case studies Enterprise Cloud Computing Guide Members Partners Join us on LinkedIn! Contact: Julie Lebo; VP of Member Relations: ; [email protected] Tom Garrubba; Sr. Director, Shared Assessments Program: ; [email protected]
Top 10 Tips for Effectively Assessing Third-party Vendors
Top 10 Tips for Effectively Assessing Third-party Vendors Presented by: Tom Garrubba, Manager, Technical Assessments Group, CVS Caremark Web Hull, Senior Privacy & Compliance Specialist, Iron Mountain
PwC Viewpoint on Third Party Risk Management
www.pwc.com PwC Viewpoint on Third Party Risk Management November 2013 Significant others: How companies can effectively manage the risks of vendor relationships Are vendors more trouble than they re worth?
Third-Party Cybersecurity and Data Loss Prevention
Third-Party Cybersecurity and Data Loss Prevention SESSION ID: DSP-W04A Brad Keller Sr. Vice President Santa Fe Group Jonathan Dambrot, CISSP CEO, Co-Founder Prevalent Networks 3rd Party Risk Management
2014 Vendor Risk Management Benchmark Study
2014 Vendor Risk Management Benchmark Study Introduction/Executive Summary You can have all the security in the world inside your company s four walls, but all it takes is a compromise at one third-party
PwC Health Industries Viewpoint on Third Party Risk Management
www.pwc.com November 2013 PwC Health Industries Viewpoint on Third Party Risk Management Significant others: How companies can effectively manage the risks of third party relationships Are vendors more
KLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT
1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT About Kyle Lai 2 Kyle Lai, CIPP/G/US, CISSP, CISA, CSSLP, BSI Cert. ISO 27001 LA President of KLC Consulting, Inc. Over 20 years in IT and Security Security
CORL Dodging Breaches from Dodgy Vendors
CORL Dodging Breaches from Dodgy Vendors Tackling Vendor Security Risk Management in Healthcare Introductions Cliff Baker 20 Years of Healthcare Security experience PricewaterhouseCoopers, HITRUST, Meditology
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare
Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare Strengthening Cybersecurity Defenders #ISC2Congress Healthcare and Security "Information Security is simply a personal
2015 Vendor Risk Management Benchmark Study. The Shared Assessments Program and Protiviti Examine the Maturity of Vendor Risk Management
2015 Vendor Risk Management Benchmark Study The Shared Assessments Program and Protiviti Examine the Maturity of Vendor Risk Management INTRODUCTION/EXECUTIVE SUMMARY MANY ORGANIZATIONS ARE NOT PREPARED
Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015
Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...
Identifying and Managing Third Party Data Security Risk
Identifying and Managing Third Party Data Security Risk Legal Counsel to the Financial Services Industry Digital Commerce & Payments Series Webinar April 29, 2015 1 Introduction & Overview Today s discussion:
DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1
DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 Continuously Assess, Monitor, & Secure Your Information Supply Chain and Data Center Data Sheet: Security Management Is your organization able
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
Data Loss Prevention. Keeping sensitive data out of the wrong hands*
Data Loss Prevention Keeping sensitive data out of the wrong hands* September 9, 2007 Aaron Davies-Morris, Director PwC Advisory Services Zeke Jaggernauth, Manager PwC Advisory Services Agenda Data Breaches
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Business Associates under HITECH: A Chain of Trust
FAQ on InfoSafe Shredding Services: Frequently Asked Questions on InfoSafe Shredding Information And Video on One Time Cleanouts: Cleanouts and Purges Business Associates under HITECH: A Chain of Trust
HITRUST CSF Assurance Program
HITRUST CSF Assurance Program Simplifying the information protection of healthcare data 1 May 2015 2015 HITRUST LLC, Frisco, TX. All Rights Reserved Table of Contents Background CSF Assurance Program Overview
HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant
1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad
Managing data security and privacy risk of third-party vendors
Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected
Enterprise Risk Management VCU Process
VCU Process What is Enterprise Risk Management? An organization-wide systematic approach to identify and tactically manage risk. A best practice to prioritize risk and implement processes to monitor risk.
BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS
BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM This Business Associate Addendum ( Addendum ), effective, 20 ( Effective Date ), is entered into by and between University of Southern California, ( University
Managing Open Source Code Best Practices
Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate
9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania
Evaluating and Managing Third Party IT Service Providers Are You Really Getting The Assurance You Need To Mitigate Information Security and Privacy Risks? Kevin Secrest IT Audit Manager, University of
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Risk Management: IT Vendor Management and Outsourcing
www.pwc.com Risk Management: IT Vendor Management and Outsourcing Definitions Third Party is any entity not under direct business control of a given organization. Many people equate third parties with
Why Add Data Masking to Your IBM DB2 Application Environment
Why Add Data Masking to Your IBM DB2 Application Environment dataguise inc. 2010. All rights reserved. Dataguise, Inc. 2201 Walnut Ave., #260 Fremont, CA 94538 (510) 824-1036 www.dataguise.com dataguise
IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014
IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system
Data Security: Fight Insider Threats & Protect Your Sensitive Data
Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand
Cyber, Security and Privacy Questionnaire
Cyber, Security and Privacy Questionnaire www.fbinsure.com Please note: This is an electronic application. When completed please save and email to: Ed McGuire [email protected] Cyber, Security & Privacy
2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents
2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Healthcare Payment Processing: Managing Data Security and Privacy Risks
Moderator: Linda A. Malek Chair, Healthcare Moses & Singer LLP Healthcare Payment Processing: Managing Data Security and Privacy Risks Thursday, September 13, 2012 Panelists: Beth L. Rubin Senior Counsel
BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement is made as of the day of, 2010, by and between Methodist Lebonheur Healthcare, on behalf of itself and all of its affiliates ( Covered Entity
Best Practices for DLP Implementation in Healthcare Organizations
Best Practices for DLP Implementation in Healthcare Organizations Healthcare organizations should follow 4 key stages when deploying data loss prevention solutions: 1) Understand Regulations and Technology
In accordance with risk management best practices, below describes the standard process for enterprise risk management (ERM), including:
Enterprise Risk Management Process and Procedures Scope In accordance with risk management best practices, below describes the standard process for enterprise risk management (ERM), including: Risk identification
Data Loss Prevention and HIPAA. Kit Robinson Director [email protected]
Data Loss Prevention and HIPAA Kit Robinson Director [email protected] ID Theft Tops FTC's List of Complaints For the 5 th straight year, identity theft ranked 1 st of all fraud complaints. 10 million
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :
Data Security & PCI Compliance Securing Your Contact Center Session Name : Title Introducing Trevor Horwitz Pi Principal, i TrustNet t [email protected] John Simpson CIO, Noble Systems Corporation
Your world runs on applications. Secure them with Veracode.
Application Risk Management Solutions Your world runs on applications. Secure them with Veracode. Software Security Simplified Application security risk is inherent in every organization that relies on
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World
Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World Web Hull Privacy, Data Protection, & Compliance Advisor Society
SHARED ASSESSMENTS PROGRAM STANDARDIZED INFORMATION GATHERING (SIG) QUESTIONNAIRE
SHARED ASSESSMENTS PROGRAM STANDARDIZED INFORMATION GATHERING (SIG) QUESTIONNAIRE The Shared Assessments Trust, But Verify Model The Shared Assessments Program Tools are used for managing the vendor risk
HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist
HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various
Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide
Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide. Four steps for success Implementing a Data Loss Prevention solution to address PCI requirements may be broken into four key
Two Approaches to PCI-DSS Compliance
Disclaimer Copyright Michael Chapple and Jane Drews, 2006. This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes,
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement
Business Associate Management Methodology
Methodology auxilioinc.com 844.874.0684 Table of Contents Methodology Overview 3 Use Case 1: Upstream of s I manage business associates 4 System 5 Use Case 2: Eco System of s I manage business associates
INFORMATION TECHNOLOGY RISK MANAGEMENT PLAN
10/25/2012 TECHNOLOGY SERVICES INFORMATION TECHNOLOGY RISK MANAGEMENT PLAN Procedure Name: LIT Risk Management Information Technology Plan ver 2.31.docx Risk Management Plan Issue Date: TBD Procedure Owner:
PCI Compliance: How to ensure customer cardholder data is handled with care
PCI Compliance: How to ensure customer cardholder data is handled with care Choosing a safe payment process for your business Contents Contents 2 Executive Summary 3 PCI compliance and accreditation 4
2012 HIPAA Privacy and Security Audits
Office of the Secretary Office for Civil Rights (OCR) 2012 HIPAA Privacy and Security Audits Linda Sanches OCR Senior Advisor, Health Information Privacy Lead, HIPAA Compliance Audits OCR 1 Agenda Background
PROJECT MANAGEMENT PLAN <PROJECT NAME>
PROJECT MANAGEMENT PLAN TEMPLATE This Project Management Plan Template is free for you to copy and use on your project and within your organization. We hope that you find this template useful and welcome
WHITE PAPER THIRD PARTY MANAGEMENT: FUNDAMENTALS
THIRD PARTY MANAGEMENT: FUNDAMENTALS by Linda Tuck Chapman Sponsored by Third Party Management Fundamentals Third Party Management isn t new, but its importance is growing in every industry and the financial
Sample Statement of Work
Sample Statement of Work Customer name Brad Miller [email protected] Fishnet Security Sample Statement of Work: Customer Name Scope of Work Engagement Objectives Customer, TX ( Customer or Client )
PCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing
HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information
Nine Network Considerations in the New HIPAA Landscape
Guide Nine Network Considerations in the New HIPAA Landscape The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus Final Rule, released January 2013, introduced some significant
Well-Documented Controls Reduce Risk and Support Compliance Initiatives
White Paper Risks Associated with Missing Documentation for Health Care Providers Well-Documented Controls Reduce Risk and Support Compliance Initiatives www.solutionary.com (866) 333-2133 Many Health
HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers
How to Effectively Collaborate with Cloud Providers Speaker Bio Chad Kissinger Chad Kissinger Founder OnRamp Chad Kissinger is the Founder of OnRamp, an industry leading high security and hybrid hosting
Solution Briefing. Integrating the LogLogic API with NSN s Remediation & Escalation Mgmt. System
Solution Briefing Integrating the LogLogic API with NSN s Remediation & Escalation Mgmt. System Tim Larson August 2009 Introduction Nokia Siemens Network s environment Company: Leading provider of mobile
SECURETexas Health Information Privacy & Security Certification Program FAQs
What is the relationship between the Texas Health Services Authority (THSA) and the Health Information Trust Alliance (HITRUST)? The THSA and HITRUST have partnered to help improve the protection of healthcare
Vendor Management Panel Discussion. Managing 3 rd Party Risk
Vendor Management Panel Discussion Managing 3 rd Party Risk Vendor Risk at its Finest Vendor Risk at its Finest CVS Care Mark Corporation announced that it had mistakenly sent letters to approximately
PCI DSS READINESS AND RESPONSE
PCI DSS READINESS AND RESPONSE EMC Consulting Services offers a lifecycle approach to holistic, proactive PCI program management ESSENTIALS Partner with EMC Consulting for your PCI program management and
HIPAA SECURITY RISK ANALYSIS FORMAL RFP
HIPAA SECURITY RISK ANALYSIS FORMAL RFP ADDENDUM NUMBER: (2) August 1, 2012 THIS ADDENDUM IS ISSUED PRIOR TO THE ACCEPTANCE OF THE FORMAL RFPS. THE FOLLOWING CLARIFICATIONS, AMENDMENTS, ADDITIONS, DELETIONS,
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
Outbound Email Security and Content Compliance in Today s Enterprise, 2005
Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Results from a survey by Proofpoint, Inc. fielded by Forrester Consulting on outbound email content issues, May 2005 Proofpoint,
Payment Card Industry Data Security Standard (PCI DSS) v1.2
Payment Card Industry Data Security Standard (PCI DSS) v1.2 Joint LA-ISACA and SFV-IIA Meeting February 19, 2009 Presented by Mike O. Villegas, CISA, CISSP 2009-1- Agenda Introduction to PCI DSS Overview
HIPAA and HITRUST - FAQ
A COALFIRE WHITE PAPER HIPAA and HITRUST - FAQ by Andrew Hicks, MBA, CISA, CCM, CRISC, HITRUST CSF Practitioner Director, Healthcare Practice Lead Coalfire February 2013 Introduction Organizations are
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
Gilead Clinical Operations Risk Management Program
Gilead Clinical Operations Risk Management Program Brian J Nugent, Associate Director 1 Agenda Risk Management Risk Management Background, Benefits, Framework Risk Management Training and Culture Change
SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR
SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR Michael de Crespigny, CEO Information Security Forum Session ID: GRC R02B Session Classification: General Interest KEY ISSUE Our
Building Best Practices for Effective Monitoring of a Third Party s Incident Event Management Program. A Shared Assessments Briefing Paper
Building Best Practices for Effective Monitoring of a Third Party s Incident Event Management Program A Shared Assessments Briefing Paper Abstract Just 43% of incident management professionals report their
Exercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
Department of Children and Families (DCF) Request for Information (RFQ) #01U013DS1 HIPAA Compliance Review DCF Answers to Vendor Questions
Department of Children and Families (DCF) Request for Information (RFQ) #01U013DS1 HIPAA Compliance Review s to Vendor Questions Questions as Submitted by Vendors (Duplicates omitted) 1. Have controls
OC Chapter. Vendor Risk Management. Cover the basics of a good VRM program, standards, frameworks, pitfall and best outcomes.
OC Chapter Vendor Risk Management. Cover the basics of a good VRM program, standards, frameworks, pitfall and best outcomes. 2 Why Assess a Vendor? You don t want to be a Target for hackers via your vendors
3 rd -party Security Risk Assessment
3 rd -party Security Risk Assessment Understanding Supplier Chain Risks. Presented by: Nasser Fattah CISSP, CISM, CISA, CGEIT Email: [email protected] Linkedin: www.linkedin.com/in/nasserfattah April
The Importance of Senior Executive Involvement in Breach Response
The Importance of Senior Executive Involvement in Breach Response Sponsored by HP Enterprise Security Services Independently conducted by Ponemon Institute LLC Publication Date: October 2014 The Importance
Guidance on Risk Analysis Requirements under the HIPAA Security Rule
Guidance on Risk Analysis Requirements under the HIPAA Security Rule Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.
Publication 805-A Revision: Certification and Accreditation
Postal Bulletin 22358 (3-7-13) Policies, Procedures, and Forms Updates Publication 805-A Revision: Certification and Accreditation Effective immediately, the January 2013 edition of Publication 805-A,
