Corporate Security Awareness. The Common Sense of Compliance



Similar documents
Intel Enhanced Data Security Assessment Form

Top Ten Technology Risks Facing Colleges and Universities

ISO Controls and Objectives

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Fortinet Solutions for Compliance Requirements

Information Technology Branch Access Control Technical Standard

HIPAA Security Alert

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

ISO27001 Controls and Objectives

IBX Business Network Platform Information Security Controls Document Classification [Public]

PROVIDING IT SOLUTIONS FOR THE HEALTHCARE INDUSTRY

CHIS, Inc. Privacy General Guidelines

DHHS Information Technology (IT) Access Control Standard

How To Protect Decd Information From Harm

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO / HIPAA / SOX / CobiT / FIPS 199 Compliant

Data Security Incident Response Plan. [Insert Organization Name]

Security and Privacy

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Data Loss Prevention Program

Cybersecurity Issues for Community Banks

Data Management & Protection: Common Definitions

SECURITY ORGANISATION Security Awareness and the Five Aspects of Security

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

HIPAA Compliance Review Analysis and Summary of Results

Information Security: A Perspective for Higher Education

Pursuing Compliance with the FFIEC Guidance Risk Assessment 101 KPMG RISK ADVISORY SERVICES

UF IT Risk Assessment Standard

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

Compliance Quick Reference Guide

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Information Security Policy

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Certified Information Systems Auditor (CISA)

Domain 5 Information Security Governance and Risk Management

Security Controls What Works. Southside Virginia Community College: Security Awareness

Compliance and Industry Regulations

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

State HIPAA Security Policy State of Connecticut

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

BANKING SECURITY and COMPLIANCE

A Technical Template for HIPAA Security Compliance

Security Practices for Online Collaboration and Social Media

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

SECURITY. Risk & Compliance Services

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

System Security Plan University of Texas Health Science Center School of Public Health

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

How To Protect School Data From Harm

Page 1 Disclaimer: None of the provisions of this document constitute legal advice. If you need legal advice on the provisions of the laws listed,

HIPAA Privacy & Security White Paper

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

INFORMATION SECURITY PROGRAM

Fundamentals of Network Security - Theory and Practice-

Information Security Program Management Standard

Altius IT Policy Collection Compliance and Standards Matrix

Security Issues with Integrated Smart Buildings

INFORMATION TECHNOLOGY SECURITY STANDARDS

HIPAA Security. assistance with implementation of the. security standards. This series aims to

2012 NCSA / Symantec. National Small Business Study

HIPAA and Mental Health Privacy:

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

HIPAA DATA SECURITY & PRIVACY COMPLIANCE

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Samsung Security Solutions

How To Manage Security On A Networked Computer System

Excerpt of Cyber Security Policy/Standard S Information Security Standards

Incident Reporting Guidelines for Constituents (Public)

Section 12 MUST BE COMPLETED BY: 4/22

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

INCIDENT RESPONSE CHECKLIST

Information Resources Security Guidelines

Potential Targets - Field Devices

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Music Recording Studio Security Program Security Assessment Version 1.1

SCAC Annual Conference. Cybersecurity Demystified

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Nine Network Considerations in the New HIPAA Landscape

Transcription:

Corporate Security Awareness The Common Sense of Compliance 1

Information Theft Physical Vendor/Client Fraudulent Activities Stolen Assets (i.e. backup tapes) Compromised Assets (vengeful employees) Other (Dumpster Diving, et al) Social Engineering Chat Rooms, Instant Messaging Web spaces, Blogs, Forums Shadowing, Eavesdropping Logical Phishing, Pharming, Spam Network/Domain Hijacking, Man-in-the-middle Attacks Spyware, Keyloggers, Viruses 70% of all information theft is still physical Talk about newer cyber-threats: especially spear-phishing 2

Explain purpose of comprehensive security awareness as building block for all other initiatives. 3

Awareness Training Legal requirements for data Ownership of data Intellectual property protection Security requirements for users Privacy expectations Auditing requirements for users activities Secure workspace requirements (passwords, etc) Acceptable use policy for Internet, email and IM Sensitivity to threats, risks and vulnerabilities Physical, personal and information vulnerabilities Responsibility of users to report issues People s behavior is based upon their principles and their values. An effective awareness program helps the workforce adopt the organization s principles and values. The message is persuasive when the information is relevant to their values 4

Regulations / Standards FFIEC October 2005 Guidance Sarbanes-Oxley Act of 2002 Gramm-Leach-Bliley Act of 1999 Basel II FIPS 200, HSPD-12 ISO 9001, ISO 17799, COBIT, ITIL Speak briefly on each, give some examples. FFIEC Multi-Factor (1½ factor) authentication for any remote transactions SOX affects only public companies, but has far broader applications than GLB and includes criminal penalties for individual executives who fail to comply with its provisions. Section 302 deals with Corporate Responsibility For Financial Reports. Computer security comes into play here because your executives need to know that your data has not been tampered with. Somebody in your organization, if your company qualifies under the act, is going to have to sign off that the data is accurate and hasn't been tinkered with. Section 404 deals with Management Assessment Of Internal Controls. Here again, computer security plays a role. Someone up there (maybe even you) is going to have to outline the controls that are in place that are safeguarding your company data and assess how well those controls are working. Section 409 deals with Real Time Disclosure. On the surface, this doesn't sound like a computer security issue, but your organization is going to be the one providing the numbers and they have to be accurate and easily available for quick distribution. That means that the numbers need to be fully automated and that they are protected from accidental or intentional loss. Further, that information cannot be tampered with once issued. GLB The Gramm-Leach-Bliley Act of 1999 (sometimes called the Financial Modernization Act, and usually known as GLB) is intended to ensure protection of consumers private financial data, which the Act refers to as Nonpublic Personal Information (NPI). GLB applies to a wide range of financial institutions and other organizations that maintain NPI related to their customers. The areas of greatest concern to most companies, and to corporate messaging managers, are the Financial Privacy Rule, which covers the collection, use, and disclosure of NPI, and the Safeguards Rule, which describes the processes companies must take to protect NPI. The Financial Privacy Rule is relevant to messaging because it covers the implementation of opt-out policies and privacy notices. For the most part, these are technology independent. The Safeguards Rule is more directly related to messaging infrastructure. It states that companies must maintain security programs that are commensurate with their size and complexity, as well as with the sensitivity of the NPI. More specifically, the Rule covers the use of technologies to prevent interception, automated enforcement of corporate policies related to message content, and general email security provisions. ISO 17799 - security policy, objectives and activities that properly reflect business objectives - a sound understanding of security risk analysis, risk management and security requirements - an approach to security implementation which is consistent with the organization's own culture - clear management commitment and support - effective 'marketing' of security to employees (including managers) - proper distribution and guidance on security policy to all employees and contractors - provision of adequate education and training - a balanced and comprehensive measurement system to evaluate performance in IS management and feedback suggestions for improvement 5

Security Objectives Corporate Liability Protection Client Data Protection Personal Identity Protection Regulations were not made to point fingers - Good business practices with a technical twist - Needed to be verbalized when governing bodies failed - (opinion) started early 80s when corporations started choosing short-term profit without regard for long-term effects - Ensures corporate focus as well as accountability A corporation s only true assets are - real estate (or other non-depreciable physical asset), - intellectual property (including its knowledge base), - customer base. 6

Corporate Liability Protection Ability to safeguard intellectual property Maintains/builds shareholder/owner trust Higher company valuation The ability to protect IP is almost as important as the ability to exploit IP. When both are accomplished in an effective and visibly positive manner, the shareholder/owner trust in the upper-level management decision process greatly improves. This effect can lead to more leash to expand decision-making capabilities. Although it is intangible, consider the opposite. Failure to protect IP (or exploit IP) will lead to a more conservative stance, stifle innovation and eventually stagnate growth. 7

Client Data Protection Ability to protect customer/vendor data Maintains/builds client relationships Longer customer engagements Build market share Along with IP, a corporation s client base is paramount to its success. Most business models address either increasing market share through customer quantity or customer quality. As many retail banks have found, failure to protect client data can be devastating to market share. However, many are only beginning to realize the potential tangible gains of making consumer protection more explicit and visible. Similarly, wholesale businesses need to be cognoscente of the indirect role they play in client data protection. 8

Personal Identity Protection Ability to protect employees and constituents Mitigates employee misconduct Less turnover More manageable workforce Elaborate on the FUD factor, but try not to diverge too long on this subject. 9

Security Goals Everyone should be AWARE of their environment Policies that are EASY to understand and implement 10

Policy Goals Avoid Prevention / Awareness 99% User Responsibility Trap Early-Detection / IDS Facilitated by Technology Still 50% User Responsibility Mitigate Reaction / Notification Regulated Responsibility User responsibility to report Cockpit Resource Management Pre-plans all possible problem scenarios Developed by the FAA in response to the crash of United Airlines Flight 173 on December 28, 1978. Avoid: Do everything reasonable to prevent the opportunity for attack. Trap: Be aware of triggers that indicate an impending attack. Mitigate: Always plan for when and not if an attack happens. In the loosest interpretations, compliance is the documentation of processes. In the strictest terms, compliance is the validation of processes. Policies should be written using a consistent interpretation. Overall make it EASY to understand and act on!!! 11

Policy Focus Data Accurate, Secured, Archived, Accessible Processes Well-defined, Documented, Repeatable, Audited Decisions Well-defined, Documented Data: Data Origination and Identification -- Endpoints, Transports, Users Data, Meta-Information and Business Intelligence -- Accurate, Secured, Archived, Accessible Data Manipulation, Auditing and Archival Processes -- Accurate, Audited Data Disposal -- Secure, Audited Processes: Well-defined and documented Repeatable Audited Decisions: Behavioral provide guidelines Business well-defined and documented 12

Policy Areas People Visitor / Guest Policies Business Focus Day-to-Day Activities Roles and Responsibilities Separation of Duties Role Based Access Control Least Privilege Tiered Access Write-Up and Read-Down Secure Communications Security Awareness Disruptive Technologies Systems Workstations Communication Devices Network Infrastructure IDS / IPS DMZ Logging / Archiving Auditing Practices Physical Access Controls Process Documentation Business Continuity Disaster Recovery Secure Data Backup Speak briefly on each with one example. 13

Policy Walkthrough Disruptive Technologies Avoid Communicate policies when There exists significant or unrealizable security risks Liabilities outweigh the benefits Trap Keep an open communication channel Research new disruptive technologies Document findings and review as technology matures Mitigate Embrace new disruptive technologies When appropriate In a secure way (i.e. sandbox) We want a positive spin 14

Disruptive Technologies Peer/Collaborative Tools Usage: Remote offices, tele-workers and B2B relationships Benefits: Increased productivity Decrease travel Liabilities: Strict time/subject management, possibly a facilitator Coordination issues Conflict resolution Security/Confidentiality of subject matter Be positive, give examples of acceptable peer technologies. Talk about security issues. 15

Disruptive Technologies Un-tethered Devices Usage: Portability and mobility Benefits: Allows for more productive work on the road Allows corporate applications to PUSH information Liabilities: Primary source of corporate IP theft (physical theft) Lack of security / encryption Lack of accountability Be positive, give examples of acceptable personal devices. Talk about security issues. 16

Disruptive Technologies Personal Spaces Usage: Inter-company communications Knowledge Bases Benefits: Allows for more effective grassroots communication Liabilities: Source of corporate IP theft (social engineering) Lack of corporate protocol Lack of information confidentiality Be positive, give examples of acceptable personal spaces. Talk about security issues. 17

Questions John C. Checco, CISSP John.Checco@CheccoServices.com 1-845-942-4246 18