Governance, Risk & Compliance for Public Sector



Similar documents
How To Manage Risk

How To Ensure Financial Compliance

<Insert Picture Here> Oracle Database Vault

Complete Database Security. Thomas Kyte

<Insert Picture Here> Oracle Identity And Access Management

Minimize Access Risk and Prevent Fraud With SAP Access Control

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Oracle Identity Management Securing The New Digital Experience

Oracle Database Security

Identity Governance Evolution

An Oracle White Paper January Access Certification: Addressing & Building on a Critical Security Control

Enterprise Identity Management Reference Architecture

Oracle Fusion Applications Security Guide. 11g Release 5 (11.1.5) Part Number E

Protecting Sensitive Data Reducing Risk with Oracle Database Security

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

Rebuilding Corporate Trust: GRC and IT Governance. Dražen Patarić Senior Sales Consultant

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

JD Edwards EnterpriseOne: Governance, Risk, and Compliance

ORACLE APPLICATION ACCESS CONTROLS GOVERNOR FOR PEOPLESOFT

<Insert Picture Here> Oracle Database Security Overview

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION

RSA Identity Management & Governance (Aveksa)

IT Governance, Risk and Compliance (GRC) : A Strategic Priority. Joerg Asma

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

Data Security: Strategy and Tactics for Success

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Oracle Reference Architecture and Oracle Cloud

Business-Driven, Compliant Identity Management

Take Control of Identities & Data Loss. Vipul Kumra

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

Oracle Role Manager. An Oracle White Paper Updated June 2009

<Insert Picture Here> Oracle Fusion: The New Standard for Enterprise Software

Best Practices Report

How To Improve Your Business

Enterprise Content Management Suite 11g

<Insert Picture Here> Oracle and Stellent Acquisition Announcement

Metrics that Matter Security Risk Analytics

Addressing Cyber Security in Oracle Utilities Applications

Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by:

XBRL & GRC Future opportunities?

Application Control Effectiveness for SAP. December 2007

Sarbanes-Oxley Compliance and Identity and Access Management

Sarbanes-Oxley Control Transformation Through Automation

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Business-Driven, Compliant Identity Management

C21 Introduction to User Access

MINISTRY OF FINANCE, PLANNING AND ECONOMIC DEVELOPMENT THE THIRD FINANCIAL MANAGEMENT AND ACCOUNTABILITY PROGRAMME (FINMAPIII) TERMS OF REFERENCE

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

Incorporate CMMI with Corporate Governance Using Enterprise Software Change Management Solutions

Enterprise Risk Management in Compliance 360

Advisory Services Oracle Alliance Case Study

Oracle Audit Vault and Database Firewall

Identity Management: Securing Information in the HIPAA Environment

North American Consumer Products Partner Summit Winning with Edge Applications

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle

Trust but Verify: Best Practices for Monitoring Privileged Users

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Directory of. Advertising Supplement

Certified Identity and Access Manager (CIAM) Overview & Curriculum

ORACLE FUSION MIDDLEWARE PROFILE

Oracle Database Security Solutions

Identity and Access Management Point of View

Making Compliance Work for You

Select the right solution for identity and access governance

Security and Identity

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,

Leverage T echnology: Move Your Business Forward

Simplify and Automate IT

Reduce Audit Time Using Automation, By Example. Jay Gohil Senior Manager

Attestation of Identity Information. An Oracle White Paper May 2006

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Securing Data in Oracle Database 12c

10 Best-Selling Modules For Home Information Technology Professionals

RSA enables rapid transformation of Identity and Access Governance processes

A Smarter Way to Manage Identity

Regulatory Compliance Using Identity Management

Transcription:

<Insert Picture Here> Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales

From egovernment to Oracle igovernment

Increase Efficiency and Transparency Oracle igovernment Provide a Governance, Risk and Compliance Platform Deliver Shared Services Streamline Business Processes Planning and Budgeting Tax and Revenue Financial Management Human Resources Management Procurement Project and Grant Management

Governance, Risk & Compliance Critical for Government Agencies Governance is the process of deciding and documenting how the Agency operates. Increase Transparency: Clearly document processes, risks and controls. Risk Management is the process of ensuring that the right levels of risk are taken. Improve Public Trust: Identify and mitigate risks of mistakes & fraud BEFORE they happen Compliance is the process of ensuring and proving that policies (internal and external) are being followed. Reduce Cost of Compliance: Reduce Audit costs via Automation Increase Public Trust: Prove the Agency is operating right

GRC Terminology Processes Risks Best Practices Financial Governance (COSO) Operational Risk Management (ISO, 6Sigma) IT Governance (COBIT, ITIL) Risk Assurance Partners Specialists Audit Firms Controls Automated Controls Detective & Preventative Reports/Documentation Attestation ( I confirm that... )

Federal Aviation Administration COMPANY OVERVIEW Revenues > $250B 52,160 employees 1 of 4 Federal Centers of Excellence (COE) CHALLENGES / OPPORTUNITIES Mask sensitive data to comply with Privacy Act Lack of tools to identify & remediate control violations and establish effective monitoring process Difficulty satisfying management and audit requirements CUSTOMER PERSPECTIVE After searching for two years for a solution that would allow us to hide social security numbers from unauthorized users, LogicalApps showed us that they could selectively hide critical fields within minutes. Michelle Overstreet, Program Manager, FAA RESULTS Eliminated programming time for application customization Reduced detection and remediation time for control violations Developed a sustainable model to manage regulatory compliance SOLUTIONS Oracle GRC Controls

How Technology Helps GRC Catalog Risks & Controls Training Administration Automate Controls Reporting/Monitoring Workflow for Exception Tracking...BUT, don t approach each of these independently!

Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms Committing investment to an aggressive development road map A suite of controls products that is integrated into the GRC Manager platform Automated controls via technology takes us beyond Gartner s expectations.

How Oracle GRC Solutions help Challenge: Solution: Multiple Consolidate Requirements, Fragmented Response Regulation Regulation Risk Standard Standard A A BB C C R1 R2 R3 R1 R2 R3 R1 R2 R3 R1 R2 R3 C1a C2a C3a C1b C2b C3b C1c C2c C3c C5a C6a C7a C5b C6b C7b C5c C6c C7c C9a C10a C11a C9b C10b C11b C9c C10c C11c Challenge: Solution: Insufficient Automate Resources, Manual Efforts Challenge: Solution: GRC Embed as an Afterthought Or Holding Up the Business Process Reporting & Diagnostics Policy Remediation GRC Risk Issues GRC Business Business Process Processes Assessment Detective Control Preventive Control Sources: Adapted from Deloitte Consulting, Open Compliance and Ethics Group, and IDC

Oracle GRC Solutions GRC Reporting & Analytics Dashboards Reporting KRI & Alerts GRC Process Management Complete GRC Platform for any Government Agency Audit Management Assessment Issue & Remediation GRC Application Controls Event & Loss Mgmt Best-in-class GRC core solutions to support all mandates and regulations Identity Mgmt SOD & Access Application Configuration GRC Infrastructure Controls Data Security Systems Mgmt Records & Content Mgmt Transaction Monitoring Digital Rights Pre-integrated with Oracle applications and technology; supports heterogeneous environments Custom or Legacy Applications

CASE STUDY: US Postal Service The Postal Accountability & Enhancement Act Requirements and Impact Passed into law in December 2006 Segments the Postal Service s products Market Dominant mailing services Competitive shipping services Changes the rate setting process by segment Requires Sarbanes-Oxley Compliance by FY 2010 Ensures the integrity of financial statements similar to public companies USPS identified 2,400 controls to be documented! Live with Oracle GRC Manager

Oracle GRC Manager Document Risks & Controls across the Agency Standards & Mandates Risks Controls Central repository for policy, risk & compliance documentation Automate certifications, audits, and management assessments Capture issues and manage remediation Document Risk and Control Matrix Assess Scope Based on Risk Risk and Compliance Process Test Controls and Analyze Exceptions Remediate and Optimize Certify and Publish

IT Governance Implement a Best Practice Framework How do you ensure the Safety and Security of Citizen Information? What are your Risks of data loss? Gartner is predicting that by year-end 2010, ITIL will be in use by 30% of companies with 250-999 employees and by 60% of companies with more than 1,000 employees. The de-facto best practice guidance for IT services

Environmental Compliance Is your agency leading by example? ISO 14001 Compliant Environmental Management System Monitor Progress on Environmental Initiatives Report Key Compliance and Utilization Metrics

Oracle GRC Applications Controls GRC Reporting & Analytics Access Policy KPIs Risk & Control KPIs Certification KPIs GRC Process Management Documentation & Reporting Management Assessments Issues & Remediation GRC Application Controls Identity Mgmt SOD & Access GRC Infrastructure Controls Data Security Application Configuration Systems Mgmt Transaction Monitoring Records & Content Mgmt Digital Rights Preventive and detective controls What-if risk simulation Automated controls testing Custom or Legacy Applications

Automate Controls throughout the Agency Detect and prevent control failure Monitor Control Effectiveness What users have done Detective Controls What s changed in the environment What are the execution patterns ACCESS Controls CONFIGURATION Controls TRANSACTION Controls What users can do How the environment is setup Preventive Controls Enforce Policies in Context How users execute processes

Department of Health & Human Services ORGANIZATION OVERVIEW Established in 1817 Total assets of $658 Billion 35,000 employees World s largest implementation of Oracle E-Business Financials CHALLENGES / OPPORTUNITIES User access was too broad Privacy Act violations No way to track changes to data, including who, what, when and why changes were made SOD analysis process was expensive and ineffective RESULTS Resolved 85% of SOD conflicts across ERP system; implemented mitigating controls for remainder Resolved privacy issues with access to SSN information Created detailed access rules and comprehensive audit trails to ensure A- 123 compliance SOLUTIONS GRC Controls

Oracle GRC Infrastructure Solutions GRC Intelligence Dashboards Reporting KRI & Alerts GRC Manager Audit Management Assessment Issue & Remediation Event & Loss Mgmt GRC Application Controls SOD & Access Application Configuration Transaction Monitoring Identity Mgmt GRC Infrastructure Solutions Data Security Systems Mgmt Records Mgmt Digital Rights Enterprise-wide identity management Information security Systems configuration management Custom or Legacy Applications Records and digital rights management

Modernize the IT Infrastructure Oracle igovernment Ensure Security and Controlled Access Automate your IT Governance Risk Controls

Oracle Identity & Access Management End Users Administrator Info. Sec, Auditor Strong Authentication Risk Based Authorization Federation Self-Service Identity Admin Account Admin Organization Admin Role Management Delegated Admin Reporting & Analytics Attestation Segregation of Duties Fraud Detection Oracle Identity Management & Security Platform Provisioning Reconciliation Password Mgmt. WS Security LDAP Storage LDAP Synchronization LDAP Virtualization DB User Security Java Platform Security Authentication For Operating Systems Business Apps, HR Directories, DB App Server, OS

Oracle Database Security Defense-in-Depth for Security and Compliance Configuration Management Audit Vault Total Recall Database Vault Label Security Advanced Security Secure Backup Data Masking

Edge to Core Segregation of Duties 1 Create or change User Access 2 3 Oracle Identity & Access Management (IAM) Propose User Access request for Applications Managed by a SoD engine Return Policy with Actions & approvals Analyze impact and policy overrides if needed Access Controls GRC Controls Management Configuration Controls Transaction Controls Update User Account 5 4 Enforce DBA SoD Policy w/ Oracle Database Vault 6 Custom, Legacy,

Oracle GRC Reporting & Analytics Access Policy KPIs GRC Reporting & Analytics Risk & Control KPIs GRC Process Management Certification KPIs Pre-built dashboards aggregate information from all sources Produce Attestations & disclosures Configure to meet your needs Documentation & Reporting Management Assessments Issues & Remediation GRC Application Controls SOD & Access Application Configuration Transaction Monitoring GRC Infrastructure Controls Identity Mgmt Data Security Systems Mgmt Records & Content Mgmt Digital Rights Custom or Legacy Applications

GRC Intelligence Timely access to GRC information, better decisions 100+ pre-built KPIs for Risk, Certification, Controls, and Issues enable personalized reporting Self-service analysis and reporting with interactive dashboards and automated alerts Integrated financial statement and GRC information Review GRC Dashboards GRC Reporting & Analysis Configure Risk and Control KPIs Investigate Troubling KPIs Monitor All Open Issues

Oracle GRC Product Set Dashboards Audit Identity Mgmt SOD & Access GRC Reporting & Analytics Reporting GRC Process Management Management Assessment GRC Application Controls Application Configuration GRC Infrastructure Controls Data Security Systems Mgmt Issue & Remediation Records & Content Mgmt Custom or Legacy Applications KRI & Alerts Event & Loss Mgmt Transaction Monitoring Digital Rights GRC Reporting and Analytics Fusion GRC Intelligence GRC Process Management GRC Manager GRC Application Controls Application Access Controls Governor Configuration Controls Governor Transaction Controls Governor Preventive Controls Governor Mantas Behaviour Detection Reveleus Operational Risk GRC Infrastructure Controls Identity Manager Access Manager Role Manager Database Vault Audit Vault Advanced Security Secure Backup Enterprise Manager Universal Content Management Universal Records Management Information Rights Management