SECURITY RISK MANAGEMENT



Similar documents
Information Security Management System for Microsoft s Cloud Infrastructure

VENDOR MANAGEMENT. General Overview

Big Data, Big Risk, Big Rewards. Hussein Syed

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

Domain 1 The Process of Auditing Information Systems

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

THE BLUENOSE SECURITY FRAMEWORK

Information security risk management using ISO/IEC 27005:2008

SCAC Annual Conference. Cybersecurity Demystified

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

Top Ten Technology Risks Facing Colleges and Universities

Cyber Security. John Leek Chief Strategist

CORL Dodging Breaches from Dodgy Vendors

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

State of Oregon. State of Oregon 1

John Essner, CISO Office of Information Technology State of New Jersey

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Cybersecurity The role of Internal Audit

Security Controls What Works. Southside Virginia Community College: Security Awareness

Information Technology Risk Management

Microsoft s Compliance Framework for Online Services

Customer-Facing Information Security Policy

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Domain 5 Information Security Governance and Risk Management

How to ensure control and security when moving to SaaS/cloud applications

Building Security In:

FINRA Publishes its 2015 Report on Cybersecurity Practices

Third Party Risk Management 12 April 2012

10 Smart Ideas for. Keeping Data Safe. From Hackers

Securing the Microsoft Cloud

Information Security ISO Standards. Feb 11, Glen Bruce Director, Enterprise Risk Security & Privacy

Guide for the Role and Responsibilities of an Information Security Officer Within State Government

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

Guidance on Risk Analysis Requirements under the HIPAA Security Rule

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire

Securing the Microsoft Cloud

Attachment A. Identification of Risks/Cybersecurity Governance

Security Risk Management Strategy in a Mobile and Consumerised World

Cloud models and compliance requirements which is right for you?

Office of Inspector General

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

HIPAA Compliance Evaluation Report

Developing National Frameworks & Engaging the Private Sector

Information Security Awareness Training

Logging In: Auditing Cybersecurity in an Unsecure World

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management

UF Risk IT Assessment Guidelines

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

Securing the Cloud Infrastructure

Ensuring Cloud Security Using Cloud Control Matrix

Cybersecurity Framework Security Policy Mapping Table

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Data Privacy, Security, and Risk Management in the Cloud

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Taking Information Security Risk Management Beyond Smoke & Mirrors

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

Cybersecurity and internal audit. August 15, 2014

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

IT Insights. Managing Third Party Technology Risk

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

defense through discovery

Ohio Supercomputer Center

Cloud Security Trust Cisco to Protect Your Data

TABLE OF CONTENTS INTRODUCTION... 1

Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Risk Management Guide for Information Technology Systems. NIST SP Overview

A Flexible and Comprehensive Approach to a Cloud Compliance Program

Designing & Building a Cybersecurity Program. Based on the NIST Cybersecurity Framework (CSF)

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Ed McMurray, CISA, CISSP, CTGA CoNetrix

CISM ITEM DEVELOPMENT GUIDE

Information Blue Valley Schools FEBRUARY 2015

FREQUENTLY ASKED QUESTIONS

KEY TRENDS AND DRIVERS OF SECURITY

Transcription:

SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services

Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W Information Assurance Services Previous AT&T, Internal Audit (Technology audits) Scientific Research Corp., Information Systems Security Officer Academics M.B.A. M.S. Information Assurance Scott.Ritchie@hawcpa.com (770) 353-2761 www.aicpa.org/fvs

HA&W Information Assurance Services Key Verticals: SME Domains: Key Services: Fraud & Analytics Healthcare IT Tech / Cloud Service Providers FinTech / Payments Security Privacy: o HIPAA / HITECH o Safe Harbor o State Regulations Confidentiality Processing Integrity Data Management Availability Financial Reporting Risk and gap assessments Attest/Compliance Reporting: SSAE 16 & SOC 2 Reporting PCI Compliance ISO 27001 Certification FedRAMP Certification IT Internal Audit IT Governance Due Diligence

Focus of Today s Presentation How to assess security risks Understand recognized security risk management frameworks Introduce security risk management practices www.aicpa.org/fvs

Security Environment Explosive growth/ aggressive use of technology Proliferation of data Sophistication of threats

Challenges Least privilege Awareness and training Insider threat Advanced Persistent Threats Trustworthiness of applications and systems Mobile computing Cloud and virtualization Individual/device auth Resiliency of Systems Privacy Supply chain Can't cover everything - Risk management allows prioritization

Risk Assessment Illustrated Licensed from CartoonStock.com

Definitions: Risk: Extent to which an entity is threatened by a potential event. (Note: Quantitative or Qualitative) Risk Assessment: Prioritization of risks based on probability and impact of an event. Threat: Circumstance with potential to adversely impact organizational operations, assets, individuals, and others. Vulnerability: Weakness in an information system, procedures, controls, or implementation. Impact: Magnitude of harm expected to result from the consequences of an event. Probability: Likelihood that a threat event will be initiated or will occur. Predisposing conditions: Condition which affects the probability that threat events, once initiated, result in adverse impacts.

Risk Management (RM) Hierarchy Reference: NIST 800-30

Risk Assessment Frameworks

ISO 27005: IT Risk Management Context Definition Risk Identification Communication and consultation Risk Analysis Risk Evaluation Monitoring and review Risk Treatment Risk Acceptance

Understand the Organization Governance Contractual relationships Organizational structure Standards Organization Policies and objectives Organization's culture Resources and knowledge Relationships with stakeholders Information flows

Management Commitment Rationale for managing risk Accountabilities for managing risk Methods for resolving conflicting interests Commit resources Risk management performance metrics Management Review Response to an event or change in circumstances. Risk Management Policy Communication Democratization of Risk Management

Risk Management Approach Nature and types of causes and consequences Likelihood and impact Criteria How the level of risk is to be determined Views of stakeholders Risk Tolerance Level and Acceptance Criteria Combinations of multiple risks

Objectives of Risk Assessment Understand business risks Identify improvement opportunities Allocate resources effectively Get support from the enterprise Demonstrate due diligence Meet compliance requirements

Information Asset Inventory Anything of value that requires protection People, Process, Technology Information Supporting Infrastructure Business processes Data Sources: Listings of Enterprise Applications Listings of Databases Software Inventory Hardware Inventory System Diagrams Technical Design Documents

Example Asset Register Asset Name/ Description Asset Class. DR Priority Description Exposure Level (H,M,L) Personnel High 1 Employees M Client PII High 1 Personally Identifiable Information L Production Web server Medium 1 Company primary web site (no sensitive data) H

Calculating Risk (perception) Source: CSOOnline.com

Calculating Risk Risk = Impact X Probability

Elements of Risk Risk Impact Probability Asset Threat Vulnerability Mitigation Threat Source Initiation Probability Success Probability Predisposing Conditions Pervasiveness Severity Effectiveness

Risk Identification Licensed from CartoonStock.com

Risk Identification Sources Threat Catalogs System Docs Workshops Surveys and Interviews Vulnerability Assessments Audits/ Gap Assessments Previous Events

Assess Threats Deliberate Attacks Intent Capabilities Operational constraints Exploit characteristics Natural Fire Water Earth Air Unintentional Exposures Characteristics Work Environment Time constraints

Likelihood Considerations Experience and statistics for threat likelihood Motivation and capabilities of the attacker Exposure to possible attackers Accident sources: geographical /weather Human errors and equipment malfunction Individual and aggregate vulnerabilities Effectiveness of existing controls

Vulnerabilities Organization Processes and procedures Management routines Personnel Physical environment Information system configuration Hardware, software or communications equipment Dependence on external parties

Impact criteria Asset classification Breaches of information security Impaired operations Loss of business and financial value Disruption of plans and deadlines Damage to reputation Breaches of requirements

Risk evaluation criteria Strategic value of the assets Criticality of the assets Legal, contractual, and regulatory requirements Operational and business importance of confidentiality, integrity, and availability (CIA) Stakeholders expectations Damage to reputation

Example Risk Register Threat Predisposing Conditions Vulnerable Entities Confidentiality Integrity (L,M,H) Availability (L,M,H) Overall Impact Likelihood of Attack Initiation Likelihood Success Total Likelihood Overall Risk Rating Control Effectiveness Lack of communication of Business and IT needs leads to unintended exposure of data. Business objectives are not aligned with IT strategies. Business Operations H H H H H H H H M Accidental or intentional duplication and retention of data leads to unnecessary exposure. Sensitive documents are retained beyond useful life All data sources. H M M H H H H H L Lost or stolen laptop leads to exposure of sensitive data. No encryption on almost all laptops All servers, network devices, and laptops. H L H H H H H H M Improper handling of data by employees, contractors, or vendors leads to exposure of sensitive data. No formal privacy awareness, data handling, or information security training. Employees, contractors, and vendors. M M M M H H H M L

Risk Treatment Avoid Transfer /Share Mitigate Accept

Risk acceptance criteria Multiple thresholds and provisions for senior managers to accept risks Ratio of estimated benefit to the estimated risk Different acceptance criteria for different classes of risk May include requirements for future additional treatment

Report Executive Summary, Methodology, and Detailed Results Share results of assessment - present risk treatment plan Eliminates misunderstanding among decision makers and stakeholders Supports decision-making Improve awareness and provides new knowledge Co-ordinate with other parties and plan responses Give decision makers and stakeholders a sense of responsibility about risks

Re-Assess Risks Assessments are an on-going exercise Track mitigation strategies Re-test control design/effectiveness Document test results, corrective actions, changes in business needs/requirements.

Future Develop risk-aware mission and business processes Integrate into enterprise architecture development Acquire IT systems with high level of assurance Consider threats when deploying new technology Agile defense Implement robust continuous monitoring programs

Questions www.aicpa.org/fvs

THANK YOU! www.aicpa.org/fvs