Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization



Similar documents
HITRUST CSF Assurance Program

Sensitive Data Management: Current Trends in HIPAA and HITRUST

HIPAA and HITRUST - FAQ

What can HITRUST do for me?

Key Speculations & Problems faced by Cloud service user s in Today s time. Wipro Recommendation: GRC Framework for Cloud Computing

XBRL & GRC Future opportunities?

igrc: Intelligent Governance, Risk, and Compliance White Paper

Governance, Risk, and Compliance (GRC) White Paper

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

How To Improve Your Business

Achieving Business Imperatives through IT Governance and Risk

Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure?

IT Governance, Risk and Compliance (GRC) : A Strategic Priority. Joerg Asma

A Flexible and Comprehensive Approach to a Cloud Compliance Program

Perspectives on Navigating the Challenges of Cybersecurity in Healthcare

IT GOVERNANCE PANEL BRING VALUE BY AUDITING IT GOVERNANCE GET THE

Enhancing IT Governance, Risk and Compliance Management (IT GRC)

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

Microsoft s Compliance Framework for Online Services

GRC Stack Research Sponsorship

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.

Information Technology Auditing for Non-IT Specialist

The Value of Vulnerability Management*

Project Management and ITIL Transitions

The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Combine ITIL and COBIT to Meet Business Challenges

Vendor Risk Management Financial Organizations

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

Italy. EY s Global Information Security Survey 2013

IT Security & Compliance. On Time. On Budget. On Demand.

CA Technologies Healthcare security solutions:

Assessing & Managing IT Risk

Well-Documented Controls Reduce Risk and Support Compliance Initiatives

Consolidated Audit Program (CAP) A multi-compliance approach

SECURITY RISK MANAGEMENT

Security Controls What Works. Southside Virginia Community College: Security Awareness

Department of Technology Services

Third Party Risk Management 12 April 2012

Anypoint Platform Cloud Security and Compliance. Whitepaper

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection

Enabling Compliance Requirements using ISMS Framework (ISO27001)

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

Self-Service SOX Auditing With S3 Control

Managing Business Risk with HITRUST Leveraging Healthcare s Risk Management Framework

Information Security Governance:

Domain 5 Information Security Governance and Risk Management

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors

Trends in Information Technology (IT) Auditing

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

So Why on Earth Would You WANT To be a CISO?

Think like an MBA not a CISSP

Cloud Security and Managing Use Risks

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

IT Audit in the Cloud

ITIL's IT Service Lifecycle - The Five New Silos of IT

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Hans Bos Microsoft Nederland.

IT Security & Compliance Risk Assessment Capabilities

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

HIPAA and HITECH Compliance for Cloud Applications

14 October 2015 ISACA Curaçao Conference By: Paul Helmich

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

Cloud Computing An Auditor s Perspective

IT Risk Management Life Cycle and enabling it with GRC Technology

HITRUST. Risk Management Frameworks

Business Continuity in Healthcare

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Secure Cloud Hosting for Healthcare Organizations

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management

NEC Managed Security Services

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

4net Technologies. Managed Services and Cloud Solutions

Response to NIST: Developing a Framework to Improve Critical Infrastructure Cybersecurity

KEY TRENDS AND DRIVERS OF SECURITY

Federal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

Transcription:

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

Outside View of Increased Regulatory Requirements Regulatory compliance is often seen as sand in the gears requirements that increase cost, introduce friction into the business processes, and have little or no payback. Introduction of multiple standards and an increasingly complex regulatory environment has disrupted IT Governance focus on improving process efficiencies Limited awareness of unified mapping of new standards and requirements has resulted in duplication of efforts Shifts in technology usage, such as the use of Cloud Computing, has introduced new risks to businesses and introduced uncertainty on how to mitigate these risks while continuing to meet new requirements Source: Gartner Research 1

Pressures on Business Today Uncertainty Increased Boards & Executives Accountability Liability Multiple Diverse Risks Modern Enterprise Spiraling Compliance Costs Speed Variability Globalization 2

Governance Requirements Common Elements and Challenges 3

Governance Requirements Understand the external and internal governance expectations of IT, and the common controls and objectives. Legislative & Mandated SOX HIPAA/HITECH PCI NIST Red Flag Rules ediscovery External & nonmandated ISO 27001/2 SLA HITRUST COSO COBIT Internal SAS 70 Internal SLAs Business Continuity Customer Requirements 4

Governance Requirements ISO 27001 Compliance Examines the organization's information security risks, taking account of the threats, vulnerabilities and impacts Requires the organization to design and implement a coherent and comprehensive suite of information security controls Brings information security under explicit management control PCI Compliance Prevents credit card fraud through increased controls around data and its exposure to compromise. The standard applies to all organizations which hold, process, or pass cardholder information SOX Established corporate governance standards for public companies. Placed responsibility on boards of directors, CEOs and CFOs to design and implement appropriate corporate governance processes. 5

Governance Requirements HIPAA/HITECH Outlines information security requirements for health information systems and exchanges. Established the Common Security Framework (CSF), a certifiable framework that can be used by any and all organizations that create, access, store or exchange personal health and financial information. The CSF harmonizes the requirements of existing standards and regulations, including federal (HIPAA, HITECH), third party (PCI, COBIT) and government (NIST, FTC). Business Continuity Prepares an organization to respond to events that disrupt normal and on-going operations. Risk management is an essential element of business continuity. and many more 6

7

Governance Requirements Typical Challenges Managed in silos Mostly reactionary projects Handled separately from mainstream processes and decision making Humans utilized as middleware leading to Greater risks More complexity Lower confidence Higher cost Limited and fragmented use of technology 8

Governance Requirements Common Elements - One Framework, Multiple Standards Compliance frameworks have been developed to simultaneously cover a wide range of standards: ISACA COBIT ISACA has and continues to invest efforts in mapping COBIT framework with ISO/IEC 27002, SOX, etc. to improve control environment efficiencies. Unified Compliance Framework (UCF) One of the first and largest independent initiatives to map IT controls across international regulations, standards, and best practices. HITRUST Common Security Framework (CSF) Unifies all targeted frameworks and standards (COBIT, ISO, PCI, HIPAA, etc.) relevant to health care. Many portions of the framework can also aid non-health care related organizations. 9

What is HITRUST? Executive Committee The Health Information Trust Alliance (HITRUST) was born out of the belief that information security should be a core pillar of the broad adoption of health information systems and exchanges. Industry-based collaboration among healthcare, business, technology and information security leaders, has established the Common Security Framework (CSF), a certifiable framework that can be used by any and all organizations that create, access, store or exchange personal health and financial information. The CSF is an information security framework that harmonizes the requirements of existing standards and regulations, including federal (HIPAA, HITECH), third party (PCI, COBIT) and government (NIST, FTC). As a framework, the CSF provides organizations with the needed structure, detail and clarity relating to information security tailored to the healthcare industry. Beyond the establishment of the CSF, HITRUST is also driving adoption and widespread confidence in the framework and sound risk management practices through education, advocacy and other outreach activities. Ultimately, an organization's adoption of the CSF will establish confidence in its ability to ensure the security of personal health information.

Governance Requirements Common Elements - One Framework, Multiple Standards The HITRUST Common Security Framework (CSF) provides a valuable method to assess the security controls in a healthcare environment and provide a path for continuous improvement. Because it was developed leveraging multiple security standards and regulations, the model provides a convenient single model to leverage for many of your security governance requirements. COBIT COBIT ISO 27001/2 ISO 27001/2 HITECH Act HIPAA Security PCI HITECH Act HITRUST CSF HIPAA Security PCI Meaningful Use NIST States Meaningful Use NIST States 11

HITRUST Common Security Framework (CSF) The HITRUST Common Security Framework is a viable alternative to developing a custom framework HITRUST unifies all targeted frameworks and standards relevant to health care HITRUST is constantly revised to ensure currency and relevance Control practices tailored to the health care environment Self-assessment criteria for control and supporting control practice compliance 2009 HITRUST LLC, Frisco, TX. All Rights Reserved. 12

13 Governance Framework

IT Governance vs. Compliance Productivity IT Governance Policy Do it right Strategy Value Defining Standards IT Processes Val IT ITIL ISO Best Practices Process Do it better Performance Value Adding Risk Management CobiT Operation Risk Mgmt IT Security IT Risk Mgmt Control Objectives (statements) Do it to protect Mitigation Value Preserving Controls Practices Compliance Sox Banking Regs National Regs Other Regs Do it or else Check & Balance Transparency Regulation Reporting & Metrics 14

The Protiviti Governance Model The value of effective governance is improved business performance and outcomes. Effective IT governance aids in addressing and mitigating some of the overall risks faced by an organization By implementing effective governance practices mechanisms are established for IT to: Understand and manage all ITrelated risks Optimize returns on IT-related business investments Deliver value from IT expenditure Maximize opportunities for business use of IT Provide appropriate IT capabilities Address legal and regulatory compliance Provide transparency and assurance that IT objectives are being achieved 15

Envisioning the Future State IT Governance is defined as the ability for the enterprise s IT function to sustain and extend the organization s strategies and objectives. Understand & Scope Identify your organization s internal & external requirements. Establish Desired Structure Assess Business and IT strategy to determine the proper alignment of business activities and controls. Determine Existing Capabilities Evaluate the existing formal and informal management practices within IT. Assess how these align with the desired structure of the governance program. Create Plan to Enhance Existing Processes & Controls Create a plan to enhance and formalize existing management processes. Sustain Measure process throughput via KPIs, monitor process performance and identify workflow constraints. 16

Common Governance Implementation Strategy Security Policy & Program Security Strategy & Architecture Security Implementation & Deployment Security Metrics Incident Response Awareness & Training Infrastructure Vulnerability Application Vulnerability Network Vulnerability Database Vulnerability Program Policy Standards Alignment Metrics Awareness Training Strength Servers Network Application Database ID Mgmt Policy Implementation SSO, RBAC Federation Trusted Credentials Open Identities Data Centric Discovery Classification Data Leakage Encryption Privacy Compliance PCI, HITRUST Vendor Mgmt Access Mgmt Policy & Standards IDAM Design & Implementation Identity Credential Selection Services Identity Federation Strategy & Implementation Data Classification Data Leakage Services Encryption & Storage Strategy & Implementation Privacy Management & Implementation PCI Planning, Readiness & Compliance HITRUST Planning, Readiness & Compliance Other Data Compliance Vendor Due Diligence Other Data Security & Privacy Management 17

Envisioning the Future State What IT processes will be impacted: Determine the processes that will influence IT s new KPIs? - Security Administration - Asset Management - Project Management - Security Monitoring - Incident Management What is to be measured: Your specific control requirements must be integrated into existing management processes. Consider what KPIs are needed to measure compliance? Process Performance? Resource productivity? Establish an organizational structure and performance expectations that support the objectives How can our KPIs be categorized into how IT manages demand and service? 18

19

Future State Outcomes Organizational Transparency Ongoing collaboration with the entire organization to determine current compliance requirements, overlaps amongst these requirements, and opportunities for control consolidation to improve efficiencies. Communication on a regular basis between IT teams to maintain standardized processes Integration, Streamlined Processes, and Common Dialog Understanding business needs, the current IT landscape including people, processes, and technology, and the required future state Development of solid risk management strategies capable of identifying high-risk processes and control requirements to mitigate these risks Integration and standardization of activities among the entire IT team from Help Desk to Infrastructure Support 20

Future State Outcomes Integration, Streamlined Processes, and Common Dialog (continued) Proactive monitoring of Public Policy and the current Regulatory Environment in order to meet new and existing regulatory requirements Automation of compliance efforts through Governance, Risk, and Compliance platforms Security and Resource Efficiencies Controls driven by business process vs. compliance Improvement in security and monitoring from streamlined control sets Increased resource efficiencies and cost savings through effectively defined roles 21

Summary Identify and assess all of your external and internal governance requirements. Build a single common control framework specific to your organization leverage existing frameworks as a starting point. Determine the KPIs that could be used to measure adherence. Identify the IT management processes that influence your control and KPI requirements. Determine how you can formalize and enhance those existing processes. Build sustainability through active management, link performance objectives to organizational objectives. Compliance should be a byproduct of a good governance process 22

Contact Us For additional information or to receive a copy of this slide deck, please contact the presentation team: Timothy Maloney Darren Jones Powerful Insights. Proven Delivery. One PPG Place, Suite 2350 Pittsburgh, PA 15222 Direct: 412.402.1720 Mobile: 412.303.6338 Fax: 412.402.1791 Timothy.Maloney@protiviti.com Powerful Insights. Proven Delivery. One PPG Place, Suite 2350 Pittsburgh, PA 15222 Direct: 412.402.1747 Mobile: 412.302.2978 Fax: 412.402.1764 Darren.Jones@protiviti.com 23

24