Information Security Management. Dipl.-Ing. (FH) Frank Wagner



Similar documents
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

Logging In: Auditing Cybersecurity in an Unsecure World

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Does it state the management commitment and set out the organizational approach to managing information security?

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

Seven Requirements for Successfully Implementing Information Security Policies and Standards

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO / HIPAA / SOX / CobiT / FIPS 199 Compliant

(Instructor-led; 3 Days)

Information Technology Cyber Security Policy

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)

DDV Declaration (VE 12/2009) Commissioned Data Processing and Data Treatment

Security Controls What Works. Southside Virginia Community College: Security Awareness

LINUX / INFORMATION SECURITY

Potential Targets - Field Devices

Cisco Advanced Services for Network Security

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Intel Enhanced Data Security Assessment Form

Third Party Risk Management 12 April 2012

This is a free 15 page sample. Access the full version online.

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities

SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE

Security aspects of e-tailing. Chapter 7

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES

I S O I E C I N F O R M A T I O N S E C U R I T Y A U D I T T O O L

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Managing data security and privacy risk of third-party vendors

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Certified Ethical Hacker (CEH)

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

DANCERT RFC2350 Description Date: Dissemination Level:

Hackers are here. Where are you?

Brainloop Cloud Security

Highland Council Information Security Policy

Samsung Security Solutions

Acceptable Usage Policy

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

University of Liverpool

Quelle sécurité dans une banque? " Sécurité des transactions électroniques sur Internet et KYC"

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

SCP - Strategic Infrastructure Security

AGENDA HIP Ho AA w i rivacy d The B reach Happen? I P nc AA Secu dent R rit esp y o nse Corrective Action Plan What We Learned ACRONYMS USED

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

COB 302 Management Information System (Lesson 8)

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

UTMB INFORMATION RESOURCES PRACTICE STANDARD

Analyze. Secure. Defend. Do you hold ECSA credential?

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

E-Commerce: Challenges and Issues ดร.มนต ช ย โศภ ษฐกมล ภาคว ชาว ศวกรรมคอมพ วเตอร คณะว ศวกรรมศาสตร มหาว ทยาล ยเกษตรศาสตร

Taxonomic Modeling of Security Threats in Software Defined Networking. Jennia Hizver PhD in Computer Science

STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES

Information Security Management Systems

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

Exam 1 - CSIS 3755 Information Assurance

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

CSC 474 Information Systems Security

State of South Carolina Policy Guidance and Training

How To Protect A Network From Attack From A Hacker (Hbss)

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Estate Agents Authority

Information Security Policy

RSA SecurID Two-factor Authentication

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Sample Third Party Management Policy. Establishment date, effective date, and revision procedure

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

10 Hidden IT Risks That Threaten Your Practice

Information Security Policy Manual

Data and Information Security Policy

Certified Cyber Security Analyst VS-1160

Data Security Incident Response Plan. [Insert Organization Name]

Windows Least Privilege Management and Beyond

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Information Security Basic Concepts

Governance and Management of Information Security

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

How To Manage Security On A Networked Computer System

Common Cyber Threats. Common cyber threats include:

Transcription:

Information Security Management Dipl.-Ing. (FH) Frank Wagner

Agenda Importance of Information Security (IT-Security vs. Information Security) Information Security Policy Information Security Organization Information Security Awareness Information Security Audits Information Security Risk Management OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 2

Corporate structure 2007 Merck Group Business sectors Pharmaceuticals Chemicals D i v i s i o n s Merck Serono* Generics** Consumer Health Care Liquid Crystals Performance & Life Science Chemicals Cross-divisonal functions / Central functions * Merck Serono = former Merck Ethicals division with Serono S.A. **The Generics division is currently being divested. OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 3

Merck Group Sales Jan. June 2007 3.5 billion Operating result Jan. June 2007 0.5 billion Employees worldwide around 30,000 242 companies in 63 countries 61 production sites in 26 countries OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 4

Locations of the Merck Group Update June, 30 2007 Status: December31, 2006 OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 5

Importance of Information Security Information is an asset which, like other important business assets, has value to companies and consequently needs to be suitably protected. Information can exist in many forms: paper, electronically, films, spoken words, etc. Whatever form it takes and throughout the whole lifecycle of the information, it must always be appropriately protected. OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 6

Information Lifecycle Meeting Minutes Network Plans Formulas Applications Conferences Presentations Strategic Plans E-Mail Paper Notebook Fax Phone PC Server Video CD Mobile Phone Whiteboard Waste Basket Create Edit Store Transfer - Destroy OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 7

More Requirements for Information Security But there is not only the company s own requirement for Information Security. There are several other requestors. BDSG Bundesdatenschutzgesetz UrhR Urheberrecht KonTraG Gesetz zur Kontrolle und Transparenz im Unternehmensbereich Basel II International Convergence of Capital Measurement and Capital Standards SOX Sarbanes-Oxley Act National and International Laws OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 8

Scope of Information Security Information Security ensures that information is accessible only to those authorized to have access (confidentiality) safeguards the accuracy and completeness of information and processing methods (integrity) ensures that authorized users have access to information and associated assets when required (availability) OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 9

Threats Information Security protects information from a wide range of threats in order to ensure business continuity, minimize damage and maximize return on investment. Keep in mind: Threats can be caused by external and by internal attackers. OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 10

Example for Threats Attacker copies Notes ID file from XCHANGE directory on server, uses a password cracking tool and gains full access to the Notes mailfile of an employee. Notebook with unencrypted confidential information is stolen from a hotel room. Password for a database is gathered by attacker by social engineering. Unencrypted e-mails with confidential information are intercepted by attacker. OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 11

Evolution of Threats high Packet spoofing Automatic scans Knowledge of attacker Backdoors Trojans WWW attacks Sniffers Graphical tools Denial of Service Password cracking Impact Vulnerability exploitation low Password guessing 1980 1985 1990 1995 2000 OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 12

Information Security Policy The obligatory framework for the implementation of a common level of information security within a company Should be based on ISO standards (e.g. ISO 27001) Should be approved by management board (not only IT management) All employees and business partners must be obliged that their activities comply with this policy The policy compliance audit should be part of internal audits OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 13

Information Security Policy Management Policies Part 1 Part 2 IT Security Management and Organization Security Policy Data Privacy, Data Classification and Information Handling Policy Technical Policies Part 3 Part 4 Part 5 Part 6 Part 7 Part 8 Part 9 Part 10 Part 11 Infrastructure and Facility Security Policy Software Security Policy Network Security Policy IT System Management and Server Security Policy Personal Computer Security Policy Telecommuting and Mobile Computer Security Policy E-Mail Security Policy Internet-/Intranet Security Policy Telecommunication Security Policy OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 14

Information Security Policy There should be a nominated team to review and update the Information Security Policy regularly. For unclear situations the team could make appropriate notifications until the next review. Most important: The Information Security Policy must be documented and accessible for all employees. OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 15

Information Security Organization Corporate Information Security Officers Corporate Information Security Team (CIST) Regional Information Security Coordinators Europe, Latin America, North America, Asia Local Information Security Officers Each company of the group nominated a Local Information Security Officer OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 16

Information Security Organization Local Management is appointed to take overall responsibility for: development and implementation of information security supporting the identification of controls The operational tasks could be delegated to the Local Information Security Officer. All employees are obliged that their activities comply with the policy. OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 17

Information Security Organization It is a good idea to separate the strategic and the operational Information Security Organizations OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 18

Information Security Awareness Corporate Merck Information Security Policy Part 1: IT Security Management and Organization Policy I- 48 All employees of the organization and, where relevant, third-party users, shall receive appropriate training and regular updates in organizational policies and procedures. This includes security requirements, legal responsibilities and business controls, as well as training in the correct use of information processing facilities, e.g. log-on procedures, use of software packages, before access to information or services is granted. ISO 17799 Compliance: Chapter 6.2.1 OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 19

Information Security Awareness Corporate Merck Information Security Policy Part 1: IT Security Management and Organization Policy I- 6 The Local Information Security Officer supports the local management in all kind of needs related to information security. Especially, he [ ] c) agrees and supports organization-wide information security initiatives, e.g. security awareness program; ISO 17799 Compliance: Chapter 4.1.2 OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 20

Information Security Awareness To fulfill the requirements of the Corporate Information Security Policy two major elements are employed: Information Security Briefing Short information about most important topics. Duration: ~30 min. - Why Information Security? - Classification of Information - Basic Rules for Information Security - Accounts and Passwords - Private Use of Merck Systems - Basic Rules for E-Mail Usage - HW/SW Installation - Mobile Systems - Copyright / Intellectual Property InfoSec Basic Training Detailled information about topics contained in InfoSec Briefing and additional topics. Duration: ~120 min. - Why Information Security? - Corporate Information Security Policy - Information Security Roles&Responsibilities - Data Protection - Information Handling Procedures - Password Usage - E-Mail Usage - Mobile Devices - Information Security Incidents OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 21

Information Security Awareness All employees joining a company of the group must go through an Information Security Briefing. The Information Security Training is obligatory for members of Corporate Information Services. After the Briefing and the Training the participants must pass an exam. The participation must be documented. OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 22

Information Security Awareness Material provided by Corporate Information Security Team: Questionnaire Certificate Slides Information Security Briefing Document (incl. Signature Sheet) Report Template OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 23

Information Security Audits Based on Information Security Audits Performed by Corporate Auditing Department and Information Security Department Yearly Audit Plan Internal and external audits (supplier audits) Document audits, on-site audits, pre-audits Two auditors Audit Report Corrective Action/Planned Activies Plan Review Reporting to the management board OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 24

Information Security Risk Management For every risk a risk assessment is done and documented in an Information Risk Report which is reported to Corporate IS management OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 25

Information Security Risk Management OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 26

Information Security Risk Management OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 27

Information Security Risk Management OCT-2007 Dipl-Ing. (FH) Frank Wagner Page 28