Using Enterprise Governance, Risk, And Compliance (EGRC) Tools For Improved Management Of Security And Privacy. June 23, 2015



Similar documents
How RSA has helped EMC to secure its Virtual Infrastructure

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

How To Improve Your Business

GRC Program Best Practices & Lessons Learned

RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

CISOs Share Advice on Managing Both Information Security & Risk

RSA Archer Risk Intelligence

Trusted Geolocation in The Cloud Technical Demonstration

Planning for a Successful Information Governance Program. Kathy Downing, MA, RHIA CHPS,PMP AHIMA Senior Director IG

10 Best-Selling Modules For Home Information Technology Professionals

ISE Northeast Executive Forum and Awards

Designing a Modern, Holistic ECM Strategy for Healthcare. How ECM consulting helps healthcare providers thrive in an atmosphere of change.

Health Information Management Systems Technology and Analysis (HIMSTA) Domains, Competencies and Modules. The Curriculum.

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

Whitepaper: 7 Steps to Developing a Cloud Security Plan

Explore the Possibilities

Metrics that Matter Security Risk Analytics

IBM Software A Journey to Adaptive MDM

Functional and technical specifications. Background

Governance, Risk, and Compliance (GRC) White Paper

Risk Considerations for Internal Audit

Agile Master Data Management A Better Approach than Trial and Error

RSA Archer Training. Governance, Risk and Compliance. Managing enterprise-wide governance, risk and compliance through training and education

RSA SECURITY MANAGEMENT. An Integrated approach to risk, operations and incident management. Solution Brief

Risk & Audit Committee California Public Employees Retirement System

NASA S PROCESS FOR ACQUIRING INFORMATION TECHNOLOGY SECURITY ASSESSMENT AND MONITORING TOOLS

Deloitte and SuccessFactors Workforce Analytics & Planning for Federal Government

IT Risk Management Life Cycle and enabling it with GRC Technology

Software Asset Management on System z

TECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR

Paisley Enterprise GRC Audit Profile. Linda Bergs

IT Governance, Risk and Compliance (GRC) : A Strategic Priority. Joerg Asma

How To Transform It Risk Management

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER

igrc: Intelligent Governance, Risk, and Compliance White Paper

SMART Considerations for Active Directory Migration. A Strategic View and Best Practices for Migrating the Corporate Directory

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Software Asset Management High Risk, High Reward

Microsoft s Compliance Framework for Online Services

integrate 2: Business Process Redesign

2014 Vendor Risk Management Benchmark Study

Operational Risk Management - The Next Frontier The Risk Management Association (RMA)

End User Computing Solving the problem

Cybersecurity in the States 2012: Priorities, Issues and Trends

The Value of Vulnerability Management*

John Essner, CISO Office of Information Technology State of New Jersey

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

Shared Assessments Program Case Study

Introduction to ITIL: A Framework for IT Service Management

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Governance, Risk and Compliance (GRC) software Business needs and market trends

RSA ARCHER OPERATIONAL RISK MANAGEMENT

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

How Insurance Companies Can Beat the Talent Crisis

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Beyond risk identification Evolving provider ERM programs

CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners

Governance, Risk, Compliance and Beyond: The Emergence of Strategic IT Risk Management

PATCH MANAGEMENT POLICY IT-P-016

Evergreen Solutions Lowering the cost of EHR ownership

RSA enables rapid transformation of Identity and Access Governance processes

Information Technology Services Project Management Office Operations Guide

Big Data Industry Approaches to Operational Excellence

Company Background EMAGINED SECURITY All rights reserved.

SDLC- Key Areas to Audit in IT Projects ISACA Geek Week /21/2013. PwC

Bridging the HIPAA/HITECH Compliance Gap

The Power to Take Control of Software Assets

New InfoSec Leader The First 90 Days. John Bruce CEO

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Standardize, streamline, simplify: Applications rationalization during M&A Part of the Wired for Winning series on M&A technology topics

Module 6 Essentials of Enterprise Architecture Tools

Certified Information Security Manager (CISM)

Information Technology Auditing for Non-IT Specialist

Appendix D Programme Stream 6 CRM Procurement. Programme Stream 6 Remodelling of Customer Services Programme CRM Procurement

Enabling HR service delivery

Best Practices for Building a Security Operations Center

NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Transcription:

Using Enterprise Governance, Risk, And Compliance (EGRC) Tools For Improved Management Of Security And Privacy June 23, 2015

What is egrc? A management system for compliance requirements, policies, risk assessment, and remediation tracking, spanning across multiple domains. IT Finance Legal Operations 2

Benefits to GRC Management via the traditional spreadsheet method does not scale well with a large decentralized environment, such as a multi- hospital enterprise. Benefits to GRC Manage and centralize risk across the enterprise Enable collaboration across different enterprise groups Streamline business processes and workflows Generate risk metrics and risk profiles for further insight Ensure data integrity through access control 3

NYP s GRC Story NewYork-Presbyterian Hospital s information security department acquired the RSAM GRC platform in 2010. It sits on a server, unused, for all the same reasons other GRC projects never get off the ground. An effort is currently underway to establish the consensus necessary for a true GRC program to be established, linking to existing organizational audit, finance, and compliance activities. In other words, this won t be another IT project.... 4

THE PARTNERS GRC JOURNEY 5

The Incident Response Problem Companies that select individual solutions for each regulatory challenge they face will spend 10 times more on IT portion of compliance projects than companies that take on a proactive and more integrated approach. Gartner 6

The Incident Response Problem 7

The Incident Response Problem 8

Steps in the Wrong Direction In 2009 Partners HealthCare acquired RSA s Archer Incident Response module. Professional services were not included; The project manager was responsible for the daily support of security infrastructure and responding to helpdesk tickets; The project did not report into the Partners Chief Information Security Officer; and No one outside of IT was aware of the project. 9

Putting on the Brakes In summer 2010 the Partners Chief Information Security Officer made a decision was made to stop the deployment of Archer s Incident Response module. Only a single workflow related to lost or stolen laptops had been implemented at that time. Business and technical ownership remained unclear. Initial discussions about implementing an GRC platform the right way began in fall 2010. 10

Important Lessons 11

Deloitte Security Review In 2012 Partners HealthCare engaged Deloitte & Touche LLP to evaluate the organization's information security and privacy program. Deloitte s recommendations included: The acquisition of a GRC platform to holistically manage compliance activity; and The establishment of a GRC Steering Committee to guide the project over multiple years; and Deloitte s review facilitated the establishment of the enterprise mindset necessary for the Partners GRC project to takeoff. 12

GRC Acquisition Partners Healthcare began evaluating GRC vendors in 2013. A cross-organizational stakeholder group was established, representing compliance, IT, information security and privacy, finance, and clinical and research leaders. This process was critical buy-in for the GRC program needed to exist amongst a diverse group of stakeholders, not just management. The RSA Archer platform was acquired in December 2013. 13

Partners GRC Implementation Project GRC Applications Enterprise Management Risk Management Policy Management Business Continuity Management Key Focuses Import Partners enterprise data such as applications, servers, site locations, which are foundational for all other solutions. Implement risk management process to evaluate, communicate, and manage enterprise risks and associating findings. Implement enterprise solution to publish, approve, and manage policies. Migrate PHS & PCC existing polices to GRC. Implement process to create, access, and manage Disaster Recovery Plans. Replace the LDRPS system. 14

DUKE MEDICINE'S GRC ADVENTURE 15

How did we get here? Project originally conceived in summer 2012 New CISO needed an IT security governance tool. Due to the impending retirement of Lotus Notes, Compliance and clinical leaders were looking for a new home for over 6,000 policies stored in 50+ separate Notes databases. No organization-wide governance for policies. Each entity created and managed their own, all in different ways with different formats. There was an expressed desire to consolidate all policies into a single database, and to establish an organization-wide governance process for policies. 16

What we did... Issued an RFP during fall 2013 Initial focus was on a policy management tool, but broadened the scope to look at GRC products in order to meet a broader set of needs In the summer of 2013, purchased RSA Archer egrc Other finalist was a system that only did policy management this was the preferred solution for some clinical leaders Implementation began in winter 2013/2014, with an initial focus on Policy Management due to the upcoming Lotus Notes retirement Needed to migrate over 4,000 policies before July 2014 17

Duke Medicine's RSA Archer egrc Evolution Enterprise Policy Management Vendor Management Risk Management FISMA (future) Business Continuity (future) Focus for Today's Discussion 18

Vendor Management Goals Centralize Vendor Data General vendor information Contracts Addendums Business Associates Agreements Manage Vendor Contacts/Relationships Assess Vendor Risk Retire/replace current Vendor Management tools: Legacy system Spreadsheets SharePoint 19

Vendor Design Considerations Contract Access Governance concerns Confidentiality/Non-Disclosure Agreement Assessments Application/Service Financial Vendor Accommodate alias (also known as) and other vendor relationships to track mergers and name changes When to start tracking/managing a vendor? Pre-purchase Contract signed 20

Risk Management Goals Provide an integrated tool to assess, categorize, and quantify risks related to the security of system applications, facilities, devices, information assets and business units. Assign data classifications, risk categories, threats, business processes. Ensure that risk assessments are designed and conducted. 21

Duke Medicine Demo Enterprise Management Business Hierarchy Company Division/Entity Department IT Infrastructure Applications Devices Business Infrastructure Processes Business Impact Analysis 22

Duke Medicine Demo Risk Assessments and Findings Questionnaires Service Transition Readiness Assessment (STRA) Critical Controls PCI Common Controls Exception Requests Document risk acceptance Remediation Plans Document risk remediation 23

QUESTIONS? 24