Information Security Governance:



Similar documents
How To Study Information Security

Assessing & Managing IT Risks: Using ISACA's CobiT & Risk IT Frameworks

University of Sunderland Business Assurance Information Security Policy

ITAG RESEARCH INSTITUTE

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

CLASSIFICATION SPECIFICATION FORM

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30

CISM (Certified Information Security Manager) Document version:

IT Governance. What is it and how to audit it. 21 April 2009

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING

Certified Information Security Manager (CISM)

Guidelines 1 on Information Technology Security

So Why on Earth Would You WANT To be a CISO?

Terms of Reference for an IT Audit of

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

G11 EFFECT OF PERVASIVE IS CONTROLS

Information Security Program CHARTER

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

Network Security Policy

GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT. January 7, 2011

The PNC Financial Services Group, Inc. Business Continuity Program

ENTERPRISE RISK MANAGEMENT FRAMEWORK

The Value of Vulnerability Management*

ow to use CobiT to assess the security & reliability of Digital Preservation

Feature. Developing an Information Security and Risk Management Strategy

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Security Transcends Technology

COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction

Information security controls. Briefing for clients on Experian information security controls

The PNC Financial Services Group, Inc. Business Continuity Program

Application for CISM Certification

COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.

Enabling Information PREVIEW VERSION

Information Technology

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

IT Compliance After Hours Seminar September 2007 Zurich. Improving IT Risk & Compliance Management (RCM)

IT Governance Dr. Michael Shaw Term Project

BUSINESS CONTINUITY MANAGEMENT POLICY

S11 - Implementing IT Governance An Introduction Debra Mallette

NSW Government Digital Information Security Policy

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Missouri Student Information System Data Governance

ADMINISTRATIVE POLICY # (2014) Information Security Roles and Responsibilities

Request for Proposal. Supporting Document 3 of 4. Contract and Relationship Management for the Education Service Payroll

How To Protect School Data From Harm

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

Guide for the Role and Responsibilities of an Information Security Officer Within State Government

INFORMATION SECURITY Humboldt State University

Information Security Managing The Risk

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

Risk Management & Business Continuity Manual

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

ENTERPRISE RISK MANAGEMENT FRAMEWORK

Capital Adequacy: Advanced Measurement Approaches to Operational Risk

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

IS Audit and Assurance Guideline 2202 Risk Assessment in Planning

Third Party Risk Management 12 April 2012

APHIS INTERNET USE AND SECURITY POLICY

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

AUDIT LOGGING/LOG MANAGEMENT

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management

Top Ten Technology Risks Facing Colleges and Universities

Information Security Program

Italy. EY s Global Information Security Survey 2013

The Importance of IT Controls to Sarbanes-Oxley Compliance

ISO Controls and Objectives

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

Office of Inspector General

Application for CISA Certification

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

UF Risk IT Assessment Guidelines

SECURITY RISK MANAGEMENT

Confident in our Future, Risk Management Policy Statement and Strategy

Information Security Program Management Standard

Part A OVERVIEW Introduction Applicability Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Auditor General s Office. Governance and Management of City Computer Software Needs Improvement

Enterprise Risk Management Process Improvement. Secure Banking Solutions, LLC

Executive Management of Information Security

Blending Corporate Governance with. Information Security

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

RISK MANAGEMENT FRAMEWORK. 2 RESPONSIBLE PERSON: Sarah Price, Chief Officer

Information Resources Security Guidelines

How To Use Risk It

Risk Management of Outsourced Technology Services. November 28, 2000

Transcription:

Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens Chapter & Manager, Ernst & Young, Advisory Services

Contents 1. A few words about ISACA and ISACA Athens Chapter 2. Why information security governance 3. What is information security governance 4. Conceptual framework 5. Who should be concerned / involved 6. Measuring information security governance / metrics & maturity model 2

1. A few words about ISACA Founded in 1969, with more than 86,000 members in over 160 countries currently 175 chapters Pace setting global organization for information governance, control, security and audit professionals Serves its practitioners by developing / providing: CobiT Framework Val IT Governance framework for IT enabled investments IT Governance Framework IS Auditing and IS Control Standards, audit programs, etc. Knowledge network KNET Professional certifications CISA, CISM, CGEIT Leading technical publications ISACA Journal, JOnline, books, etc. Monthly webcasts ISACA esymposia International conferences & educational events 3

and the ISACA Athens Chapter Founded in 1994 Currently more than 300 members Its mission is to: Promote IT audit, security & governance in Greece Contribute in and promote relevant standards Support its members through educational activities Promote ISACA professional certifications (CISA, CISM, CGEIT) Support networking and professional growth 4

2. Why Information Security Governance? Increased need to focus on the overall value of information protected and delivered in terms of enabled services Complex array of new laws and regulations Exponential increase of information magnitude and value Integration, process assurance and compliance requirements lead to a wider approach, not only IT systems security Focus on effectiveness and sustainability Cost reduction through automation leads to a widening array of risks Information security should follow an integrated approach, aligned with IT governance efforts and other processes in place to govern critical functions 5

3. What is Information Security Governance: Definitions Information security governance is a subset of enterprise governance that provides strategic direction, ensures that objectives are achieved, manages risks appropriately, uses organizational resources responsibly, and monitors the success or failure of the enterprise security program. 6

3. What is Information Security Governance: Attributes Is the responsibility of the Board of Directors and Senior Executives It must be an integral and transparent part of enterprise governance and be aligned with IT governance framework Aspects of information security governance: Desired outcomes Knowledge and protection of information assets Benefits Process integration 7

3. What is Information Security Governance: Desired Outcomes Strategic alignment of information security with business strategy to support organizational objectives Risk management by executing appropriate measures to manage and mitigate risks and reduce potential impacts on information resources to an acceptable level Resource management by utilizing information security knowledge and infrastructure efficiently and effectively Performance measurement by measuring, monitoring and reporting information security governance metrics to ensure that organizational objectives are achieved Value delivery by optimizing information security investments in support of organizational objectives 8

3. What is Information Security Governance: Knowledge & Protection of Information Assets Data Information Knowledge Identification of information assets Information assets > business critical assets Security over information assets should be addressed at the highest level of the organization, not regarded as a technical specialty, relegated to the IT department 9

3. What is Information Security Governance: Benefits (1) An increase in share value for organizations that practice good governance McKinsey, in conjunction with Institutional Investors Inc., concluded that major international investors were willing to pay a premium for shares in an enterprise known to be well governed. The premium ranged from 11 to 16 percent in 1996, to 18 to 28 percent in 2000. Increased predictability and reduced uncertainty of business operations Protection from the increasing potential for civil or legal liability The structure and framework to optimize allocation of limited security resources 10

3. What is Information Security Governance: Benefits (2) Assurance of effective information security policy and policy compliance A firm foundation for efficient and effective risk management, process improvement, and rapid incident response related to securing information A level of assurance that critical decisions are not based on faulty information Accountability for safeguarding information during critical business activities, such as mergers and acquisitions, business process recovery, and regulatory response

3. What is Information Security Governance: Process Integration Integration of an organization's management assurance processes regarding security Serve to improve overall security and operational efficiencies Avoid overlapping security initiatives, which waste resources, or major gaps that can lead to serious security compromises IT Security Physical Security / Guarding Fraud Management Risk Management Evaluating management processes from start to finish, along with their controls, can mitigate the tendency for security gaps to exist amongst various functions 12

13 4. Information Security Governance Conceptual Framework

4. Conceptual Framework Components An information security risk management methodology A comprehensive security strategy explicitly linked with business and IT objectives An effective security organizational structure A security strategy that talks about the value of information protected and delivered Security policies that address each aspect of strategy, control and regulation A complete set of security standards for each policy to ensure that procedures and guidelines comply with policy Institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk A process to ensure continued evaluation and update of security policies, standards, procedures and risks 14

5. Who should be Concerned / Involved Board of Directors Executives Steering Committee Chief Information Security Officer 15

5. Who should be Concerned / Involved: Board of Directors Strategic Alignment Set direction for a demonstrable alignment Risk Management Value Delivery Set direction for a risk management policy that applies to all activities and regulatory compliance Set direction for reporting of security activity costs and value Of information protected Performance Measurement Set direction for reporting of security effectiveness Resource Management Set direction for a policy of knowledge management and Resource utilization Integration Set direction for a policy of assuring process integration 16

5. Who should be Concerned / Involved: Senior Executives Strategic Alignment Risk Management Value Delivery Performance Measurement Resource Management Integration Institute processes to integrate security with business objectives Ensure that roles and responsibilities include risk management in all activities. Monitor regulatory compliance Require business case studies of security initiatives and value of information protected Require monitoring and metrics for reporting security activities Ensure processes for knowledge capture and efficiency metrics Provide oversight of all management process functions and plans for integration 17

5. Who should be Concerned / Involved: Steering Committee Strategic Alignment Risk Management Value Delivery Performance Measurement Resource Management Review and assist security strategy and integration efforts, ensure that business unit managers and process owners support integration Identify emerging risks, promote business unit security practices and identify compliance issues Review and advise adequacy of security initiatives to serve business functions and value delivered in terms if enabled services Review and advise the extent to which security initiatives meet business objectives Review processes for knowledge capture and dissemination Integration Identify critical business processes and management Assurance providers. Direct assurance integration efforts 18

5. Who should be Concerned / Involved: Chief Information Security Officer Strategic Alignment Risk Management Value Delivery Performance Measurement Resource Management Integration Develop security strategy, oversee the security program and initiatives and liaise with business unit managers and process owners for ongoing alignment Ensure risk and business impact assessments, develop risk mitigation strategies and enforce policy and regulatory compliance Monitor utilization and effectiveness of security resources and reputation and the delivery of trust Develop and implement monitoring and metrics collection analysis and reporting approaches. Direct and monitor security initiatives Develop methods for knowledge capture and dissemination. Develop metrics for effectiveness and efficiency. Liaise with other management process functions. Ensure that gaps and overlaps are identified and addressed. 19

6. Measuring Information Security Governance Information security governance maturity model, used for: Self assessment against the scales, deciding where the organization is Using the results of the self assessment to set targets for future development, based on where the organization wants to be on the scale, which is not necessarily at the top level Planning projects to reach the targets, based on an analysis of the gaps between those targets and the present status Prioritising project work based on project classification and an analysis of its beneficial impact against its cost 20

21 6. Measuring Information Security Governance: Maturity Model Dashboard

6. Measuring Information Security Governance: Strategic Alignment Ensure transparency and understanding of IT security costs, benefits, strategy, policies and service levels. Develop a common and comprehensive set of IT security policies. Communicate the IT strategy, policies and control framework. Enforce IT security policies. Define security incidents in business impact terms. Establish clarity on the business impact of risks to IT objectives and resources. Establish IT continuity plan that supports business continuity plans. 22

6. Measuring Information Security Governance: Risk Management Account for and protect all IT assets. Establish and reduce the likelihood and impact of IT security risks. Perform regular risk assessments with senior managers and key staff. Permit access to critical and sensitive data only to authorised users. Ensure critical and confidential information is withheld from those who should not have access to it. Identify, monitor and report security vulnerabilities and incidents. Develop IT continuity plans that can be executed and are tested and maintained. 23

6. Measuring Information Security Governance: Performance Measurement Number of incidents damaging reputation with the public Number of systems where security requirements are not met Time to grant, change and remove access privileges Number and type of suspected and actual access violations Number and type of malicious code prevented Number and type of security incidents Number and type of obsolete accounts Number of unauthorized IP addresses, ports and traffic types denied Number of access rights authorized, revoked, reset or changed 24

6. Measuring Information Security Governance: Value Delivery Ensure automated business transactions and information exchanges can be trusted. Make sure that IT services are available as required. Minimize the probability of IT service interruption. Minimize the impact of security vulnerabilities and incidents. Ensure minimum business impact in the event of an IT service disruption or change. Establish cost effective action plans for critical IT risks. 25

Summary Does the head of security/ciso routinely meet or brief business management? Does management know who is responsible for security? Does the responsible individual know? Does everyone else know? Is security considered an afterthought or a prerequisite? Is the enterprise clear on its position relative to IT and security risks? Does it tend toward risk avoidance or risk taking? How much is being spent on information security? On what? How were the expenditures justified? What projects were undertaken to improve security during the past 12 month period? Is management confident that security is being adequately addressed in the enterprise? Does management have a view on how much the enterprise should invest in information security improvements? Does management obtain regular progress reports on the state of security and security improvement projects? 26

Thank you for your Attention! Questions & Answers E mail: president@isaca.gr anestis.demopoulos@gr.ey.com Web sites: www.isaca.org www.itgi.org www.isaca.gr 27