TABLE OF CONTENTS FOR AUDIT, COMPLIANCE, AND MANAGEMENT REVIEW COMMITTEE



Similar documents
TABLE OF CONTENTS FOR TECHNOLOGY TRANSFER AND RESEARCH COMMITTEE

EXECUTIVE PERFORMANCE INCENTIVE COMPENSATION PLAN

T HE U NIVERSITY OF T EXAS S YSTEM A DMINISTRATION

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

UTSA Change Management. UTShare PeopleSoft Implementation June, 2013

Meeting No. 1,090 THE MINUTES OF THE BOARD OF REGENTS THE UNIVERSITY OF TEXAS SYSTEM. Pages 1-10

Building a More Secure and Prosperous Texas through Expanded Cybersecurity

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Specific observations and recommendations that were discussed with campus management are presented in detail below.

A BILL TO BE ENTITLED AN ACT. relating to establishing a health science center and medical school

INFORMATION SECURITY California Maritime Academy

The Protection Mission a constant endeavor

Tuition and Fees. Jim Brunjes Vice Chancellor and Chief Financial Officer. Fiscal Year March 5, 2015

INFORMATION SECURITY Humboldt State University

Supplier Security Assessment Questionnaire

Critical Controls for Cyber Security.

Meeting No. 1,086 THE MINUTES OF THE BOARD OF REGENTS THE UNIVERSITY OF TEXAS SYSTEM. Pages 1-5. Austin, Texas

SUMMARY OF AUDIT FINDINGS

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Security Management. Keeping the IT Security Administrator Busy

USING GENIE REMOTELY

Next. CDS 2015 Survey Module 7 Information Security Survey Errata

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

INCIDENT RESPONSE CHECKLIST

Next. CDS 2015 Survey Module 7 Information Security Survey Errata

Enterprise Security Tactical Plan

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

Information Technology Internal Audit Report

Client Security Risk Assessment Questionnaire

The Univ ersity o f Texas System Nine Universities. Six Health Institutions. Unlimited Possibilities.

NOTICE OF OPEN MEETING FOR SUBMISSION TO SECRETARY OF STATE/TEXAS REGISTER DIVISION

Information Resources Security Guidelines

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

How To Teach At A University

Information Technology General Controls (ITGCs) 101

Security Controls What Works. Southside Virginia Community College: Security Awareness

THE UNIVERSITY OF TEXAS SYSTEM

I. EXECUTIVE SUMMARY. Date: June 30, Sabina Sitaru, Chief Innovation Officer, Metro Hartford Innovation Services

FREQUENTLY ASKED QUESTIONS ON STUDENT HEALTH INSURANCE AND THE AFFORDABLE CARE ACT

2012 Risk Assessment Workshop

UNIVERSITY OF TEXAS at BROWNSVILLE SCHOOL OF BUSINESS MASTER OF BUSINESS ADMINISTRATION DEGREES (MBA) STUDENT INFORMATION

Texas Public University Cost Study FY FY 2008

Information Security Program Management Standard

VEHICLE INSURANCE PACKET CONTENTS:

(Instructor-led; 3 Days)

VEHICLE INSURANCE PACKET CONTENTS:

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Vendor Risk Management Financial Organizations

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Projectplace: A Secure Project Collaboration Solution

Click to edit Master title style

ADDENDUM #1 REQUEST FOR PROPOSALS

Cybersecurity in the States 2012: Priorities, Issues and Trends

TABLE OF CONTENTS THE UNIVERSITY OF TEXAS SYSTEM BOARD OF REGENTS CONSENT AGENDA. Committee and Board Meetings: May 14-15, 2014 Austin, Texas

RMS. Privacy Policy for RMS Hosting Plus and RMS(one) Guiding Principles

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

Work in Progress: The Bridge to the Doctorate Experience A Reflection on Best Practices and Project Outcomes

B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.

STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE

Information Blue Valley Schools FEBRUARY 2015

Information Technology Internal Audit Report

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two

STRATEGIC IT ACCOUNTABILITY BOARD AGENDA Wednesday, December 19, :00 3:00 p.m. STARK LIBRARY

Security from a customer s perspective. Halogen s approach to security

How To Protect Your School From A Breach Of Security

Information Technology Plan

Five keys to a more secure data environment

Transcription:

TABLE OF CONTENTS FOR AUDIT, COMPLIANCE, AND MANAGEMENT REVIEW COMMITTEE Brenda Pejovich, Chairman Wallace L. Hall, Jr. R. Steven Hicks Jeffery D. Hildebrand Robert L. Stillwell Committee Meeting: /4/203 Board Meeting: /4/203 Austin, Texas Committee Meeting Board Meeting Page A. CONVENE (Conference Room, Ashbel Smith Hall, 9th Floor) 8:30 a.m. Chairman Pejovich B. RECESS TO EXECUTIVE SESSION PURSUANT TO TEXAS GOVERNMENT CODE, CHAPTER 55 Personnel matters relating to appointment, employment, evaluation, assignment, duties, discipline, or dismissal of officers or employees - Texas Government Code Section 55.074 U. T. System: Discussion with the Chief Audit Executive concerning personnel matters relating to appointment, employment, evaluation, assignment, duties, discipline, or dismissal of individual System Administration and institutional officers or employees involved in internal audit functions C. RECONVENE IN OPEN SESSION (Board Room, Ashbel Smith Hall, 9th Floor). U. T. System Board of Regents: Discussion and appropriate action regarding Consent Agenda items, if any, referred for Committee consideration Mr. Peppers 8:45 a.m. 8:45 a.m. Action Action 7 2. U. T. System: Update on the implementation of initiatives to address recommendations from the Report on the Strategic Assessment of the U. T. System Internal Audit Services performed by Deloitte 3. U. T. System: Report on the Systemwide internal audit activities, including results of the executive travel and entertainment, laptop encryption and IT inventory, and practice plan audits, and update on the Systemwide internal audit of development activities 4. U. T. System: Annual Report on Information Security Compliance Enhancements across the U. T. System and on security of the U. T. Research Cyberinfrastructure 8:47 a.m. Report/Discussion Mr. Peppers 8:50 a.m. Report/Discussion Mr. Peppers 9:05 a.m. Report/Discussion Mr. Plutko Mr. Watkins Not on Agenda Not on Agenda Not on Agenda 8 9 20 D. ADJOURN 9:5 a.m. 6

. U. T. System Board of Regents: Discussion and appropriate action regarding Consent Agenda items, if any, referred for Committee consideration RECOMMENDATION The proposed Consent Agenda is located at the back of the book. 7

2. U. T. System: Update on implementation of initiatives to address recommendations from the Report on the Strategic Assessment of the U. T. System Internal Audit Services performed by Deloitte REPORT Chief Audit Executive Peppers will provide an update on implementation of initiatives developed to address the recommendations from the report on the Strategic Assessment of the U. T. System Internal Audit Services performed by Deloitte, which was presented at the May 8, 203 Audit, Compliance, and Management Review Committee meeting. The 7 recommendations have been organized into eight key initiatives to be implemented over a three-year period as follows: Governance Strengthen institutional audit committee independence and capability Assess Systemwide and institutional risk management Provide resources for governance Processes, Resources, and Capability Development Organize mission and values into objectives, models, and priorities Enhance risk assessment methodology Develop audit and reporting models Quantify and improve team competency Success and Sustained Quality Align internal audit metrics and quality program with improvement plans 8

3. U. T. System: Report on the Systemwide internal audit activities, including results of the executive travel and entertainment, laptop encryption and IT inventory, and practice plan audits, and update on the Systemwide internal audit of development activities REPORT Chief Audit Executive Peppers will report on the Executive Travel and Entertainment Expenses audits and the Laptop Encryption and IT Inventory audits that were conducted at U. T. System Administration and each of the U. T. System institutions. He will also report on the practice plan audits that were performed at the U. T. System health institutions. Summaries of the results for these audits were provided to the Regents prior to the meeting. Chief Audit Executive Peppers will provide an update on the Systemwide internal audit of development activities performed by the U. T. System Audit Office. Reports for U. T. System, U. T. System Administration, and U. T. M. D. Anderson Cancer Center have been issued and were provided to the Regents prior to the meeting. He will also present the results of the U. T. Austin Law School Foundation Special Request Project conducted by the System Audit Office, for which the report was issued and previously provided to the Regents. 9

4. U. T. System: Annual Report on Information Security Compliance Enhancements across the U. T. System and on security of the U. T. Research Cyberinfrastructure REPORT Systemwide Compliance Officer Plutko and Chief Information Security Officer Watkins will report on Information Security Compliance Enhancements across the U. T. System and on the security of the U. T. Research Cyberinfrastructure. A PowerPoint presentation is set forth on the following pages. BACKGROUND INFORMATION Following a November 0, 20 report to the Board by Deloitte on its comprehensive information security compliance effectiveness review of the U. T. System, the Board approved the allocation of $34,872,000 of Available University Funds to invest in information security compliance enhancements across the U. T. System and to secure the U. T. Research Cyberinfrastructure. The Office of Systemwide Compliance administers the investment of these funds through a centrally managed program and is to submit annual reports on progress to the Chancellor and to the Board. This is the second Annual Report. 20

2 ANNUAL REPORT ON INFORMATION SECURITY COMPLIANCE ENHANCEMENTS Audit, Compliance, and Management Review Committee U. T. System Board of Regents Meeting November 203 Mr. Lewis Watkins, U. T. System Chief Information Security Officer

22 U.T. System Common Risks 3 2 7 2 Risk - Mobile Device Security Risk 2 - Decentralized IT Risk 3 - Network Security Risk 4 - Logging and Monitoring Risk 5 - Disaster Recovery Risk 6 - Inconsistent Risk Assessment Risk 7 - Unencrypted Backup Tapes Risk 8 - Third-party Risk Management Risk 9 - Software Development & Configuration Mgt. Risk 0 - Physical Security Risk - Identity and Access Management Risk 2 - Training and Awareness Risk 3 - CISO Authority and Culture Information Security gaps posing highest risk across the U. T. System 8 9 0 4 3 6 5 2

23 High Risk Area : Mobile Device Security Completed laptop encryption Systemwide Purchased mobile device management software for Systemwide use to enforce ipad, iphone, and Android encryption and configuration management Deployed encrypted thumb drives to U. T. System faculty and staff using/maintaining confidential information Launched a Systemwide Network Access Control Working Group led by U. T. San Antonio 3

24 High Risk Area 2: Decentralized IT Completed two technology consolidation projects: U. T. Austin centralized 000+ servers U. T. Health Science Center - San Antonio centralized 77 servers Completed centralization of access management at U. T. Southwestern Medical Center 4

25 High Risk Area 3: Network Security Completed U. T. San Antonio network upgrade Started segmentation of critical servers at U. T. Health Science Center - Tyler Completed enterprise firewall upgrade at U. T. Pan American Completed U. T. Health Science Center - San Antonio wireless network upgrade

26 High Risk Area 4: Logging and Monitoring Purchased patient privacy monitoring software for U. T. health institutions use Launched a Security Incident and Event Monitoring Working Group led by U. T. Health Science Center - Houston 6

27 High Risk Area 5: Disaster Recovery Disaster Recovery for the Arlington Regional Data Center (ARDC) Backup processing for Shared PeopleSoft applications U. T. Arlington failover capabilities Disaster Recovery Plan and co-location at a remote location for UTShare and Texas Student Information System Systems are used by multiple institutions 7

28 High Risk Area 6: Inconsistent Risk Assessment Risk Assessment Consistency: Established a U. T. System Risk Assessment Framework based on the National Institute of Standards and Technology Purchased risk assessment software for Systemwide use Started pilot deployment in five early adopter institutions Third-Party Risk Assessment: Established a third-party risk assessment process based on U. T. System Risk Management Framework Important for outsourcing and collaborations arrangements 8

29 Project Funding by Risk Area Network Security High Risk Area 3 Risk Management High Risk Area 6 Monitoring and Logging High Risk Area 4 Disaster Recovery High Risk Area 5 Decentralized IT Migration High Risk Area 2 Patient Privacy Monitoring High Risk Area 4 Data Loss Prevention High Risk Area Mobile Device Security High Risk Area Encryption High Risk Area Infrastructure Upgrade Physical Security Identity Management Backup Training Business Process Improvement Application Security Vulnerability Scanning Governance $868,83 $787,684 $556,398 $345,950 $250,000 $98,530 $75,990 $33,54 $0,090 $,465,029 $,07,857 $,06,830 $3,453,996 $3,449,807 $3,30,497 $2,68,555 $2,306,992 $5,036,552 Projects Addressing High Risks Affecting Many Institutions 9

30 U. T. Arlington $,842,885 6.3% Common Infrastructures $2,066,24 7.% Funding by Institution U. T. Arlington... $,842,885 6.3% U. T. Austin. $3,28,032.0% Available Funds $2,498,520 8.5% Multi-Institution Projects $3,828,47 47.3% U. T. Austin $3,28,032.0% U. T. San Antonio $2,069,307 7.% Includes: - Patient Privacy Monitoring - Mobile Device Security and Management - IT Resources Logging and Monitoring - Risk Management - Training UTHSC-San Antonio $,069,902 3.7% U. T. Brownsville $54,000 0.2% U. T. Dallas. $0 0.0% U. T. El Paso..... $277,763 0.9% U. T. Pan American.. $549,204.9% U. T. Permian Basin. $80,373 0.3% U. T. San Antonio. $2,069,307 7.% U. T. Tyler. $78,0 0.6% U. T. Southwestern.. $436,438.5% U. T. Medical Branch.... $56,992 0.5% U. T. HSC Houston. $45,54 0.2% U. T. HSC San Antonio $,069,902 3.7% U. T. MDACC.. $360,000.2% U. T. HSC Tyler.. $490,650.7% U. T. System Administration. $3,996 0.0% Multi-Institution Project. $3,828,47 47.3% UTIMCO...... $0 0.0% Common Infrastructures $2,066,24 7.% Funds Balance $2,498,520 8.5% 0

3 Funds Allocation to Date $7,987,463 6% $8,769,07 30% $2,498,520 9% Funds Earmaked for Approved Projects Funds Used in Completed Projects Funds Balance

32 Active and Completed Projects by Activity Area Policy Development Business Process Improvement Network Security Risk Management Training Business Process Analysis Physical Security Monitoring and Logging Mobile Device Security Encryption Disaster Recovery Decentralized IT Migration Patient Privacy Monitoring Infrastructure Upgrade Identity Management Access Control Software Development Life Cycle Data Loss Prevention Configuration Management Application Security Vulnerability Scanning Governance Backup 3 2 3 2 2 4 6 6 5 4 5 2 9 9 2 4 9 7 20 5 2 0 2 7 5 3 5 0 5 0 5 20 25 30 35 40 9 4 2 6 Active Projects Completed Projects 2

33 Active and Completed Projects by Institution U. T. Arlington U. T. Austin U. T. Brownsville U. T. Dallas U. T.El Paso U. T. Pan American U. T. Permian Basin U. T. San Antonio U. T. Tyler U. T. Southwestern U. T. Medical Branch U. T. HSC Houston U. T. HSC San Antonio U. T. MDACC U. T. HSC Tyler U. T. System Administration Multi-Institutional Projects UTIMCO Common Infrastructures 0 2 3 4 5 5 4 6 6 6 8 9 0 0 9 3 3 2 3 4 3 3 4 6 2 9 27 6 7 8 0 5 0 5 20 25 30 35 40 8 24 0 Active Projects Completed Projects 3

34 Project Progress Summary 200 50 00 50 0 62 37% Current Project Status 0 25% 63 38% Active Projects Completed Projects Pending Projects Total Identified Projects: 435 Projects Underway 5 63 Low and Medium Priority Projects High-Priority Projects High Priority Project Completion Status High-Priority 37 Projects 2% 93 294 4 32% Completed 68% 64 32% 56% Active Pending Cumulative Projects Completed October 202 October 203 October 202 October 203 45 0 4

35 Multi-Institution Projects Completed and In Process Mobile Device Management Laptop encryption Encrypted thumb drives iphones, ipads, and Androids Network access control Risk Management IT risk assessments Third-party assessments Training Technical training User training Logging and Monitoring Patient privacy Data discovery Security events 5

36 Common Infrastructures Hired an Information Security Officer for Common Use Information Resources Work with Resource Manager Identify control gaps Define compliance strategies Establish program metrics Deployed U. T. Research Cyber Infrastructure Perimeter Security Devices Completed Information Security Assessment for Texas Advanced Computing Center and ARDC Are they electronic protected health information-ready? 6

37 U. T. System Security Profile is Maturing Improved Security Laptop encryption minimizes the number of reportable security breaches Mobile device management provides security standards and secure configurations for mobile devices connecting to institutional networks Alignment Projects support the Framework for Advancing Excellence U. T. System Risk Management Framework provides a common methodology to assess, report, and aggregate information security risk across all institutions Cultural Shift Executive management is considering and, in cases, requiring centralization of critical assets Institutions are increasingly considering collaboration and shared strategies to address security Efficiency Systemwide purchasing and leveraging the U. T. System Supply Alliance generates considerable savings to the U. T. System 7