ISACA Tools Help Develop Cybersecurity Expertise

Similar documents
CYBERSECURITY NEXUS CSX. 15 October 2014 ISACA Winchester Chapter

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

KEY TRENDS AND DRIVERS OF SECURITY

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework )

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014

Trends in Information Technology (IT) Auditing

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW

InfoSec Academy Application & Secure Code Track

So Why on Earth Would You WANT To be a CISO?

MANY CERTIFICATES WHAT S THE WORTH?

Terms of Reference for an IT Audit of

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

ISACA. Trust in, and value from, information systems.

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA

InfoSec Academy Forensics Track

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Understanding the Federal IT Security Professional (FITSP) Certification

Program Overview and 2015 Outlook

Access FedVTE online at: fedvte.usalearning.gov

IRAP Policy and Procedures up to date as of 16 September 2014.

Governance and Management of Information Security

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Information Security Management Systems

Athens, 2 December 2011 Hellenic American Union Conference Center

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Database Security and Auditing

Feature. Developing an Information Security and Risk Management Strategy

CLASSIFICATION SPECIFICATION FORM

Domain 5 Information Security Governance and Risk Management

Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA

The Next Generation of Security Leaders

Certified Information Security Manager

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

State of South Carolina InfoSec and Privacy Career Path Model

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING

ISACA Singapore Chapter

SECURING PAYMENTS IN THE CYBER WORLD

InfoSec Academy Pen Testing & Hacking Track

Information Systems Security Certificate Program

Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

Security Transcends Technology

Certified Information Systems Auditor (CISA)

Information Security Awareness Training

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

PROVING YOUR GRC KNOWLEDGE WITH CERTIFICATIONS

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

FINRA Publishes its 2015 Report on Cybersecurity Practices

Certification Programs

Earning Your Security Trustmark+

IMPLEMENTATION OF HIGH-PERFORMANCE SECURITY MANAGEMENT PROCESSES

Enabling Information PREVIEW VERSION

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile

Experienced professionals may apply for the Certified Risk Management Professional (CRMP) certification under the grandfathering provision.

COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.

IT Service Management ITIL, COBIT

Microsoft Services Premier Support. Security Services Catalogue

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

IT Governance Implementation Workshop

LINUX / INFORMATION SECURITY

MANAGEMENT DEVELOPMENT COURSES

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

Q&A. DEMO Version

Cybersecurity Framework: Current Status and Next Steps

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

CORE Security and GLBA

Transcription:

Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional Guidance Webinar Participate in Cyber Security Awareness Month This October Explore Governance, Cybersecurity and Leadership at 2014 Oceania CACS Learn to Protect Organizational Data at Audit Webinar Cybersecurity Focus at North America ISRM COBIT-related Risk Scenarios Available Book Review: Networking: A Beginner s Guide ISACA Tools Help Develop Cybersecurity Expertise Cybersecurity is a constantly changing field. New threats are uncovered every day as enterprises race to secure their systems. Mitigate your enterprise s risk with access to the latest developments in cybersecurity. October is Cyber Security Awareness Month, and ISACA has tools to help you develop your cybersecurity skills. Nominate Qualified Candidates for the ISACA Board of Directors Nominations for the ISACA Board of Directors for the 2015-16 term are open. Note that only about a week remains in the nomination period for international president. Members may submit nominations for themselves or for others (or both).

Tips for Solving Data Classification Challenges By Sunil Bakshi, CISA, CISM, CGEIT, CRISC, AMIIB, ABCI, CEH, CISSP, ISO 27001 LA, BS 25999 LI, MCA, PMP Information is a primary enabler for any organization, as established in COBIT 5. Organizations today generate, process, use and store volumes of data/information. However, the major concern for organizations is, Are these data secure? Information security best practices state that in order to optimize security, data must be classified. But organizations find that this is easier said than done. Earn CPE at Professional Guidance Webinar The US National Initiative for Cybersecurity Education (NICE) is using public -private relationships to promote awareness, education and professional development in the area of cybersecurity. To help cybersecurity professionals understand NICE and its changes, ISACA has partnered with Capella University to create the National Initiative for Cybersecurity Education in Transitions: Update and Overview. ISACA members can earn 1 free CPE hour by attending this webinar, which will take place on 9 October at 11:00 a.m. CDT (UTC -5 hours). Participate in Cyber Security Awareness Month This October ISACA is a champion of Cyber Security Awareness Month in October. The goal of Cyber Security Awareness Month is to inform people about the importance of online safety and ISACA has the tools to help you become a cybersecurity leader.

Explore Governance, Cybersecurity and Leadership at 2014 Oceania CACS The 2014 Oceania Computer Audit, Control and Security (CACS) conference addresses the governance, cybersecurity and leadership challenges that IT professionals face today. The conference, hosted by the ISACA Perth (Western Australia) Chapter, will take place on 29-31 October. Learn to Protect Organizational Data at Audit Webinar An important component of any good security strategy is to protect databases that contain sensitive data. To help organizations learn how to create such a plan, Oracle is sponsoring an ISACA webinar to help enterprises reduce their organization s risk. The Data -centric Audit and Protection: Reducing Risk and Improving Security Posture webinar will take place on 23 October at 11:00 a.m. CDT (UTC -5 hours), and ISACA members can earn 1 continuing professional education (CPE) hour for attending. Cybersecurity Focus at North America ISRM The 2014 North America ISRM Conference provides valuable resources for anyone interested in the field of cybersecurity. As cybersecurity is a growing concern for enterprises, 2 of the 5 conference tracks focus on cybersecurity and contain the latest information on cybersecurity trends and how to use ISACA s numerous cybersecurity -related resources. COBIT-related Risk Scenarios Available Risk scenarios are powerful tools that help risk professionals prepare for the unexpected. ISACA understands that scenario analysis is an important component of enterprise risk management and has issued Risk Scenarios Using COBIT 5 for Risk to provide guidance to professionals tasked with utilizing risk scenarios.

Book Review: Networking: A Beginner s Guide Reviewed by Upesh Parekh, CISA Many people do not know how networking in the networked world works. How a message sent from point A reaches point B over the Internet is still a mystery to many. As a result, network security is becoming increasingly important. Networking A Beginners Guide explains the fundamentals of networking, which is necessary for audit and security professionals who are entrusted with the responsibility of ensuring network security. ISACA Tools Help Develop Cybersecurity Expertise Cybersecurity is a constantly changing field. New threats are uncovered every day as enterprises race to secure their systems. Mitigate your enterprise s risk with access to the latest developments in cybersecurity. October is Cyber Security Awareness Month, and ISACA has tools to help you develop your cybersecurity skills. ISACA s Cybersecurity Nexus (CSX) includes the most innovative advancements in the cybersecurity field. For example, the Advanced Persistent Threat Awareness Study Results report highlights the need for enterprises to cultivate new defenses. Implementing the NIST Cybersecurity Framework and its accompanying tool kit describe the application of ISACA methods as an effective way to use the cybersecurity framework. Both publications empower you to proactively secure your enterprise. Cybersecurity webinars on the CSX platform offer cutting-edge thought leadership, research and advice on the current and emerging threat environments. The webinars explore controls for cyberdefense, diagnostics and COBIT 5. Watch the upcoming and archived webinars today to earn continuing professional education (CPE) hours before the year ends You can become more knowledgeable about cybersecurity with the tools and resources provided by your ISACA membership. I cannot think of an organization that is more apt for professionals in the IT security field than ISACA, says Manu Kuriakose Varghese, CISA, CIA, internal auditor. To learn more about membership benefits, visit the IT Professional Membership Benefits page of the ISACA web site.

Nominate Qualified Candidates for the ISACA Board of Directors Nominations for the ISACA Board of Directors for the 2015-16 term are open. Information about serving on the board, the attributes for office and the nomination form itself are available on the Board Nominations page of the ISACA web site. Note that only about a week remains in the nomination period for international president. Members may submit nominations for themselves or for others (or both). All nominations will be acknowledged and all candidates will be required to complete a candidate profile form that confirms the candidate s willingness to serve if selected and provides the Nominating Committee information about the candidate. Self-nominating candidates will also be asked to submit a letter of recommendation from an ISACA member, outlining how the candidate demonstrates the attributes for office. Information on candidates will be gathered in other ways as well, including review of public web sites (e.g., Google, Facebook, LinkedIn) and interviews with the candidates. Nominations for international president close at 5:00 p.m. CDT (UTC -5 hours) on 14 October 2014; nominations for vice president close at 5:00 p.m. CST (UTC -6 hours) on 6 January 2015. These are the dates by which all materials must be received at ISACA International Headquarters (i.e., completed candidate profile form and letter of recommendation, if required). Questions? Contact nominate@isaca.org. Tips for Solving Data Classification Challenges By Sunil Bakshi, CISA, CISM, CGEIT, CRISC, AMIIB, ABCI, CEH, CISSP, ISO 27001 LA, BS 25999 LI, MCA, PMP Information is a primary enabler for any organization, as established in COBIT 5. Organizations today generate, process, use and store volumes of data/information. However, the major concern for organizations is, Are these data secure? Information security best practices state that in order to optimize security, data must be classified. But organizations find that this is easier said than done. Data classification best practices suggest the following steps: 1. Define a classification scheme in which the information within the organization shall be classified in predefined buckets (e.g., top secret, confidential, sensitive, internal, public). Organizations may adopt a different scheme. 2. Identify the organization s data electronic and physical. 3. Classify and label the data.

4. Implement controls for protection. Organizations face major challenges while executing the second step, primarily due to: Volume of data generated, processed and stored Multiple data owners and coordination among them Cross-functional dependency and, hence, accesses required Classifying and labeling historical data Organizations may consider the following suggestions during data classification: Educate business process owners on the need and scheme for classification. Ask business process owners to identify data elements and the source of data. This will help in identifying data owners/custodians. (For example, employee data generated and owned by the human resource function, but used by other departments, must be classified by human resources and others must use that classification.) Independent data elements often cannot be classified, except for a few (e.g., credit card number), therefore, it is best to form small data sets that make meaningful information from data elements and classify them (e.g., employee number, name, date of birth, address, and date of hire can form 1 data set that is generally used by other functions like payroll, physical security). Any information or report generally contains multiple data sets. While classifying such information, identify the data sets (partial or complete) used and dete rmine the classification level of report/information based on classification of data sets; generally the highest level shall prevail. Determine and document exceptions. Maintain a function-wise and centralized data set inventory with validity. Implement a process for periodic review. Implement an ongoing classification process. Once the classification process is on its way, further steps to optimize security may be considered. Sunil Bakshi, CISA, CISM, CGEIT, CRISC, AMIIB, ABCI, CEH, CISSP, ISO 27001 LA, BS 25999 LI, MCA, PMP, is a consultant and trainer in IT governance and information security. Earn CPE at Professional Guidance Webinar The US National Initiative for Cybersecurity Education (NICE) has created the National Cybersecurity Workforce Framework (Workforce Framework), which provides a common language for defining cybersecurity work. To help cybersecurity professionals understand the Workforce Framework and its changes, ISACA has partnered with Capella University to create the Why Implement the NICE Cybersecurity Workforce Framework?, which

will take place on 9 October at 11:00 a.m. CDT (UTC -5 hours). After attending and passing a quiz about the webinar, ISACA members can earn 1 free continuing professional education (CPE) hour. Cybersecurity is rapidly evolving, and protecting cyberspace relies on the quality and quantity of the cyberworkforce. This webinar will be led by Ben Scribner, from the Cybersecurity Education and Awareness Branch of the US Department of Homeland Security. To register for this webinar, visit the Why Implement the NICE Cybersecurity Workforce Framework? page of the ISACA web site. Participate in Cyber Security Awareness Month This October ISACA is a champion of Cyber Security Awareness Month in October. The goal of Cyber Security Awareness Month is to inform people about the importance of online safety and ISACA has the tools to help you become a cybersecurity leader. ISACA has created Cybersecurity Nexus (CSX) to help address the growing need for cybersecurity professionals. One component of the CSX portfolio is the knowledge-based Cybersecurity Fundamentals Certificate. The Cybersecurity Fundamentals Certificat e exam is now available online. To earn the certificate, candidates must pass the exam and agree to adhere to ISACA s Code of Professional Ethics. To help those interested in the certificate prepare for the exam, ISACA has issued the Cybersecurity Fundamentals Study Guide, which covers the key areas that will be tested on the exam. On the CSX page of the ISACA web site, you can find webinars, studies, certificates and white papers with up-to-date information on cybersecurity trends. You can post about cybersecurity issues on social media to engage others and encourage discussion. You can also interact with others on cybersecurity-related issues by using the hashtag #ChatSTC to participate in Twitter chats on 16 October at 2:00 p.m. CDT (UTC -5 hours) and 30 October at 2:00 p.m. CDT (UTC -5 hours). The Get Involved page of the Stay Safe Online web site has specific actions you can take to help others learn about cybersecurity. For more information on Cyber Security Awareness Month, visit the National Cyber Security Alliance s Cyber Security Awareness Month web site and the European Union Agency for Network and Information Security s European Cyber Security Month web site. For more information on the fundamentals exam or CSX, visit the Cybersecurity Nexus page of the ISACA web site.

Explore Governance, Cybersecurity and Leadership at 2014 Oceania CACS The 2014 Oceania Computer Audit, Control and Security (CACS) Conference addresses the governance, cybersecurity and leadership challenges that IT professionals face today. The conference, hosted by the ISACA Perth (Western Australia) Chapter, will take place on 29-31 October. The keynote speakers for this conference have years of experience in cybersecurity, audit and governance. In addition to learning from industry leaders, attendees will also be provided with information on ISACA s Cybersecurity Nexus (CSX) and how it can be used to strengthen their organization s cybersecurity practices. Attendees can also network with professionals from around the region and the world. A networking session and dedicated networking time have been built in to the conference schedule. To register for or learn more about the conference, visit the Oceania CACS web site. Learn to Protect Organizational Data at Audit Webinar An important component of any good security strategy is to protect databases that conta in sensitive data. To help organizations learn how to create such a plan, Oracle is sponsoring an ISACA webinar to help enterprises reduce their organization s risk. The Data-centric Audit and Protection: Reducing Risk and Improving Security Posture webinar will take place on 23 October at 11:00 a.m. CDT (UTC -5 hours), and ISACA members can earn 1 continuing professional education (CPE) hour for attending. Roxana Bradescu, CISSP, director of product management, database security at Oracle will lead this webinar and will teach attendees what and how to audit, secure infrastructure practices and how to prevent information leaks. To register for the webinar or learn more about it, visit the Data-centric Audit and Protection page of the ISACA web site.

Cybersecurity Focus at North America ISRM The 2014 North America Information Security and Risk Management (ISRM) Conference provides valuable resources for anyone interested in the field of cybersecurity. As cybersecurity is a growing concern for enterprises, 2 of the 5 conference tracks focus on cybersecurity and contain the latest information on cybersecurity trends and how to use ISACA s numerous cybersecurity-related resources. The sessions at this conference are led by experts in the field of cybersecurity and cover topics including cybersecurity for small businesses, security trends, privacy and security, and how to involve the board of directors in cybersecurity discussions. In addition to the cybersecurity lectures, North America ISRM also offers cybersecurity workshops, including the in-demand Cybersecurity Fundamentals Workshop, which prepares attendees for ISACA s Cybersecurity Fundamentals Certificate exam. The other tracks at this conference are compliance, privacy/security and risk management. To learn more about the presentations and workshops offered at the conference, visit the North America ISRM 2014 Presentations and Descriptions page of the ISACA web site. To learn more about the conference, visit the North America ISRM page. COBIT-related Risk Scenarios Available Risk scenarios are powerful tools that help risk professionals prepare for the unexpected. ISACA understands that scenario analysis is an important component of enterprise risk management and has issued Risk Scenarios Using COBIT 5 for Risk to provide guidance to professionals tasked with utilizing risk scenarios. Risk Scenarios Using COBIT 5 for Risk provides practical guidance on how to use COBIT 5 for Risk to solve for current business issues. The publication provides a high -level overview of risk concepts, along with more than 50 complete risk scenarios covering all 20 categories described in COBIT 5 for Risk. An accompanying online tool kit is available and contains interactive risk scenario templates for each of the 20 categories. Risk Scenarios Using COBIT 5 for Risk is available to ISACA members as a complimentary download. Nonmembers can purchase the PDF in the ISACA Bookstore. A print version of the book will be released in the coming weeks.

Book Review: Networking: A Beginner s Guide Reviewed by Upesh Parekh, CISA Many people do not know how networking in the networked world works. How a message sent from point A reaches point B over the Internet is still a mystery to many. As a result, network security is increasingly important. Networking A Beginners Guide explains the fundamentals of networking, which is necessary for audit and security professionals who are entrusted with the responsibility of ensuring network security. Networking A Beginner s Guide is a technical book focused on explaining the basics of networking. The book is divided in 2 parts. Part I, Networking Ins and Outs, deals with fundamental concepts; Part II, Hands-on Knowledge, is a practical guide to working with selected platforms. Part I of the book starts with a basic explanation of why networking is re quired by a company. It then goes on to cover network hardware, network protocols, directory services, remote connections, network design, network security and network disaster recovery. Part II of the book covers hands-on knowledge of Windows 2012 server, Exchange server 2013 and Linux, and includes an introduction to virtualization. The book presumes a certain level of understanding of terminology most commonly used in the IT world. It is written in very lucid, simple language and flows very easily. The tips, warnings and diagrams support the technical explanations. Many students and job seekers are looking forward to a career as network professionals. They need to start with an understanding of the nuts and bolts of networking. Novice network professionals or nontechnical assurance professionals who want to take the first step toward a better understanding of networking will find this book immensely helpful. Networking A Beginner s Guide is available from the ISACA Bookstore. For information, see the ISACA Bookstore Supplement in the latest issue of the ISACA Journal, visit the ISACA Bookstore online or email bookstore@isaca.org. Upesh Parekh, CISA, is a governance and risk professional with more than 10 years of experience in the fields of IT risk management and audit. He is based in Pune, India, and works for Barclays Technology Centre, India. 2014 ISACA. All rights reserved.