Integrated Governance, Risk and Compliance (igrc) Approach



Similar documents
Integrated Governance, Risk, and Compliance. Improve performance and enhance productivity in Federal agencies

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

NUMBER OF MATERIAL WEAKNESSES

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

VA Office of Inspector General

Significant Revisions to OMB Circular A-127. Section Revision to A-127 Purpose of Revision Section 1. Purpose

Department of Homeland Security

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

How To Check If Nasa Can Protect Itself From Hackers

POSTAL REGULATORY COMMISSION

2014 Audit of the Board s Information Security Program

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

May 2, 2016 OIG-16-69

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

Office of Inspector General

Authorized Federal Supply Schedule Price List

NEIAF June 18, IS Auditing 101

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

GAO INFORMATION SYSTEMS. The Status of Computer Security at the Department of Veterans Affairs. Report to the Secretary of Veterans Affairs

VA Office of Inspector General

U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS. Final Audit Report

Department of Homeland Security

March 17, 2015 OIG-15-43

Information System Security Officer (ISSO) Guide

FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Information Security Guide For Government Executives. Pauline Bowen Elizabeth Chew Joan Hash

Information System Security Officer (ISSO) Guide

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION

Department of Homeland Security Office of Inspector General. Audit of Application Controls for FEMA's Individual Assistance Payment Application

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE

Audit of the Department of State Information Security Program

AUDIT REPORT REPORT NUMBER Information Technology Professional Services Oracle Software March 25, 2014

IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP

Audit of the Board s Information Security Program

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

State of South Carolina Policy Guidance and Training

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS

NASA OFFICE OF INSPECTOR GENERAL

Third Party Risk Management 12 April 2012

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

3.B METHODOLOGY SERVICE PROVIDER

OFFICE OF INSPECTOR GENERAL. Audit Report

U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009

Auditing Standard 5- Effective and Efficient SOX Compliance

AUDIT REPORT. The Energy Information Administration s Information Technology Program

United States Secret Service's Management Letter for DHS' FY 2014 Financial Statements Audit

Evaluation of DHS' Information Security Program for Fiscal Year 2014

The Value of Vulnerability Management*

December 8, Security Authorization of Information Systems in Cloud Computing Environments

STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

INFORMATION SECURITY. Evaluation of GAO s Program and Practices for Fiscal Year 2012 OIG-13-2

STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

Audit Readiness Essentials

IBM Internet Security Systems October FISMA Compliance A Holistic Approach to FISMA and Information Security

Real property solutions for Federal agencies*

VOLUME 1, CHAPTER 3: FEDERAL FINANCIAL MANAGEMENT IMPROVEMENT ACT OF 1996 COMPLIANCE, EVALUATION, AND REPORTING SUMMARY OF MAJOR CHANGES

Office of Inspector General

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

OFFICE OF INSPECTOR GENERAL. Audit Report

Office of the Inspector General United States Office of Personnel Management. Statement of Michael R. Esser Assistant Inspector General for Audits

SYSTEMS AND CONTROLS. Management Assurances FEDERAL MANAGERS FINANCIAL INTEGRITY ACT (FMFIA) ASSURANCE STATEMENT FISCAL YEAR (FY) 2012

Office of Inspector General

AUDIT REPORT PERFORMANCE AUDIT OF COMMUNITY HEALTH AUTOMATED MEDICAID PROCESSING SYSTEM (CHAMPS) CLAIMS EDITS

Final Audit Report -- CAUTION --

Computer Security Roles and Responsibilities and Training Should Remain Part of the Computer Security Material Weakness.

Department of Homeland Security Office of Inspector General

Information Security for Managers

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

January 9, 2009 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND ESTABLISHMENTS, CHIEF FINANCIAL OFFICERS, AND INSPECTORS GENERAL

DEPARTMENT OF THE INTERIOR. Privacy Impact Assessment Guide. Departmental Privacy Office Office of the Chief Information Officer

VA Office of Inspector General

AUDIT REPORT. The Department of Energy's Management of Cloud Computing Activities

OBLIGATION MANAGEMENT

SMITHSONIAN INSTITUTION

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report

Enterprise Security Tactical Plan

CHAPTER 3 FINANCIAL MANAGEMENT SYSTEMS: POLICY, ROLES AND RESPONSIBILITIES FOR CONFORMANCE, EVALUATION, AND REPORTING

Department of Technology Services

Report of Audit OFFICE OF INSPECTOR GENERAL. Information Technology Infrastructure Project Management A Tammy Rapp Auditor-in-Charge

Department of Homeland Security Office of Inspector General

Policy Management Compliance 360 GRC Software Suite

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

NASA Financial Management Requirements Volume 9, Chapter 4 April 2005 CHAPTER 4 RISK ASSESSMENTS

Information Security Program CHARTER

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Application Security Review

UNITED STATES COMMISSION ON CIVIL RIGHTS. Fiscal Year 2012 Federal Information Security Management Act Evaluation

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Cyber Security & Compliance Briefing

a GAO GAO INFORMATION SECURITY Department of Homeland Security Needs to Fully Implement Its Security Program

United States Patent and Trademark Office

Overview. FedRAMP CONOPS

NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO TABLE OF CONTENTS

Transcription:

U.S. Department of Homeland Security (DHS) United States Secret Service (USSS) Integrated Governance, Risk and Compliance (igrc) Approach Concept Paper* *connectedthinking

Provided to: Provided by: Mrs. Nichole Vaughn, Systems Operations Branch Chief Mr. Steve Vaughn, Systems Integrations Branch Chief Enterprise Financial Systems (EFS) United States Secret Service (USSS) U.S. Department of Homeland Security Jack L. Johnson, Jr. Principal 1800 Tysons Boulevard McLean, Virginia 22102 Telephone (703) 9181303 Fax (813) 3290173 johnson.jack@us.pwc.com 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers LLP (a Delaware limited liability partnership) or, as the context requires, other member firms of PricewaterhouseCoopers International Ltd., each of which is a separate and independent legal entity. *connectedthinking is a trademark of PricewaterhouseCoopers LLP.

Table of Contents Purpose...1 Background...3 Approach...7 Project Milestones...9 Contract Deliverables...10 Required Support Capabilities...11 PricewaterhouseCoopers Use or disclosure of data contained on this page is subject to the restriction on the inside cover of this document.

Purpose The purpose of this Concept Paper is to provide the United States Secret Service (USSS) Enterprise Financial Systems (EFS) Branch Chiefs with an integrated Governance, Risk, and Compliance (igrc) approach to: 1. 2. 3. Test, analyze, and document their Oracle Financials security environment; Link financial and mixed financial system controls, policies, and procedures to applicable laws and regulations; and Procure and configure the Oracle governance, risk, and compliance (GRC) tool. This igrc approach will assist the USSS with automating the management of internal controls over business processes, application security, and technical infrastructure security. This igrc approach will also assist the USSS with improving the efficiency of their compliance processes and complying with applicable laws and regulations. At USSS specifically, the following IT GRC challenges have been noted: Multiple financial and operational information systems that are not centrally managed; Lack of available staff resources to ensure compliance with internal control requirements while also supporting the operational and mission needs of the agency; Decentralized compliance efforts, which limit the ability to share information and avoid unnecessary work; Lack of technology to support documentation, testing, and reporting of compliance activities; and High dependence on manual control procedures, with limited use of technology to automate internal controls. PricewaterhouseCoopers Use or disclosure of data contained on this page is subject to the restriction on the inside cover of this document. 1

2 Use or disclosure of data contained on this page is subject to the restriction on the inside cover of this document. PricewaterhouseCoopers

Background The wide array of complex and overlapping Federal laws and regulations related to the protection of financial information and systems poses a number of challenges to the USSS and EFS Branches. A number of laws have been implemented to protect the confidentiality, integrity, and availability of the sensitive information resources that support Federal operations and assets, including financial systems and data. These laws and regulations include the Federal Information Security Management Act (FISMA) of 2002, the Federal Managers Financial Integrity Act (FMFIA) of 1982, and the Federal Financial Management Improvement Act (FFMIA) of 1996. FISMA requires each Federal agency to develop, document, and implement an entitywide security program to protect the information and information systems that support the operations and assets of the agency, including both financial and nonfinancial systems and data. FMFIA provides additional requirements specific to systems supporting financial accounting and reporting, including Chief Financial Officer (CFO)Designated Financial Systems. FFMIA requires that Federal financial management systems comply with Federal systems requirements and accounting standards, and that they also comply with the U.S. Standard General Ledger at the transaction level. Specific guidelines for addressing the laws and regulations are included in National Institute of Standards and Technology (NIST) Special Publication (SP) 80053 and OMB Circular A130, which are applicable to all IT systems, and OMB Circulars A123 and A127, which are applicable to significant financial system internal controls. In addition, the Department of Homeland Security (DHS) Financial Accountability Act (DHS FAA) requires DHS Management to provide an assertion on internal controls over financial reporting (ICOFR) and to obtain an independent audit opinion on ICOFR. In October 2007, the DHS issued updates to DHS Sensitive Systems Policy Directive 4300A and the DHS 4300A Sensitive Systems Handbook with additional guidance for the Department s financial systems. DHS 4300A requires the DHS Chief Information Officer (CIO) to establish and oversee the Departmentwide IT Security Program, and it includes specific requirements for the DHS CFO related to the Department s financial systems. In addition, DHS 4300A requires the components to (1) conduct annual assessments of the design and operational effectiveness of 27 key A123 ITGCs and (2) monitor or maintain documentation evidencing the effectiveness of key securityrelated controls. These requirements build upon DHS s existing FISMA/NIST 80053based IT security and control framework, which includes a compliance review program that incorporates an evaluation of the security documents uploaded into the Department s Trusted AgentFISMA (TAF) tool, as well as onsite evaluations of a sample of DHS systems. The USSS and other Federal agencies continue to be challenged by this array of applicable laws and regulations, particularly as they relate to developing, implementing, maintaining, and enforcing consistent financial policies and procedures. As Figure 1 illustrates, the effort required to achieve compliance with applicable laws and regulations may lead to assessment fatigue, duplicative data, gaps in risk activities, overlapping efforts, inconsistent processes, and unclear roles and responsibilities. PricewaterhouseCoopers Use or disclosure of data contained on this page is subject to the restriction on the inside cover of this document. 3

Figure 1: Opportunities for integration of the Oracle governance, risk and compliance tool. To address these IT GRC challenges, the USSS may consider opportunities for integration of the Oracle GRC tool. GRC tools automate the management of internal controls over business processes, application security, and technical infrastructure security. GRC tools will also assist the USSS improve the efficiency of their compliance processes and comply with applicable laws and regulations. The USSS is currently in the process of evaluating the Oracle GRC tool, which carries out a range of functions such as: Documentation of Policies and Procedures Creates a central repository to store and manage content for all GRC initiatives (including documentation created by the DHS Internal Control Program Management Office to be used by all DHS components), giving users a single view and access point to critical information, including policies and procedures, process diagrams, control descriptions, test plans, control matrices, and remediation plans for issues; and, Continuous Monitoring of Controls Monitors user access/segregation of duties (integrated workflow and approvals) and provides internal automated controls reporting; Creates dashboards for controllers, auditors, and business process owners so that users can quickly construct their own reports for onthespot analysis; Tracks risk metrics and thresholds, triggering an alert/ notification to appropriate personnel when thresholds are breached (integrated workflow and notification); and Utilizes dateeffective audit trails that track who, what, and when changes made to riskcontrol matrices, work papers, and other documentation. Automates the creation, approval (including periodic reviews), distribution, editing, and archiving of policies and procedure documents; and 4 Use or disclosure of data contained on this page is subject to the restriction on the inside cover of this document. PricewaterhouseCoopers

Enforcement of Policies and Procedures Enforces user access/segregation of duties; and Delivers policy education via online, selfpaced learning with the user interface optimized for training (creates tests to assess employee understanding and to provide feedback on policy design). See Figure 2 below for the Oracle GRC processes. If implemented appropriately, use of the Oracle GRC tool will help the USSS automate the management of internal controls over business processes, application security, and technical infrastructure security via the following approach: Testing, analyzing, and documenting the Oracle Financials security environment to identify the USSS Oracle security baseline; Linking financial and mixed financial system controls, policies, and procedures to applicable laws and regulations; Evaluating and implementing the Oracle GRC tool best suited for the USSS environment; Configuring the Oracle governance, risk, and compliance tool to meet the USSS needs to help automate internal controls over business processes, application security, and technical infrastructure security. This would typically include workshops and interactive client sessions to define and collect tool requirements; and Conducting testing, remediation, and training activities to maintain the effectiveness of the tool. Figure 2: Oracle GRC Processes. PricewaterhouseCoopers Use or disclosure of data contained on this page is subject to the restriction on the inside cover of this document. 5

6 Use or disclosure of data contained on this page is subject to the restriction on the inside cover of this document. PricewaterhouseCoopers

Approach Integrated GRC Approach Summary The USSS EFS Branch Chiefs may consider a threephased approach to implementing the Oracle GRC tool that would ensure IT security controls are identified via walkthroughs and assessments, mapped to applicable laws and regulations, and integrated into the GRC tool by building the requirements. This integrated GRC approach would consist of the following activities: Assessing Oracle Financials security and control configurations for specific modules and supporting infrastructure. This assessment can help the USSS establish the Oracle security baseline, identify control weaknesses, and develop achievable remediation actions. The results of this assessment can be leveraged to link key controls to applicable laws/regulations and control weaknesses. Mapping the USSS technical, operational, and management controls (as defined in DHS 4300A) for financial and mixed financial systems to the applicable laws and regulations identified in Figure 1. The USSS may also consider addressing compliance with DHS policies and procedures in this mapping exercise. Gaps in IT documentation, compliance and/or security control requirements can be identified and remediated. Identifying GRC tool requirements, conducting the vendor selection process, implementing the tool, and integrating it within the USSS. This includes customizing the GRC tool to the USSS needs, including workshops and interactive client sessions to define and collect tool requirements. Oracle Financials Assessment In order to effectively map the USSS policies, procedures, and other manual/automated controls to applicable laws/regulations in preparation for a GRC implementation, the USSS may consider identifying its Oracle security baseline. This can be achieved by performing a security and controls assessment of Oracle Financials for specific modules and supporting infrastructure. The review can use a riskbased methodology to assess the following: Oracle Application Security: assessing the creation and assignment of Oracle Responsibilities (application security profiles) for proper segregation of duties. This includes sampling Oracle Responsibilities and users to ensure that excess privileges have not been granted; Business Process and Manual Controls: Assessing the adequacy of the business process and manual controls that support the application (i.e., monitoring controls); System Administration: Assessing the controls around the administering of user IDs and passwords, system auditing, and user monitoring procedures; Oracle Database: Assessing the security and controls over the database; and, Operating System: Assessing the security and controls over the operating system. PricewaterhouseCoopers Use or disclosure of data contained on this page is subject to the restriction on the inside cover of this document. 7

Mapping the USSS Technical, Operational, and Management Controls The USSS may consider mapping its IT policies, procedures, and other manual/automated controls to applicable laws and regulations identified in Figure 1. The USSS may also include compliance with DHS policies and procedures in this mapping. This will help the USSS to: Determine what overlap exists between apparently differing applicable laws/regulations and perform cost/benefit analysis of addressing control gaps; Respond to various regulators and auditor requests more quickly to avoid duplication of efforts; and, Evaluate risk exposure across the enterprise. GRC Tool Implementation and Training GRC tools allow management to access relevant compliance and governance information, and examine how internal controls over business processes, application security, and technical infrastructure security are implemented. In order to identify and implement GRC tool requirements, the USSS may be able to utilize the mapping results (see Mapping the USSS Technical, Operational, and Management Controls) and output from the Oracle Financials Review (see Oracle Financials Assessment section) to perform the following actions: Identify business rules and internal controls over financial reporting (including business processes, application security, and technical infrastructure security) which will be included in the system requirements; Identify user access privileges and segregation of duties requirements which will be included in the system requirements; and, Document, test, and sustain the business rules, internal controls over financial reporting (including business processes, application security, and technical infrastructure security) and access privileges over time to achieve audit readiness and A123 compliance. The USSS may also consider conducting testing, remediation, and training activities to maintain the effectiveness of the tool. 8 Use or disclosure of data contained on this page is subject to the restriction on the inside cover of this document. PricewaterhouseCoopers

Project Milestones The USSS EFS Branch Chiefs may consider the following milestones for addressing the aforementioned objectives: Short Term: Begin to identify GRC tool requirements and continue to conduct the vendor selection process. Perform a security and controls assessment of Oracle Financials for specific modules and supporting infrastructure. Completing this assessment will allow the USSS to proactively document current IT controls and analyze the root causes for noted control weaknesses. Based on the results of this assessment, the USSS should update its Plan of Actions and Milestones (POA&Ms), as necessary, to remediate root causes. Intermediate Term: Map the USSS technical, operational, and management controls for financial and mixed financial systems to the applicable laws and regulations identified in Figure 1. The USSS should also include compliance with DHS policies and procedures in this mapping. Perform gap analysis to identify gaps in IT documentation, compliance and/or security control requirements. Finalize and implement updated IT controls policies and procedures that align to DHS security requirements based on the Oracle Financials assessment and IT documentation gap analysis. Utilize the results of the Oracle Financials assessment and gap analysis to report results for compliance with applicable laws and regulations identified in Figure 1, including A 123 compliance. The results should also be leveraged for building requirements for the GRC tool. Procure the GRC tool and install it into the USSS environment. Configure the governance, risk, and compliance tool to the USSS needs, which typically include workshops and interactive client sessions to define and collect tool requirements. Long Term: On a periodic basis, evaluate the operational effectiveness of IT security controls over financial and mixed financial systems and implement compensating controls to reduce risks, while developing overall longterm, sustainable solutions. Monitor and report compliance with the USSS security policies and procedures. Continue to customize the GRC tool to the USSS needs, hosting remediation workshops and interactive client sessions to define, collect, and modify tool requirements. Conduct testing, remediation, and training activities to maintain the effectiveness of the tool. PricewaterhouseCoopers Use or disclosure of data contained on this page is subject to the restriction on the inside cover of this document. 9

Contractor Deliverables For a specific time period, the USSS may require the contractor to provide the following deliverables: Reports detailing the IT controls in place and control design weaknesses identified for IT Oracle Financials assessments (see Oracle Financials Assessment section for specific reviews that may be conducted and documented). Matrices detailing the result of the mapping of the USSS controls to applicable laws and regulations. This may include a gap analysis of the USSS IT documentation and compliance with applicable laws/regulations and DHS requirements. This gap analysis may also include suggestions for enhancing current policies, procedures, technical controls, and practices, as well as new documentation that may need to be developed, implemented, and communicated. Requirements documentation, utilizing the Oracle Financial assessment results and mapping matrices, which helps to build the IT controls within the GRC tool. Biweekly status reports that include the following information: Progress of the three work streams (Oracle Financials Assessment, Mapping Matrices, and Requirements Documentation); Project budget analysis; Any project issues; and, Accomplishments and next steps. Informally, the contractor may provide the USSS EFS Branch Chiefs with any additional draft documentation or output that may be created at management s request to assist the USSS with the implementation of the GRC tool. 10 Use or disclosure of data contained on this page is subject to the restriction on the inside cover of this document. PricewaterhouseCoopers

Required Support Capabilities Choosing the right support is crucial to the USSS ability to integrate the GRC tool into its environment. Choice of support should be based on experience and technical knowhow. Specifically, the USSS external support team should have the following capabilities: Ability to begin Oracle Financials assessment, mapping efforts, and GRC support immediately; Experience with the USSS IT environment and performing tests of design and operating effectiveness for internal controls over financial reporting for the USSS; Specific prior experience with and a significant understanding of the USSS IT infrastructure, including both major applications and general support systems; Experience with performing Oracle assessments / reviews worldwide; Experience with unique issues surrounding Oracle assessments, implementations, upgrades and redesigns; Experience in helping companies maximize the return on their investment in Oracle through the application of effective and efficient internal controls; Experience in assisting with the selection, implementation and integration of business processes with GRC tools; Experience with the DHS Office of Chief Information Officer s 27 key information technology general controls that are part of the DHS OMB A123 Appendix A Compliance Framework requirements; Experience in performing audits of internal controls over financial reporting in the Federal Government, and issuing an Opinion on Internal Controls in the Federal Government; Experience in performing tests of design and tests of operating effectiveness for internal controls over financial reporting for the Department of Homeland Security; Experience in developing and implementing strategies for remediation of weaknesses in internal controls in accordance with the Department of Homeland Security Corrective Action Planning guidance; Experience with the GAO Federal Information System Controls Audit Manual (FISCAM), FISMA/National Institute of Standards and Technology (NIST) Special Publication (SP) 80053, Federal financial statement audits, and Federal internal controls improvement initiatives; Demonstrated understanding of USSS Chief Information Officer (CIO), Chief Financial Officer (CFO), Information Resource Management Division (IRMD), and EFS mission and objectives. At least five (5) years of sustained experience executing large support efforts specifically related to ediscovery and Electronically Stored Information (ESI); Domestic capacity, capability, and experience to conduct enterprise information technology infrastructure assessments; Experience preserving and analyzing large volumes of structured and unstructured ESI in support of mission objectives; Demonstrated ability to use the USSS sophisticated ediscovery datamining tools to support mission objectives; Ability to determine functional and technical requirements to assist with a rapid deployment of a scaleable and secure web based electronic document review applications; Ability to deploy resources throughout the United States; Recognized Project Management Methodology to run large, complex engagements; and, Experienced and cleared computer forensics specialists and staff who have a deep understanding of the USSS IT infrastructure and possess the following certifications: Certified Public Accountants (CPA); Certified Information System Auditors (CISA); Certified Information Systems Security Professional (CISSP); Certified Fraud Examiners (CFE); EnCase Certified Examiner (EnCE); and Certified Project Management Professional (PMP). PricewaterhouseCoopers Use or disclosure of data contained on this page is subject to the restriction on the inside cover of this document. 11

pwc.com 2008 PricewaterhouseCoopers. All rights reserved. PricewaterhouseCoopers refers to the network of member firms of PricewaterhouseCoopers International Limited, each of which is a separate and independent legal entity.