Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.

Slides:



Advertisements
Similar presentations
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Advertisements

Software Quality Assurance Plan
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Security Controls – What Works
Information Security Policies and Standards
VITA [Virginia Information Technologies Agency]
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Unit # 3: Information Security and Risk Management
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
Complying With The Federal Information Security Act (FISMA)
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
HIPAA COMPLIANCE WITH DELL
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Rich Archer Partner, Risk Advisory Services KPMG LLP Auditing Business Continuity Plans.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Roles and Responsibilities
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Presented by: Meg Boyd The Blue Mountains Drinking Water System: DWQMS Overview.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Note1 (Admi1) Overview of administering security.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
5/18/2006 Department of Technology Services Security Architecture.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Chapter 8 Auditing in an E-commerce Environment
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
The NIST Special Publications for Security Management By: Waylon Coulter.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Risk management.
Information Security Principles and Practices
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Chapter 8 – Administering Security
Introduction to the Federal Defense Acquisition Regulation
I have many checklists: how do I get started with cyber security?
IS4680 Security Auditing for Compliance
Final HIPAA Security Rule
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
County HIPAA Review All Rights Reserved 2002.
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Presentation transcript:

Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey

Getting folks on-board CEO Board of Directors All Business Units  Leverage Applicable Laws to your Industry

Security Infrastructure includes Policies, Standards, Baselines, Guidelines, Procedures, Plans and Programs. This infrastructure supports all security components including: Security awareness Both disaster and business recovery Risk assessment, and IT security

Policies Established to express conceptual information security organizational goals in the Information Security Program. Information Security Program “Best Practices” which, once established, sets the foundation of a proven program to protect the availability, integrity, and privacy of controlled assets.

Standards Established to support implementation of Information Security Policy. Standards can address: Personnel security Employee conduct Data classification Data labeling Data handling Data transmission Data encryption VPNs Asset management Physical security Data routing Data recovery Access control Firewall standard Network security Network application Data switching Logging Alarms Security maintenance

Baselines Established to ensure a specific set of security requirements that all systems must meet or exceed. Information Technology Security Evaluation Criteria (ITSEC) Trusted Computer Security Evaluation Criteria (TCSEC) Common Criteria for Information Technology Security Evaluation (CCITT)

Guidelines Established to formalize adoption of information security best practices. Guidelines can address: Access control Data protection Router configuration Organizational security

Procedures Established to detail information security implementation in support of relevant standards and policies. Procedures can address: Alarm Security maintenance Terminal server add/modify/delete Password/shared secret change Firewall setup Incident response Risk management Backup/Restore System user add/delete/modify Customer provisioning Equipment maintenance Asset control

Plans/Programs Established to meet information security goals. Plans and programs can address: Information security awareness Cybersecurity and Terrorism Change control Incident response Intrusion detection Business continuity Acceptance test

Components of an Information Security Program 1. Chief Information Security Officer, CISO 2. Information Security Advisory Committee, ISAC 3. Information Security Policies 4. Information Security Awareness, Training and Education (SATE) 5. Information Identification and Classification 6. Information Risk Assessment 7. Implementation of Information Security Controls 8. Monitor Effectiveness and Assurance 9. Business Continuity and Disaster Recovery

Chief Information Security Officer (CISO) Purpose  develop organization-wide policies  assist business units in the development of procedures  administer the organization-wide Information Security Program Attributes  direct reporting method to the CEO regardless of where they report administratively  not subjected to business unit budget constraints or cutbacks.

Information Security Advisory Committee (ISAC) Purpose  review and update Information Security Program and Policies  ensures policies enable business units to accomplish their business objectives.  keeps information security policies in line with business goals  provides cross-organizational involvement

Information Security Advisory Committee (ISAC) cont. Members  CISO  Business Unit Representatives also act as Business Unit information security champions work with all managers  ensure files and databases have designated owners  coordinate requests for user IDs and data access  Coordinate SATE within their Business Unit  help develop unique specific policies and procedures

Information Security Policies Purpose  set forth information security policy objectives  high-level guidance or vision directing the organization  cornerstone for managing and controlling assets Attributes  identify informational assets  define who is responsible for classifying and valuing assets  defines who must comply  describes employee role in protection and recovery  provide for monitoring and enforcement

Information Security Policies cont. Characteristics  short, easy to read, and not incorporate technical terms  protect people, the facilities, as well as data

Information Security Awareness, Training and Education (SATE) Purpose  means of ensuring employee understanding and/or recognition of responsibilities Elements  signed personnel agreement include the protection of assets as a condition of employment  security login banners  training  posters  contests

Information Identification and Classification Purpose  standards and procedures by which information resources are managed and accessed. identify and classify information  both collected and maintained by the information owner and custodian(s) based on information content sensitivity and importance. Methodology  Categorize content E.G. Medical Records, Project Data, Fiscal Budget, etc.  Classify based on categories.

Information Identification and Classification cont. Classification scheme  helps employees determine – owner defined adequate and appropriate procedures associated access controls for information protection and distribution based upon Federal, State, or Local laws and jurisdictions

Information Risk Assessment Purpose  quantify the benefits of an Information Security Program as a function of cost  policies are needed to reduce risk, and risk analysis is used to justify security policies and technologies Concepts  Risk: anything that could potentially cause harm operations, assets, or organization profitability/legal requirements

Information Risk Assessment cont.  Risk Analysis: formal process of determining what your informational assets are worth threat/exposures due to vulnerabilities potential harm if the identified vulnerabilities are exploited.  Result: cost vs. benefit analysis cost to implement fixes, mitigate risk, or increase protection cost of the asset's loss.

Implementation of Information Security Controls Purpose  defines roles in developing and implementing information security Roles  Board of Directors Protect and ensure for continuity of the Organization  Administrators and Business Unit Directors Protect and ensure for prosperity of their departments  Managers Maintain information as a strategic asset

Implementation of Information Security Controls cont.  Chief Information Security Officer Ensure written policies are developed and implemented  Internal Information Systems Auditor Ensure that information security policies are followed  System Administrators, Technicians and Installers Ensure technology assets are configured in a secure manner  Users Ultimate responsibility for appropriate use of information

Monitor Effectiveness and Assurance Purpose  assess the measures that have been implemented  ensure information security goals are being met Attributes  collect information from processes that measure effectiveness  independent review and evaluation  requires separation of duties

Business Continuity and Disaster Recovery Purpose  ensure the organization can resume business processing in the event of a disaster Concepts  Contingency Plans (Business Continuity Plans) address the business side of departments facilities, personal, procedures, forms and supplies  Disaster Recovery Plans (Operational Recovery Plans) address recovery of information technology assets computers, storage, electronic communications and data

Business Continuity and Disaster Recovery cont. Attributes  Identification of applications and systems in priority order operating systems, utilities, programs, and data documentation  Preparation of crucial aspects off-site storage facility procedures testing and validation

Summary Executive sponsorship and support are essential Needed to help safeguard assets  both logical and physical assets Foundation to ensure availability, integrity and confidentiality of organizational controlled assets Based on industry & government ‘best practices’ Sanctioned by Industry Standards

Questions?