CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.

Slides:



Advertisements
Similar presentations
Organizational Governance
Advertisements

USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Security and Personnel
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Framework for Improving Critical Infrastructure Cybersecurity NIST Feb 2014.
Security Controls – What Works
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Information Security Policies and Standards
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
IT Governance and Management
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Session 3 – Information Security Policies
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
1 Dan Steinberg, JD Portland, OR May 4, 2011 Speaking Notes Privacy and Security for Research Repositories Please do not reuse or republish without attribution.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Complying With The Federal Information Security Act (FISMA)
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
Information Security Framework & Standards
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
Evolving IT Framework Standards (Compliance and IT)
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Seeking a National Standard for Security: Developing a Systematic Crosswalk of the Final HIPAA Security Rule, the NIST SP , NIST SP Security.
Note1 (Admi1) Overview of administering security.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Working with HIT Systems
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Chapter 1: Security Governance Through Principles and Policies
Dr. Bhavani Thuraisingham Information Security and Risk Management June 5, 2015 Lecture #5 Summary of Chapter 3.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security tools for records managers Frank Rankin.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
MIT University Skopje Ass. Prof. Oliver Andonov, PhD
Sendai Framework for Disaster Risk Reduction
IS4680 Security Auditing for Compliance
IS4680 Security Auditing for Compliance
I have many checklists: how do I get started with cyber security?
IS4550 Security Policies and Implementation Unit 5 User Policies
IS4680 Security Auditing for Compliance
IS4680 Security Auditing for Compliance
IS4680 Security Auditing for Compliance
Chapter 8 Developing an Effective Ethics Program
HIPAA Security Standards Final Rule
Security Policies and Implementation Issues
Presentation transcript:

CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011

Agenda Chapter 24: Information Technology Security Management

INFORMATION TECHNOLOGY SECURITY MANAGEMENT

FISMA Federal Information Security Management Act (FISMA) – Created by National Institute of Standards and Technology (NIST) – Describes information security guidelines – Describes a risk management framework Paramount in implementing an IT security management plan – Usable by any organization

Figure 24.1 Specifications in the Federal Information Security Management Act.

International Standards Organization ISO/IEC 17799:2005 – Published by International Standards Organization and the International Electro Technical Commission (ISO/IEC) – Security guidelines and general principles Initiating, implementing, maintaining, improving – Guidance on commonly accepted goals – Best practices of control objectives and controls – Intended to meet risk assessment requirements

Figure 24.2 International Standards Organization best-practice areas.

Professional Societies The Internet Society – Organization home for groups responsible for Internet infrastructure standards Internet Engineering Task Force (IETF) Internet Architecture Board (IAB) Information Security Forum – Global nonprofit organization – Provides research into best practices and advice – Produces biannual Standard of Good Practice

Security Policies and Procedures Essential steps for implementing IT security management – Authorize security roles and responsibilities to various security personnel – Set rules for expected behavior from users and security role players – Set rules for business continuity plans Security policy requirements – General agreement by most personnel – Support of highest-level management This is the “teeth”

Example Security Policies Information Security Program Information Security Roles & Responsibilities Acceptable Use Policy (AUP) Risk Management Program Vulnerability Management Patch Management Encryption Media Disposal Asset Accountability Password Policy Remote Access Policy Log/Event Management Auditing Unique User Account Wireless Security Network Security Physical Security Business Continuity/Disaster Recovery Awareness Training

Security Organization Structure What are some important issues to include in a security policy? Various security-related roles – End user – Executive management – Security officer – Data/information owners – Information system auditor – Information technology personnel – Systems administrator

Processes: Continuity and Governance Business continuity strategy – Requires senior management commitment – Includes business impact assessment/risk analysis Focuses on business value drivers determined by main stakeholders IT security governance planning – Includes prioritization as its major function – Determines priorities among potentially conflicting interests Budget setting, resource allocation, politics

Processes: Rules and Regulations Consider state, national, and international rules and regulations – FISMA – HIPAA – SOX – Gramm-Leach-Bliley Act – Computer Fraud and Abuse Act – State privacy laws

Summary Information technology security management – Processes enable organizational structure – Technology protects IT operations and assets Security policies and procedures – Require general agreement and management support IT security processes – Part of an organization’s risk management process and business continuity strategy – Be aware of national and international rules and regulations