Information Asset Classification Communications Forum

Slides:



Advertisements
Similar presentations
How Will it Help Me Do My Job?
Advertisements

HISPC-Illinois II The Public-Private Partnership Moves Forward on Privacy and Security.
EMS Checklist (ISO model)
Department of Environmental Quality Environmental Management System Overview.
Information Asset Classification Communications Forum Theresa A. Masse, State Chief Information Security Officer Department of Administrative Services.
SL21 Information Security Board Mission, Goals and Guiding Principles.
Chapter 5: Asset Classification
Data Ownership Responsibilities & Procedures
Why Managers Must Understand IT Managers play a key role –Frame opportunities and threats so others can understand them –Evaluate and prioritize problems.
First Practice - Information Security Management System Implementation and ISO Certification.
Audit Program: Introduction. Our role Located within the Tasmanian Archives and Heritage Office (TAHO), the Government Recordkeeping team.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Session 3 – Information Security Policies
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Preparing Scotland’s first Records Management Plan Ava Wieclawska Records Manager.
Information Asset Classification
Maureen B. Higgins Assistant Director, Agency Support & Technical Assistance Office of Personnel Management December 8, 2010.
1 Records Inventory & Data Classification Workshop Data Classification Project Note: This is an example of one agency’s approach to meeting the state records.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Roles and Responsibilities
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
U.S. Department of Agriculture eGovernment Program eGovernment Working Group Meeting February 11, 2004.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Managing Records: Good government, Better business. FOI Presentations to Boards & Committees Cayman Islands National Archive November 2008.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
ISO/IEC 27001:2013 Annex A.8 Asset management
Confidential 1 HIPAA Compliance at Blue Cross Blue Shield of Minnesota: A Case Study Tim Wittenburg Director of Corporate Architecture & Data Management.
ISMS Implementation Workshop Adaptive Processes Consulting Pvt. Ltd.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
WESTERN PA CHAPTER OF THE AMERICAN PAYROLL ASSOCIATION – NOVEMBER 4, 2015 Risk Management for Payroll.
UNDERSTANDING INFORMATION MANAGEMENT (IM) WITHIN THE FEDERAL GOVERNMENT.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Community of Practice K Lead Project Team: الالتزامالتحفيز التفكير المؤسسي المرونةالتميزالشراكةالاستقامة.
Environmental Management Division 1 NASA Headquarters Environmental Management System (EMS) Michael J. Green, PE NASA EMS Lead NASA Headquarters Washington,
Information Security Officer Meeting

JMFIP Financial Management Conference
Accountability & Structured Privacy Management
BruinTech Vendor Meet & Greet December 3, 2015
Fair Labor Standards Act: Implementing Changes
Utilizing Your Business Continuity Plan.
Implementing SMS in Civil Aviation: the Canadian Perspective
Fair Labor Standards Act: Implementing Changes
Data Minimization Framework
Auditing Sustainable Development Goals
Data Architecture World Class Operations - Impact Workshop.
Learn Your Information Security Management System
A New Model for Managing Data Security and Privacy
Information Security Seminar
Information Security Board
Update on the South Dakota Digital Cadastral Initiative
9/16/2018 The ACT Government’s commitment to Performance and Accountability – the role of Evaluation Presentation to the Canberra Evaluation Forum Thursday,
Description of Revision
IT Development Initiative: Status and Next Steps
Professional & Scientific Council Update
RECORDS AND INFORMATION
UNLV Data Governance Executive Sponsors Meeting
Security Plans Communication Forum
Contents subject to change.
for the year ended 31 December 2016
Compliance with the Freedom of Information Act 2000
Finance & Planning Committee of the San Francisco Health Commission
Kuali Research Organizational Change Management
Continuity of Operations Planning
OECD good practices for setting up an RIA system Regional Capacity-Building Seminar on Regulatory Impact Assessment Istanbul, Turkey 20 November 2007.
Process and Procedure Documentation
IT Next – Transformation Program
Presentation transcript:

Information Asset Classification Communications Forum Theresa A. Masse, State Chief Information Security Officer Department of Administrative Services Enterprise Security Office

Agenda Policy Overview Community of Practice Update Enterprise Information Agency Plan Methodology and Agency Plan Clearinghouse and Q&A Wrap up

Policy - Overview Identify an Information Owner or Owners Information will be classified and managed based on its confidentiality, sensitivity, value and availability requirements. Identify an Information Owner or Owners Owner responsible for: Initial Classification Decisions regarding information management Review and reclassification if appropriate Proper retention and disposal Statewide information Agency information

Policy – Classification Levels Level 1, Published - Low-sensitive information, will not jeopardize the privacy or security of agency employees, clients and partners. Examples: Press releases, brochures, pamphlets, public access Web pages, and materials created for public consumption. Level 2, Limited - Sensitive information, may jeopardize the privacy or security of agency employees, clients, partners. Examples: Enterprise risk management planning documents, published internal audit reports, names and addresses that are not protected from disclosure.

Policy – Classification Levels Level 3, Restricted – Sensitive information , unauthorized access could result in financial loss or identity theft. Examples: Network diagrams, personally identifiable information, other information exempt from public records disclosure. Level 4, Critical - Extremely sensitive, potential to cause major damage or injury. Examples: Disclosure that could result in loss of life, disability or serious injury or regulated information with significant penalties for unauthorized disclosure, information that is typically exempt from public disclosure.

Policy - Compliance Time Line Plan developed by June 30, 2009 Level 4 identified and protected by December 31, 2009 All other policy provisions completed by June 30, 2010 Note: Agencies are required to comply with the Oregon Consumer Identity Theft Protection Act (Senate Bill 583, 2007 Legislative Session)

Community of Practice and DHS Approach Kyle Miller Department of Human Services

Community of Practice Membership Representatives Human Services Consumer and Business Services Forestry Corrections Transportation Education Administrative Services

Community of Practice Goals Methodology document that contains best practices and links to tools and resources Best practices for classification Elements of information asset management Recommendations for user awareness Recommendations regarding policy

DHS Approach Survey approach Information exchange Forms development Other Initiatives

Enterprise Information Bret West Department of Administrative Services

Enterprise Information What enterprise information does DAS “own”? HR Payroll Financial Contracts DAS-Owned Facilities State Network Others

Enterprise Information What does ownership mean? DAS is responsible for determining classification levels DAS is responsible for communicating classification levels to stakeholders Ownership rests with DAS until information is transferred to another agency At that point, agencies will be responsible for ensuring security

Enterprise Information What does ownership mean? Business partners (in this case DAS divisions) are responsible for classifying information assets This is not a technology issue!

Enterprise Information Example: Statewide Financial Management Application Data The application itself will be classified at Level 4 Combination of data elements puts the state and individuals at risk Specific elements or reports will be classified according to the statewide policy guidelines

Enterprise Information Example: Statewide Financial Management Application Data (continued) Specific elements or reports will be classified according to the statewide policy guidelines Currently, SFMS staff have labeled reports “confidential” or “not confidential” based on data included Further work will be done to classify these reports according to appropriate levels

Enterprise Information When will the classifications be available? Our goal is to have all Level 4 data classified by July 1, 2008 Our draft internal policy requires all Level 3 data to be classified by January 1, 2009 and all Level 2 data classified by July 1, 2009.

ODOT’S SECURITY FABRIC Addressing Information Security Lisa Martinez Oregon Department of Transportation

Where do you begin? Establish a “First-Strike” project team to develop your initial roll out strategy Make sure you have the right blend of business and information technology representatives Review and consolidate standards across all of the DAS Enterprise Information Security policies and Senate Bill 583 Develop a “final draft” of an agency-wide assessment tool to determine where your agency is in meeting, partially meeting, or not meeting the consolidated standards Pilot tool in a few areas to gather information on resources and time required to assess across your agency

Where do you begin? (cont.) Make sure you have the support and commitment of your agency Director and his/her direct reports Provide enough information so they understand the work effort required by their managers and employees Have them provide names of appropriate staff to assist on a project team Make sure that you use them to reinforce agency commitment if you encounter problems

Where do you begin? (cont.) Take time to understand how other initiatives underway in your agency interlace with Information Security Can you demonstrate benefit to other initiatives with regard to information gathering, business process mapping, and similar tasks Be willing to share information with other project teams Don’t overlook everyday work processes – they may be an easy opportunity to help with culture change

Where do you begin? (cont.) Communicate to managers and employees why this initiative is important Make it real by giving real life examples Utilize internal communication tools such as newsletters, intranet pages, etc. Acknowledge that this will take time and is not an overnight process Consider an Information Security “hotline” Identify Available Resources

ODOT Progress Report “First Strike” Project Team established consisting of business and information technology staff and contracted project manager Identified standards across policies and SB 583 Developing assessment tool, criteria to measure current state against standards, glossary of terms and background materials Identified two business areas to pilot tool Preparing presentation for Director and his direct reports to affirm support and commitment and solicit business resources

Identify Business Contacts for Each Division, Region, and Branch Identified Key Business Challenges and Opportunities Reliant on Business Line Subject Matter Experts Competes with Other Priorities Undefined Roles and Responsibilities Requires Routine Review and Assessment to Manage Risk Reduce Agency Risk Potential to Improve Business Processes Recognize and Develop Partnerships Develop and Share Best Practices Successful Implementation Results in Improved Agency Compliance Identify Business Contacts for Each Division, Region, and Branch

Subject Matter Experts from Lines of Business Gather Requirements and Identify Gaps Gap Analysis Meets or Exceeds Does Not Meet Not Applicable Requirements ODOT Current   Ñ Across State by Lines Initiatives of Business Subject Matter Experts from Lines of Business Project Team: Review Results Rank Gaps Based on Risks and Priorities Develop Blueprint of Implementation Plan High Opportunity High Risk Low Opportunity Low Risk

Available Resources Statewide Community of Practice (CoP) Workgroup on Information Assets Management Policy Tool development Information asset classification architecture methodology Risk assessment tools Communication tools Will continue sharing process documents Web site resource ODOT IS Tech Management Research Inventory and identify capabilities of current information security tools Research capabilities of other security tools, for example data leakage Business Line Best Practices

Information Asset Classification John Koreski Department of Corrections

Methodology Information Asset Classification Methodology Identify information assets Identify the owner Conduct an impact assessment Determine the classification Document classified information assets Provide education and awareness Maintain classification and conduct continuous review

Security Organization Security Legal Implications

Recommended Strategy to Implement the Office of Legal Affairs Phase 1: Identify LIO and PIOs 1/08 Create Training Deliver Training 3/08 DOJ/DOC key staff Management Other impacted staff Create Tracking Mechanisms Establish Measures Complete Phase 1 12/08 12 mos.

Recommended Strategy to Implement the Office of Legal Affairs Phase 2: Info. Asset Identification 4/08 Project Mgmt. Methodology Archive E-Mail Project Transporting Info. Assets Project Complete Phase 2 6/09 15 mos.

Recommended Strategy to Implement the Office of Legal Affairs Phase 3: Begin Grant Admin. Strategy 7/09 Hire Info. Security Officer (ISO) See handout for duties Hire Records Officer (RO) Complete Phase 3 1/11 18 mos.

Recommended Strategy to Implement the Office of Legal Affairs Phase 4: Electronic Records Management Enterprise Content Management Timeline: approximately 1/11 – 7/11

Clearinghouse and Wrap Up Theresa A. Masse, State Chief Information Security Officer Department of Administrative Services Enterprise Security Office

Policy Resources A clearinghouse-type Web site with links to best practices and tools/templates www.oregon.gov/DAS/EISPD/ESO/IAC.shtml

Thank You Other Questions Contact: Eva.Doud@state.or.us 503-378-3071 Cinnamon.S.Albin@state.or.us 503-373-1496