Information Technology Standards at the University of Illinois

Slides:



Advertisements
Similar presentations
Internal Audit Capability Model (IA-CM) for the Public Sector
Advertisements

USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
CANHEIT | On the EDGE | June 15-18, 2008 | University of Calgary Collaborative Computing on an Institutional Level Steve Breeck, Harold Esche, Bill Richardson.
Child Safeguarding Standards
Overview of Priorities and Activities: Shared Services Canada Presentation to the Information Technology Infrastructure Roundtable June 17, 2013 Liseanne.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information Security Governance
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
Security Controls – What Works
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Financial Controls Task Force Report Joint Financial-HRMS Unit Liaison Meeting March 17, 2004 Mike Kalasinski Norel Tullier Cheryl Soper.
EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess February 3, 2004.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Institutional Leadership for Copyright Administration Presentation to ACCC June 2013.
April 2, 2013 Longitudinal Data system Governance: Status Report Alan Phillips Deputy Director, Fiscal Affairs, Budgeting and IT Illinois Board of Higher.
Monitoring Policy Implementation Michelle Murton, School Nutritionist.
Performance Audit Fraud management in local government Report 19: David Toma Manager 24 July 2015.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
Annual Conference The Internal Auditor – value added to both the Audit Committee and Management 7 November 2012.
Strong Schools, Strong Communities Strategic Plan Implementation Process and Roles Saint Paul Public Schools has designed the following process and roles.
GRC - Governance, Risk MANAGEMENT, and Compliance
1 Status Report: Task Force on FAMU Finance and Operational Control Issues Derry Harper, Inspector General & Director of Compliance December 6, 2007.
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign Developing a Comprehensive GENI Cyber Security Program Adam.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) John M. Gilligan May, 2009.
Holistic Approach to Security
UWM CIO Office Institutional Data Privacy and Security Presenter: Steve Brukbacher, Information Security Architect Moderated by: Bruce Maas, CIO November.
Safety Management System Implementation Michael Niels Thorsen Moscow 15 September 2005.
The OCIO/PSCD, in collaboration with the Advisory Board’s Long Range Planning Committee, developed this Strategic Plan to foster the leadership and.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
ICP 8 – Risk Management and Internal Controls Ekrem Sarper Vice Chair, Implementation Committee San Jose, Costa Rica.
Revised AQTF Standards for Registered Training Organisations Strengthening our commitment to quality - COAG February August 2006.
Industrial safety 0. Highlights Communication Management Evaluation Investigation Practice/implementation Development 1.
Policy, Standards and Guidelines Breakout Co-Chairs Victor Hazlewood OCIO Cyber Security, ORNL Kim Milford ISO, University of Rochester.
Washington State Work Zone Rule  Work Zone Rule Implementation  New Work Zone Policy Cathy Nicholas, FHWA - WA Division Office Frank Newboles, WSDOT.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Moving to BYOD Gary Audin 1.
Project Planning and Management Gail Campbell and Tom Broadhurst.
Enterprise Risk Management Scott Moss, CIS P/C Trust Director Maryam Z. Sherkat, MIABC Legal Counsel & Risk Officer Mayor Teunis Westbroek, MIABC Board.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Performing Risk Analysis and Testing: Outsource or In-house
Board Roles & Responsibilities
IT Governance and Management Structure
Physical Security Governance Model
Division I Progress Toward Degree: Improving the Certification Process
Michael Kelly, Ed. D. Virginia Tech
Effectively engaging everyone in it governance
Cyber Risk Presentation to the Board of Directors
Information Security Review Panel Report
WORK PROGRAMME to support the implementation of the Recommendation
Compliance with hardening standards
YEAR ONE SELF-EVALUATION REPORT
Key findings on comparability of language testing in Europe ECML Colloquium 7th December 2016 Dr Nick Saville.
Enterprise Risk Management
CMMI – Staged Representation
IT Development Initiative: Status and Next Steps
ITIL: Why Your IT Organization Should Care Service Support
Where We Are Now. Where We Are Now Project Oversight Project Oversight Oversight’s Purposes: A set of principles and processes to guide and improve.
ITIL: Why Your IT Organization Should Care Service Support
UNLV Data Governance Executive Sponsors Meeting
AWS Boulder - Denver Meetup – January 2017
IS4680 Security Auditing for Compliance
NCAA Division I Progress Toward Degree: Improving the Certification Process
Safety Management System Implementation
Change Management and COBIT®. ISACA London Chapter Presentation
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
ITIL: Why Your IT Organization Should Care Service Support
Diversity & Inclusion at UCONN
{Project Name} Organizational Chart, Roles and Responsibilities
Presentation transcript:

Information Technology Standards at the University of Illinois Common Challenges and Solutions Shea Nangle, Security Standards and Compliance Officer Michael Corn, CPO/CSO

Presentation Outline A little context and history Three Elements of a standards program Drill down during each Feel free to interrupt during any portion Encourage alternate solutions or overlooked challenges during discussion

Background and Context

Background Policy vs. Standards vs. Guidelines vs. Procedures No campus understanding No tradition of central IT Governance Usual issues of distributed IT Well established role for the security office

Context Diverse environment Forced to be collaborative

Slow Progress Timeline PCI DSS

Three Legs of a Standards Program Elements Governance Compliance Risks Controls Standards Policy Oversight Vetting/Socialization Accountability Technology Risk Acceptance Challenges Elements Governance Compliance

Controls| Standards | Risks Elements

Elements of a Standards Program Controls 13. All University-owned laptops must be configured and operate with Full Disk Encryption (FDE) software or hardware. Standards Laptop Standard Risks [GEN-001] Risk of data breach, release, or loss through the theft or loss of a laptop.

Controls ISO 27002 NIST

Standards Not organizing/writing in ISO 27k domains Very low bar due to University culture Acceptability will increase over time

Risks Changing perspective (forest vs. trees) Developing Risk Knowledgebase

Element Challenges I Palatability of controls Everyone’s an expert Standards are platform-agnostic Exception process Everyone’s an expert Risk first? Standards first? Controls first?

Element Challenges II Quantification vs. Qualification of risk Discussion of choice to do lightweight, qualitative risk analysis initially (examples) Move towards quantitative risk analysis as much as possible

Current Risk Analysis

Policy| Oversight | Vetting Governance

Governance - Policy Policy “The responsibility for Information Security includes the authority to assume leadership and responsibility to develop, implement, and monitor for compliance the policies, standards, and procedures necessary to achieve the objectives detailed within this policy.”

Governance – Oversight Standards Advisory Board 2-3 faculty Service/admin representative 1 college CIO; 1 IT line staff Auditor + Security Office

Governance - Vetting Standards Focus Group Range of constituents Visiting SMEs Monthly meetings Draft discussion Revision discussion Endorsement (as interim standards)

Governance Challenges Policy != Standard Faculty and non-IT engagement

Accountability| Technology | Risk Acceptance Compliance

Accountability Control  Accountability

Compliance Technology Ad hoc GPOs CIS benchmarks Scanners Centralized tools

Risk Acceptance Only a percentage of your environment can be measured Extrapolate Map your “compliance topology” Compare with high risk zones Focus efforts with a higher ROI “Accept” what you can’t measure

Compliance Challenges Defining accountability outside of central unit How do we measure compliance? Evaluate each control, average across standard Leverage any existing tools, even if weak

Compliance Challenges How do we increase compliance? Sales & Marketing Audit Cyber-Insurance requirements Incident follow up Identify centralized management as strategic (e.g., endpoint management) Provide simple tools: GPOs, CIS benchmark, Scanners, Hardening scripts

Fear | Uncertainty | Doubt Challenge Summary

Contact Shea Nangle nangle@illinois.edu Mike Corn mcorn@illinois.edu http://go.illinois.edu/itstandards