USAID/Peru Risk Assessment In-Briefing

Slides:



Advertisements
Similar presentations
(Individuals with Disabilities Education Improvement Act) and
Advertisements

Program Management Office (PMO) Design
Directions for this Template  Use the Slide Master to make universal changes to the presentation, including inserting your organization’s logo –“View”
© 2001 by Carnegie Mellon University PPA-1 OCTAVE SM : Participants Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh, PA
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Information Security Policies and Standards
Unit 8: Tests, Training, and Exercises Unit Introduction and Overview Unit objectives:  Define and explain the terms tests, training, and exercises. 
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
By: Ashwin Vignesh Madhu
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Vulnerability Assessment Course Terms, Methodology, Preparation, Obstacles, and Pitfalls.
1 USAID/Peru Risk Assessment In-Briefing February 19, 1999 PRIME Principal Resource for Information Management Enterprise-wide USAID PRIME.
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
ESC/EN Engineering Process Compliance Procedures August 2002.
Complying With The Federal Information Security Act (FISMA)
Website Hardening HUIT IT Security | Sep
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
Unit Introduction and Overview
PRIME Principal Resource for Information Management Enterprise-wide USAID PRIME 1 USAID/Peru Risk Assessment In-Briefing February 19, 1999 PRIME Principal.
WHAT IS “CLASS”? A BRIEF ORIENTATION TO THE CLASS METHODOLOGY.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
1 Our Expertise and Commitment – Driving your Success An Introduction to Transformation Offering November 18, 2013 Offices in Boston, New York and Northern.
Hosted by How to Conduct an Information Security (INFOSEC) Assessment The NSA INFOSEC Assessment Methodology (IAM) Stephen Mencik, CISSP ACS Defense, Inc.
© 2001 by Carnegie Mellon University PSM-1 OCTAVE SM : Senior Management Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh,
Process for Analysis  Choose a standard / type  Qualitative / Quantitative Or  Formal / Informal  Select access controls  Match outcome to project.
Unit 8:COOP Plan and Procedures  Explain purpose of a COOP plan  Propose an outline for a COOP plan  Identify procedures that can effectively support.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
NMS Certification and Accreditation (C&A) Removal of Material Weakness for NMS Security and Access Controls Jim Craft USAID ISSO.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Physical Inventory Project Overview 0 Physical Inventory Overview George Vrtiak Transformation Projects Team April 10, 2007.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Business Continuity Program Orientation (insert presentation date) (This presentation is a template that requires adjustments to meet your needs)
Audit Planning Process
REC support is. provided under cooperative agreement 90RC0025/01 from the Office of the National Coordinator for HIT, US Dept. of Health and Human Services.
Frontline Enterprise Security
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Better Prepared And Ready to Help Emergency Preparedness Mission Nepal February 2011 From Contingency planning to readiness WFP’s Emergency Preparedness.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
Business Continuity Planning 101
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
P U B L I C S E R V I C E S State of South Carolina Enterprise Information System Business Case Study SCEIS User Group Briefing Wednesday July 10, 2002.
PILOT SCHOOL PRINCIPAL EVALUATION
Information Security Program
Office 365 Security Assessment Workshop
WSU IT Risk Assessment Process
Overview of IT Auditing
“Strategic Planning” Mississippi Library Commission
Why Special Events are Special
Service Owner: Andrea Beesing 9 February 2016
Natural Gas Infrastructure Assessment
Training for New District Test Coordinators
Environmental Quality Program Strategy
IS4550 Security Policies and Implementation
RST processes Session 5 Presentation 2.
Risk Analysis and HIPAA Security
ITP Maturity Model Survey 2018
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Facilities, Planning and Construction October 24, 2016
Preparing for Title IIA Monitoring Review (FY15)
Independent Expert Program Review (IEPR)
HIPAA Security A Quantitative and Qualitative Risk Assessment
2019 Spring & Fall Timeline May 10, 2019
Internal Audit Who? What? When? How? Why? In brief . . .
{Project Name} Organizational Chart, Roles and Responsibilities
Directions for this Template
Central New York HEALTH EMERGENCY PREPAREDNESS COALITION
Presentation transcript:

USAID/Peru Risk Assessment In-Briefing February 19, 1999 PRIME Principal Resource for Information Management Enterprise-wide USAID

Team Introduction USAID ISSO - Jim Craft Risk Assessment Program Manager - Rod Murphy Consulting Manager, Information Technology - John Zobel Senior Computer Scientist - Mike Reiter UNIX Team Lead - Steve Bui

Purpose Determine which information is critical to the organization A Risk Assessment allows one to: Determine which information is critical to the organization Identify the systems that process, store, or transmit that critical information Identify potential vulnerabilities Recommend solutions to mitigate or eliminate those vulnerabilities

Determine the Scope Identify the boundaries of the system(s) being evaluated Cisco Routers Servers Workstations Communication Lines Identify the level of detail expected from the Assessment Compliance with Agency/Mission requirements Compliance with best practices PRIME Principal Resource for Information Management Enterprise-wide USAID

Pre-Assessment Activity Collected and Analyzed Mission Data Asset Information (Hardware/Software/Financial) Automated Survey Questionnaires 51 surveys sent out 22 responses received 34 potential vulnerabilities identified Conducted an Automated Network Scan using HYDRA Identified 8 major and 17 minor vulnerabilities Developed and forwarded an Immediate Needs Report to TCO and Mission staff for action Conducted a follow-up HYDRA scan to confirm Mission Configuration changes PRIME Principal Resource for Information Management Enterprise-wide USAID

On-site Activities Friday: Receive a Mission Threat Briefing Coordinate Assessment Logistics A room for the Assessment team to work out of A room scheduled for conducting training (Wed) A room for in-briefing and out-briefing Interviews scheduled for Mon and Tue, if necessary Schedule meeting with Functional Management on Tues. Schedule all staff training for Wed. (one hour sessions) Schedule meeting with Security Plan and Contingency Planning staff. (Wed) List of mission phones number ranges for scan PRIME Principal Resource for Information Management Enterprise-wide USAID

On-Site Activities (continued) Conduct a Physical Review of the Mission Facility Meet with System Administrators Establish System Ids as needed Conduct UNIX review Conduct Banyan review Review NT Security Monday: Conduct staff interviews Additional System (UNIX,Banyan,NT, Cisco) reviews Conduct an after-hours modem scan PRIME Principal Resource for Information Management Enterprise-wide USAID

On-Site Activities (continued) Tuesday: Conduct additional interviews as needed Meet with Functional Mission Management to discuss: Connectivity/Business needs Mission impact with regards to Agency requirements Roles and Responsibilities associated with policies Wednesday: Conduct Mission staff training Assist in the development of Mission Security Plan and Contingency Plan PRIME Principal Resource for Information Management Enterprise-wide USAID

On-Site Activities (continued) Conduct any activities needed to wrap-up assessment. Analyze information gathered from pre-assessment and on-site assessment activities. Develop “Draft” Assessment Executive Summary Report. Develop Out-Briefing Present Out-Briefing to Mission Management/Staff PRIME Principal Resource for Information Management Enterprise-wide USAID

Expected Outcome What the Assessment Team expects to Accomplish: Identify areas of concern Provide recommendations that will enable management to make decisions associated with risks Assist in the development of a Mission Security Plan Assist in the development of a Mission Contingency Plan Provide an annual Security refresher Training class to all Mission personnel Develop a standardized approach to conducting Mission Risk Assessments Identify Mission Concerns associated with UNIX, Banyan, NT, Cisco configuration checklists Identify and address specific Mission concerns PRIME Principal Resource for Information Management Enterprise-wide USAID

Additional Activities Being Conducted at Each Mission Assist in the development of a Mission System Security Plan Provide a template for developing a Mission Contingency Plan Provide on-site training General User System Administrator System Managers/Executive Officers Address any additional concerns PRIME Principal Resource for Information Management Enterprise-wide USAID