Managing Compliance Early: System Development

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Professional Health and Safety Consultants Helping your enterprise or your institution with safety management
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Stephen Upton – 2 June 2005EURIM Personal Identity Working Group Secure identity – a personal view Stephen Upton Office: Mobile:
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Ivan Launders, Simon Polovina Chapter 13 - A Semantic Approach to Security Policy Reasoning, Pg. 150.
Phone: (919) Fax: (919) CFR Part 11 FDA Public Meeting Comments Presented by: M. Rita.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Introduction CSCI102 - Introduction to Information Technology B ITCS905 - Fundamentals of Information Technology.
2 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
0 Career Opportunities in Public Accounting. Introduction to Deloitte & Touche 1 Deloitte Touche Tohmatsu u Over 100,000 people worldwide u Over 30,000.
E-Commerce: Regulatory, Ethical, and Social Environments
Trade Across the Americas: Bolstering Security and Efficiency Supply Chain Risk Analytics May 2015.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
MasterCard Site Data Protection Program Program Alignment.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
SecureAware Building an Information Security Management System.
Sai-innovations.com. Why we care about IA Review of Information Management statistics published by Gartner shows  Information is doubling every 2 years.
SECURITY Is cloud computing secure? Are Microsoft Online Services secure? Is cloud computing secure? Are Microsoft Online Services secure? PRIVACY What.
How to Gain Comfort in Losing Control to the Cloud Randolph Barr CSO - Qualys, Inc SourceBoston, 23. April 2010.
What may fundamentally transform pharma dispensing….. May 2013.
Part of the BRE Trust Protecting People, Property and the Planet BREEAM In-Use Sarah Young BREEAM In-Use Scheme Manager Ecobuild March 2012.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Claims Leakage Risk How Technology Can Help Plug the Gaps.
Syllabus check Common Law – Rights and Obligations EmployeesEmployers obey lawful and reasonable commands made by employers use care and skill in performing.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Vendor Credentialing Jon Morales VP of Operations VCS - Vendor Credentialing Service
RISK ASSESSMENT. What is a Risk Assessment? A Risk Assessment is simply a careful examination of what, in your work, could cause harm to people, so that.
Cloud Compliance Considerations March 24, 2015 | Jason Smith, CISSP.
Management of Change ► The health, safety, security, environmental, technical and other impacts of temporary and permanent changes are formally assessed,
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
Introducing The eLearning solution for the Archdiocese of Brisbane Building the capability of our people through flexible learning.
Eurostat Statistical challenges in collecting e-commerce data What do we know, What would we like to know, and What is difficult Carsten OLSSON Eurostat.
© Allen & Overy April 2015 Katia Manhaeve - Catherine Di Lorenzo The Internet of Things.
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
Compliance is Pretty Important, I Guess Florida Gulf Coast ARMA Meeting.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
6 March 2016TCS Public Global Market Demands Panel Discussion Paper – CSL-UIUC K Ananth Krishnan Vice President and CTO Tata Consultancy Services Sep 6,
CLOUD-BASED VIDS A CIO’S PERSPECTIVE Stephen Alford, CIO WEP, Inc.
Place image here INFORMATION MANAGEMENT Cloud Computing and Enterprise Information Management March 2010 Jim Cuff VP Strategy, Iron Mountain Digital.
Minimizing Risk and Cost Exposure through Information Governance January 28, 2015 Moderator: Christopher Johnson, Director of Technology and Integrated.
An Information Security Management System
The Revolutionary Benefits Of Blockchain
Understanding The Cloud
What do clients think about law firm IG?
1 MANAGING THE DIGITAL INSTITUTION.
إدارة الأعمال الإلكترونية عمادة التعلم الإلكتروني والتعليم عن بعد
Mysale Information Classification 101
European app matters Charles Lowe
Career Opportunities in Public Accounting
Decrypting Data Compliance in China
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
Legal dimensions of Big Data in the Health and Life Sciences – From Intellectual Property Rights and Global Pandemics to Privacy and Ethics 15 minutes-
Nathaniel Lacktman, Legal and Business Issues in Telehealth: Offering Services in Michigan and Beyond Nathaniel Lacktman,
MyDocs Pratham Kumar Verma
ESG 2010 IT Spending Intentions Survey
Network Access Control 101 Securing the Critical Edge of Your Network
HCS 341 TUTORS Perfect Education/ hcs341tutors.com.
E-Commerce: Regulatory, Ethical, and Social Environments
Organisation Model Assistant Director: IT & Digital
General Counsel and Chief Privacy Officer
The case for cloud Bill La Ruffa | Sr. Sales Enablement Specialist.
Office of Information Security
Collaborative Business Solutions
Chris Ince ISO Lead Auditor Security Risk Management Ltd
What is Interesting in the CCSP certification?
Tools & Approaches for Ongoing Privacy Compliance
Cyber Security: What the Head & Board Need to Know
Adding security to your ICS environment? Fine! But how?!
Presentation transcript:

Managing Compliance Early: System Development Randy Moeller Records & Information Governance P&G

iRisk Application What does it do Who is involved Review process Records & Information Governance review Links to other processes Challenges (nothing’s perfect)

What Does it Do Review of IT initiatives by 15 compliance groups .net application, .sql database Complete 14 questions; results in a score by each group States a consult or self-assess Documents compliance via forms and/or notes

Who is Involved 15 Compliance Groups Represented Business & IT Continuity Employee Relations Enterprise Architecture Global Security Health, Safety & Environment Information Security Labor Relations Legal – Digital Privacy & Commerce Legal – Intellectual Property Payment Card Industry Privacy Records & Information Governance Regulatory Computer Validation Third Party Risk Assessment Vendor Governance

Review Process

Details

Details

Multiple Choices

Each Selection Scored

Links Where Needed

Question List

Results

Task Details

R&IG Compliance Document

Completing Tasks

Process Links

Cloud Process Cloud Security Alliance Skyhigh Network Matrix Cloud provider assessments

JAS Results Be careful what you wish for… Row Labels Consult Self-Assess (blank) Grand Total Records & Information Governance 100 41 141 Information Security 123 16 139 Business & IT Continuity 64 70 134 Labor Relations 88 42 130 Enterprise Architecture 29 83 112 Employee Relations 94 7 101 Privacy 59 34 93 Legal - Digital Privacy & Commerce 81 Vendor Governance 24 37 61 Legal - Intellectual Property 20 26 46 35 Third Party Risk Assessment 27 Global Security 3 19 22 Regulatory Computer Validation 13 Health, Safety & Environment (HS&E) 9 Payment Card Industry

Challenges Not all assessments created equal Weak project documents Treat it as a check mark Outliers Project managers not equal Turnover

Thank You Randy Moeller moeller. rj@pg. com http://twitter