© Caveon, 2006 Under Lock and Key: Conducting a Physical Security Audit John Fremer, Ph.D – President, Caveon Jamie Mulkey, Ed.D. – Sr. Director Caveon.

Slides:



Advertisements
Similar presentations
Pennsylvania BANNER Users Group 2007 Disaster Recover For The Financial Aid Environment.
Advertisements

HIPAA Security.
Chapter 7: Physical & Environmental Security
Internal Controls What Are They And Why Should I Care? 1.
Test Security Company Perspective Presented by: John Fremer, President, Caveon Consulting Services NCSA – June 2014.
BUS VIDEO RECORDINGS COLLECTION – PROCESSING - REDACTION - SHARING WHAT IS RIGHT FOR YOUR DISTRICT?
Gramm-Leach-Bliley Act for Financial Aid Val Meyers Associate Director Michigan State University.
Securing NPI Mary Schuster Mike Murphy.  Gramm-Leach-Bliley Act Enacted to control the ways that financial institutions deal with the private information.
Information Systems Audit Program. Benefit Audit programs are necessary to perform an effective and efficient audit. Audit programs are essentially checklists.
Security Awareness Lloyd Guyot – Steelcase Ed Jaros – Tenundra Inc. July 17, 2003.
Security Controls – What Works
IT Retreat 2009 IT Security Controls and Initiatives.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Factors to be taken into account when designing ICT Security Policies
Steps to Compliance: Risk Assessment PRESENTED BY.
Wisconsin Knowledge & Concepts Examination (WKCE) Test Security Wisconsin Department of Public Instruction Office of Educational Accountability 06/26/2013.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
General Awareness Training
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 CONFIDENTIALITY ASD Special Education Watch what you say Where you say it To whom you say it.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Physical Site Security.  Personnel  Hardware  Programs  Networks  Data  Protection from:  Fire  Natural disasters  Burglary / Theft  Vandalism.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Why Respect Privacy and Confidentiality? Access to Confidential Information (OP ) Protection and Security of Protected Health Information (OP.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
NCSC Test Security. NCSC vs States’ role NCSC is not a vendor and does not handle data with PII except for prescribed research study roles by one organizational.
Note1 (Admi1) Overview of administering security.
Working with HIT Systems
FIRMA April 2010 DATA BREACHES & PRIVACY Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
TOP TEST SECURITY RECOMMENDATIONS FOR SCHOOL DISTRICTS John Fremer, Ph.D. President Caveon Test Security October 25, 2006.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Protecting the Integrity of Tests Delhi, 20 November, 2015.
IT Summit November 4th, 2009 Presented by: IT Internal Audit Team Leroy Amos Sue Ann Lipinski Suzanne Lopez Janice Shelton.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Audit – Consultation – Ethics & Compliance – Enterprise Risk Management – Investigations Office of Internal Audit and Compliance Best Practices for Protecting.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Information Security tools for records managers Frank Rankin.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Payment Card Industry (PCI) Rules and Standards
Performing Risk Analysis and Testing: Outsource or In-house
An Update on FERPA and Student Privacy
Chapter 8 – Administering Security
Michigan Department of Education
Chapter 3: IRS and FTC Data Security Rules
Move this to online module slides 11-56
DATA BREACHES & PRIVACY Christine M
County HIPAA Review All Rights Reserved 2002.
Health Care: Privacy in a Digital Age
Protecting Student Data
Presentation transcript:

© Caveon, 2006 Under Lock and Key: Conducting a Physical Security Audit John Fremer, Ph.D – President, Caveon Jamie Mulkey, Ed.D. – Sr. Director Caveon July 19, 2006

© Caveon, 2006 Got questions? Get the Card.

© Caveon, 2006 Are your tests out partying when you leave the office at night? Lets get out the #2 and change the answer key Yeah, then can see whats happening up the block. I hear they are having a party at the testing house tonight

© Caveon, 2006 Webinar focus: Understand the types of materials that need to be put under lock and key Determine who should have access rights to rooms, systems, & paper materials Describe policies to put in place to protect secure information Understand the cultural & attitudinal effects of maintaining physical security

© Caveon, 2006 Defining physical security Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism.

© Caveon, 2006 Three main components of physical security Obstacles Methods Surveillance

© Caveon, 2006 Like the Shoemakers children…

© Caveon, 2006 The problem with most testing programs Security is penetrable Materials too easily accessible Lack of formal process

© Caveon, 2006 Got Questions?

© Caveon, 2006 Putting materials under lock & key Test files Candidate records Candidate agreements Vendor agreements Discarded product Putting most secure content in most secure areas

© Caveon, 2006 Who has access? Determine a chain of responsibility Maintaining a list of who needs access to what materials Rules for sending confidential material to others Vendor physical security agreements Visitor access Training of staff Access is limited to need to know

© Caveon, 2006 Policy management Procedures appropriate to the context Policies for access to test items, test publication, test administration Processes for employees who leave the company Escalation plan when a breach does occur Back up and disaster recovery plans Use score card to evaluate how you are doing

© Caveon, 2006 Culture & attitude Higher success when individuals recognize the value of policies Employees and vendors more likely to comply, not get around Ongoing security training and awareness activities help

© Caveon, 2006 Conducting a physical security audit Objective, third-party auditors Explicit written standards, carefully developed, using available models: Transmission of secure materials Access to items banks Password change frequency Materials reviewed in advance

© Caveon, 2006 Conducting a physical security audit Individual and group interviews Physical examination of work area and procedures Distinguishing between formal policy and actual practice Written report with recommendations for improvement Follow-up after defined time interval

© Caveon, 2006 Sample recommendations Enhance building access controls: Require visitors to present ID before being admitted to the building Scan and post-incident records on internal system with limited, secure access to the files Secure files with combination locks for the file cabinets Maintain an entry/exit log for use of materials in the secure storage vault Make secure files difficult to get to

© Caveon, 2006 Got Questions?

© Caveon, 2006 Results of physical security audits Increased awareness and training among staff Installation of locks and locked access areas Reduced number of access points into the building Issuance of system password policies Move from physical to electronic files Moving most vulnerable stuff into most secure area

© Caveon, 2006 Points we hope you will take away What needs to be put under lock and key? Who needs access? What policies need to be put in place? What culture and behaviors need to be reinforced? Who can I bring in to evaluate my physical environment?

© Caveon, 2006 Thanks for attending! John Fremer, Ph.D. (215) Jamie Mulkey, Ed.D phone mobile Please contact us: