Security & Privacy The changing world of Privacy and the core drivers.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

BalaBit Shell Control Box
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Massachusetts privacy law and your business  Jonathan Gossels, President, SystemExperts Corporation  Moderator: Illena Armstrong  Actual Topic: Intersecting.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
ISecurity Compliance with Sarbanes-Oxley & COBIT.
Security Controls – What Works
Information Security Policies and Standards
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
1 An Overview of Computer Security computer security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introduction (Pendahuluan)  Information Security.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
SOX & ISO Protect your data and be ready to be audited!!!
Stephen S. Yau CSE , Fall Security Strategies.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Session 3 – Information Security Policies
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Information Systems Controls for System Reliability -Information Security-
Security Guidelines and Management
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
Compliance System Validation - An Audit Based Approach December 2012 Uday Gulvadi, CPA, CIA, CISA, CAMS Director - Internal Audit, Risk and Compliance.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Inventory Management & Administration System Tourism suite What is the PCI DSS? The PCI DSS stands for Payment Card Industry Data Security Standard.
Information Security Update CTC 18 March 2015 Julianne Tolson.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA COMPLIANCE WITH DELL
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Microsoft.com/publicsector Records Management Microsoft Records Management for Government Agencies.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Understand Audit Policies LESSON Security Fundamentals.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IS3220 Information Technology Infrastructure Security
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Securing Information Systems
Audit Trail LIS 4776 Advanced Health Informatics Week 14
Securing Information Systems
Audit Findings: SQL Database
Chapter 3: IRS and FTC Data Security Rules
INFORMATION SYSTEMS SECURITY and CONTROL
Database Security &Threats
Microsoft Data Insights Summit
Presentation transcript:

Security & Privacy The changing world of Privacy and the core drivers.

Privacy Issues   Authentication of a customer prior to disclosure of information.   There is a need to beef up practices, policies and governance while remaining sensitive to customer circumstances in order to anticipate possible privacy issues.

Privacy Issues   Negotiation of confidentiality and privacy provisions in service provider contracts   Service providers must be clear in identifying their obligations, we are not responsible for their compliance obligations.

Privacy Issues   Identity Theft   Limit the data that is shared with third party service providers.   Minimize the data to that required for them to perform their service.   Limit data included on customer communications   Needs to know policy and governance

Privacy Impacts   Privacy impacts to Infrastructure Protection operations.   LEA Requests …electronic wiretap   Background checks … (potential) employees   Security Clearances …personal employee data   Fraud … customer information protection

Privacy Driver SOX

Tactical Response Data Mining and Correlation Does the need for protection of privacy override the Business operational needs?

Compliance Matrix Functional Requirements PCISOXPrivacy Comprehensive, granular view to know precisely who did what to which information Be able to reconstruct a wide range of events tied to cardholder information COBIT and ISO requirements Disclosure of personal information must be audited Scales across the enterprise Audit all accesses to cardholder data Corporations must demonstrate that they have insight into and control over systems that can impact their ability to faithfully report financial status Disclosure of personal information is audited Cross-application, Cross- data source Be able to reconstruct a wide range of events tied to cardholder information, independent of information source Comprehensive, corporate information sources Disclosure of personal information must be audited, independent of data source Real-time architecture Review logs for all system components at least daily. Limit risk exposure Detect suspicious or anomalous user behavior Alert suspicious behavior Policy-based flexibility to respond to changing auditing requirements SOX doesn’t explicitly define operational control methodologies. Federal governments, as well as many local governments are currently enacting legislation. Simplified Reporting Review logs for all system components at least daily. Corporations must demonstrate that they have insight into and control over systems that can impact their ability to faithfully report financial status Demonstrate that disclosure of personal information is monitored, logged and audited

Requirement Establish a process for linking all data access activities (especially those with root or administrative privileges) to an individual user or system Implement automated audit trails to reconstruct the following events: All accesses to customer data All actions taken by any individual with root or administrative privileges Access to all audit trails Invalid logical access attempts Use of identification and authentication mechanisms Initialization of the audit logs Creation and deletion of system level objects 10.3 Record at least the following audit trail entries for each event: User identification Type of event Date and time Success or failure indication Origination of event Identity or name of affected data, system component, or resource 10.5 Secure audit trails so they cannot be altered in any way Review logs for all system components at least daily Retain your audit trail history for a period that is consistent with its effective use, as well as legal regulations. An audit history usually covers a period of 2 years or more. Audit Checklist

The SOX Compliance Challenge Section 404 of the Sarbanes-Oxley Act requires enterprises to have insight into and control over systems that can impact their ability to faithfully report financial status. Non-compliance and/or incorrect information can result in punitive penalties.

COBIT 13.6 and ISO SOX doesn’t explicitly define operational control methodologies. COBIT and ISO are the two most commonly used frameworks for SOX compliance. Both of these standards demand that a company have insight into the following areas key to maintaining control over critical data activities: Logins and Logouts Application and data trigger modifications Changes to user definitions and privileges Data structure changes Access to and usage of sensitive data Errors and exceptions Sources of client access Time of access

The Information Protection and Privacy Challenge Across the country and around the world, organizations are discovering how serious the threat of information and identity theft can be. Some are discovering the hard way, as the recent large identity theft incidents major corporate databases illustrate. The cost of failure has proven to include the loss of brand equity and public trust. Because information and identity theft incidents are typically perpetrated by authorized users, stronger perimeter security and encryption have limited benefit in detecting and stopping them.

Use Cases for Information and Identity Theft MASQUERADER Phishing, Key log, Spyware SECONDARY ATTACKS Worms/viruses, Trojans INACTIVE ACCOUNTS Incomplete Account Decommissioning ACCIDENTAL MISUSE “innovative” employee INSIDER Good guy gone bad WEAK AUTHENTICATION Lost passwords OUTSOURCING Trusted partner gone bad

Tactical Response Data Management “ Needs to know ” Privacy can be protected and business can continue with a good strategy and a practical tactical response.

The Compliance Reality  Database Logging  Traffic Anomaly Systems  Intrusion Detection Systems  Content Filtering Traditional security products are not designed to monitor user activities at the data server

Detection of Information Theft Catching Information Theft requires determining in real time that the BEHAVIOR of an individual’s information access is ANOMALOUS compared to his/her normal access behavior. u Behavior of information access: “WHO is doing WHAT to WHICH and HOW MUCH critical information, WHEN and from WHERE”

Traditional Audit Solutions Traditional audit solutions are not user behavior aware. They have been point application-driven, custom-coded, after-the-fact report-driven and lacking correlation and analytics.

Solution: Activity Auditing   Provides a comprehensive, granular view into key compliance activities   Transparent solution that scales across the enterprise   Policy-based flexibility to respond to changing auditing requirements   Inherently real-time architecture that supplies compliance-driven audit reports and real-time security alerts and forensic information   Intelligent solution that provides automated correlation and analytics to specify and detect composite or anomalous behavior

PCI Compliance Solves the difficult challenge to monitor all access to cardholder information including:   Identify sensitive data to reduce audit “information glut”   Monitor and log access to sensitive data across multiple applications   Audit all actions taken by individuals with root or administrative privileges   Capture full context for each event record, including exact commands given to data server to facilitate forensic reconstruction of activity and the precise exposure of a PCI violation   Generate audit reports   Detect unauthorized access to sensitive information while it’s happening, in real-time

SOX Compliance Provides a single, flexible, enterprise level solution that can handle both current and future requirements including:   Identify SOX-appropriate assets and activities   Monitor privileged user activity to ensure accuracy of financial information   Audit specific data access activity to demonstrate compliance with documented policies and procedures   Capture full context for each event record, including exact commands given to data server to facilitate forensic reconstruction of activity   Generate audit reports

Information and Identity Theft Protection   Identify sensitive data to reduce audit “information glut”   Monitor and log access to sensitive data across multiple applications   Audit all actions taken individuals with root or administrative privileges Monitor user activity to mission-critical information and applications   Detect unauthorized access to high-risk information while it’s happening, in real-time   Real-time alerting to minimize the impact of breach

Contact William (Bill) G. O’Brien Systems Security Architect Bell Canada