Monday, 17 August 2015 Compliance Management, Governance and Benchmarking Strategic security management.

Slides:



Advertisements
Similar presentations
EzQMS incorporates easy access to your companys: –Quality Manual –Procedures –Corrective and Preventative Action –Work Instructions.
Advertisements

Capital Banking Solutions A Fresh Start in Banking Systems By Vantage Business Systems.
Deploying GMP Applications Scott Fry, Director of Professional Services.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
COBIT - II.
Hosted Exchange 2010 Enterprise Grade and Collaboration Solutions for Small and Medium Businesses Web Site:
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in Acceleratio specializes in developing high-quality enterprise.
Sarbanes-Oxley Compliance Process Automation
Security Controls – What Works
DELATUSH SYSTEMS, INC. Presents MB SECURE NETWORK MONITORING AND MANAGEMENT.
Advantages of IT Security Prof. Uldis Sukovskis, CISA Riga Information Technology Institute Secure information exchange in Electronic media Baltic IT&T.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Centers for IBM e-Business Innovation :: Chicago © 2005 IBM Corporation IBM Project October 2005.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
© 2009 IBM Corporation GoPro GoPro Portal Automating Case Management for Enhanced Operational Efficiency, Increased Customer Service and Improved Compliance.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
The Cloud: Demystified Neil Cattermull Frontier Technology.
Discover Transparency COMPAREX SAM2GO
© InLoox ® InLoox PM Web App product presentation The Online Project Software.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
SQL Server 2008 for Hosting Key Questions to Address How can SQL Server save your costs? How can SQL Server help you increase customer base? How can.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
Module 16: Software Maintenance Using Windows Server Update Services.
Online Job Portal with Exam
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Strategic Technology Planning for Nonprofits 2009 Pacific Northwest Digital Inclusion Summit David Forrester January 28, 2009.
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
1 Jon Whitfield Agency CEO Head of Government Internal Audit.
SecureAware Building an Information Security Management System.
IBM Software Group - IBM Systems Group © 2006 IBM Corporation IBM Software Group | IBM Systems Grouppage 1 Team Collaboration Software Selling Strategy.
Evolving IT Framework Standards (Compliance and IT)
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Segregation of Duties for Infor-Lawson Software 1.
GRC - Governance, Risk MANAGEMENT, and Compliance
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
SplendidCRM An alternative to Sugar CRM Idol 2011 August 17, :00 PM.
Challenges in Infosecurity Practices at IT Organizations
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
Securing Your Enterprise with Enterprise Manager 10g Amir Najmi Principal Member of Technical Staff System Management Products Oracle Corporation Session.
1 Good Dynamics & IBM Worklight integration May 2013.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
TMS - Cooperation partner of TÜV SÜD EFFECTIVE SERVICE MANAGEMENT based on ISO/IEC & ISO/IEC
Comprehensive Project Management Solutions with the.NET Server family.
Company: Cincinnati Insurance Company Position: IT Governance Risk & Compliance Service Manager Location: Fairfield, OH About the Company : The Cincinnati.
Commission 1: Landscape challenges Chairperson: Aslam Raffee Issues in the current environment : – Lack of sponsorship and accountability – No coordination.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Managing your IT Environment. Microsoft Operations Manager 2005 Overview.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Explore engage elevate On-Premise vs. Online David J. Buggy Vice President/Partner Beringer Associates, Inc.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
WORK SMARTER Passionate | Responsive | Committed Content Management… Simply Better Best Practices in AP Automation JIM FLINK SENIOR.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
1 Using CobiT to Enhance IT Security Governance LHS © John Mitchell John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, CIA, CISA, QiCA, CFE LHS Business.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
Avenues International Inc.
CEE software leader achieves CRM breakthrough
Pack Your Park by Modernizing Your Business Online
InLoox PM Web App product presentation
Governance, audit and digital preservation
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Drew Hunt Network Security Analyst Valley Medical Center
SysKit Security Manager
Presentation transcript:

Monday, 17 August 2015 Compliance Management, Governance and Benchmarking Strategic security management

C o m p l i a n c e M a n a g e m e n t Compliance ?! EuroSOX® COBIT Sarbanes- Oxley Proprietary standards DS 484:2005 (Danish Standard) ISO Other FDA ISO9001 Policy Enforcer® PresentationPage 2Monday, August 17, 2015

C o m p l i a n c e M a n a g e m e n t The challenge Policy Enforcer® PresentationPage 3Monday, August 17, 2015 Technical IT Corporate Governance Finance Physical security HRR&D $ Common reference

C o m p l i a n c e M a n a g e m e n t The challenge Policy Enforcer® PresentationPage 4Monday, August 17, 2015  Most organizations have a security policy  Not all are communicated  Some are rooted in top management  Few are audited and enforced  Lack of common reference  Lack of clearly defines responsibilities  Lack of systematic internal audits

C o m p l i a n c e M a n a g e m e n t The pain Policy Enforcer® PresentationPage 5Monday, August 17, 2015  Compliance with Law  Compliance with rules and regulations  Compliance with best practices  Comments from external audit  Requirements from board or stockholders  Requirements from customers and partners  Good governance

C o m p l i a n c e M a n a g e m e n t Bringing it all together:  Management visions and targets  The processes of the organization  The features of the applications  The design of the infrastructure  Audit and review on all levels  Coherence between targets, processes and IT  Reporting to top management The thread from business to IT Controls Business processes Organization Applications Infrastructure Policy Enforcer® PresentationPage 6Monday, August 17, 2015

C o m p l i a n c e M a n a g e m e n t The solution Policy Enforcer® PresentationPage 7Monday, August 17, 2015  One portal for governance and compliance  Generic framework with editable content  Includes international standards  Best practices for security policies  Software built on proven technology  Combines manual and automatic enforcement in one system  Integrates with major vendors of system management  Simple to use and understand  Powerful reports

C o m p l i a n c e M a n a g e m e n t Customer benefits Policy Enforcer® PresentationPage 8Monday, August 17, 2015  Ensure compliance with approved policy  Reduce risks by appropriate audits  Improve communication concerning security  Increase internal security awareness  Reduce costs of external audit  Ensure maximum effect of investments

C o m p l i a n c e M a n a g e m e n t How it works Auditor Schedule Enforcement Procedures Policies Policy Enforcer ® Framework System Management IBM Tivoli MS SMS HP OpenView CA UniCenter N/A A B C IIS SQL SMTP SysAdmin Admin/User Policy Enforcer® PresentationPage 9Monday, August 17, 2015

C o m p l i a n c e M a n a g e m e n t Corporate compliance COMPLIANT NON COMPLIANT COMPLIANT WITH EXEPTIONS Policy Enforcer® PresentationPage 10Monday, August 17, 2015

1. Gather available information 2. Define the policy and anchor it in the organization 3. Define the important procedures 4. Define audits on the critical procedures 5. Perform the first audits 6. Present your first compliance report C o m p l i a n c e M a n a g e m e n t The process Policy Enforcer® PresentationPage 11Monday, August 17, 2015 Six steps to compliance

C o m p l i a n c e M a n a g e m e n t The cost Policy Enforcer® PresentationPage 12Monday, August 17, 2015  Policy Enforcer® with ISO content Organisation management Policy & Procedure Manual enforcement Automatic enforcement Basic reporting Extended reporting Data content control Features ME editionEnterprise editionStandard edition                 £ 5,900£ 9,900£ 24,900

C o m p l i a n c e M a n a g e m e n t The cost Policy Enforcer® PresentationPage 13Monday, August 17, 2015  Typical Policy Enforcer® solution startup Also featured as SaaS (Software-as-a-Service) online. Policy Enforcer® Software£ 9,900 Software maintenance 1 year (20%)£ 1,980 Installation and setup (partner)£ 1,900 Policy Creator project (partner)£ 5,900 - additional site is +10% Products & Services £ 19,680

C o m p l i a n c e M a n a g e m e n t Facts Policy Enforcer® PresentationPage 14Monday, August 17, 2015  Developed in C#  Require.NET 1.1 or later  Require SQL server  Running on IIS on Windows 2003 server  Uses generic SMTP for  Supports Internet Explorer 5.5 and later  Integrates with Tivoli SCM  International language support  Content and UI can be freely modified  Can integrate with most log-files  Tested by Microsoft®

C o m p l i a n c e M a n a g e m e n t Policy Enforcer® PresentationPage 15Monday, August 17, 2015  Compliance and Governance are HOT topics  Address top management rather than IT  Get a strategic discussion about security  Total and ongoing security GAP analysis  Increase sales of security software  Package sales of security services  Policy Enforcer® provides a platform for governance and compliance that can be used as a reference for all future security projects. What’s in it for the reseller?

C o m p l i a n c e M a n a g e m e n t The link to security software? Policy Enforcer® PresentationPage 16Monday, August 17, 2015 Anti Virus Patch Management ”compliance” System Management Storage Management ”compliance” Storage Management Risk Management Services Policy Enforcer Compliance Management Software IT Security Policy ISO ILM Patch Management Asset Management Anti Virus Database Management Asset Management

C o m p l i a n c e M a n a g e m e n t The company Policy Enforcer® PresentationPage 17Monday, August 17, 2015  Policy Enforcer founded in 2005 by Frederik Helweg-Larsen  Funded by Technological Innovation and the Danish government  Frederik has 16 years of security experience (CISM)  Member of ISSA and ISACA  Customers in Government, Public sector, Private sector and Education  International resellers such as IBM and Deloitte  IBM Business Partner and Microsoft Certified Partner (ISV)

C o m p l i a n c e M a n a g e m e n t Contact us Policy Enforcer® PresentationPage 18Monday, August 17, 2015 Policy Enforcer ApS Gregersensvej 1 A DK-2630 Taastrup Denmark Phone: Frederik Helweg-Larsen CEO, CISM GSM: