Enterprise Risk ManagementSeptember 2010Miami, FL © 2010 Enterprise Risk Management Information Security- Facing the Risks in Electronic Channels and Social.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Chapter 5: Asset Classification
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Separate Domains of IT Infrastructure
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
The Islamic University of Gaza
Security Controls – What Works
Information Security Policies and Standards
Developing a Records & Information Retention & Disposition Program:
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Payment Card Industry (PCI) Data Security Standard
Session 3 – Information Security Policies
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Introduction to Network Defense
New Data Regulation Law 201 CMR TJX Video.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Securing Information Systems
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
BUSINESS B1 Information Security.
1.1 System Performance Security Module 1 Version 5.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Information Systems Security Operational Control for Information Security.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
IS3220 Information Technology Infrastructure Security
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Information Systems Security
Risk management.
Cybersecurity Policies & Procedures ICA
Introduction to the Federal Defense Acquisition Regulation
I have many checklists: how do I get started with cyber security?
Contact Center Security Strategies
Anatomy of a Common Cyber Attack
Presentation transcript:

Enterprise Risk ManagementSeptember 2010Miami, FL © 2010 Enterprise Risk Management Information Security- Facing the Risks in Electronic Channels and Social Media

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Agenda n Implementing a Comprehensive Security Program n Conducting Security Risk Assessments – Best Practices n Security Attack Trends and Prevention Strategies n Emerging Technologies and Social Media – Security Threats and Countermeasures

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Implementing a Comprehensive Security Program

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Information Security Program n It is an initiative which serves to ensure that information assets are properly protected.

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Reasons for a Security Program n Minimize costly risks n Provide a structure manner to address information security n Align information security initiatives with business strategies, goals and objectives – IT Governance n Comply with laws, regulations and industry standards

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Every organization’s information security program should be guided by the following: Information Security Program n Plans for achieving information security goals and objectives n Clear and comprehensive mission, goals, and objectives n Performance measures to continuously monitor the efficiency and effectiveness of identified goals and objectives

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL An information security program should cover: n Security function n Security risk assessment n Security plans n Security policies n Security standards n Security procedures Information Security Program

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL An information security program should cover: n Information assets ownership n Classification of information assets n Information security laws, regulations and industry standards n Logical security n Physical security n Disaster recovery and contingency planning Information Security Program

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL An information security program should cover: n Auditing and monitoring n Security incident response n Security awareness and training n Human Resources n Legal n Help Desk \ user support Information Security Program

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL An information security program should cover: n System life cycle management n External service providers n Security reviews Information Security Program

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Security Program Life Cycle ISO 27001:2005

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Security Program Life Cycle Organizations should follow a life cycle approach in developing, implementing and maintaining their information security program. n Establish ISMS n Implement and Operate ISMS n Monitor and Review ISMS n Maintain and Improve ISMS This approach ensures that security is an on-going and continually improving process.

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Who Directs This Initiative? n Board of Directors n Top Management n Information Security Committee

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL How Does a Security Program Affects My Job? n Information security is part of every employee’s responsibility. n Security policies, standards and procedures affect everyone – for example: – Each time someone enters the building – Each time a password is used – Each time customer information is viewed or edited

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Ongoing Monitoring n An effective information security program requires constant review. n Organizations should monitor the status of their programs to ensure that: – Ongoing information security activities are providing appropriate support to the organization's mission. – Policies, standards and procedures are current and aligned with evolving technologies. – Security controls are accomplishing their intended purpose.

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Conducting Security Risk Assessments – Best Practices

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Security Risk Assessment Phase II – System Inventory and Classification of Assets Phase III – Threat Analysis Phase IV – Security Controls Testing Phase V – Implementation of Security Controls Phase I – Project Initialization Phase VI – Monitor Security Controls

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Phase I – Project Initialization n Define the objective n Define the scope n Define the method required (e.g., Qualitative, Quantitative) n Define the personnel required n Define the approach to gather the information n Define the deliverables per each phase

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Phase II – System Inventory and Classification of Assets n Document the organization information assets – Consider all departments and business processes – Consider information assets in physical and logical format n Classify the information assets: – Critical – the organization cannot operate without this information asset. – Essential – the organization needs the information asset at some point in time. – Normal – the organization can operate without this information asset for an extended period of time.

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Phase II – System Inventory and Classification of Assets n Deliverable – Phase II Asset Description Classification (C/E/N) Item No. Asset Name OtherOwnerLocation 1 Payroll 2000 Payroll Application E Human Resources Server - A

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Phase III – Threat Analysis n Identify security threats n Identify security vulnerabilities n Identify existing security controls to reduce the risk n Determine the likelihood of occurrence n Determine the severity of impact n Determine the risk level

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Phase III – Threat Analysis n Identify different types of security threats – A starting point would be to consider those threats that might actually impact an enterprise n n Unauthorized access n n Denial of Service n n Social Engineering n n Theft n n Hurricane n n Fire n n Pharming n n Phishing n n Virus/Worms

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Phase III – Threat Analysis n Identify different types of security vulnerabilities – Identify vulnerabilities associated with each threat to produce a threat/vulnerability pair. Vulnerabilities may be associated with either a single or multiple threats n n There is not a disaster recovery plan n n Flammable materials store in the Data Centre n n Lack of fire extinguishers n n User-id and passwords by default n n Operating System without the last patch n n Data center’s door does not have lock n n TFTP service enabled in the Unix hosts n n Shared folder with Everyone full control

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Phase III – Threat Analysis n Identify existing controls to reduce the risk – Identify existing controls that reduce:  The likelihood or probability of a threat exploiting an identified security vulnerability.  The magnitude of impact of the exploited vulnerability on the system.

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Phase III – Threat Analysis n Deliverable phase III Vulnerability Name Risk Description Item No. Threat Name Impact Severity Risk Level Existing Controls Likelihood of Occurrence 1 1 Fire Disaster Recovery plan There is a DRP in place Lack of fire extinguishers There are not fire extinguishers Low Medium ModerateDamaging High

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Phase IV – Security Control Testing n Tests the security controls / safeguards that are in place n Consider performing different types of security tests n Determine if the control exists and if the control works effectively and consistently n Determine the residual risk n Determine if additional security controls are required n Develop an action plan to remediate security issues noted

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Phase IV – Security Control Testing n Deliverable – Phase IV Recommend Safeguard Description Item No. Residual Likelihood of Occurrence The item number is used to reference the vulnerability defined in the Phase III deliverable Residual Impact Severity Residual Risk Level 1 Install fire extinguishers LowDamagingModerate

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Phase V – Implementation of Security Controls n Prioritize implementation of security controls:  Based on risk  By business area  By technical area

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Phase VI – Monitoring Security Controls n Implement mechanisms to monitor security controls. This phase can include:  Review of system and application logs  Review of system and application exception reports  Different types of audits  Different types of security assessments  Department self assessments

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Security Attack Trends and Prevention Strategies

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Title n Malware infection leapt from 50 percent of respondents to 64.3 percent of respondents n Financial Frauds increases from 12% to 20% n Password Sniffing increases from 9% to 17% n Laptop or mobile hardware theft or loss remains the same

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Countermeasures n Apply patches and updates n Implement strong security policies, procedures, and standards n Turn off and remove services that are not needed for normal company network operations n Perform filtering on all network traffic to ensure that malicious activity and unauthorized communications are not taking place n Provide additional security awareness training to end users n Install additional security software (e.g. Data Leakage products)

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Countermeasures n Change or replace software or systems n Apply sound configurations to system and applications n Apply frequent updates to antivirus systems n Apply sound encryption mechanisms n Apply general logical and physical security measures

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Source of Information for Developing a Security Strategy n Information security and privacy laws (GLBA, FACT Act) n Industry standards (ISO 27001:2005) n Sector specific information security standards (PCI) n Previous attacks on your organization / other organizations n General news reports of other attacks / incidents n Information shared in associations / reputable forums n Executive and management priorities n Contract with business partners

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Emerging Technologies and Social Media – Security Threats and Countermeasures

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Social Media and Networking n Social media technology involves the creation and dissemination of content through social networks using the Internet. n Social media and networking is rapidly growing and becoming more popular than communication. n Examples: Facebook, Myspace, Twitter and LinkedIn

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Security Issues Relevant to Social Media: n Social Engineering: Exploits people n Spam and Malware Attacks: Exploits systems n Disgruntled Employee: Reputational damage of the organization n Legal Issues: Regulatory sanctions and fines assessed on the organization

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Countermeasures n Policies and Procedures – Corporate privacy protection – Nondisclosure / posting of business-related content – Acceptable use in the workplace – Acceptable use outside of the workplace – Action plan for privacy breaches and escalation

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Countermeasures n Training and Awareness – Communicate policies to employees – Inform employees of risks involved with social media sites – Social engineering trends and techniques n Technical Safeguards – Up-to-date antivirus and antimalware controls – Content filtering programs to restrict/limit access n Audits and Assessments

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Emerging Technologies that can Help n Emerging security technologies – Biometrics – Self-encrypting hard drives – USB tokens for authentication – Mobile Device Security Authentication, antivirus, firewalls, anti-spam and encryption for mobile devices Authentication, antivirus, firewalls, anti-spam and encryption for mobile devices

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Technologies that Require New Security Measures n Cloud Computing – Share infrastructure – Becomes difficult to control and protect n Smart Phones – Becoming the standard phones – Another version of a regular computer n I-spoof and other Applications – Spoof your telephone number and trick individuals who rely on it

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Countering New Challenges n Establish and enforce strong authentication policies for devices trying to access corporate networks n Require employees to use a corporate VPN and encryption when handling sensitive data n Devices and software applications are configured as per configuration standards

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Countering New Challenges n Corporate security policies prevent workers from transferring sensitive data to mobile devices or unauthorized computers n For laptops/netbooks consider air cards, which require a service plan, instead of hot spots for wireless connections

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Countering New Challenges n Establish ground rules for the use of devices like the iPad, and develop policies and procedures that take the security limitations of the device into consideration and adequately protect sensitive business data n Perform periodic risk and security assessments n Set resource controls

© 2010 Enterprise Risk Management Enterprise Risk ManagementSeptember 2010Miami, FL Countering New Challenges n Provide security awareness and training n Eliminate any unnecessary services

Enterprise Risk ManagementSeptember 2010Miami, FL © 2010 Enterprise Risk Management Enterprise Risk Management Phone: Fax: URL: