Challenges in Infosecurity Practices at IT Organizations 9-Dec-2008 Challenges in Infosecurity Practices at IT Organizations Jamuna Swamy Head-Information Security Hexaware Technologies Ltd Jan 09 Hexaware Technologies Ltd Hexaware Technologies Ltd
Information Security management (ISM) What is it? Managing Availability, Confidentiality & Integrity of Information Where are we? What is so challenging in IT industry? What is the Road map? 23-Apr-17 Hexaware Technologies Ltd
Presentation Path Corporate Information security Perspective ISM Roles and Responsibilities Use of Standards and Frameworks ISM implementation and effectiveness ISM spending and ROI ISM alignment and integration Recommendation 23-Apr-17 Hexaware Technologies Ltd
Corporate Information Security Perspective in IT Industry Alignment of Information Security objectives to meet Business Objectives Development of Products Offshore Development Centre Application Service Provider Alignment of ISM with enterprise Risk management Risk team focuses more on financial risk Flow of IS risks to enterprise risks IS is perceived as more technical in nature Awareness on importance of IS governance Identification of Information Security Risks Identification of regulatory driver for business Impact of any security incident Perception of IS as strategic importance 23-Apr-17 Hexaware Technologies Ltd
ISM Roles and Responsibilities How the roles are defined and communicated? Various roles played by employees Steering committee members Security Task force Emergency Response Team Business Continuity Management team Information Security Team ISM – Should be a part of Quality Management? IS Head – Whom should he/she report to? 23-Apr-17 Hexaware Technologies Ltd
ISM Roles and Responsibilities What is the role of the following in ISM in Software Industry? Sales Manager Accounts Manager Delivery Head Project Team member IS Team Technology Team Customer 23-Apr-17 Hexaware Technologies Ltd
Use of standards and Frameworks What standards/ Frameworks should the Organization certify for? ISO 27001 Cobit Framework SAS 70 Audits HIPAA GLBA PCIDSS 23-Apr-17 Hexaware Technologies Ltd
Use of standards and Frameworks Data Protection Acts Europe US UK Canada …..List goes on Federal laws and regulatory requirements 23-Apr-17 Hexaware Technologies Ltd
ISM implementation and effectiveness Is it driven by Top Management? Is it driven by Customer? ISM implementation – Is it same to all employees? Balancing Between operational efficiency and control effectiveness Between privacy and monitoring Between availability and confidentiality Key mantra to effective implementation Awareness ! Awareness ! Awareness ! Automation of controls 23-Apr-17 Hexaware Technologies Ltd
ISM spending and ROI ROI Value ISM can create What is the % of business budget allocated to ISM? How the ROI calculated? Preferred partner? Customer confidence? Availability of services without any business interruption Protection of Customer information/ Organizational information ROI Value ISM can create 23-Apr-17 Hexaware Technologies Ltd
ISM alignment and integration How ISM aligns with business objective? Application development Centre Selling a software product Application maintenance How the Project assets give input to Business Continuity Plan? How the IS risks are constantly monitored and evaluated to give inputs to Organization Risks? How these strategic risks are integrated to enterprise risks? 23-Apr-17 Hexaware Technologies Ltd
What is the solution to over come these challenges? Recommendation Please turn over….. 23-Apr-17 Hexaware Technologies Ltd
Currently the Compliance to the controls is what been looked at. Graduate to Understand the controls from risk perspective. Relate the operational risks to strategic risks Next Relate strategic risk to enterprise risk business risk Define controls to business risks ie. Governance Contd…. 23-Apr-17 Hexaware Technologies Ltd
Bring ISM under GRC Framework (Governance Risk Compliance) 23-Apr-17 Hexaware Technologies Ltd
Thank You 23-Apr-17 Hexaware Technologies Ltd