DCSS Information Security Office Partnership for a secure environment Lawrence “Buddy” Troxler Chief Information Security Officer February 13, 2011.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Why Security? A Commitment for [the Agency’s] Executives [CIO’s name] EC Presentation [date]
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 4: Effective Integration.
Information Technology – Guidelines for the Management of IT Security
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Building Secure Business for Industry & Government.
Framework for Improving Critical Infrastructure Cybersecurity NIST Feb 2014.
Information Security Advisory Council Thursday, March 3rd 2014 Student Union, Calloway Peak (room 137 A)
Security Controls – What Works
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Northwestern University Information Technology Information and Systems Security/Compliance February 2005.
ISO 17799&ITS APPLICATION Prepared by Çağatay Boztürk
Information Systems Security Officer
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Chapter 2 Leadership The most important and critical issue for quality system success.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Adaptive Processes Simpler, Faster, Better 1 Adaptive Processes Understanding Information Security ISO / BS7799.
GWS SMS INTRODUCTION MSM Manual. 3. MISSION STATEMENT AND CORE VALUES OF THE COMPANY  MISSION  Our Mission is to provide expertise in the fields of.
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Engaging Contractors in the Environmental Management System (EMS) Department of Energy EMS Workshop: Implementation, Lessons Learned, and Best Practices.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
July 10, 2008www.infosecurity.ca.gov1 What’s New!.
Presented by : Miss Vrindah Chaundee
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Welcome and Introduction to the Security Task Force Joy Hughes Co-Chair, Security Task Force Vice President and Chief Information Officer George Mason.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
WORKSHOP Laredo 28 th May OBJECTIVES To provide an interactive forum to discuss the developments of Logistics Cities To share experiences – good,
THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services Compact Planning A collegial, participatory.
Working with HIT Systems
Shell Exploration & Production Company SHELL ALASKA VENTURE BEAUFORT & CHUKCHI SEAS EXPLORATION DRILLING PROGRAM SAFETY AND THE ENVIRONMENT November 2012.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
The Direction of Information Security and Privacy in State Government Presented by Colleen Pedroza Chief Information Security Officer California State.
Supplier Forum 2007 Corporate Security 14/11/2007.
November 13, 2008www.infosecurity.ca.gov1 What’s New! Presented by Colleen Pedroza.
October 10, Better Together – The Road to Responsible Information Management Presented by Colleen Pedroza, State Information Security Officer.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
1 ITS STRATEGIC INITIATIVES Ken Orgill Assistant Vice Chancellor, Information Technology Services and Campus Chief Information Officer.
Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
Technology Services Division Rebecca Stilling Deputy Director.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
Policy, Standards and Guidelines Breakout Co-Chairs Victor Hazlewood OCIO Cyber Security, ORNL Kim Milford ISO, University of Rochester.
Business Continuity Disaster Planning
Navigating the Challenges of FTI Sammi Shultz Project Manager IRS Office of Safeguards Flexi-place phone Blackberry
AGENDA ■Department of Child Support Services Information Security Office (DCSS-ISO) Responsibilities ■Definition of Federal Tax Information (FTI) ■Requirements.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Managing Information Security Personnel By Christopher Boehm.
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
Primary Steps for Achieving ISO Certification.
Department of Safety & Quality Assurance
Higher Education Information Security Council
Start Why ISO In WWM CRC?.
Be prepared How to face crises Safety in and around the building.
Business Cointinmuit Framework
Information Technology (IT) Department
Final HIPAA Security Rule
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Film Restoration. Prasad Corp provides Digital Image Film Restoration services for film, video and audio through its state-of-the-art facilities in India.
Presentation transcript:

DCSS Information Security Office Partnership for a secure environment Lawrence “Buddy” Troxler Chief Information Security Officer February 13, 2011

2 ISO Mission Support California's Child Support Program by ensuring the confidentiality, integrity, and availability of information assets through communication, collaboration and awareness.

3 ISO Vision Safeguarding child support assets through customer service and collaboration.

4 ISO Core Values

5 12 Components of the Information Security Program 1. Risk Management 2. Security Policy Management 3. Organizing Information Security 4. Asset Management and Protection 5. Human Resource Security 6. Physical and Environmental Security 7. Communications and Operations Management 8. Access Control 9. Information Systems Acquisition, Development, and Maintenance 10. Information Security Incident Management 11. Disaster Recovery Management 12. Compliance

6 ISO Interacts with LCSAs Resource/Service and Support Organization Policy Development and communications (CSS Letters) Information Security Training Access Requests (DMV, MEDS) Incident Management Safeguard Reviews

7 Partnership for a secure environment

8 Questions???