Download presentation
Presentation is loading. Please wait.
1
1 Information Security Management Working in Iraq Bill Casti, CQA, SSCP, CISM, CISA, CITP, ITIL Foundations ASQ Section 0511 Northern Virginia 20 June 2007
2
2 Introduction Position: Senior Advisor, IT Information Security Management, eGovernment Services, Economic Governance II Project What are all those letters? CQA = ASQ Certified Quality Auditor SSCP = ISACA Systems Security Certified Practitioner CISA = ISC 2 Certified Information Systems Auditor CISM = ISC 2 Certified Information Security Manager CITP = British Computer Society Chartered IT Professional ITIL Foundations = passed IT Infrastructure Library Foundations exam
3
3 Quality Management in Iraq Short answer: There isn’t any. Longer answer: In order to build effective, consistent, repeatable, documented quality management, you need a stable infrastructure, and that’s not there in Iraq as a whole. Quality Management for this presentation: This slide show has been quality-managed by me, but I can’t tell you much about quality management in the Government of Iraq…there’s no formal or informal system for that. Someday maybe, but not today. Day2Day working environment in Iraq for regular workers: Their big issue is getting to and from work alive. QMS kind of takes a backseat to that.
4
4 Project is USAID-funded Project was just picked up for both of its one-year extension options, runs thru September 2009 Project designed to help restore and rebuild economic governance for the Government of iraq Project parameters include: Fiscal, Tax and Customs Reform; Monetary policy and Central Bank; Financial Reform; Commercial Law and Institutional Reform; Utilities/Regulatory Reform and Government-wide IT; Social Service and Pension Reform; General policy Implementation and Special Projects Econ Gov II Project
5
5 Providing technical assistance to the Iraqi government in order to help them establish for their information requirements the legislation, processes, procedures, and technical requirements required to economically manage the resources, collection, storage, and sharing of information with the goal to provide: Transparency of Government Increased access to Government Decrease in discrimination Increase in commerce Increase in foreign investment Reduction in the cost of government Increased efficiency of government Increased security Private Sector participation My TOR (Terms of Reference)
6
6 TOR (cont.) Tasks Provide assistance to the National CIO Office: 1. Establish Government-wide information security standards that comply with international best practice 2. Establish a plan for implementing IT security standards across all Government Ministries 3. Build capacity and understanding of security standards
7
7 Expected Deliverables In conjunction with team members and the National CIO office develop Government wide IT security standards In conjunction with team members and the National CIO office develop a comprehensive IT security management capacity building program that covers o Security policy o Disaster recovery planning o Risk management o Securing the network o Intrusion detection, hacking o Computer forensics o Implementing PKI Develop and conduct the following training seminars: o Disaster recovery planning o Securing the network o Risk management
8
8 Some Threats to Information Employees : who can you trust? Unstable infrastructure Information transmission risks, both natural and man- made Verbal communications Printed documents Facility security Back-up sites
9
9 Information Security Management The ISO 17799 Way Safeguarding the confidentiality, integrity, and availability of written, spoken and computer information.
10
10 What is Information Security? BS ISO/IEC 17799:2005 defines this as: Confidentiality : ensuring that information is accessible only to those authorized to have access Integrity : safeguarding the accuracy and completeness of information and processing methods Availability : ensuring that authorized users have access to information and associated assets when required
11
11 Security for Advisors Private security service is employed full- time to take advisors to/from venues in the Red Zone To Venues: All Advisors wear body armor during any travel outside the IZ, covered with a dark-colored sweatshirt or casual shirt Lead car is Level 4 armored, low-profile BMW or Mercedes that fits into the milieu of typical cars you see on the street; no big Chevy Suburbans or Ford Excursions with lots of flashing lights and military escorts; two armed guards in front, maximum of two advisors in back Trailing car is soft-side Nissan Altima or similar low profile car with two armed guards.
12
12 Corporate Camp Living
13
13 Camp Living (cont.)
14
14 Camp Living (cont.)
15
15 Camp Living (cont.)
16
16 Camp Living (cont.)
17
17 Camp Living (cont.)
18
18 Camp Living (cont.)
19
19 Camp Living (cont.)
20
20 Thanksgiving 2006
21
21 Thanksgiving 2005
22
22 Traveling to/from the Airport
23
23 Science & Technology Counterparts Sundus MousaDr. Mahmood Sharief Director-General ITD
24
24 Red Zone Pics
25
25 Red Zone Pics
26
26 Red Zone Pics
27
27 Travel to/from BIAP
28
28 Baghdad international Airport
29
29 BIAP
30
30 Note ‘The relevance of any control should be determined in the light of the specific risks an organization is facing. Selection of controls should be based on a risk assessment.’ BS ISO/IEC 17799:2005
31
31 Controls for Best Practice An Information Security Management Plan Documented Roles and Responsibilities Ongoing Information Security Education and Training Ongoing Risk Assessments and Management of Risk Reporting of Information Security Incidents and Events Documented Disaster Recovery and Continuity of Business Operations Plans Leveraging existing or off-the-shelf controls as needed to reduce labor and financial costs and to preclude “reinventing the wheel”
32
32 Customer and Other Contractual Requirement Considerations Security Screening Restricted Access Physical perimeters Data storage Encryption Digital signatures Biometrics
33
33 Questions?
34
34 Contact Information Bill Casti, CQA, SSCP, CISM, CISA, CITP, ITIL Foundations eGovernment Services IT Advisor, eGovernment Services Iraq Economic Governance II Project BearingPoint +964 (0) 790.191.9612 Iraqna Mobile +1.703.879.5635 Skype VoIP Email: bill.casti@bearingpoint.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.