Information Security Program

Slides:



Advertisements
Similar presentations
Organizational Governance
Advertisements

IT Security Policy Framework
Chapter 14 Fraud Risk Assessment.
Institutional Insurance: Creating a Comprehensive Campus-wide IT Security Risk Management Program Brian Davis IT Security & Policy Office of Information.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Discovery – The Next Generation!: Business Context of Risk Presentation to the North London Branch British Computer Society 19 March, 2008 Dr. Victoria.
Strategy 2022: A Holistic View Tony Hayes International President ISACA © 2012, ISACA. All rights reserved.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
Emerging and Strategic Risk Management TASSCUBO Janice M. Abraham, President & CEO.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
“The Impact of Sarbanes Oxley, An Evolving Best Practice” Ellen C. Wolf Senior Vice President & Chief Financial Officer American Water National Association.
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Information Technology Audit
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
Information Security Training for Management Complying with the HIPAA Security Law.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Enterprise Risk Management & IT Compliance March 30, 2010 Presented by: Ken Rowe, Director Enterprise Systems Assurance & Chief Security Officer University.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
RISK MANAGEMENT : JOURNEY OR DESTINATION ?. What is Risk? “ Any uncertain event that could significantly enhance or impede a Company’s ability to achieve.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Threats & Challenges in the Digital World EY 2015 Global Information Security Survey.
Draft - Enterprise Risk Management Risk Universe
JMFIP Financial Management Conference
Cybersecurity as a Business Differentiator
Physical Security Governance Model
Information Security – Current Challenges
MGMT 452 Corporate Social Responsibility
Team 1 – Incident Response
Enterprise risk management
Cybersecurity Policies & Procedures ICA
Information Security: Risk Management or Business Enablement?
Transforming IT Management
I have many checklists: how do I get started with cyber security?
8 Building Blocks of National Cyber Strategies
Andy Hall – Cyber & Tech INSURANCE Specialist
Higher Education Privacy Update
Securing the Threats of Tomorrow, Today.
Cyber Risk & Cyber Insurance - Overview
Cybersecurity ATD technical
The State of Cybersecurity in State Government NAST March 26, 2019
The MobileIron® Threat Detection difference:
Effective Risk Management in Decision Making Process
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
IT and Audit Building a Security Aware Culture
Presentation transcript:

Information Security Program 4/13/2018 Information Security Program March 22, 2017 Tom Ambrosi Chief Information Security Officer Template D Plain-white-dark

https://er.educause.edu/articles/2017/1/top-10-it-issues-2017-foundations-for-student-success

Penn State University President – Eric Barron “We all will need to take additional steps to protect ourselves, our identities and our information from a new global wave of cybercrime and cyberespionage," Barron said in his statement. "Well-funded and highly skilled cyber criminals have become brazen in their attacks on a wide range of businesses and government agencies, likely in search of sensitive information and intellectual property.“ "In this particular case we are dealing with the highest level of sophistication," Barron said. "Unfortunately, we now live in an environment where no computer network can ever be completely, 100 percent secure.“ Mandiant "Advanced cyberattacks like this -- sophisticated, difficult to detect and often linked to international threat actors -- are 'the new normal,'" said Nick Bennett, Mandiant's senior manager of professional services. "No company or organization is immune -- the world's leading banks, energy companies, retailers and educational institutions have all been and will be targets."

Program Requirements/Drivers 4/13/2018 Program Requirements/Drivers Required to comply with Federal, State & Industry Standards & Regulations FERPA HIPAA PCI DSS v3.1 – 6.1, 10.6, 12.2 GLBA Washington State OCIO Policy 141 – Securing Information Technology Assets Template D Plain-white-dark

Program Governance Initiatives Governance Structure Information Security Program Strategy Information Security Policies University Security Policy Update to University Data Policies Security & Privacy Accountabilities, Roles & Responsibilities Standards & Compliance Frameworks PCI, HIPAA Requirements / Drivers

Executive Perspectives on Top Risks for 2017 https://www.protiviti.com/US-en/insights/protiviti-top-risks-survey

Executive Perspectives on Top Risks for 2017

Institutional Risk Areas For Public Research Institutions Financial & Economic Conditions Ability to Recruit Quality Students, Faculty & Staff Business Continuity Physical Infrastructure WSU IT Infrastructure Legal & Regulatory Compliance Safety & Security Research Reputation & Brand Requirements / Drivers

Information Security & Privacy Risk Areas Cyber Attacks & Data Security Advanced Threats to C-I-A Data Privacy Breaches Federal, State, Industry Regulations Legal & Regulatory Compliance Outsourcing & Cloud Computing Mobile Devices Incident Response Identity & Access Mgmt Education, Training & Awareness Business Continuity & Disaster Recovery Requirements / Drivers

Managing Security & Privacy Risk Establish Risk Mgmt Framework Consistent with Enterprise Risk Mgmt Identify, Assess, Respond, Monitor Risk Mgmt Objectives Support Strategic Decision Making & Planning Allocate Resources Effectively Better able to meet Compliance Requirements Provide Optimized set of Risk Mitigations Enable University Mission & Business Objectives with acceptable level of risk Security & Privacy Risks are Institutional Risks Requirements / Drivers

Risk = Likelihood x Impact Each Vulnerability/Threat Pair will be evaluated for Likelihood of Occurrence Impact Classification Risk Level Assigned

Responsibilities Protecting Data Security & Privacy is a shared responsibility Promote a Risk-Aware Culture Understand risks to your business & potential impacts to the University Be Proactive – Avoiding risk is Accepting risk Escalate critical risks to Senior Leadership Include risk assessment processes into business processes Ensure all employees are aware of their responsibilities Provide training for employees that is appropriate to their roles & responsibilities

4/13/2018 Questions? Template D Plain-white-dark

Executive Perspectives on Top Risks for 2017

Executive Perspectives on Top Risks for 2017