Current ‘Hot Topics’ in Information Security Governance Auditing

Slides:



Advertisements
Similar presentations
Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Advertisements

Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03.
Discovery – The Next Generation!: Business Context of Risk Presentation to the North London Branch British Computer Society 19 March, 2008 Dr. Victoria.
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
IOR Scottish Chapter Annual Conference Glasgow Caledonian University – 1 st November 2013 Relevance of Operational Risk to the FCA Jill Savager Manager,
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Security Controls – What Works
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Why Comply with PCI Security Standards?
Information Security Risk Management
Auditing Cloud Computing: Adapting to Changes in Data Management IIA and ISACA Joint Meeting March 12, 2013 Presented by: Jay Hoffman (AEP), John Didlott.
Consultancy.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Information Security Update CTC 18 March 2015 Julianne Tolson.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Presentation to Senior Management MiFID for Senior Managers Introduction These slides introduce the big changes for senior management from MiFID.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Assurance Market Research June Executive Summary Small response rate (n=43) General low awareness of information security controls and.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security tools for records managers Frank Rankin.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Managing Trust Professor Richard Walton CB. Exam Question The importance of Trust in Data Protection (This essay should discuss the relationship between.
Cyber Insurance Risk Transfer Alternatives
Law Firm Data Security: What In-house Counsel Need to Know
An Information Security Management System
Performing Risk Analysis and Testing: Outsource or In-house
Distributed Asset Management Making The Business Case
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
E&O Risk Management: Meeting the Challenge of Change
ENTERPRISE RISK MANAGEMENT IN THE CASE OF THE FINANCIAL SERVICE SECTOR
Data protection headaches: GDPR, brexit AND perimeter risk
The Internal Audit Role in assessing Cybersecurity
Session 11 Other Assurance Services
Securing the Law Firm Myth vs. Reality vs. Practicality:
Service Organization Control (SOC)
Lecture 14: Business Information Systems - ICT Security
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
LEGAL & ETHICAL ISSUES InsurTech & Health Insurance Providers
INTRODUCTION TO ISO 9001:2015 FOR IMPLEMENTATION Varinder Kumar CISA, ISO27001 LA, ISO 9001 LA, ITIL, CEH, MEPGP IT, Certificate course in PII & Privacy.
Securing Information Systems
Information Security based on International Standard ISO 27001
Risk Criteria and Guidance_
Unit 7 – Organisational Systems Security
Project proposal for ISO 27001:2013 implementation
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
IIA District Conference Seminar Presenter David Cole, CPA, CISA, CRISC
County HIPAA Review All Rights Reserved 2002.
Forensic and Investigative Accounting
Vendor Management The Risks to Your Business
DSC Contract Management Committee Meeting
IT and Audit Building a Security Aware Culture
The state of digital supplier risk management: In partners we trust
Presentation transcript:

Current ‘Hot Topics’ in Information Security Governance Auditing AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03 March 2011

WHAT DOES MUTUAL ONE DO ? We facilitate collective action amongst mutuals across 4 broad areas: Internal audit Compliance, risk and governance Events Collective procurement We are very committed to supporting the mutual sector so that it thrives, not just survives More details on the above can be found on www.mutual-one.co.uk

Current ‘Hot Topics’ in Information Security Governance Auditing Contents Definition of ‘Information Security’ What Information do we need to secure? Why do we need to secure information? Auditing Information Security Frameworks Emerging Themes Questions

Information Security…. ….protecting information and information systems from unauthorised access, use, disclosure, disruption, modification or destruction. Wikipedia – Nov 2010

What information needs protecting? Customer Company Employee Confidential Bank / card Product / ideas

But why….? Regulatory Requirements Financial Services Authority

But why….? Regulatory Requirements Reputation Damage Financial Cost

Estimated Cost of a Data Breach: Data Loss incidents cost between £365k and £3.92m to manage Average cost per lost record = £64 Biggest cost per lost record is lost business - £29 Other costs include: customer communication recompense operational costs financial penalty Increased 7% in past year, 36% in past two years Source: Ponemon Institute / PGP 2009 Annual Study - Global Cost of a Data Breach report

Auditing InfoSec Dependent upon: Organisation Operating environment – regulated firm? Compliance to external requirements (e.g. PCI-DSS)? Size and nature of IT environment i.e. is control requirement proportionate? Risk appetite

Auditing InfoSec - Frameworks ISO27001 / 2 ISO/IEC 27001:2005 – Information Security Management Systems – Requirements ISO/IEC 27002:2005 – Code of Practice for Information Security Management COBIT FSA Paper – Data Security in Financial Services (Apr 2008) Payment Card Industry – Data Security Standards

Auditing InfoSec Emerging Themes: FSA split into Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA)

Data Security in Financial Services (April 2008) – New Regulation ?? Governance – managing systems and controls Training and Awareness Staff Recruitment & Vetting Controls Physical Security Disposing of Customer Data Managing Third-party Suppliers Internal Audit and Compliance Monitoring

Auditing InfoSec Emerging Themes: FSA split into Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA) Outsourcing / key suppliers

FSA Fines…. Zurich fined £2.3m over customers’ data loss, August 2009 Result of a lack of oversight on key outsourced service Third Party Assurance

Third Party Assurance Due diligence Relationship management Contracts / service level agreements Ongoing review of security arrangements Third party assurance

Auditing InfoSec Emerging Themes: FSA split into Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA) Outsourcing / key suppliers Internal Threats – who are our employees?

Who are our employees? Initial recruitment process background checks CRB checks credit checks Recruitment of temporary staff Ongoing vetting of staff

Auditing InfoSec Emerging Themes: FSA split into Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA) Outsourcing / key suppliers Internal Threats – who are our employees? Internal Threats – how is the internet used?

“To block or not to block….?” Reasons to block…. Introduction of malware, spyware, virus Bandwidth usage ‘Time-wasting’ Data Leakage Accidental Intentional Data aggregation REPUTATION!

“To block or not to block….?” Reasons to allow…. Networking opportunities Knowledge sharing Communication with staff Marketing ability / customer engagement Increased staff morale

“To block or not to block….?” Controls to consider (if allowing social networking sites) Solid risk assessment Training and awareness Usage policies Granular web-site controls (next-gen firewalls) Data leakage software

Auditing InfoSec Emerging Themes: FSA split into Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA) Outsourcing / key suppliers Internal Threats – who are our employees? Internal Threats – how is the internet used? Portable Media Devices – Encrypted?

Ongoing Problem

Laptop Security Encryption Laptop policy – cannot rely on adherence Asset Register Laptop sharing

Auditing InfoSec Emerging Themes: FSA split into Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA) Outsourcing / key suppliers Internal Threats – who are our employees? Internal Threats – how is the internet used? Portable Media Devices – Encrypted? Smart Phones

Auditing InfoSec Emerging Themes: FSA split into Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA) Outsourcing / key suppliers Internal Threats – who are our employees? Internal Threats – how is the internet used? Portable Media Devices – Encrypted? Smart Phones What next….? Cloud Computing?

Cloud Computing Security Regulatory Compliance Location Segregation Recovery Auditability Longevity Costs

ANY QUESTIONS ?

Communicate Clearly At all levels, to achieve the optimum outcome Work Together Respect each other and our clients and through teamwork achieve a common goal Share Knowledge Our aim is to enlighten and add value through experience Communicate Clearly At all levels, to achieve the optimum outcome Deliver Quality Service We can be relied upon and trusted to meet agreed objectives Anticipate and Respond to Change We aim to be proactive and innovative; by being adaptable we address tomorrow's challenges today