USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.

Slides:



Advertisements
Similar presentations
Session No. 4 Implementing the State’s Safety Programme Implementing Service Providers SMS
Advertisements

MSCG Training for Project Officers and Consultants: Project Officer and Consultant Roles in Supporting Successful Onsite Technical Assistance Visits.
Effective Contract Management Planning
Radiopharmaceutical Production
School Board Audit Committee Training Module 7 Evaluation of the Audit Committee 1.
Auditing, Assurance and Governance in Local Government
What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
Child Safeguarding Standards
The International Security Standard
CIP Cyber Security – Security Management Controls
Core principles in the ASX CGC document. Which one do you think is the most important and least important? Presented by Casey Chan Ethics Governance &
Meeting with IESBA CPAB Update Glenn Fagan and Kam Grewal April 7, 2014.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
1 LBNL Enterprise Computing (EC) January 2003 LBNL Enterprise Computing.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Office of Inspector General (OIG) Internal Audit
ASPEC Internal Auditor Training Version
Quality Representative Training Version
Internal Auditing and Outsourcing
Peer Information Security Policies: A Sampling Summer 2015.
2009 NWCCU Annual Meeting Overview of the Revised Accreditation Standards and New Oversight Process Ronald L. Baker Executive Vice President and Director,
Evolving IT Framework Standards (Compliance and IT)
An Educational Computer Based Training Program CBTCBT.
1 Internal Controls. 2 Example Internal Control Manual  Focused Assessment Exhibit 4A  /trade/trade_programs/audits/focused.
Basics of OHSAS Occupational Health & Safety Management System
SMS Operation.  Internal safety (SMS) audits are used to ensure that the structure of an SMS is sound.  It is also a formal process to ensure continuous.
Atlanta Public Schools Project Management Framework Proposed to the Atlanta Board of Education to Complete AdvancED/SACS “Required Actions” January 24,
Corporate Governance: Basel II and Beyond Corporate Governance Program for Bank Directors of Indian Banks Mumbai December 14, 2005.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Roles and Responsibilities
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Promoting Effective Boards of Directors
Corporate Governance Yoshi Kawai Secretary General, IAIS IAIS-ASSAL Regional Seminar Buenos Aires, Argentina, November 2011 PUBLIC.
1 CIP Cyber Security – Personnel & Training Steve Garn CIP Compliance Workshop Baltimore, MD August 19-20, 2009 © ReliabilityFirst Corporation.
Audit of predetermined objectives Presentation: Portfolio Committee on Economic Development March 2013.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Audit Planning Process
ASPEC Quality Representative Internal Auditor Training Version
Project Kick-off Meeting Presented By: > > > > Office of the Chief Information Officer.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Chapter 9: Introduction to Internal Control Systems
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Information Security IBK3IBV01 College 3 Paul J. Cornelisse.
IT Summit November 4th, 2009 Presented by: IT Internal Audit Team Leroy Amos Sue Ann Lipinski Suzanne Lopez Janice Shelton.
SPC Advisory Committee Training - TAC Fall 2015 Institutional Research President’s Office 1 Abridged from the SPC Advisory Committee Training on October.
Chapter 8 Auditing in an E-commerce Environment
State of Georgia Release Management Training
PROGRESS ON THE IMPLEMENTATION OF AUDIT RECOMMENDATIONS FOR 2014/15: INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) 1 Briefing presentation to the Portfolio.
Pertemuan 14 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Page 1 Portfolio Committee on Water and Environmental Affairs 14 July 2009.
Board Structure & Responsibilities Governing Board Online Training Module.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
MODULE 7: CONDUCT OF GOVERNANCE AUDIT GOVERNANCE AUDITOR ACCREDITATION COURSE.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Auditors’ Dilemma – reporting requirements on Internal Financial Controls under the Companies Act 2013 and Clause 49 of the Listing agreement V. Venkataramanan.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Safety Committee Formation
Audit of predetermined objectives
Chapter 9 Control, security and audit
An overview of Internal Controls Structure & Mechanism
Radiopharmaceutical Production
Presentation transcript:

USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC

Topic Introduction  This presentation will highlight areas of focus for the upcoming USG Information Security Program Audit that will be conducted at the University System Office.  OIAC will be working closely with the USO and the USG CISO  Some Institutional involvement will be essential during the course of this audit  Expectations of the audit and examples of artifacts (to drive successful audit outcomes) are derived from the IT Handbook Sections 3 & 5 and the Audit Expectations Workbook. IT Handbook Sections 3 & 5 Audit Expectations Workbook.

Topic Objectives  Objective 1: Awareness of the audit as Institutional involvement may be required.  Objective 2: To Provide a Sneak Preview as the procedures are still in development … more soon  Objective 3: Final plan will be distributed accordingly upon its completion

Background Information Board of Regents: 11.3 Information Security Policy  General Policy  System-Level Activities  Institutional Responsibilities

General Policy  The USO, all USG institutions, and the GPLS shall create and maintain an internal information security technology infrastructure consisting of an information security organization and program that ensures the confidentiality, availability, and integrity of all USG information assets.

System-Level Activities  The USG CISO shall:  develop and maintain an information security organization and architecture for support of information security across the USG and support of activities between institutions.  maintain information security implementation guidelines that the USO, all USG institutions, and the GPLS should consider in the development of their individualized information security plans.

Institutional Responsibilities  ensure appropriate and auditable information security controls are in place.  develop, implement, and maintain an individualized information security plan and submit for periodic review  methods for ensuring that information regarding the applicable laws, regulations, guidelines, and policies is distributed and readily available to its user community shall be included in the individualized information security plan.  clear procedures for reporting and handling of information security incidents shall be followed. These procedures shall include reporting of incidents to the USO in a timely manner, and shall be documented in the individualized information security plan. BOR Policy Manual

Background Information Board of Regents: 11.3 Information Security Policy  We all play respective roles in 11.3 policy adherence  One step toward adherence is the upcoming USG Information Security Program Audit

USG Information Security Program Audit Timeline:  Planning phase: In progress  Field work: Will begin Summer 2014 Areas of Focus:  Information Security Management  Information Security Operations

Areas of Focus: Information Security Management 1. Governance 2. Risk Assessment (Procedures Still Being Developed) 3. Policies 4. IT Security Plan

1. Governance  Objective: Processes are in practice to assure applicable management oversight of the information security function.  Purpose: The information security governance is to ensure that the USO, SSC, USG, Georgia Archives and GPLS are proactively implementing appropriate information security controls to support their mission in an effective manner, while managing evolving information security risks.

1. Governance  Expectations for Audit: security governance committee/security steering committee exists security steering committee includes representation from key functional areas committee members regularly attend committee meetings security management communication process exists and reporting lines are clearly established

1. Governance: Example Artifacts: security governance committee/security steering committee charter charter membership list meeting schedule minutes of selected committee meetings verification of communication process

2. Risk Assessment Expectations for Audit: Risk Assessments are regularly conducted to prioritize information security initiatives and ensure alignment with business risks. Example Artifacts : Recent risk assessment documents

3. Policies  Objective: Policies are created according to a defined format and are distributed following a distribution list based on subject matter and relevance, and the scope of the policies are appropriate to ensure that the information security is adequate to address the risk tolerance.

3. Policies  Expectations for Audit  Information security policies are adequate and complete.  There is adequacy of communication practices related to the dissemination of information security policies.

3. Policies  Example Artifacts  Security policies documents An agreement to comply with Information Security policies (internal to IT/external to IT) Appropriate Use Policy Laptop/desktop computer security policy Internet usage policy Firewall policy security policy  Proof of policy awareness/communications  Location/site of the readily available policies

4. IT Security Plan  Objective:  Translate business, risk and compliance requirements into an overall IT security plan: Taking into consideration the IT infrastructure and the security culture Ensure that the plan is implemented in security policies and procedures, together with appropriate investments in services, personnel, software and hardware. Communicate security policies and procedures to stakeholders and users.  The security plan is reviewed on a regular basis to determine that it is updated to reflect changes to the operating environment and new threats.

4. IT Security Plan:  Expectations for Audit:  There exists a Security Plan, by which the security strategic plan is operationalized or implemented.  Adequacy and completeness of the Security Plan.  The Security Plan is reviewed on a regular basis to determine that it is updated to reflect changes to the operating environment and new threats.

4. IT Security Plan:  Example Artifact  A copy of the IT security plan including version history

Areas of Focus: Information Security Operations 1. Security Testing and Monitoring (Procedures Still Being Developed) 2. Incident Management (Procedures Still Being Developed)  Response and Monitoring 3. Endpoint Security Management (Procedures Still Being Developed) 1. *Procedures will be developed in accordance with IT HB Sect 5 update as it is published. 4. Security Awareness, Training, and Education

 Objective:  One of the objectives/goals of the ITS Information Technology Strategic Plan 2010 is to increase the awareness of the workforce through a security awareness program. The USG cannot protect the confidentiality, integrity, and availability of information and information systems in today’s highly networked environment without ensuring that each person involved understands their roles and responsibilities and is adequately trained to perform them. (IT Handbook Section )

4. Security Awareness, Training, and Education  Expectations for Audit  There is a strong Security Awareness, Training, and Education program Training is conducted annually and attendance is mandatory Role-based security education and awareness needs have been identified and provided to those individuals within the organization that have unique or specific information security responsibilities There is record of completed and needed security training maintained

4. Security Awareness, Training, and Education  Example Artifacts  Copy of the Security Awareness, Training, and Education program  Documented record of completed and needed security training

SUMMARY EXAMPLE ARTIFACTS, THUS FAR: 1. Security governance committee/security steering committee charter 2. Charter membership list 3. Meeting schedule 4. Minutes of selected committee meetings 5. Verification of communication process 6. Recent risk assessment documents 7. Security policies documents 8. Proof of policy awareness/communications 9. Location/site of the readily available policies 10. A copy of the IT security plan including version history 11. Copy of the Security Awareness, Training, and Education program 12. Documented record of completed and needed security training

Points of Contact Kenyatta Morrison Director of Information Technology Audit Office: Cara King Senior IT Auditor Office:

Thank You