Presented by Heorot.net.  Understand managerial tasks and responsibilities within the OSSTMM  Identify legal requirements and how the OSSTMM meets these.

Slides:



Advertisements
Similar presentations
H = P = A = HIPAA DEFINED HIPAA … A Federal Law Created in 1996 Health
Advertisements

IT Security Policy Framework
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Criteria For Approval 45 CFR CFR Minimized risks Reasonable risk/benefit ratio Equitable subject selection Informed consent process Informed.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
© 2014 ACA International. All Rights Reserved. Obtaining Optimum Compliance Performance Foundational Training on ACA’s Professional Practices Management.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Navigating Compliance Requirements DCM 6.2 Regs and Codes linford & co llp.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Frameworks, Standards and Regulations IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA, MS, CIA, CISA, CISSP)
Presented by Heorot.net.  Understand the need for a PenTest Methodology  Identify the most-used methodologies  Understand Advantages and Limitations.
Module 2 – PenTest Overview
Chapter 21 Assurance, Attestation, and Internal Auditing Services Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
“Limiting electronic fraud through an Information Security Management System (ISMS): An Introduction to ISO 27001" Presented to the ICGFM Annual Conference.
Security Controls – What Works
ISO/IEC Winnie Chan BADM 559 Professor Shaw 12/15/2008.
2 HIPAA, HITECH, and Medical Records. Learning Outcomes When you finish this chapter, you will be able to: 2.1Discuss the importance of medical records.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Vulnerability Assessments
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
Patch Management Strategy
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
1 HIT Policy Committee HIT Standards Committee Privacy and Security Workgroup: Status Report Dixie Baker, SAIC July 16, 2009.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Implementation Issues of Sarbanes-Oxley CASE Presentation September 23, 2004 By Denise Farnan.
1 Copyright © 2014 M. E. Kabay. All rights reserved. CSH5 Chapter 67 “Developing Classification Policies for Data” Karthik Raman & Kevin Beets Classification.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
HIPAA (health insurance portability and accountability act)
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Copyright © 2008 Delmar Learning. All rights reserved. Unit 8 Observation, Reporting, and Documentation.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Connecting the Dots A Practical Approach to Integrating Compliance, Risk and Quality Jody Ann Noon RN, JD Partner Health Care Regulatory Practice.
Sarbanes-Oxley (SOX) John H. Messing, Esq. Law-on-Line,Inc. Providing 3 E’s -- E-Security, Encryption, E-Signatures 3900 E. Broadway Blvd., Suite 201 Tucson,
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
WEC MADRID 18 TH MARCH 2004 ASTRAZENECA’S APPROACH TO SUPPLIER RISK MANAGEMENT.
Introduction to Information Security
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Robert J. Scott. Agenda Licensing Models Perpetual vs. Subscription User vs. Device Agreement Types Microsoft Business and Services Agreement Online Subscription.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Incident Documentation Campus Security Officer Training.
HIPAA Security Final Rule Overview
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Human Subjects Update E. Wethington, Chair, UCHS.
MIS5001: Information Technology Management Ethics and Continuity Management Larry Brandolph
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Working to Raise the Bar in the Quality, Professionalism and Value of Integration Services.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Wisconsin Department of Health Services Purchase of Services Contract Guide Julie Anstett and Lucinda Champion Friday, May 6, 2016 Wisconsin Department.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the screen changes and you.
Regulatory Compliance
Matthew Christian Dave Maddox Tim Toennies
Current Privacy Issues That May Affect Your Credit Union
Health Care: Privacy in a Digital Age
Drew Hunt Network Security Analyst Valley Medical Center
Chapter 13: Construction
Enforcement and Policy Challenges in Health Information Privacy
Project proposal for OHSAS 18001:2007 implementation
FORMATION & AUDIT OF NGO’s
Presentation transcript:

Presented by Heorot.net

 Understand managerial tasks and responsibilities within the OSSTMM  Identify legal requirements and how the OSSTMM meets these requirements  Create Rules of Engagement  Become familiar with terminology  Understand what is “good security practices”  Create metrics

 For Managers and Project Managers Document Scope Compliance Rules of Engagement Process Security Map Risk Assessment Security Metrics Heorot.net

 Primary purpose: ○ “…to provide a scientific methodology for the accurate characterization of security through examination and correlation in a consistent and reliable way.”  Secondary purpose: ○ “provide guidelines which when followed will allow the auditor to perform a certified OSSTMM audit” Heorot.net

 Requirements for Accreditation Signed by the tester/analyst Meet the reporting requirements Anonymized report ○ What was tested ○ What was not tested Heorot.net

 Professional Certifications OPST - OSSTMM Professional Security Tester ○ OPSA - OSSTMM Professional Security Analyst ○ OPSE - OSSTMM Professional Security Expert ○ OWSE - OSSTMM Wireless Security Expert ○ Heorot.net

 Terminology – Security Test Types Blind Double Blind (Black Box) Grey Box Double Grey Box (White Box) Tandem Reversal Heorot.net

 Terminology –Error Types Well-known terms ○ False Positive ○ False Negative ○ Human Error ○ Falsification ○ Sampling Error ○ Constraint Other Terms ○ Grey Positive ○ Grey Negative ○ Specter ○ Indiscretion ○ Entropy Error ○ Propagation Heorot.net

 Legal Compliance U.S. Gramm-Leach-Bliley Act (GLBA) U.S. Sarbanes-Oxley Act (SOX) Health Insurance Portability and Accountability Act of 1996 (HIPAA) Others listed: ○ California Individual Privacy Senate Bill - SB1386 ○ USA Government Information Security Reform Act of 2000 section 3534(a)(1)(A) OCR HIPAA Privacy TA E.001, Business Associates [45 CFR §§ , (e), (e)] ○ OCR HIPAA Privacy TA E.001, Health-Related Communications and Marketing [45 CFR §§ ○ , (e)] ○ OCR HIPAA Privacy TA B.001, Minimum Necessary [45 CFR §§ (b), (d)] ○ OCR HIPAA Privacy TA , Payment [45 CFR ] Heorot.net

 Rules of Engagement (see page 19, OSSTMM) Do’s and Don'ts ○ Sales & Marketing ○ Assessment / Estimated Delivery ○ Contracts and Negotiations ○ *Scope Definition ○ *Test Plan ○ *Test Process ○ *Reporting *Required for successful completion of the PTE

 Rules of Engagement (see page 19, OSSTMM) Do’s and Don'ts ○ Sales & Marketing ○ Assessment / Estimated Delivery ○ Contracts and Negotiations ○ *Scope Definition ○ *Test Plan ○ *Test Process ○ *Reporting *Required for successful completion of the PTE

 Rules of Engagement ○ Scope Definition ○ Test Plan ○ Test Process ○ Reporting  Risk Assessment  Security Metrics Each topic is covered in separate video presentations.

 What needs to be protected: People Culture information Processes Business Image Intellectual property Legal rights Intellectual capital

 Four Categories of Concern: Safety Privacy Practicality Usability  “Perfect Security” Theoretical Personal note: “Need to meet business objectives”

 Three areas of concern: Operations ○ Visibility, Trust, Access Controls ○ Authentication, Indemnification, Subjugation, Continuity, Resistance, Non-repudiation, Confidentiality, Privacy, Integrity, Alarm Limitations ○ Vulnerability, Weakness, Concern, Exposure, Anomaly

1. Count the values within each area Operations = number of targets Controls = number of instances Limitations = number of flaws 2. Create a delta for each In this case, a percentage for each 3. Obtain the “Actual Delta” ∆Op + ∆Con - ∆Lim = ∆Actual 4. Combine Hashes of all three area to obtain the “Risk Assessment Value” (RAV)

 Understand managerial tasks and responsibilities within the OSSTMM  Identify legal requirements and how the OSSTMM meets these requirements  Understand Rules of Engagement  Become familiar with terminology  Identify what is “good security practices”  Security metrics