U.Va.’s IT Security Risk Management Program (ITS-RM) April 2004 LSP Conference Brian Davis OIT, Security and Policy.

Slides:



Advertisements
Similar presentations
Ways to Improve the Hazard Management Process
Advertisements

Module N° 4 – ICAO SSP framework
EMS Checklist (ISO model)
Institutional Insurance: Creating a Comprehensive Campus-wide IT Security Risk Management Program Brian Davis IT Security & Policy Office of Information.
SOP Melody Lin, Ph.D. Deputy Director, Office for Human Research Protections Director, International Activities Santiago, Chile August.
Agency Risk Management and Internal Control Standards Presentation to the Board of Visitors November 14, 2014.
Information System Assurance Practices in China Key players doing IS Assurance In China Regulatory Regime and Professional Organizations -Regulatory AuthoritiesRegulatory.
Internal Control.
Building a Better Business Model Start with a discussion of Risk Higher Education Policy Commission Board of Governors Summit August 2, 2014.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
1. Failure is when users do not feel they get what they paid for. 2. Failure is when the overall organization fails to adopt the solution.
Quality evaluation and improvement for Internal Audit
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Risk Assessment Frameworks
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
Building a Compliance Risk Monitoring Program HCCA Compliance Institute New OrleansApril 19, 2005 Lois Dehls Cornell, Esq. Assistant Vice President, Deputy.
Business Continuity Check List PageOne. - Why Does Your Business Need A Continuity Checklist? Should the unexpected occur, your business will be able.
Auditing Standards IFTA\IRP Audit Guidance Government Auditing Standards (GAO) Generally Accepted Auditing Standards (GAAS) International Standards on.
National Association of College and University Attorneys 1 November 11, 2009 NACUA Fall 2009 Workshop November 2009.
Peer Information Security Policies: A Sampling Summer 2015.
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
PRM 702 Project Risk Management Lecture #28
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
Basics of OHSAS Occupational Health & Safety Management System
SMS Operation.  Internal safety (SMS) audits are used to ensure that the structure of an SMS is sound.  It is also a formal process to ensure continuous.
Information Systems Security Risk Management. © G. Dhillon All Rights Reserved Alignment Glenmeade Vision To provide a personalized experience to our.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
1 DOE IMPLEMENTATION WORKSHOP ASSESSING MY EMS Steven R. Woodbury
CDS Operational Risk Management - October 28, 2005 Existing Methodologies for Operational Risk Mitigation - CDS’s ERM Program ACSDA Seminar - October 26.
David N. Wozei Systems Administrator, IT Auditor.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Agency Risk Management & Internal Control Standards (ARMICS)
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Business Continuity and Disaster Recovery Chapter 8 Part 1 Pages 897 to 914.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Eliza de Guzman HTM 520 Health Information Exchange.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
Integrating Environmental Management System (EMS) Requirements and Work Controls April 21, 2004 Denny Hjeresen, EMS Team Lead, LANL Gene Turner, NNSA Lead,
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Data Report July Collect and analyze RtI data Determine effectiveness of RtI in South Dakota in Guide.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
OMB Memorandum M Implementation of the Government Charge Card Abuse Prevention Act of 2012 (Charge Card Act) September 2013.
Presented to Managers. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an organization.
TREASURY REGULATIONS’ CHANGES AND POTENTIAL IMPACT
SOLUTION What kind of plan do we need? How will we know if the work is on track to be done? How quickly can we get this done? How long will this work take.
Information Security IBK3IBV01 College 1 Paul J. Cornelisse / George Pluimakers.
Company: Cincinnati Insurance Company Position: IT Governance Risk & Compliance Service Manager Location: Fairfield, OH About the Company : The Cincinnati.
Prepared By: Razif Razali 1 TMK 264: COMPUTER SECURITY CHAPTER SIX : ADMINISTERING SECURITY.
Report Performance Monitor & Control Risk Administer Procurement MONITORING & CONTROLLING PROCESS.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Revision N° 11ICAO Safety Management Systems (SMS) Course01/01/08 Module N° 9 – SMS operation.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Configuration Control (Aliases: change control, change management )
Business Continuity Planning 101
QUALITY CONTROL CAIRO 12 – 14 April One of the key characteristics is the degree of independence under which post- clearance audits are carried.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Monitoring and Evaluation Systems for NARS organizations in Papua New Guinea Day 4. Session 12. Risk Management.
CHAPTER11 Project Risk Management
U.Va.’s IT Security Risk Management Program (ITS-RM)
Data Security and Protection Toolkit Assurance 2018/19
Central New York HEALTH EMERGENCY PREPAREDNESS COALITION
Presentation transcript:

U.Va.’s IT Security Risk Management Program (ITS-RM) April 2004 LSP Conference Brian Davis OIT, Security and Policy

IT Security Risk Management Program (ITS-RM) Announcing the roll out of version 1.0 Announcing the roll out of version 1.0 Will assist departments in appropriately protecting their IT assets Will assist departments in appropriately protecting their IT assets

Why? IT Security Risk Management. It’s not just a “best practice,” it’s a good idea!

Good News Most of you are already doing most of what you need to be doing Most of you are already doing most of what you need to be doing Program provides tools to make identification and prioritization of the rest easier Program provides tools to make identification and prioritization of the rest easier Be prepared when your department’s administrators come to you for assistance Be prepared when your department’s administrators come to you for assistance

What’s Risk Management? Formally defined “The total process to identify, control, and manage the impact of uncertain harmful events, commensurate with the value of the protected assets.”

More simply put… “Determine what your risks are and then decide on a course of action to deal with those risks.”

Even more colloquially… What’s your threshold for pain? Do you want failure to deal with this risk to end up on the front page of the Daily Progress?

Risk Management Practices Conduct a mission impact analysis and risk assessment to: 1. 1.Identify various levels of sensitivity associated with information resources 2. 2.Identify potential security threats to those resources

Risk Management Practices (cont.) Conduct a mission impact analysis and risk assessment to: 3.Determine the appropriate level of security to be implemented to safeguard those resources 4.Review, reassess and update as needed or at least every 3 years

Risk Management Practices (cont.) Coordinated and integrated with contingency planning and mission resumption activities Coordinated and integrated with contingency planning and mission resumption activities Mission continuity plan that will provide reasonable assurance that critical data processing support can be continued or resumed within an acceptable time frame if normal operations are interrupted Mission continuity plan that will provide reasonable assurance that critical data processing support can be continued or resumed within an acceptable time frame if normal operations are interrupted

University Level Design university-wide program for analysis, assessment & planning Design university-wide program for analysis, assessment & planning Identify general security threats & provide other guidance material Identify general security threats & provide other guidance material Oversee completion of department level analysis, assessment, planning efforts Oversee completion of department level analysis, assessment, planning efforts Complete yearly analysis & assessment for enterprise systems; update enterprise business continuity regularly Complete yearly analysis & assessment for enterprise systems; update enterprise business continuity regularly

Departmental Level Identify sensitive department system data, assets & threats to those data, assets Identify sensitive department system data, assets & threats to those data, assets Determine appropriate safeguards & form plan for implementing them Determine appropriate safeguards & form plan for implementing them Complete U.Va. templates at least every three years & when computing environment changes significantly Complete U.Va. templates at least every three years & when computing environment changes significantly

Brief Description ITC implementing a University-wide IT Security Risk Management Program for IT Mission Impact Analysis IT Mission Impact Analysis IT Risk Assessment IT Risk Assessment IT Mission Continuity Planning IT Mission Continuity Planning Evaluation and Reassessment Evaluation and Reassessment

What Has Been Done ITC conducts a yearly business analysis and risk assessment for directly managed resources; updates its business continuity plan more often ITC conducts a yearly business analysis and risk assessment for directly managed resources; updates its business continuity plan more often Similar planning occurred across the University as part of the Y2K initiative Similar planning occurred across the University as part of the Y2K initiative Comptroller’s Office collects information on the existence–but not quality–of security-related plans Comptroller’s Office collects information on the existence–but not quality–of security-related plans Audit Department includes review of security plans during routine departmental audits Audit Department includes review of security plans during routine departmental audits ITC’s departmental security self-assessment checklist (part of security awareness program) ITC’s departmental security self-assessment checklist (part of security awareness program)

Why That’s Not Enough Y2K business continuity plans not updated Y2K business continuity plans not updated No mechanisms for tracking the frequency of updates, quality and consistency No mechanisms for tracking the frequency of updates, quality and consistency No central repository for safeguarding assessment and planning documents No central repository for safeguarding assessment and planning documents No university-level procedure dealing explicitly with ongoing IT security risk management No university-level procedure dealing explicitly with ongoing IT security risk management Non-compliant with state standards or HIPAA and GLBA Non-compliant with state standards or HIPAA and GLBA

Responsibilities ITC ITC Health System Health System Audit Department Audit Department Other Offices Other Offices The Departments… The Departments…

Executive Support Strong executive support has been a key success factor at other institutions Strong executive support has been a key success factor at other institutions Executives fully behind program at U.Va. Executives fully behind program at U.Va. University policy requiring participation in the program is coming University policy requiring participation in the program is coming Encouragement from LSPs will also be necessary as many department heads will not fully appreciate the need for IT security assessment and planning Encouragement from LSPs will also be necessary as many department heads will not fully appreciate the need for IT security assessment and planning

Let’s look at an example…

It’s good for you! Risk management makes you more efficient Risk management makes you more efficient Risk management helps you make your case Risk management helps you make your case Risk management has got your back Risk management has got your back

It’s not as painful as it looks! No one will be starting from scratch No one will be starting from scratch Little is expected from those with little, more is expected from those with more Little is expected from those with little, more is expected from those with more The templates are designed for the most complex situations but work for simple solutions, too The templates are designed for the most complex situations but work for simple solutions, too

ITS-RM Roll Out Version 2.0 coming soon… Version 2.0 coming soon… Top 5 by end of year Top 5 by end of year Next 5 by next summer Next 5 by next summer Encourage other departments to get moving Encourage other departments to get moving

You’re Not Alone... ITC can’t do it for you ITC can’t do it for you Available to consult Available to consult Meet to explain process Meet to explain process Service consultations if we have solutions that fill a gap Service consultations if we have solutions that fill a gap

For More Information... Brian DavisShirley Payne