Copyright Security-Assessment.com 2006 Protecting The Data Data security, compliance, disclosure requirements and what can happen if you get it wrong Presented.

Slides:



Advertisements
Similar presentations
Innovation or Necessity? ISM 158 By: Sepehr Saeb.
Advertisements

Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Internal Controls What Are They And Why Should I Care? 1.
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
HIPAA Regulations What do you need to know?.
Auditing Concepts.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Auditing Computer Systems
Auditing Computer-Based Information Systems
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Operational risk management Margaret Guerquin, FSA, FCIA Canadian Institute of Actuaries 2006 General Meeting Chicago Confidential © 2006 Swiss Re All.
IS Audit Function Knowledge
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
SOX & ISO Protect your data and be ready to be audited!!!
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 12-1 Chapter Twelve Auditing the Human Resource Management Process.
Control environment and control activities. Day II Session III and IV.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Implementing and Auditing Ethics Programs
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Planning an Audit The Audit Process consists of the following phases:
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Auditing Complex EDP Systems
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Risk Management For the Board of The Law Society 16 February 2005.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
Evaluation of Internal Control System
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
CIA Annual Meeting LOOKING BACK…focused on the future.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Advanced Accounting Information Systems Day 19 Control and Security Frameworks October 7, 2009.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 7-1 Chapter Seven Auditing Internal Control over Financial Reporting.
Introduction to Information Security
Copyright © 2007 Pearson Education Canada 7-1 Chapter 7: Audit Planning and Documentation.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
ISO/IEC 27001:2013 Annex A.8 Asset management
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Chapter 5 Evaluating the Integrity and Effectiveness of the Client’s Control Systems.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Software Engineering Process - II 7.1 Unit 7: Quality Management Software Engineering Process - II.
CAN I DO THAT IN THE CLOUD? Jason Testart, BMath, CISSP Director, Information Security Services May 2016.
Welcome to the ICT Department Unit 3_5 Security Policies.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Auditing Concepts.
Information Security based on International Standard ISO 27001
Presentation transcript:

Copyright Security-Assessment.com 2006 Protecting The Data Data security, compliance, disclosure requirements and what can happen if you get it wrong Presented By Brett Moore

Copyright Security-Assessment.com 2006 Recent study by the Ponemon Institute Examined costs incurred by 14 companies in 11 industry sectors Breaches affecting between 1,500 to 900,000 consumers Tangible and intangible costs up to $14 million USD Related survey of customers 20% had terminated their relationship with the company Another 40% were considering in doing so What information Staggering amount of information stored now Financial, health, social, personal, business With the masses amount of data that flows through your organisation, are you taking the appropriate steps to protect what may be your most valuable asset? Information Loss Costs Money

Copyright Security-Assessment.com 2006 The Issue Many organisations choose to spend their resources identifying and managing information security vulnerabilities instead of managing risk to their information assets. Vulnerability-centric approaches to organisational security fall short of appropriately characterizing organizational risk because they fail to focus on what is actually at risk, the information and processes they support.

Copyright Security-Assessment.com 2006 What is an information asset An information asset is any data stored that is used by the organisation for information purposes. Information value can be calculated Based on the importance to the organisations continuation The affect the loss of the information would have Information risk assessment The type of data the information is created from affects the requirement to secure it Information value Determines its importance and criticality to the organisation Which data is which? What happens when an information asset is a combination of data from different sources? Information Assets

Copyright Security-Assessment.com 2006 Where Is The Information Stored You MUST know where your information is stored How else are you able to secure it? Data is stored in containers Drive, tape, cd-rom, dvd, paper, people Containers are not ‘physical’ Stored on multiple servers A collection of databases A collection of database tables Containers are not only technical Information can be in printed form Information is stored in peoples heads

Copyright Security-Assessment.com 2006 Container Security Aspects The way in which an asset is protected Through controls implemented at the container level ie: access checks at the database level Security control depth The degree to which an asset is protected is based on how well the control reflect the requirements of the asset Risk inheritance Any risk associated with the container is inherited by the asset ie: server destruction, tape backup theft Legal requirements There can be different legal requirements dependant on the information asset’s container

Copyright Security-Assessment.com 2006 Who Owns The Data? The owner Are those who have primary responsibility for the viability and survivability of the asset Security requirements Owners set the security requirements for an asset and communicate these to the assets’ custodians Ensuring the security requirements have been implemented Defining the asset The owner defines what the information asset consists of, and is responsible for determining the assets value It is this value that is used to calculate risk mitigation processes Delegation The owner can delegate responsibilities but ultimately remains the owner responsible for the assets protection

Copyright Security-Assessment.com 2006 Who Looks After The Data? The custodian Manage or are responsible for containers Accepts responsibility The custodian accepts responsibility and protects the data according to the owners defined requirements Is NOT the owner Despite common misconception, the custodian is not the owner and therefore not the responsible entity Information use Any person who makes use of the information asset becomes a custodian during that period

Copyright Security-Assessment.com 2006 Governance – External Requirements Legal Sarbanes-Oxley California Disclosure Law Common Law Duty of Care Industry Imposed PCI Compliance All concerned with information assets, not security breaches

Copyright Security-Assessment.com 2006 Sarbanes-Oxley (USA, July 2002) Requirements for all public companies listed in the US Public companies must evaluate and disclose the effectiveness of their internal controls as they relate to financial reporting Independent auditors for such companies must "attest" (i.e., agree, or qualify) to such disclosure Financial reporting is generally driven by information assets, so the security of those information assets is of primary concern SB 1386 (California Disclosure Law, September 2002) Requires protection of personally identifiable information Must disclose if this information is reasonably believed to have been compromised Relates to any instance involving a resident of California 23 States now passed and several bills in front of Congress Legal Requirements

Copyright Security-Assessment.com 2006 Impact of Disclosure Requirements Sarbanes-Oxley Cray Inc (Supercomputer manufacturer) In March 2005, Cray filed a SOX report warning of material weaknesses in internal control over financial reporting Inadequate review of third-party contracts and lack of software application controls and documentation (SoD, and IT auditing issues) Cray's stock price dropped 56%, from $3.15 per share on March 15, 2005, to $1.38 on May 25, 2005 Now faced with a class action suit by shareholders

Copyright Security-Assessment.com 2006 Impact of Disclosure Requirements US Disclosure Laws From Over 120 Breaches disclosed so far this year Over 80 million records involved Breaches included: Hacking Dishonest employees Stolen computers Lost backup tapes Accidental online exposure

Copyright Security-Assessment.com 2006

Impact of Disclosure Requirements Ponemon Institute Studies Notification Impact 19% of disclosure recipients terminated relationship 40% thinking of terminating 27% concerned regarding organisation Cost of Breach Reviewed 14 breaches Breaches ranged from 1,500 records to 900,000 records from 11 different industry sectors Average losses of $140 per record, or $14 million per company Includes direct ($50), indirect($15), and opportunity costs($75) Does not include implementation of additional controls

Copyright Security-Assessment.com 2006 Identify information assets and owners IAP – Information Asset Profiling Conduct an information security risk assessment This includes identifying the risks to the asset Develop and implement security policies and procedures This drives how and what technology is used Test, audit, and update Policies and processes must work You need to know when they are been breached They need to be kept recent and up to date Steps To Protect Information Assets

Copyright Security-Assessment.com 2006 Information Asset Risk Assessment Primary Container May Not Be Primary Risk Other locations where information may be stored includes: – Backups – DR systems – Laptops – Desktops Once Each Container Has Been Identified, Establish How Each Is Accessed – Thick client applications – Web Applications – Database connections – Direct file access

Copyright Security-Assessment.com 2006 Information Asset Risk Assessment Perform a threat assessment of each entry point of each information asset container Assess each threat using standard risk assessment mechanisms utilising the value of the information asset to determine the impact of the threat occurring Each container may have multiple risk profiles, use the highest rating to determine the overall risk for that container Remember to take into account information in transit

Copyright Security-Assessment.com 2006 Vulnerability versus Information Asset Approaches Vulnerability Management Usually focused on individual containers or access points (applications) Generally doesn’t take into account the value of information assets Rates vulnerabilities in terms of impact to container, not data Information Asset Profiling Focuses on risks to data rather than systems or applications Risks directly associated with value of data May not take into account risks not relating to data, such as reputational risk

Copyright Security-Assessment.com 2006 Encryption Database Communication Laptop Backup Principle Of Least Privilege Database Server Application Protect Data Even After Container Has Been Retired Wipe old disks/tapes, or destroy Log/Audit Trails Common Tools And Techniques To Protect Data

Copyright Security-Assessment.com 2006 Do you have an application or vulnerability-centric approach to security rather than focusing on the information itself? Have you identified where your critical business data resides? Databases Servers Backups Laptops Have you got mechanisms in place to protect each of those locations? Database/Server protections Laptop encryption Backup encryption Key Questions To Take Away

Copyright Security-Assessment.com 2006 Questions ?