Presentation to ISSD Task Force INFORMATION SYSTEMS SECURITY DIVISION Reorganization Study Prepared: May 6, 1991 Revised: May 7, 1991.

Slides:



Advertisements
Similar presentations
Organizing Information Technology Resources
Advertisements

Course: e-Governance Project Lifecycle Day 1
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Auditing Concepts.
TECHNICAL VOCATIONAL EDUCATIONAL AND TRAINING COLLEGES AN INTRODUCTION TO THE IMPEMENTATION OF A COMPLIANT RISK MANAGEMENT PROCESS July 2014.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Coordinating Center Overview November 18, 2010 SPECIAL DIABETES PROGRAM FOR INDIANS Healthy Heart Project Initiative: Year 1 Meeting 1.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Computer Security: Principles and Practice
Center for Health Care Quality Licensing & Certification Program Evaluation 1 August 2014 rev.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
IACT 901 Module 10 1 Plan Delivery. IACT 901 Module 10 2 Elements of IS & IT Plans Delivered Comprise Overall IS/IT vision Applications development plan.
1 Operational Risk Management Member Education Series Seminar Indian Institute of Banking & Finance Nagpur November 2005.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Purpose of the Standards
Session 6: Data Integrity and Inspection of e-Clinical Computerized Systems May 15, 2011 | Beijing, China Kim Nitahara Principal Consultant and CEO META.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
Unit Introduction and Overview
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Organizing Information Technology Resources
Evolving IT Framework Standards (Compliance and IT)
Module 2.1 Finance and Administration Cabinet Organizational Changes and Agency Impact March
1 IS 8950 Managing and Leading a Networked IT Organization.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
NIST Special Publication Revision 1
Keeping you Running Part I Experiences in Helping Local Governments Develop Cyber Security and Continuity Plans and Procedures Stan France & Mary Ball.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Information Systems Security Operational Control for Information Security.
16 1 Installation  After development and testing, system must be put into operation  Important planning considerations Costs of operating both systems.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Practice Management Quality Control
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Chapter 3 Strategic Information Systems Planning.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
SecSDLC Chapter 2.
ISMS Implementation Workshop Adaptive Processes Consulting Pvt. Ltd.
System Users and Developers
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Prepared By: Razif Razali 1 TMK 264: COMPUTER SECURITY CHAPTER SIX : ADMINISTERING SECURITY.
~ pertemuan 4 ~ Oleh: Ir. Abdul Hayat, MTI 20-Mar-2009 [Abdul Hayat, [4]Project Integration Management, Semester Genap 2008/2009] 1 PROJECT INTEGRATION.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Practical Use of International Standards in the Control and Auditing Activities of Federal Treasury Prague, March, 2016 Head of Internal Control (Audit)
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Auditing Concepts.
Roles and Responsibilities
Internal (Operational) Risk Management System at the Federal Treasury
Data and database administration
Description of Revision
The Basics of Information Systems
Security Policies and Implementation Issues
The Basics of Information Systems
{Project Name} Organizational Chart, Roles and Responsibilities
Security Policies and Implementation Issues
Presentation transcript:

Presentation to ISSD Task Force INFORMATION SYSTEMS SECURITY DIVISION Reorganization Study Prepared: May 6, 1991 Revised: May 7, 1991

I. Proposed Reorganization (Security Automation Division) II. Why Merger of Fraud Detection and ISS Divisions III. ISSD Staff Reduction Service & Project Assumptions ISS-WA Organization & Service Reductions 155-LA Organizations & Service Reductions 155-AZ Temporary Organization IV. Cost Reduction Summary V. Action Summary VI. ISSD Functions Summary

Reduction in Cost Infusion of Expert System Knowledge into Security Function Centralized Supervision & Administration of Security Technical Functions WHY J XXXXXXX AS DIVISION MANAGER Significantly More Technical and Managerial Depth - 30 years of Technical and Managerial Data Processing Experience - Development and Systems Assurance Management Experience - Data Center Production and Operations Management Experience - Security (RACF) Project Experience - Expert Systems Project Experience - Commercial and M Application & Architecture Design Experience - Business Resumption and Data Processing Contingency Planning Experience

SAD with the Support of SPAC performs Security Product Reviews SPBA accepts decentralized Branch Security Administration. AZ Security Service will be provided without local presence (no reduction in service anticipated) SPAC-NW will use their current system as basis for SPC Online Request Processing and therefore have responsibility for SPC Security Architecture

ELIMINATE Security Boiler Plate Contributions to Legal Documents REDIRECT MVS Request Processing Physical Security Reviews Security Product Research REDUCE New Business Research Procedure and Guideline Writing Security Awareness Program Department & Division Administrative Documentation

ELIMINATE Security Boiler Plate Contribution to Legal Documents REDIRECT PC/Virus Software Distribution Physical Security Reviews REDUCE Security Product Research New Business Research Procedure & Guideline Writing Security Awareness Program Department & Division Administrative Documentation

REDIRECT Procedure & Guideline Writing TANDEM Request Processing, and Violation Reporting & Review

CONSOLIDATE ELSEWHERE INTO SAD MVS Environment Management (WA) MVS Request Processing (LA) Cryptographic Key Management (LA) Audit Response (WA) TRANSFER TO USERS Thirty Plus Internal Security Applications

2 ND QUARTER Layoff Division Manager - Layoff Mainframe Technical Consultant In LA - Layoff Midrange Technical Consultant In LA - Move Data Security Analyst from WA to LA (add TANDEM skills to LA) 4 TH QUARTER Complete Conversion of Arizona Processing to Common Architecture 1 ST QUARTER Transfer(Layoff) AZ Manager - Layoff AZ Data Security Analyst

KEPT AT CURRENT LEVEL OF EFFORT SPC Security Architecture Development Mainframe & Tandam Security Request Processing (Consolidated) Mainframe & Tandem Security Technical Support Midrange, LAN, and PC Security Technical Support Network Security Support Online Security Request Processing System Development Wire Transfer Security Support Cryptographic Key Management MAC Security Request Processing (CA) Database and Tracking of Waiver, Virus, and Security Incident Events Information Systems Security Committee (ISSC) Support Information Systems Security Manual (ISSM) Policy Development Application Project (such as BDS) Security Consulting REDUCED LEVEL OF EFFORT Security Procedure and Guideline Writing (Consolidated) Security Awareness Program Security Product Reviews (with SPAC) New Business Research Assistance Department and Division Administrative Documentation

OVERALL PURPOSE The purpose of this position is to provide support to the Corporate Security Department objectives in: - Managing and coordinating of computer security plans, projects, and policies; - Developing external fraud detection and prevention applications; - Administering passwords and users identifications for productions and development operations. - Identify and monitor emerging technology in the fields of information security and expert systems products REQ UIREM ENTS - Minimum of 20 years of data processing background with a thorough understanding of computer operating systems and networks. The major emphasis is in database computer environments supported in different geographic locations. - Ability to interact with senior management to gain concurrence on security related methods and production processing. - Possess technical skills to interact, make decisions, and implement security methods consistent with business and technical requirements. - Proven record of knowledge based application development and installation. RESPONSIBILITIES - Provide technical direction and leadership to apply and create access controls to meet Federal, State, CCC, NBE, and internal audit requirements. Additionally, provide risk versus exposure analysis and recommendations. - Provide security direction in the SPC dynamic technical and business environments. - Work with AC in the creation of security related technology, products, procedures, systems, and concepts. The position requires the ability to innovate and to manage innovative projects. - Ensure that the security needs/requirements of the corporation are maintained and established with consideration to the amount of risk or exposure to electronic assets. - Ensure and provide technical direction to mitigate security related failures and damage that can have significant negative impact on the total organization. - Provide technical direction for the design of expert systems related to external fraud detection and prevention. - Ability to analyze user expertise into knowledge base rules.