Pro-active Security Measures

Slides:



Advertisements
Similar presentations
Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Advertisements

USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
Security and Personnel
David A. Brown Chief Information Security Officer State of Ohio
Copyright 2004 Turning Point Solutions Establishing Lines Of Communication Before a Crisis.
Peter Brudenall & Caroline Evans- Simmons & Simmons Marsh Technology Conference 2005 Zurich, Switzerland. Managing the Security Landscape – Legal and Risk.
Security Controls – What Works
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
The Way Ahead for Information Systems Security: What You Don’t Know Can Hurt You Christopher Baum Research Vice President Global Government NYSCIO Conference.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Information Systems Security Officer
Session 3 – Information Security Policies
Disclaimer Copyright Michael Chapple and Jane Drews, This work is the intellectual property of the authors. Permission is granted for this material.
Tan Jenny 23 September 2009 SESSION 4: Understanding Your IT Control Environment & Its Readiness.
Network security policy: best practices
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Computer Security: Principles and Practice
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
MnSCU Audit Reports Presentation to the MnSCU Audit Committee Office of the Legislative Auditor September 21, 2004.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 14 – Human Factors.
Roles and Responsibilities
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
The Risk Adverse Property Management Firm Understanding the risks to your business and methods to manage those risks.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
UNIT 15 WEEK 9 CLASS 1 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
University Health Care System 1 HTM 660 Systems Management and Planning May 2014.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Connecting the Dots A Practical Approach to Integrating Compliance, Risk and Quality Jody Ann Noon RN, JD Partner Health Care Regulatory Practice.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Placing Information Security within an Organization
Compliance August 18, Agenda Outline Status Draft of Answers.
Development of a Clean Room/Highly Restricted Zone June 12, 2012 Thomas Garrubba - CVS Caremark; Manager, Technical Assessments Group ©2011 The Shared.
1 Managing the Security Function Chapter 11 2 Figure 11-1: Organizational Issues Top Management Support  Top-Management security awareness briefing.
Chapter 8 Auditing in an E-commerce Environment
The University of Toledo Finance and Audit Committee Meeting “Internal Audit and Compliance Update” September 21, 2015.
February,  On October 23, 2015 the Commodity Futures Trading Commission (“CFTC”)approved National Futures Association’s (“NFA”) interpretive notice.
February 2, 2016 | Chicago NFA Cybersecurity Workshop.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
S19: Documentation of fieldwork. Session Objectives ♂ In the last session, we have discussed the standards of documentation and the standard files to.
Managing Information Security Personnel By Christopher Boehm.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Case Study - Target.
Team 4 – Mack, Josh, Felicia, Kevin and Walter
Current ‘Hot Topics’ in Information Security Governance Auditing
IS4680 Security Auditing for Compliance
IT Development Initiative: Status and Next Steps
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Securing and Protecting Citizens' Data
Managing the Security Function
Cybersecurity Update Cascade Natural Gas.
Anatomy of a Common Cyber Attack
Presentation transcript:

Pro-active Security Measures David Mannering September 20, 2004 APPA Business and Financial Conference Jacksonville, Florida 1

Lincoln Electric System Municipal utility in Lincoln, Nebraska 119,500 electric customers 450 employees at four sites 35 IT staff 2

IT Security 2

Technology Technology Hardware & software dedicated to security Firewalls Anti-virus etc. Technology 2

Operational Procedures Activities related to security Log monitoring Incident response Etc. Procedures Technology 2

User Practices User Practices Security awareness & actions Company employees Vendors & Contractors Business Partners Procedures Technology Users 2

Policy Corporate policy Security policy Authority Responsibility Standards Etc. Policy Procedures Technology Users 2

Security Structure Board & CEO Security Policy ISO-17799 Steering Committee CIO Security Orgs CSO IT Staff Training Regulations Security Program IT Staff SLA’s Local Standards Operational Procedures Physical Security Security Education IT Infrastructure IT Architecture 2

Corporate Security Policy Goal “We will secure our information systems” Authority Enforced by corporate management Responsibility Governance (Steering committee) Chief Security Officer (or equivalent) Standards ISO-17799 Method Security program 2

Corporate Security Program Local standards ISO-17799 + regulations & special conditions Influences security architecture Ties security to SLA’s Operational procedures Carried out by IT staff & users Connected to IT infrastructure Education Employee security awareness program Issues & current events Standards & procedures Vendor/contractor/partner security awareness 2

Proactive Methods Vulnerability Assessments Internal Compliance Auditing Security Awareness Training Incident Response Drills Employee background checks Alertness to current issues & events 2

Vulnerability Assessments Annually if possible Use external consultant Wholesale or Specialized scope Inform only those with need to know Act on the results Budget Staff performance goals Security program 2

Internal Compliance Auditing Announced or stealth Have clear connection to policy Prioritized by a risk assessment Coordinate with internal auditors Escalating consequences for non-compliance Warnings, loss of access, etc. Act on patterns discovered Employee training Operational procedures 2

Security Awareness Program Goals Make security part of the culture Well informed employees Employee education Annual classes Topical briefings Timely Announcements Partner & contractor awareness Compliance and confidentiality agreement Administration Management reporting 2

Incident Response Drills Practice different kinds of incidents Hacking, theft, virus infection, etc. Write the incident report Have report reviewed by non-involved party Debrief the response team Discuss the “what if’s” Update procedures if necessary 2

Employee Background Checks On hiring Employment history Educational History Criminal Records For critical positions Credit report Psychological testing Re-check periodically 2

Alertness Monitor external security organizations CERT, Infragard, ES-ISACS. etc. Check the daily news CSO, SANS, Yahoo, Wired etc. Discuss security issues with your peers 2

Conclusion King Arthur: Where hides evil, then, in my kingdom. Merlin: Always where you never expect it. Always. (Excalibur) 2

Business Card David Mannering Chief Information Officer Lincoln Electric System (402) 473-3468 dmannering@les.com 2