Protecting Information Assets - Week 5 - Risk Evaluation. MIS 5206 Protecting Information Assets

Size: px
Start display at page:

Download "Protecting Information Assets - Week 5 - Risk Evaluation. MIS 5206 Protecting Information Assets"

Transcription

1 Protecting Information Assets - Week 5 - Risk Evaluation

2 MIS5206 Week 5 Brief intro to Team Project In the News Week 3 & 4 Material Highlights Risk Evaluation Test Taking Tip Quiz

3 Weeks 3&4: Data Classification Process and Models Why is data classification important? Focuses attention on the identification and valuation of information assets Is the basis for access control policy and processes 3

4 Weeks 3&4: Data classification process and models

5 Risk Evaluation Risk evaluation is the process of identifying risk scenarios and describing their potential business impact

6 Risk Evaluation - Key Components Collect Data Analyze Risk Maintain Risk Profile Identify relevant data to enable effective IT-related risk identification, analysis and reporting Develop useful information to support risk decisions that take into account the business impact of risk factors Maintain and up-to-date and complete inventory of known risks and attributes as understood in the context of IT controls and business processes

7 Risk Evaluation - Collect Data (RE-1) Goal: Ensure IT-related risks and opportunities are identified, analyzed and presented in business terms Metric: Cumulative business impact from ITrelated incidents and events not identified by risk evaluation processes

8 Risk Evaluation - Collect Data (RE-1) Process Goal: Identify relevant data to enable effective IT-related risk identification, analysis and reporting Process Metrics: # of loss events with key characteristics not captured or measured Degree to which collected data support Analyzing scenarios and reporting trends Visibility and understanding of the control state Visibility and understanding of the threat landscape

9 Risk Evaluation - Collect Data (RE1) Activity Goals: Establish and maintain a risk data collection model Identify risk factors Collect data on operating environment Collect data on risk events Process Metrics: Existence of a documented risk data collection model # of data sources # of data items with identified risk factors Completeness of Risk event data Affected assets Impact data Threats Controls Measures of the effectiveness of controls Historical data on risk factors

10 RE1: Collect Data summary of goals and metrics

11 RE-1: Collect Data Key Activities RE1.1 Establish and maintain a model for data collection RE1.2 Collect data on the operating environment RE1.3 Collect data on risk events RE1.4 Identify risk factors

12 Risk Evaluation - Collect Data: Roles Board of directors Chief Executive Officer (CEO) Chief Financial Officer (CFO) Chief Risk Officer (CRO) Enterprise Risk Committee Business Management Business Process Owner Risk Control Functions Human Resources Compliance and Audit

13 Risk Evaluation - Collect Data: Roles

14 Risk Evaluation - Key Components Collect Data Analyze Risk Maintain Risk Profile Identify relevant data to enable effective IT-related risk identification, analysis and reporting Develop useful information to support risk decisions that take into account the business impact of risk factors Maintain and up-to-date and complete inventory of known risks and attributes as understood in the context of IT controls and business processes

15 Risk Evaluation - Analyze Risk (RE2)

16

17

18 Annualized loss expectancy (ALE) = Single loss expectancy (SLE) X Annualized rate of occurrence (ARO)

19

20 FIPS 199: Risk event impact ratings

21 FIPS 199: Composite IS risk event impact ratings Example with multiple information types:

22 Security Categorization of Different Types of Information and Information Systems

23

24

25

26

27

28

29 How to prioritize an enterprise s data for protection?

30 How to prioritize an enterprise s data for protection?

31 Analyzing risk to prioritize protection NIST SP Information Security Handbook: A Guide for Managers, page 99 Transforming ordinal risk rankings to interval risk measures

32 Analyzing risk example

33 Analyze Risk

34

35 Maintain Risk Profile

36 Maintain Risk Profile

37 Projected Growth of Data

38 Projected Growth of Data What is a Zetta Byte? A zettabyte is a quantity of information or information storage capacity equal to bytes Research from the University of California, San Diego reports that in 2008, Americans consumed 3.6 zettabytes of information.

39 Projected Growth of Data

40 Projected Growth of Data

41 Projected Growth of Data

42 Data Retention Why have a formal data retention policy? a) Applicable Laws and Regulations b) Resource Limits c) Privacy d) Access e) Security f) Plagiarism and Copyright g) Enforcement

43 Data Retention Why companies need to have a formal data retention policy Practical Concerns Regulatory Concerns Privacy Concerns

44 Data Retention Why companies need to have a formal data retention policy Practical Concerns

45 Data Retention Why companies need to have a formal data retention policy Practical Concerns Regulatory Concerns

46 Data Retention Why companies need to have a formal data retention policy Practical Concerns Regulatory Concerns Privacy Concerns

47 Data Retention Establishing a Data Retention Policy Establish data classes Classify data Establish retention periods Select archive methods Paper-based Electronic forms

48 Data Retention Establishing a Data Retention Policy Establish data classes Classify data Establish retention periods Select archive methods Paper-based Electronic forms Create end-of-life processes Create policies for destruction of media

49 Data Retention Establishing a Data Retention Policy Establish data classes Classify data Establish retention periods Select archive methods Paper-based Electronic forms Create end-of-life processes data quality and management Create policies for destruction of media Identify roles and responsibilities Create enforcement mechanisms Owner Steward Custodian Manages the business function that generates and/or uses the data Has business and/or regulatory responsibility for Focuses on managing data content and the business logic behind all data transformations. Oversees the safe transport and storage of data Focuses on the underlying infrastructure and activities required to keep the data intact

50 Data Retention Establishing a Data Retention Policy Establish data classes Classify data Establish retention periods Select archive methods Paper-based Electronic forms Create end-of-life processes Create policies for destruction of media Identify roles and responsibilities Create enforcement mechanisms

51 Data Retention Handling Customer Data Conduct an enterprise application compliance review Implement Payment Application Data Security Standard (PA-DSS)

52 Data Retention Handling Customer Data Conduct an enterprise application compliance review Implement Payment Application Data Security Standard (PA-DSS) Pilot data tokenization solutions Implement end-to-end encryption Restrict Internal access to customer data

53 Test Taking Tip - Eliminate any probably wrong answers first - Focus on the highest likelihood answers for test taking efficiency Here s why: Some of the answers use unfamiliar terms and stand out as unlikely and can therefore be discarded immediately Some answers are clearly wrong and you can recognize them based on your familiarity with the subject The correct answer may require a careful reading of the wording of the question and eliminating the unlikely answers early in the evaluation process helps you focus on key concepts for making the choice 53

54 Example: Test Taking Tip The promotion manager of Northeast Electronics has been made the owner of the department s printers and other resources. The manager can now designate who in the department can use the the large format printer. What term is used to describe this type of access control? A. Mandatory B. Role-Based C. Discretionary D. Distributed Answer: C 54

55 Example: Test Taking Tip The promotion manager of Northeast Electronics has been made the owner of the department s printers and other resources. The manager can now designate who in the department can use the the large format printer. What term is used to describe this type of access control? A. Mandatory B. Role-Based C. Discretionary D. Distributed Answer: C Nothing seems mandatory about this scenario 55

56 Example: Test Taking Tip The promotion manager of Northeast Electronics has been made the owner of the department s printers and other resources. The manager can now designate who in the department can use the the large format printer. What term is used to describe this type of access control? A. Mandatory B. Role-Based C. Discretionary D. Distributed Answer: C Maybe. 56

57 Example: Test Taking Tip The promotion manager of Northeast Electronics has been made the owner of the department s printers and other resources. The manager can now designate who in the department can use the the large format printer. What term is used to describe this type of access control? A. Mandatory B. Role-Based C. Discretionary D. Distributed Answer: C Nothing about roles other than manager in the question 57

58 Example: Test Taking Tip The promotion manager of Northeast Electronics has been made the owner of the department s printers and other resources. The manager can now designate who in the department can use the the large format printer. What term is used to describe this type of access control? A. Mandatory B. Role-Based C. Discretionary D. Distributed Answer: C Distributed is not relevant to the information in the question 58

59 Example: Test Taking Tip The promotion manager of Northeast Electronics has been made the owner of the department s printers and other resources. The manager can now designate who in the department can use the the large format printer. What term is used to describe this type of access control? A. Mandatory B. Role-Based C. Discretionary D. Distributed Answer: C 59

60 Quiz 60

61

62

Protecting Information Assets - Week 4 - Risk Evaluation. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 4 - Risk Evaluation. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 4 - Risk Evaluation MIS5206 Week 4 Readings Vacca, Security Management Systems, Chapter 22 Vacca, Risk Management, Chapter 53 ISACA RiskIT Framework pp. 47-96 NIST

More information

ISACA. The recognized global leader in IT governance, control, security and assurance

ISACA. The recognized global leader in IT governance, control, security and assurance ISACA The recognized global leader in IT governance, control, security and assurance High-level session overview 1. CRISC background information 2. Part I The Big Picture CRISC Background information About

More information

ISACA San Francisco Chapter

ISACA San Francisco Chapter ISACA San Francisco Chapter The 2007 Privacy Panel Rena Mears, CISSP, CIPP, CPA, CISA Partner, Deloitte & Touche LLP March 23, 2007 San Francisco 0 What is Privacy and Why Now? Definition of PII The definition

More information

Enterprise Risk Management Program

Enterprise Risk Management Program Enterprise Management Program APPA Meeting Austin, Texas September 25, 2007 Presented by: L.D. Hollingsworth 1 Agenda Introduction - Why ERM? Governance & Reporting Structure CPS Energy s ERM Approach

More information

Guidelines for Information Asset Management: Roles and Responsibilities

Guidelines for Information Asset Management: Roles and Responsibilities Guidelines for Information Asset Management: Roles and Responsibilities Document Version: 1.0 Document Classification: Public Published Date: April 2017 P a g e 1 Contents 1. Overview:... 3 2. Audience...

More information

Vol. 2 Management RFP No. QTA0015THA General Services Administration (GSA) Enterprise Infrastructure Solutions (EIS)

Vol. 2 Management RFP No. QTA0015THA General Services Administration (GSA) Enterprise Infrastructure Solutions (EIS) General Services Administration (GSA) Enterprise Infrastructure Solutions (EIS) or more test data sets provided by GSA and demonstrate how we meet the specified BSS acceptance criteria through the test

More information

Standard Statement and Purpose

Standard Statement and Purpose Personnel Security Standard Responsible Office: Technology Services Initial Standard Approved: 10/23/2017 Current Revision Approved: 10/23/2017 Standard Statement and Purpose Security of information relies

More information

Emerging Technology and Security Update

Emerging Technology and Security Update Emerging Technology and Security Update February 13, 2015 Jordan Reed Managing Director Agenda 2015 Internal Audit Capabilities and Needs Survey 2014 IT Priorities Survey Results 2014 IT Security and Privacy

More information

Content of the ITIL 2011 Process Library light

Content of the ITIL 2011 Process Library light 1 Content 1 Content... 1 2 Processes... 2 2.1 Service Strategy... 2 2.1.1 Business Relationship Management... 2 2.1.2 Service Portfolio Management... 2 2.1.3 Financial Management... 2 2.2 Service Design...

More information

Protecting Information Assets - Week 9 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 9 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 9 - Business Continuity and Disaster Recovery Planning MIS5206 Week 9 Case study discussion Business Continuity Planning (BCP) and Disaster Recovery (DR) Planning Test

More information

G11: Convergence of Security and Compliance - An Integrated Approach to Information Risk Management Larry A. Jewik and Ramy Houssaini, Kaiser

G11: Convergence of Security and Compliance - An Integrated Approach to Information Risk Management Larry A. Jewik and Ramy Houssaini, Kaiser G11: Convergence of Security and Compliance - An Integrated Approach to Information Risk Management Larry A. Jewik and Ramy Houssaini, Kaiser Permanente The Convergence of Security and Compliance -- An

More information

II. Key Elements of Results-based Monitoring Systems

II. Key Elements of Results-based Monitoring Systems II. Key Elements of Results-based Monitoring Systems DCED Standard for Results Measurement 4 November 05.11.2010 Page Seite 1 Overview Certain core elements common to all good monitoring systems GTZ uses

More information

Securing Intel s External Online Presence

Securing Intel s External Online Presence IT@Intel White Paper Intel IT IT Best Practices Information Security May 2011 Securing Intel s External Online Presence Executive Overview Overall, the Intel Secure External Presence program has effectively

More information

Genpact Intelligent Operations SM

Genpact Intelligent Operations SM PROVIDE VISIBILITY Genpact Intelligent Operations SM Making enterprises more competitive, with operations that sense, act and learn from the outcome of actions, at scale Foreword Intelligent Operations

More information

How Business Analysis Can Improve Sales and Marketing Outcomes

How Business Analysis Can Improve Sales and Marketing Outcomes How Business Analysis Can Improve Sales and Marketing Outcomes In today s environment, the strategic focus for most organizations is revenue growth. Almost all executives are searching for ways to drive

More information

06.0 Data and Access Classification

06.0 Data and Access Classification Number 6.0 Policy Owner Information Security and Technology Policy Data and Asset Classification Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 6. Data and Asset

More information

Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements

Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements SAP Database and Data Management Portfolio/SAP GRC Solutions Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements

More information

Accelerate GDPR compliance with the Microsoft Cloud Samuel Marín Sr. Sales Solutions Specialist

Accelerate GDPR compliance with the Microsoft Cloud Samuel Marín Sr. Sales Solutions Specialist Accelerate GDPR compliance with the Microsoft Cloud Samuel Marín Sr. Sales Solutions Specialist This presentation is intended to provide an overview of GDPR and is not a definitive statement of the law.

More information

Protecting Information Assets - Unit #9 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protecting Information Assets

Protecting Information Assets - Unit #9 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protecting Information Assets Protecting Information Assets - Unit #9 - Business Continuity and Disaster Recovery Planning Agenda Contingency Planning (CP) IT Security Control Class and Family Business Continuity and Disaster Recovery

More information

Time: 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A. Answer all questions.

Time: 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A. Answer all questions. COPYRIGHT RESERVED End SEM (IV) MCA (XXIV) ERP 2017 Time: 3 hours Full Marks: 70 Candidates are required to give their answers in their own words as far as practicable. The figures in the margin indicate

More information

The Open Group Exam OG0-091 TOGAF 9 Part 1 Version: 7.0 [ Total Questions: 234 ]

The Open Group Exam OG0-091 TOGAF 9 Part 1 Version: 7.0 [ Total Questions: 234 ] s@lm@n The Open Group Exam OG0-091 TOGAF 9 Part 1 Version: 7.0 [ Total Questions: 234 ] https://certkill.com Topic break down Topic No. of Questions Topic 1: Volume A 100 Topic 2: Volume B 134 2 https://certkill.com

More information

CERT Resilience Management Model, Version 1.2

CERT Resilience Management Model, Version 1.2 CERT Resilience Management Model, Organizational Process Focus (OPF) Richard A. Caralli Julia H. Allen David W. White Lisa R. Young Nader Mehravari Pamela D. Curtis February 2016 CERT Program Unlimited

More information

ITIL Intermediate Capability Stream:

ITIL Intermediate Capability Stream: ITIL Intermediate Capability Stream: OPERATIONAL SUPPORT AND ANALYSIS (OSA) CERTIFICATE Sample Paper 2, version 6.1 Gradient Style, Complex Multiple Choice SCENARIO BOOKLET This booklet contains the scenarios

More information

ON THE INFORMATION MANAGEMENT AND INFORMATION TECHNOLOGY GOVERNANCE. Audit Services Division. September 2008

ON THE INFORMATION MANAGEMENT AND INFORMATION TECHNOLOGY GOVERNANCE. Audit Services Division. September 2008 AUDIT REPORT ON THE INFORMATION MANAGEMENT AND INFORMATION TECHNOLOGY GOVERNANCE Audit Services Division Approved by Chief Public Health Officer on October 28, 2008 Table of Contents Executive Summary..3

More information

Enhanced Risk Management Policy

Enhanced Risk Management Policy Enhanced Risk Management Policy Approved By: City Council Category: General Administration Approval Date: September 12, 2001 Effective Date: September 12, 2001 Revision Approved By: Revision Date: August,

More information

Data and Information. Work session for Non-Practitioners

Data and Information. Work session for Non-Practitioners Data and Information Work session for Non-Practitioners Eight Dimensions of an Organisation Strategy Governance Investment Policy Standards Performance Business Data and Information Application and Software

More information

Developing a Strategy to Manage Legacy Data

Developing a Strategy to Manage Legacy Data Developing a Strategy to Manage Legacy Data Session #34, March 6, 2018 Cindy Andreason, Director, St. Luke s Health System Keith Olenik, Principal, The Olenik Consulting Group, LLC 1 Conflict of Interest

More information

Findings from ICO audits of 16 local authorities

Findings from ICO audits of 16 local authorities Data protection Findings from ICO audits of 16 local authorities January to December 2013 Introduction This report is based on ICO audits of 16 local authorities between January and December 2013. This

More information

STREAM Integrated Risk Manager. ISO Application. How STREAM supports compliance with ISO 27001

STREAM Integrated Risk Manager. ISO Application. How STREAM supports compliance with ISO 27001 STREAM Integrated Risk Manager ISO 27001 Application How STREAM supports compliance with ISO 27001 Plan Do Check - Act STREAM provides support to all 4 stages of the international management system model

More information

A Guide to IT Risk Assessment for Financial Institutions. March 2, 2011

A Guide to IT Risk Assessment for Financial Institutions. March 2, 2011 A Guide to IT Risk Assessment for Financial Institutions March 2, 2011 Welcome! Housekeeping Control panel on the right side of your screen. Audio Telephone VoIP Submit Questions in the pane on the control

More information

Security Today. Shon Harris. Security consultant, educator, author

Security Today. Shon Harris. Security consultant, educator, author Security Today Shon Harris Security consultant, educator, author 360 Security Model Holistic Approach to Security Every Organization has these EXACT issues The responsibility of securing an organization

More information

THE FIVE ELEMENTS OF AN EFFECTIVE HIPAA AUDIT PREPARATION PROGRAM

THE FIVE ELEMENTS OF AN EFFECTIVE HIPAA AUDIT PREPARATION PROGRAM WHITEPAPER THE FIVE ELEMENTS OF AN EFFECTIVE HIPAA AUDIT PREPARATION PROGRAM ANDREW HICKS MBA, CISA, CCM, CRISC, HCISSP, HITRUST CSF PRACTITIONER PRINCIPAL, HEALTHCARE AND LIFE SCIENCES TABLE OF CONTENTS

More information

RISK MANAGEMENT STRATEGY AND POLICY

RISK MANAGEMENT STRATEGY AND POLICY NEWPORT COMMUNITY SCHOOL PRIMARY ACADEMY Date Adopted: 12 th July 2012 Author/owner: Resources Committee Anticipated Review: Ongoing RISK MANAGEMENT STRATEGY AND POLICY Risk Management Strategy The Governing

More information

ABL Information Risk Policy

ABL Information Risk Policy Policy Name Approving Board ABL Information Risk Policy Date Approved 30/01/2018 Last Review Date 23/01/2018 Next Review Date 23/01/2020 Prepared By Version Number 3.0 Reference Number ABL Information

More information

Privacy Management Policy Compliance Audit Final Report

Privacy Management Policy Compliance Audit Final Report JORDAN YOUNGS Privacy Management Policy Compliance Audit Final Report Fiscal Year (2016 2017) June 2, 2017 GAM 2.27 Privacy Audit Table of Contents List of Acronyms... 1 1.0 Executive Summary... 2 1.1

More information

WHANGAREI DISTRICT COUNCIL

WHANGAREI DISTRICT COUNCIL WHANGAREI DISTRICT COUNCIL CHIEF EXECUTIVE PA TO CHIEF EXECUTIVE MANAGER - PEOPLE & CAPABILITY GENERAL MANAGER COMMUNITY GENERAL MANAGER CORPORATE CFO GENERAL MANAGER INFRASTRUCTURE DEPUTY CE GENERAL MANAGER

More information

The table below compares to the 2009 Essential Elements and the 2018 Enhanced Data Stewardship Elements

The table below compares to the 2009 Essential Elements and the 2018 Enhanced Data Stewardship Elements October 8, 2018 The Essential Elements of Accountability were developed by a multi-stakeholder group that met in Dublin Ireland as the Global Accountability Dialogue. The Essential Elements provided granularity

More information

Implementation Practices for the Archiving and Compliance Infrastructure

Implementation Practices for the Archiving and Compliance Infrastructure Implementation Practices for the Archiving and Compliance Infrastructure Gary Zasman, Network Appliance WW Practice Director Co-chair 100 Year Archive and ILM PS SNIA Legal Notice The material contained

More information

UNIVERSITY STANDARD. Title UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL STANDARD ON ENTERPRISE DATA GOVERNANCE. Introduction

UNIVERSITY STANDARD. Title UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL STANDARD ON ENTERPRISE DATA GOVERNANCE. Introduction UNIVERSITY STANDARD Issuing Office Responsible University Title UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL STANDARD ON ENTERPRISE DATA GOVERNANCE PURPOSE Introduction This Standard to the Policy on Enterprise

More information

Methodology for evaluating usage and comparison of risk assessment and risk management items

Methodology for evaluating usage and comparison of risk assessment and risk management items ENISA ad hoc working group on risk assessment and risk management Methodology for evaluating usage and comparison of risk assessment and risk management items Deliverable Version Date: 6/4/7 Index of Contents

More information

CIO Advisory Community IT Security Framework Conversation February 8, Executive Summary

CIO Advisory Community IT Security Framework Conversation February 8, Executive Summary Executive Summary CIO Advisory Community Following a university security incident, the Office of the Chief Information Officer (OCIO) hosted a community conversation on how the IT community could advance

More information

Certified Information Professional 2016 Update Outline

Certified Information Professional 2016 Update Outline Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability

More information

INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS)

INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) ATTRIBUTE STANDARDS 1000 Purpose, Authority and Responsibility The purpose, authority, and responsibility of the internal

More information

Hospital Resource Vulnerability Assessment (RVA) Implementation Guide

Hospital Resource Vulnerability Assessment (RVA) Implementation Guide Quick tips to get started Optimized for Excel 2013 and Windows 8 environment (though should work on recent versions of Excel for Mac) Save the document to your desktop select a name that s appropriate

More information

RISK MANAGEMENT REPORT

RISK MANAGEMENT REPORT RISK MANAGEMENT REPORT A RCL FOODS RISK MANAGEMENT REPORT 2016 RISK MANAGEMENT REPORT FRAMEWORK Risk management is considered by the Board to be a key business discipline, designed to balance risk and

More information

Building and Maintaining a Business Continuity Program

Building and Maintaining a Business Continuity Program Building and Maintaining a Business Continuity Program Successful strategies for financial institutions for effective preparation and recovery 1 Building and Maintaining a Business Continuity Program Table

More information

Governance: Risk Committees

Governance: Risk Committees Governance: Risk Committees Eric Holmquist Managing Director, ERM National Practice FIS Melinda Thompson SVP, Director, Operational Risk Management Rabobank NA Agenda Introductions The Role of Risk Committees

More information

Compliance Officer Tools & Resources. November 10-11, 2014 at the Seminole Hard Rock Hotel & Casino

Compliance Officer Tools & Resources. November 10-11, 2014 at the Seminole Hard Rock Hotel & Casino Compliance Officer Tools & Resources November 10-11, 2014 at the Seminole Hard Rock Hotel & Casino Compliance Officer Tools and Resources Presented by: John Vecchioni National Sales Director/Director of

More information

External Supplier Control Obligations. Information Security

External Supplier Control Obligations. Information Security External Supplier Control Obligations Information Security Version 8.0 March 2018 Control Area / Title Control Description Why this is important 1. Roles and Responsibilities The Supplier must define and

More information

Content of the ITIL 2011 Process Library

Content of the ITIL 2011 Process Library 1 Content 1 Content...1 2 Processes...2 2.1 Service Strategy...2 2.1.1 Business Relationship Management...2 2.1.2 Management of IT Service Strategy...2 2.1.3 Demand Management...3 2.1.4 Service Portfolio

More information

Citizens Property Insurance Corporation Business Continuity Framework

Citizens Property Insurance Corporation Business Continuity Framework Citizens Property Insurance Corporation Framework Dated September 2015 Approvals: Risk Committee: September 17, 2015 (via email) Adopted by the Audit Committee: Page 1 of 12 Table of Contents 1 INTRODUCTION...

More information

Enterprise Risk Management Framework

Enterprise Risk Management Framework Enterprise Risk Management Framework 2018 Johnson & Johnson 1 2 Introduction In order to deliver value to our consumers, patients, caregivers, employees, communities and shareholders, we at Johnson & Johnson

More information

Version manage enterprise risk, compliance, and resiliency. The Framework for Process Improvement. History

Version manage enterprise risk, compliance, and resiliency. The Framework for Process Improvement. History Manage Enterprise Risk, Compliance, and Resiliency DEFINITIONS AND KEY MEASURES Version 2.0.0 The Framework for Process Improvement Experience shows that benchmarking s potential to drive dramatic improvement

More information

STATEMENT ON RISK MANAGEMENT AND INTERNAL CONTROL

STATEMENT ON RISK MANAGEMENT AND INTERNAL CONTROL Governance Digi.Com Berhad Annual Report 2017 73 STATEMENT ON RISK MANAGEMENT AND INTERNAL CONTROL IN ACCORDANCE WITH PARAGRAPH 15.26 (b) OF THE MAIN MARKET LISTING REQUIREMENTS OF BURSA MALAYSIA SECURITIES

More information

Reduce The Risk (and get a better night s sleep):

Reduce The Risk (and get a better night s sleep): Reduce The Risk (and get a better night s sleep): Building a Solid IT Security Program Dave Burhop Deputy Commissioner/CIO Virginia Department of Motor Vehicles June 13, 2016 Program Components Where Do

More information

COBIT 5. COBIT 5 Online Collaborative Environment

COBIT 5. COBIT 5 Online Collaborative Environment COBIT 5 Product Family COBIT 5 Enabler Guides COBIT 5 COBIT 5: Enabling es COBIT 5: Enabling Information Other Enabler Guides COBIT 5 Professional Guides COBIT 5 Implementation COBIT 5 for Information

More information

1. Understanding Big Data. Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview

1. Understanding Big Data. Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. Understanding

More information

COBIT 5 for Information Security. Dr. Derek J. Oliver Co-Chair, COBIT 5 Task Force

COBIT 5 for Information Security. Dr. Derek J. Oliver Co-Chair, COBIT 5 Task Force COBIT 5 for Information Security Dr. Derek J. Oliver Co-Chair, COBIT 5 Task Force First, a bit of background Just to level the playing field COBIT 5 Objectives o ISACA Board of Directors: tie together

More information

International Standards for the Professional Practice of Internal Auditing (Standards)

International Standards for the Professional Practice of Internal Auditing (Standards) INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) Attribute Standards 1000 Purpose, Authority, and Responsibility The purpose, authority, and responsibility of the

More information

Table of Contents 1. What s New... 1

Table of Contents 1. What s New... 1 Table of Contents Business and IT Impact Analysis Questionnaire... Impact - Risk... Scoring... 2 Facility / Business Function / Application... 3 Mandated Requirement Compliance... 4 Compliance - System

More information

A COMPANION DOCUMENT TO THE GDPR READINESS DECISION TREE QUESTIONS AND ANALYSIS. April 19, 2017

A COMPANION DOCUMENT TO THE GDPR READINESS DECISION TREE QUESTIONS AND ANALYSIS. April 19, 2017 A COMPANION DOCUMENT TO THE GDPR READINESS DECISION TREE QUESTIONS AND ANALYSIS April 19, 2017 The General Data Protection Regulation (GDPR) represents perhaps the most sweeping changes to the protection

More information

Eclipx Group Limited Governance Framework. Date: 1 November Version: 1.3

Eclipx Group Limited Governance Framework. Date: 1 November Version: 1.3 Eclipx Group Limited Governance Framework Date: 1 November 2018 Version: 1.3 Table of Contents 1. Introduction and Principles... 3 2. Model and Functions... 3 Audit & Risk Committee... 3 Remuneration &

More information

IT and Security Governance. Jacqueline Johnson

IT and Security Governance. Jacqueline Johnson IT and Security Governance Jacqueline Johnson Background Control Objectives for Information and related Technology Developed by IT Governance Institute (ITGI) Not incremental High level standard 5 principles

More information

RECORDS MANAGEMENT GOVERNANCE IN 12 EASY STEPS A GUIDE CREATED BY

RECORDS MANAGEMENT GOVERNANCE IN 12 EASY STEPS A GUIDE CREATED BY RECORDS MANAGEMENT GOVERNANCE A GUIDE CREATED BY RECORDS MANAGEMENT GOVERNANCE RECORDS MANAGEMENT GOVERNANCE Not too long ago, records management was a primary concern for many organizations. A small event

More information

Financial Supply Chain Transactions: The Rising Importance of Information Protection and Secure Connectivity for Data Exchange

Financial Supply Chain Transactions: The Rising Importance of Information Protection and Secure Connectivity for Data Exchange Financial Supply Chain Transactions: The Rising Importance of Information Protection and Secure Connectivity for Data June 18, 2007 Rising Complexity of Financial Supply Chain Transactions and the Role

More information

This resource is associated with the following paper: Assessing the maturity of software testing services using CMMI-SVC: an industrial case study

This resource is associated with the following paper: Assessing the maturity of software testing services using CMMI-SVC: an industrial case study RESOURCE: MATURITY LEVELS OF THE CUSTOMIZED CMMI-SVC FOR TESTING SERVICES AND THEIR PROCESS AREAS This resource is associated with the following paper: Assessing the maturity of software testing services

More information

Treasury s Leading Role in Enterprise Risk Management

Treasury s Leading Role in Enterprise Risk Management Treasury s Leading Role in Enterprise Risk Management May 2015 Presented To Presented By Kevin Ruiz Principal 2015 Treasury Strategies, Inc. All rights reserved. Situation The Expanding Scope and Value

More information

SOLUTION BRIEF CA MANAGEMENT CLOUD FOR MOBILITY. Overview of CA Management Cloud for Mobility

SOLUTION BRIEF CA MANAGEMENT CLOUD FOR MOBILITY. Overview of CA Management Cloud for Mobility SOLUTION BRIEF CA MANAGEMENT CLOUD FOR MOBILITY Overview of CA Management Cloud for Mobility CA Management Cloud for Mobility from CA Technologies enables companies to create and manage their mobile environments,

More information

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 14 Project Management, Business Value, and Managing Change

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 14 Project Management, Business Value, and Managing Change Managing Information Systems Seventh Canadian Edition Laudon, Laudon and Brabston CHAPTER 14 Project Management, Business Value, and Managing Change Copyright 2015 Pearson Canada Inc. 14-1 Project Management

More information

Risk Management at Statistics Canada

Risk Management at Statistics Canada Risk Management at Statistics Canada Presentation to Workshop on Risk Management Practices in Statistical Organizations J. Mayda April 25 th, 2016 Introduction Statistics Canada has had a formal Integrated

More information

5 Core Must-Haves for Improved Internal Audit Performance. Copyright 2018 AuditBoard Inc. 1

5 Core Must-Haves for Improved Internal Audit Performance. Copyright 2018 AuditBoard Inc. 1 5 Core Must-Haves for Improved Internal Audit Performance Copyright 2018 AuditBoard Inc. 1 Introductions Built by experienced auditors, AuditBoard allows enterprises to collaborate, manage, analyze and

More information

RSA. Sustaining Trust in the Digital World. Gintaras Pelenis

RSA. Sustaining Trust in the Digital World. Gintaras Pelenis 1 RSA Sustaining Trust in the Digital World Gintaras Pelenis +370 698 75456 Gintaras.pelenis@emc.com 2 IN 2011 THE DIGITAL UNIVERSE WILL SURPASS 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 3 $ 4 5 Advanced

More information

Discovering the TAC 202 Information Security Standard

Discovering the TAC 202 Information Security Standard This PathMaker Group white paper describes the subject matter within the standard and purpose of each area of measurement. Ryker Exum Introduction The TAC 202 is a freely available security standards framework

More information

IT-28 Risk Mitigation Policy and Peer Review Process

IT-28 Risk Mitigation Policy and Peer Review Process IT-28 Risk Mitigation Policy and Peer Review Process Indiana University University Information Security Office September 12, 2017 Agenda For Today What is Policy IT-28? Policy Goals & Past Successes Leveraging

More information

GDPR is coming in 108 days: Are you ready?

GDPR is coming in 108 days: Are you ready? Charles-Albert Helleputte Partner, Brussels GDPR is coming in 108 days: Are you ready? Diletta De Cicco Legal Consultant, Brussels 6 February 2018 +32 2 551 5982 chelleputte@mayerbrown.com +32 2 551 5974

More information

LogLogic. Open Log Management. LogLogic LX and LogLogic ST for Enterprise. LogLogic LX Enterprise- Class Log Data Capture and Processing

LogLogic. Open Log Management. LogLogic LX and LogLogic ST for Enterprise. LogLogic LX Enterprise- Class Log Data Capture and Processing LogLogic Open Log Management LX and ST for Enterprise Driven by compliance, security, and limited personnel and budget, CIOs and IT departments are turning to the LogLogic Open Log Management solution

More information

Isaca Exam CISM Certified Information Security Manager Version: 6.1 [ Total Questions: 631 ]

Isaca Exam CISM Certified Information Security Manager Version: 6.1 [ Total Questions: 631 ] s@lm@n Isaca Exam CISM Certified Information Security Manager Version: 6.1 [ Total Questions: 631 ] Topic break down Topic Topic 1: INFORMATION SECURITY GOVERNANCE Topic 2: INFORMATION RISK MANAGEMENT

More information

A Practical and Effective Approach to Risk Assessment

A Practical and Effective Approach to Risk Assessment A Practical and Effective Approach to Risk Assessment IT Risk Assessment Case Study Portions of this presentation are from a 2007 & 2008 FFIEC Technology Conference presentation to bank examiners. Special

More information

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 2 How Businesses Use Information Systems

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 2 How Businesses Use Information Systems Managing Information Systems Seventh Canadian Edition Laudon, Laudon and Brabston CHAPTER 2 How Businesses Use Information Systems Copyright 2015 Pearson Canada Inc. 2-1 Business Processes and Information

More information

East Riding of Yorkshire Council Data protection audit report. Executive summary March 2014

East Riding of Yorkshire Council Data protection audit report. Executive summary March 2014 East Riding of Yorkshire Council Data protection audit report Executive summary March 2014 1. Background The Information Commissioner is responsible for enforcing and promoting compliance with the Data

More information

ASSESSMENT AND EVALUATION OF THE CITY OF PHILADELPHIA S INFORMATION TECHNOLOGY GENERAL CONTROLS FISCAL 2016

ASSESSMENT AND EVALUATION OF THE CITY OF PHILADELPHIA S INFORMATION TECHNOLOGY GENERAL CONTROLS FISCAL 2016 ASSESSMENT AND EVALUATION OF THE CITY OF PHILADELPHIA S INFORMATION TECHNOLOGY GENERAL CONTROLS FISCAL 2016 Charles J. Brennan Chief Information Officer Office of Innovation and Technology 1234 Market

More information

DFAST Stress Testing Conference Developing an Effective DFAST Audit Program October 28, :00 A.M.

DFAST Stress Testing Conference Developing an Effective DFAST Audit Program October 28, :00 A.M. DFAST Stress Testing Conference Developing an Effective DFAST Audit Program October 28, 2015 11:00 A.M. Introduction Michael Glotz, CRP Founding Partner of Strategic Risk Associates Strategic Risk Associates

More information

Why CIP? AIIM International's Certified Information Professional designation was designed to allow information professionals to:

Why CIP? AIIM International's Certified Information Professional designation was designed to allow information professionals to: Why CIP? Over the past decade, there has been a perfect storm of change driven by consumerization, cloud, mobile, and the Internet of Things. It has changed how we think about enterprise information and

More information

Topics and Trends. A presentation by Vonya Global Vonya Global LLC Duplication without written consent from Vonya Global is not permitted.

Topics and Trends. A presentation by Vonya Global Vonya Global LLC Duplication without written consent from Vonya Global is not permitted. Topics and Trends A presentation by Vonya Global Presenter Steve Randall Partner Vonya Global Internal Audit co-sourcing and outsourcing firm based in Chicago with international capabilities, representation

More information

These guidelines describe how Hamilton College approaches the development, measurement and management of information security. Version 3.03.

These guidelines describe how Hamilton College approaches the development, measurement and management of information security. Version 3.03. These guidelines describe how Hamilton College approaches the development, measurement and management of information security. Version 3.03 Page 1 1. Introduction 4 1.1 Overview 4 1.2 The Information Security

More information

Data rich governance. Three keys to leading consumer data and information practices. kpmg.com

Data rich governance. Three keys to leading consumer data and information practices. kpmg.com Data rich governance Three keys to leading consumer data and information practices kpmg.com 2018 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent

More information

International Standard on Auditing (Ireland) 500 Audit Evidence

International Standard on Auditing (Ireland) 500 Audit Evidence International Standard on Auditing (Ireland) 500 Audit Evidence MISSION To contribute to Ireland having a strong regulatory environment in which to do business by supervising and promoting high quality

More information

Treasury and Risk- Vision 2009 March 25 th, 2009 Michele L. Turner- Sr. Manager Operations Enterprise Risk Management (OERM)

Treasury and Risk- Vision 2009 March 25 th, 2009 Michele L. Turner- Sr. Manager Operations Enterprise Risk Management (OERM) Treasury and Risk- Vision 2009 March 25 th, 2009 Michele L. Turner- Sr. Manager Operations Enterprise Risk Management (OERM) Microsoft Mission: At Microsoft, our mission and values are to help people and

More information

IT risks and controls

IT risks and controls Università degli Studi di Roma "Tor Vergata" Master of Science in Business Administration Business Auditing Course IT risks and controls October 2017 Agenda I IT GOVERNANCE IT evolution, objectives, roles

More information

ISACA CRISC. Certified in Risk and Information Systems Control. Download Full Version :

ISACA CRISC. Certified in Risk and Information Systems Control. Download Full Version : ISACA CRISC Certified in Risk and Information Systems Control Download Full Version : http://killexams.com/pass4sure/exam-detail/crisc QUESTION: 391 Jane, the Director of Sales, contacts you and demands

More information

Business Decision Management Business Decision Maturity Model BDMM

Business Decision Management Business Decision Maturity Model BDMM member of Business Decision Management Knut Hinkelmann Business Process Management Business Decision Management Knowledge Management Business Process Management Management of Process Logic Management of

More information

Enterprise Risk Management (ERM) How Internal Audit Can Add Great Value

Enterprise Risk Management (ERM) How Internal Audit Can Add Great Value ASSOCIATION OF HEALTHCARE INTERNAL AUDITORS 2009 ANNUAL CONFERENCE Charting a Course for Excellence Enterprise Risk Management (ERM) How Internal Audit Can Add Great Value to Your Organization s ERM Process

More information

Evolving Core Tasks for Improved Internal Audit Performance. Copyright 2018 AuditBoard Inc. 1

Evolving Core Tasks for Improved Internal Audit Performance. Copyright 2018 AuditBoard Inc. 1 Evolving Core Tasks for Improved Internal Audit Performance Copyright 2018 AuditBoard Inc. 1 Introductions Built by experienced auditors, AuditBoard allows enterprises to collaborate, manage, analyze and

More information

PeopleSoft Project Costing Rel 9.2

PeopleSoft Project Costing Rel 9.2 Oracle University Contact Us: +966 1 1 2739 894 PeopleSoft Project Costing Rel 9.2 Duration: 5 Days What you will learn The Project Costing course covers the features, functions, and processes supported

More information

Developing the IT Audit Plan

Developing the IT Audit Plan Developing the IT Audit Plan Global Technology Audit Guide (GTAG) Written in straightforward business language to address a timely issue related to IT management, control, and security, the GTAG series

More information

Enhancing frameworks in the standardised approach to operational risk policies and documentation

Enhancing frameworks in the standardised approach to operational risk policies and documentation Financial Services Authority Guidance consultation Enhancing frameworks in the standardised approach to operational risk policies and documentation July 2011 5. OR policies and documentation Introduction

More information

Business Decision Maturity Model BDMM

Business Decision Maturity Model BDMM Business Decision Maturity Model BDMM Knut Hinkelmann Business Decision Maturity Model BDMM 1 Business Processes and Business Decisions Quality of business processes depends on quality of decisions Decision

More information

International Standards for the Professional Practice of Internal Auditing (Standards)

International Standards for the Professional Practice of Internal Auditing (Standards) Attribute Standards 1000 Purpose, Authority, and Responsibility The purpose, authority, and responsibility of the internal audit activity must be formally defined in an internal audit charter, consistent

More information

GRM OVERSEAS LIMITED RISK MANAGEMENT POLICY

GRM OVERSEAS LIMITED RISK MANAGEMENT POLICY GRM OVERSEAS LIMITED RISK MANAGEMENT POLICY As approved by the Board of Directors at their meeting held on 11.11.2014. 1 P a g e Contents 1. Risk Management...3 2. Policy...3 3. Risk Management Philosophy...3

More information

GENERAL GUIDANCE NOTE Summary of King IV Disclosure Requirements

GENERAL GUIDANCE NOTE Summary of King IV Disclosure Requirements GENERAL GUIDANCE NOTE Summary of King IV Disclosure Requirements IoDSA, All rights reserved The following text have been directly extracted from the King IV Report on Corporate Governance for South Africa

More information