• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
How to Audit Your Incident Response Plan
 

How to Audit Your Incident Response Plan

on

  • 1,190 views

IT has deployed the appropriate security controls. You've updated your policies and procedures and raised awareness. And you've got your incident response plan in place. What could possibly go wrong? ...

IT has deployed the appropriate security controls. You've updated your policies and procedures and raised awareness. And you've got your incident response plan in place. What could possibly go wrong? The answer is: the plan itself. All the planning and preparation in the world won't protect your business from a data breach if the response plan doesn't work. It's necessary to ensure that your response plan stays current and functional.
This webinar will provide a checklist of items to review when auditing your response plan. It will also review how often you should audit, test, and update your plan.

Statistics

Views

Total Views
1,190
Views on SlideShare
1,190
Embed Views
0

Actions

Likes
0
Downloads
42
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    How to Audit Your Incident Response Plan How to Audit Your Incident Response Plan Presentation Transcript

    • How To Audit YourIncident Response Plan
    • Agenda• Introductions• Incident Response Plans• Audit Checklist• Q&A Page 2
    • Introductions: Today‟s Speakers• Ted Julian - Chief Marketing Officer, Co3 • Security / Compliance entrepreneur • Security industry analyst• Michael Bruemmer – Vice President, Experian® Data Breach Resolution • CIPP/US, CHC • IAPP Certification Advisory Board Page 3
    • Co3 Automates Breach ManagementPREPARE ASSESSImprove Organizational Quantify PotentialReadiness Impact, Support Privacy• Assign response team Impact Assessments• Describe environment • Track events• Simulate events and incidents • Scope regulatory requirements• Focus on organizational gaps • See $ exposure • Send notice to team • Generate Impact AssessmentsREPORT MANAGEDocument Results and Easily Generate DetailedTrack Performance Incident Response Plans• Document incident results • Escalate to complete IR plan• Track historical performance • Oversee the complete plan• Demonstrate organizational • Assign tasks: who/what/when preparedness • Notify regulators and clients• Generate audit/compliance reports • Monitor progress to completion Page 4
    • Experian® Data Breach Resolution Pre-Breach Risk Forensics Assessment Breach Response & Fraud Resolution • Inventory of • Preservation of Systems evidence • Incident Management • Threat and • Reconstruction of vulnerability data sources • Notification assessment • Forensic analysis • Call Center of preserved or • Evolution of Support reconstructed controls data sources • Identity Theft • Risk Ranking • Searches for Protection suspected kinds • Fraud Resolution • Communicating of PII and Monitoring • Aggregation of • Reporting identified PII Page 5
    • Incident Response Plan• Crucial to have in place• Streamlines the process• What to Include: • The Team and Responsibilities • Testing / Fire drills • Third Party Support • Outside counsel • Compliance • Forensics • Data Breach Resolution Vendor Page 6
    • Why Auditing Your IR Plan Is A Must• Ensures you have accurate, up-to-date information• Allows the process to be refined• Identifies errors in advance• Ensures everything in order before a breach occurs• Doesn‟t cut into crucial response time post-breach Page 7
    • 7 Checklist Items To Keep In Mind• Update your internal contact list• Verify that your plan is comprehensive• Double check your vendor contracts• Review notification guidelines(State and Federal)• Check up on third parties that have access to your data• Evaluate IT security• Review staff security awareness Page 8
    • Update Your Contact List• Make sure the contact info for each member is up-to-date • Internal • External• Note department heads• People are 100% committed during a breach• Re-distribute list once updated Page 9
    • Verify That Your Plan Is Comprehensive• Plan Revisions • Major company changes • New departments • Data management policy adjustments• Ensure Departments Know Their Roles• Fire Drillls / Rehearsals Page 10
    • Double Check Your Vendor Contracts• Forensics Team• Attorneys• Data Breach Resolution Provider• Law Enforcement• Current / Accessible• Ensure They Still Match Your Needs Page 11
    • Review Notification Guidelines• Ensure your plan reflects the latest state legislation• Notification letter templates address new laws• Update contact list • State AGs • Government Agencies • Media• Healthcare Providers: DHHS and OCR contacts• Response team should understand reporting procedures Page 12
    • Check On 3rd Parties With Access To Your Data• Are they following your protection rules?• Educate them on any new relevant legislation• Stress the importance of immediate notification• Go over the resolution process• Healthcare companies: HIPAA requirements • Establish Business Associate Agreements (BAAs) Page 13
    • Evaluate IT Security• Re-evaluate where sensitive / regulated data is stored• Ensure proper access controls are in place• Check that software and system updates are installed• Verify that monitoring / reporting systems are working and up-to-date• Ensure back-ups are securely stored Page 14
    • Review Staff Security Awareness• Are Initial Background Checks valid? Random updates?• Regular employee Security Awareness Training• Practice and audit proper information disposal(hard & soft)• Train staff to identify cyber threats• Require password changes every three months• Physical security for all devices Page 15
    • POLL
    • How Often You Should Audit?• HCCA recommends regular monitoring where PHI handled• Monitoring is part of any risk assessment plan• Audit when objective results needed and integrity is critical• Independent (outside) audits provide the best perspective• OIG - „annual audit to minimize risk‟ Page 17
    • POLL
    • When Should You Update Your Response Plan?• When new legislation passes (state, federal, and industry regulators)• When response team members leave the company• When new vendors join the process• When new security procedures are implemented Page 19
    • QUESTIONS
    • “Co3 Systems makes the process of planning for a nightmare scenario as painless as possible, making it an Editors‟ Choice.” PC MAGAZINE, EDITOR’S CHOICEOne Alewife Center, Suite 450 “Co3…defines what software packagesCambridge, MA 02140 for privacy look like.”PHONE 617.206.3900 GARTNERWWW.CO3SYS.COM “Platform is comprehensive, user friendly, and very well designed.” PONEMON INSTITUTE Michael Bruemmer, Vice President, Experian® Data Breach Resolution Michael.Bruemmer@Experian.com www.Experian.com/DataBreach Blog: www.Experian.com/DBBlog