SlideShare a Scribd company logo
1 of 23
Creating a Compliance
Assessment Program on a
Tight Budget
ASHLEY DEUBLE
Why Do We Need A Compliance
Program
 We spend time and money creating all these policies – is the
business adhering to them?
 Are our critical assets actually being protected as we had originally
planned?
 Are there certain regulatory requirements that you must meet?
 Do we need to make the business aware of their responsibilities in
regards to information security?
The Basic Roadmap
 Create policies, procedure, standards, controls & guidelines
 Socialise these with the business
 Create a compliance assessment in alignment with your
policies/standards/controls etc.
 Review the adherence to the policies
 Create a report and present findings back to the business
 Deal with risks and issues (accept, remediate, insure etc.)
 Review and mature the process
Preparation – Create Policies,
Procedures, Standards & Guidelines
 Create Policies, Standards, Procedures & Guidelines (links to generic
template policies are at the end of the presentation)
 Talk to all parties that the policies may impact (e.g. HR, Legal etc.)
 Get policies approved by the Board or appropriate senior
management/representative
 Notify the general business of the new policies and their
responsibilities (possibly run some targeted sessions on business units
that are more heavily impacted).
Preparation – Example Policy
Preparation – Comply/Non-Comply
 This is a compliance assessment – we want compliant/non-
compliant responses (yes or no).
 We want to be able to determine specific policy areas
where the business has deficiencies.
Preparation – What About Partial
Compliance?
 Partial compliance can be a sliding scale
 Where does someone become non-compliant?
 Is someone truly compliant if they are only partially compliant?
 Provide notes in report to say that even though the business is non-
compliant, they are doing certain actions to provide some form of
compliance. The work needed to get them to be compliant may be
minimal. This may also reduce the level of the finding.
Preparation – Consider The Maturity
Level Of The Assessment Process
 Start with a process that your assessment team can handle
 Think about skill levels of staff here
 Either skill them up, or make the process simpler
 Does the process need to be completed by non security or IT staff at
remote locations?
 Mature and grow the process as the assessment teams get used to
the process (take them on a learning journey).
 Know what your end goal for the process is, and work towards it.
Preparation – Consider Who/What
to Assess (Scope)
 Determine the scope of your assessment.
 Are you going to assess a facility, a business unit, a process, etc.?
 Do you want to assess local staff processes against what remote
managers think are happening (could be very different results)?
 Is this a part of a larger audit body of work?
Preparation – Consider How Will We
Assess
 On-site with security staff
 Remote interviews conducted by security staff via phone or video
conference
 On-site personnel performing the assessment on behalf of the
security staff
 Self survey by the business
Assessment – Create A Process
Flow
 Map out the process flow
 Sit down and run some tabletop exercises to check for
completeness
 Make sure you can tie into any additional process that you may
need (e.g. Risk Acceptance)
 Consider running a pilot assessment to test suitability
Assessment – Process Flow Example
Assessment – The Assessment Form
 Determine what elements you need so that you can assess the
subject and then report on them accurately?
 Examples
 Policy question/statement
 Rating of importance/criticality
 Are they compliant?
 Who did you ask
 Notes?
Assessment – Assessment Question
Example
 Example policy statement (AUP)
 <Company Name> proprietary information stored on electronic and
computing devices whether owned or leased by <Company Name>,
the employee or a third party, remains the sole property of <Company
Name>. You must ensure through legal or technical means that
proprietary information is protected in accordance with the Data
Protection Standard.
 Example Compliance question
 Is proprietary information protected in accordance with the "Data
Protection Standard" on all electronic and computing devices (whether
owned or leased by <Company>, employees or a third party)?
Assessment – The Assessment Form
(example)
 Use the category and policy
statement number as a
reference when writing your
report
 Add any non-compliant
findings to your report as an
issue
Assessment – Creating the Report
 Use a similar format to other reports in your organisation
 Make sure to include
 Executive summary
 Issues overview
 Detailed issues
 Recommendations
 Document control
Assessment – Reviewing the Report
 Always read the report to yourself before you send it to anyone to
review (you’ll find the majority of the mistakes before anyone else)
 Review amongst team members (peer review)
 Always keep track of any changes/amendments
 Seek management approval prior to sending to client
Assessment – Storing the
Data/Evidence
 ENCRYPT! ENCRYPT! ENCRYPT! (have a password safe – just in case)
 Create an encryption procedure to provide to the client if you
require them to send you any items of evidence.
 Use a file and folder naming system
 Keep one central “safe source” repository
Assessment – Reporting Findings
 Conduct a meeting with management to discuss high level findings
 Get their buy-in for remediation activities
 Conduct a meeting with technical staff to discuss detailed findings
 Explain the issues and provide recommendations to remediate
 Conduct a final close out meeting with all involved in the
assessment to ensure they are aware of the issues and willing to
remediate them
Improving the Program – Review
Cycles/Maturing the Process
 How often should the process be reviewed (quarterly, yearly etc.)?
 What should be reviewed?
 Should you have an “improvement team”
 How do you communicate your changes? Will it require additional
training?
 Are you moving towards your end goal?
Improving the Program – GRC Tools
 Excel isn’t the best tool for running a compliance program – but the
majority of us will have it as a standard application on our SOE.
 Create your own tool (Sharepoint etc.)?
 Purchase a commercial tool (Archer etc.)?
Resources – Policies, Standards,
Procedures & Guidelines
 SANS - http://www.sans.org/security-resources/policies/
 InstantSecurityPolicy - https://www.instantsecuritypolicy.com
 Information Sheild - http://www.informationshield.com/info-security-
policy.html
 ISO27001Security - http://www.iso27001security.com/
 ISO27001templates - http://www.iso27001templates.com/
 Beaker’s Policy Template -
http://www.packetfilter.com/InfoSec_Policy-ISO17799.doc
Questions?
 @ashd_au
 Linkedin.com/in/ashleydeuble

More Related Content

What's hot

Practical approach to Risk Based Internal Audit
Practical approach to Risk Based Internal AuditPractical approach to Risk Based Internal Audit
Practical approach to Risk Based Internal AuditManoj Agarwal
 
Audit & Compliance Presentation
Audit & Compliance PresentationAudit & Compliance Presentation
Audit & Compliance PresentationJo Heighway
 
Financial controls for Businesses
Financial controls for BusinessesFinancial controls for Businesses
Financial controls for BusinessesGeorge Varghese
 
11. materiality and audit risk
11. materiality and audit risk11. materiality and audit risk
11. materiality and audit riskSyed Osama Rizvi
 
Risk Based Quality Management System Auditing
Risk Based Quality Management System AuditingRisk Based Quality Management System Auditing
Risk Based Quality Management System AuditingAQSS-USA
 
Operational Risk Management for practitioners v1.0
Operational Risk Management for practitioners v1.0Operational Risk Management for practitioners v1.0
Operational Risk Management for practitioners v1.0Ignacio Reclusa
 
Key considerations for your internal audit plan
Key considerations for your internal audit planKey considerations for your internal audit plan
Key considerations for your internal audit planessbaih
 
Standards of Internal Audit
Standards of Internal AuditStandards of Internal Audit
Standards of Internal AuditKaran Puri
 
Application Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 FinalApplication Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 FinalManoj Agarwal
 
02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIABCM Institute
 
Third Party Vendor Contract – Risk Management
Third Party Vendor Contract – Risk ManagementThird Party Vendor Contract – Risk Management
Third Party Vendor Contract – Risk ManagementElizabeth Baker, JD, CRCMP
 
The role of ia in erm process
The role of ia in erm processThe role of ia in erm process
The role of ia in erm processSALIH AHMED ISLAM
 

What's hot (19)

Managing Regulatory Compliance
Managing Regulatory ComplianceManaging Regulatory Compliance
Managing Regulatory Compliance
 
Practical approach to Risk Based Internal Audit
Practical approach to Risk Based Internal AuditPractical approach to Risk Based Internal Audit
Practical approach to Risk Based Internal Audit
 
Audit & Compliance Presentation
Audit & Compliance PresentationAudit & Compliance Presentation
Audit & Compliance Presentation
 
Financial controls for Businesses
Financial controls for BusinessesFinancial controls for Businesses
Financial controls for Businesses
 
11. materiality and audit risk
11. materiality and audit risk11. materiality and audit risk
11. materiality and audit risk
 
Risk Based Quality Management System Auditing
Risk Based Quality Management System AuditingRisk Based Quality Management System Auditing
Risk Based Quality Management System Auditing
 
Operational Risk Management for practitioners v1.0
Operational Risk Management for practitioners v1.0Operational Risk Management for practitioners v1.0
Operational Risk Management for practitioners v1.0
 
BSA/AML in the USA and AML/CTF in the Caymans
BSA/AML in the USA and AML/CTF in the CaymansBSA/AML in the USA and AML/CTF in the Caymans
BSA/AML in the USA and AML/CTF in the Caymans
 
Key considerations for your internal audit plan
Key considerations for your internal audit planKey considerations for your internal audit plan
Key considerations for your internal audit plan
 
Audit & compliance
Audit & complianceAudit & compliance
Audit & compliance
 
Internal audit
Internal auditInternal audit
Internal audit
 
Audit Risk Assessment Chapter 9
Audit Risk Assessment Chapter 9Audit Risk Assessment Chapter 9
Audit Risk Assessment Chapter 9
 
Solis Invicti Consultancy Pvt Ltd
Solis Invicti Consultancy Pvt LtdSolis Invicti Consultancy Pvt Ltd
Solis Invicti Consultancy Pvt Ltd
 
Standards of Internal Audit
Standards of Internal AuditStandards of Internal Audit
Standards of Internal Audit
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Application Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 FinalApplication Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 Final
 
02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA
 
Third Party Vendor Contract – Risk Management
Third Party Vendor Contract – Risk ManagementThird Party Vendor Contract – Risk Management
Third Party Vendor Contract – Risk Management
 
The role of ia in erm process
The role of ia in erm processThe role of ia in erm process
The role of ia in erm process
 

Viewers also liked

Risk assessment for_small_business_-_be_smart
Risk assessment for_small_business_-_be_smartRisk assessment for_small_business_-_be_smart
Risk assessment for_small_business_-_be_smartRana Daniyal
 
Electronic Compliance Monitoring
Electronic Compliance MonitoringElectronic Compliance Monitoring
Electronic Compliance Monitoringwardsmith66
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016Ashley Deuble
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Scce webinar assessment_061316
Scce webinar assessment_061316Scce webinar assessment_061316
Scce webinar assessment_061316Eric Morehead
 
LT-Innovate OSCAR Open Standards Compliance Assessment Report Project
LT-Innovate OSCAROpen Standards Compliance Assessment Report ProjectLT-Innovate OSCAROpen Standards Compliance Assessment Report Project
LT-Innovate OSCAR Open Standards Compliance Assessment Report ProjectSerge Gladkoff
 
Regulatory Change Management
Regulatory Change ManagementRegulatory Change Management
Regulatory Change Management360factors
 
Compliance Effectiveness Assessments
Compliance Effectiveness AssessmentsCompliance Effectiveness Assessments
Compliance Effectiveness AssessmentsPYA, P.C.
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA ComplianceRaffa Learning Community
 

Viewers also liked (13)

Risk assessment for_small_business_-_be_smart
Risk assessment for_small_business_-_be_smartRisk assessment for_small_business_-_be_smart
Risk assessment for_small_business_-_be_smart
 
Compliance Risk Assessment
Compliance Risk AssessmentCompliance Risk Assessment
Compliance Risk Assessment
 
Control Freak Ver 1.0
Control Freak Ver 1.0Control Freak Ver 1.0
Control Freak Ver 1.0
 
Electronic Compliance Monitoring
Electronic Compliance MonitoringElectronic Compliance Monitoring
Electronic Compliance Monitoring
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016
 
Security Essentials
Security EssentialsSecurity Essentials
Security Essentials
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
Scce webinar assessment_061316
Scce webinar assessment_061316Scce webinar assessment_061316
Scce webinar assessment_061316
 
LT-Innovate OSCAR Open Standards Compliance Assessment Report Project
LT-Innovate OSCAROpen Standards Compliance Assessment Report ProjectLT-Innovate OSCAROpen Standards Compliance Assessment Report Project
LT-Innovate OSCAR Open Standards Compliance Assessment Report Project
 
Regulatory Change Management
Regulatory Change ManagementRegulatory Change Management
Regulatory Change Management
 
Human Rights Compliance Assessment Presentation
Human Rights Compliance Assessment PresentationHuman Rights Compliance Assessment Presentation
Human Rights Compliance Assessment Presentation
 
Compliance Effectiveness Assessments
Compliance Effectiveness AssessmentsCompliance Effectiveness Assessments
Compliance Effectiveness Assessments
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 

Similar to Creating a compliance assessment program on a tight budget

Business Process Improvement
Business Process ImprovementBusiness Process Improvement
Business Process ImprovementAnand Subramaniam
 
Asq toronto10 jan2007effectcorraction
Asq toronto10 jan2007effectcorractionAsq toronto10 jan2007effectcorraction
Asq toronto10 jan2007effectcorractionOmnex Inc.
 
Business Process Management
Business Process ManagementBusiness Process Management
Business Process ManagementAmin Kazemi
 
Lean Thinking Inside and Outside a Software Engineering Company (Dave Jackson)
Lean Thinking Inside and Outside a Software Engineering Company (Dave Jackson)Lean Thinking Inside and Outside a Software Engineering Company (Dave Jackson)
Lean Thinking Inside and Outside a Software Engineering Company (Dave Jackson)AdaCore
 
2009 04 21 Ntihi Faculty Course 110
2009 04 21 Ntihi Faculty Course 1102009 04 21 Ntihi Faculty Course 110
2009 04 21 Ntihi Faculty Course 110tmdonoesq
 
Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...
Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...
Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...Audrey Reynolds
 
Lean Agile Metrics And KPIs
Lean Agile Metrics And KPIsLean Agile Metrics And KPIs
Lean Agile Metrics And KPIsYuval Yeret
 
How to be a consultant and run a successful assignment
How to be a consultant and run a successful assignmentHow to be a consultant and run a successful assignment
How to be a consultant and run a successful assignment1STOUTSOURCE LTD
 
Section b
Section bSection b
Section bPCTE
 
The case for continuous delivery
The case for continuous deliveryThe case for continuous delivery
The case for continuous deliveryCodecamp Romania
 
The case for continuous delivery
The case for continuous deliveryThe case for continuous delivery
The case for continuous deliveryCodecamp Romania
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Lean Transformation ~ A Journey
Lean Transformation ~ A JourneyLean Transformation ~ A Journey
Lean Transformation ~ A JourneyAnand Subramaniam
 
Quality Course 1
Quality Course 1Quality Course 1
Quality Course 1Fin1
 
Conducting Kaizen Events
Conducting Kaizen EventsConducting Kaizen Events
Conducting Kaizen EventsStephen Depoe
 
Beyond a TM1 Project - Building a sustainable solution and competency for you...
Beyond a TM1 Project - Building a sustainable solution and competency for you...Beyond a TM1 Project - Building a sustainable solution and competency for you...
Beyond a TM1 Project - Building a sustainable solution and competency for you...Ambrus Vancso
 
Simple Lean Agile KPIs
Simple Lean Agile KPIsSimple Lean Agile KPIs
Simple Lean Agile KPIsYuval Yeret
 

Similar to Creating a compliance assessment program on a tight budget (20)

Business Process Improvement
Business Process ImprovementBusiness Process Improvement
Business Process Improvement
 
Erp (Re) Implementation
Erp (Re) ImplementationErp (Re) Implementation
Erp (Re) Implementation
 
Asq toronto10 jan2007effectcorraction
Asq toronto10 jan2007effectcorractionAsq toronto10 jan2007effectcorraction
Asq toronto10 jan2007effectcorraction
 
Business Process Management
Business Process ManagementBusiness Process Management
Business Process Management
 
Lean Thinking Inside and Outside a Software Engineering Company (Dave Jackson)
Lean Thinking Inside and Outside a Software Engineering Company (Dave Jackson)Lean Thinking Inside and Outside a Software Engineering Company (Dave Jackson)
Lean Thinking Inside and Outside a Software Engineering Company (Dave Jackson)
 
2009 04 21 Ntihi Faculty Course 110
2009 04 21 Ntihi Faculty Course 1102009 04 21 Ntihi Faculty Course 110
2009 04 21 Ntihi Faculty Course 110
 
Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...
Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...
Making IT Work for Your Business - 4 Key Concepts to Get the Most Out of Your...
 
Lean Agile Metrics And KPIs
Lean Agile Metrics And KPIsLean Agile Metrics And KPIs
Lean Agile Metrics And KPIs
 
Best practices in ERP solutions
Best practices in ERP solutionsBest practices in ERP solutions
Best practices in ERP solutions
 
How to be a consultant and run a successful assignment
How to be a consultant and run a successful assignmentHow to be a consultant and run a successful assignment
How to be a consultant and run a successful assignment
 
Section b
Section bSection b
Section b
 
The case for continuous delivery
The case for continuous deliveryThe case for continuous delivery
The case for continuous delivery
 
The case for continuous delivery
The case for continuous deliveryThe case for continuous delivery
The case for continuous delivery
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Osha Manager Role
Osha Manager RoleOsha Manager Role
Osha Manager Role
 
Lean Transformation ~ A Journey
Lean Transformation ~ A JourneyLean Transformation ~ A Journey
Lean Transformation ~ A Journey
 
Quality Course 1
Quality Course 1Quality Course 1
Quality Course 1
 
Conducting Kaizen Events
Conducting Kaizen EventsConducting Kaizen Events
Conducting Kaizen Events
 
Beyond a TM1 Project - Building a sustainable solution and competency for you...
Beyond a TM1 Project - Building a sustainable solution and competency for you...Beyond a TM1 Project - Building a sustainable solution and competency for you...
Beyond a TM1 Project - Building a sustainable solution and competency for you...
 
Simple Lean Agile KPIs
Simple Lean Agile KPIsSimple Lean Agile KPIs
Simple Lean Agile KPIs
 

Recently uploaded

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Recently uploaded (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Creating a compliance assessment program on a tight budget

  • 1. Creating a Compliance Assessment Program on a Tight Budget ASHLEY DEUBLE
  • 2. Why Do We Need A Compliance Program  We spend time and money creating all these policies – is the business adhering to them?  Are our critical assets actually being protected as we had originally planned?  Are there certain regulatory requirements that you must meet?  Do we need to make the business aware of their responsibilities in regards to information security?
  • 3. The Basic Roadmap  Create policies, procedure, standards, controls & guidelines  Socialise these with the business  Create a compliance assessment in alignment with your policies/standards/controls etc.  Review the adherence to the policies  Create a report and present findings back to the business  Deal with risks and issues (accept, remediate, insure etc.)  Review and mature the process
  • 4. Preparation – Create Policies, Procedures, Standards & Guidelines  Create Policies, Standards, Procedures & Guidelines (links to generic template policies are at the end of the presentation)  Talk to all parties that the policies may impact (e.g. HR, Legal etc.)  Get policies approved by the Board or appropriate senior management/representative  Notify the general business of the new policies and their responsibilities (possibly run some targeted sessions on business units that are more heavily impacted).
  • 6. Preparation – Comply/Non-Comply  This is a compliance assessment – we want compliant/non- compliant responses (yes or no).  We want to be able to determine specific policy areas where the business has deficiencies.
  • 7. Preparation – What About Partial Compliance?  Partial compliance can be a sliding scale  Where does someone become non-compliant?  Is someone truly compliant if they are only partially compliant?  Provide notes in report to say that even though the business is non- compliant, they are doing certain actions to provide some form of compliance. The work needed to get them to be compliant may be minimal. This may also reduce the level of the finding.
  • 8. Preparation – Consider The Maturity Level Of The Assessment Process  Start with a process that your assessment team can handle  Think about skill levels of staff here  Either skill them up, or make the process simpler  Does the process need to be completed by non security or IT staff at remote locations?  Mature and grow the process as the assessment teams get used to the process (take them on a learning journey).  Know what your end goal for the process is, and work towards it.
  • 9. Preparation – Consider Who/What to Assess (Scope)  Determine the scope of your assessment.  Are you going to assess a facility, a business unit, a process, etc.?  Do you want to assess local staff processes against what remote managers think are happening (could be very different results)?  Is this a part of a larger audit body of work?
  • 10. Preparation – Consider How Will We Assess  On-site with security staff  Remote interviews conducted by security staff via phone or video conference  On-site personnel performing the assessment on behalf of the security staff  Self survey by the business
  • 11. Assessment – Create A Process Flow  Map out the process flow  Sit down and run some tabletop exercises to check for completeness  Make sure you can tie into any additional process that you may need (e.g. Risk Acceptance)  Consider running a pilot assessment to test suitability
  • 12. Assessment – Process Flow Example
  • 13. Assessment – The Assessment Form  Determine what elements you need so that you can assess the subject and then report on them accurately?  Examples  Policy question/statement  Rating of importance/criticality  Are they compliant?  Who did you ask  Notes?
  • 14. Assessment – Assessment Question Example  Example policy statement (AUP)  <Company Name> proprietary information stored on electronic and computing devices whether owned or leased by <Company Name>, the employee or a third party, remains the sole property of <Company Name>. You must ensure through legal or technical means that proprietary information is protected in accordance with the Data Protection Standard.  Example Compliance question  Is proprietary information protected in accordance with the "Data Protection Standard" on all electronic and computing devices (whether owned or leased by <Company>, employees or a third party)?
  • 15. Assessment – The Assessment Form (example)  Use the category and policy statement number as a reference when writing your report  Add any non-compliant findings to your report as an issue
  • 16. Assessment – Creating the Report  Use a similar format to other reports in your organisation  Make sure to include  Executive summary  Issues overview  Detailed issues  Recommendations  Document control
  • 17. Assessment – Reviewing the Report  Always read the report to yourself before you send it to anyone to review (you’ll find the majority of the mistakes before anyone else)  Review amongst team members (peer review)  Always keep track of any changes/amendments  Seek management approval prior to sending to client
  • 18. Assessment – Storing the Data/Evidence  ENCRYPT! ENCRYPT! ENCRYPT! (have a password safe – just in case)  Create an encryption procedure to provide to the client if you require them to send you any items of evidence.  Use a file and folder naming system  Keep one central “safe source” repository
  • 19. Assessment – Reporting Findings  Conduct a meeting with management to discuss high level findings  Get their buy-in for remediation activities  Conduct a meeting with technical staff to discuss detailed findings  Explain the issues and provide recommendations to remediate  Conduct a final close out meeting with all involved in the assessment to ensure they are aware of the issues and willing to remediate them
  • 20. Improving the Program – Review Cycles/Maturing the Process  How often should the process be reviewed (quarterly, yearly etc.)?  What should be reviewed?  Should you have an “improvement team”  How do you communicate your changes? Will it require additional training?  Are you moving towards your end goal?
  • 21. Improving the Program – GRC Tools  Excel isn’t the best tool for running a compliance program – but the majority of us will have it as a standard application on our SOE.  Create your own tool (Sharepoint etc.)?  Purchase a commercial tool (Archer etc.)?
  • 22. Resources – Policies, Standards, Procedures & Guidelines  SANS - http://www.sans.org/security-resources/policies/  InstantSecurityPolicy - https://www.instantsecuritypolicy.com  Information Sheild - http://www.informationshield.com/info-security- policy.html  ISO27001Security - http://www.iso27001security.com/  ISO27001templates - http://www.iso27001templates.com/  Beaker’s Policy Template - http://www.packetfilter.com/InfoSec_Policy-ISO17799.doc

Editor's Notes

  1. For many places the term “tight budget” means no budget .. Or a BAU activity
  2. MAYBE REMOVE AND CHANGE TO HAVE DELIVERABLES FOR THE PRESENTATION?
  3. Links to generic policies at the end of the presentation
  4. Links to generic policies at the end of the presentation
  5. Think about a lock with a 4 digit combination .. If you only have 3 digits to the combo the lock doesn’t open does it?
  6. We want to make sure that we can tie a compliance question directly back to a policy statement
  7. And Finally … If the program shows value then the business may be more willing to invest into it further