SlideShare a Scribd company logo
1 of 16
Download to read offline
WHITE PAPER
INTEGRATED RISK MANAGEMENT
End the Struggle with InfoSec
Policies and Standards through
Risk & Compliance Integration
Information Security Policies and Standards are a
Chief Information Security Officer’s primary tool for
communicating security expectations throughout the
organization.
However, for many organizations, they are more a
source of confusion, and worse, they can increase
the organization’s liability. Employees are forced
to sift through bloated, complex, and frequently
contradictory documents and then deduce what
requirements apply to them in their particular
role and circumstance. Neither security managers
nor internal auditors can confidently attest they
meet minimum regulatory compliance and risk
management practices.
This is usually a result of a CISO taking a compliance-
only approach meant to satisfy an auditor. The
hallmark of such an approach is simply restating
regulatory mandates into policies and standards
or using generic “out-of-the-box” policies. Other
symptoms of this mindset include the use of a generic
risk register and overlapping assurance programs.
Why CISOs Struggle with Information
Security Policies and Standards
In this situation, policy and standards compliance processes are
disconnected from other risk and compliance processes creating
confusion for the organization. As regulations evolve, this burden only
increases. This is an ineffective approach.
Eventually a complete rewrite becomes an easier task than attempting to
review and update the current set of documents.
When this point is reached, we advocate CISOs take the time to correct
the root cause of the problem as we see it: failure to build Policies and
Standards with an integrated risk and compliance approach.
In this book, we will cover the 4 symptoms of a compliance-only
approach and the benefits of a risk-integrated approach.
4
3
2
1
The four
symptoms
The Symptoms of A
Compliance-Only Approach
1
2
3
4
Simply re-stating regulatory
mandates into policies
and standards without first
interpreting and right-sizing for
the unique risk posture of the
organization.
Use of “out-of-the-box” policies
obtained through tools or
websites that do not meet
applicable federal, state, industry
and internal mandates.
Use of a generic risk-register that
doesn’t include internal policies
and standards.
Overlapping assurance programs,
typically aligned against each
regulatory mandate, which
burden staff and complicate
reporting requirements.
Although the results of a compliance-only information security mindset
show up at various levels throughout the organization, we’ve identified four
common symptoms of this problem.
1 Simply Re-Stating
Regulatory Mandates
The aim of a narrow, compliance-only approach is to survive an audit review of
policy documents without any findings. Thus, the tendency is to add any and all
mandates to governance documents to minimize chances of a gap.
The problem with this approach is it can actually increase an organization’s risk
level. Simply restating regulatory mandates into policies and standards can
unnecessarily restrict an organization’s compliance options. Whereas before it had
the flexibility to identify alternate means to mitigate risk, it has now mandated itself
to follow a prescribed approach. Further, many regulatory mandates are more
appropriately enforced at the process or procedure level.
Take for example, the practice of testing in production. Although broadly recognized
as non-ideal, for some environments and situations, it is simply unavoidable.
Do your policies generically state this common mandate,
or is it tailored to your unique risk?
Do they identify alternative controls that equivalently
mitigate risk?
If an organization fails to make this distinction, it increases exposure
to any regulator, auditor, or insurance company that may evaluate the
organization’s policy compliance.
Excessive focus on a single
regulatory source (e.g.,
HIPAA, PCI, or FFIEC only)
and not sufficiently customized to
other applicable federal, state and
industry-specific sources.
Not written for the
organization’s current
InfoSec maturity and
culture.
Inclusion of controls the
organization cannot meet due
to technical or operational
infeasibility.
Exclusion of or insufficient
consideration for internally derived
mandates applicable to the
organization.
A CISO may be attracted to this approach if they are trying to “check the box” on
policy compliance. Many GRC tools and websites are populated with generic content
for organizations to use. However, we find that such generic content generally has the
following shortcomings:
The typical result is an organization that is over-controlled in some areas and under-
controlled in others – exposing it to unnecessary costs and audit findings.
Where should a CISO start? After all, where does one begin organizing the
mass of various topics and overlapping requirements? In our experience, CISOs
are better off focusing their time on building a strong organization-specific risk
register and using it as the spine for developing InfoSec Policies and Standards.
This leads directly to the next common symptom.
2 Use of “Out-of-
the-box” Policies
What are the controls I
must address to be
compliant?
How important are these controls
to my organization
(what is the inherent risk?)
How effective are these controls
in my organization
(what is the residual risk?)
What are the mandates
driving the need for
those controls?
The key to simplifying the risk and compliance challenge is a well-defined,
organization-specific risk register. Such a tool clarifies:
However, such a tool has historically proven to be a barrier to entry. After all,
it takes considerable effort to identify all regulatory sources, map them to a
harmonized control library, and allocate associated risk ratings.
For this reason, many CISOs will either adopt a generic risk register from a
GRC tool or website. Or fail to build a risk register at all–instead adopting a
compliance-only approach.
We strongly caution CISOs against adoption of a generic risk register
as they are typically impractical from an assurance perspective and can
significantly drive up testing costs. Instead, we advocate a middle ground
where organizations adopt a managed content library that can be rapidly
customized to include incorporation of its own policies and standards as
sources themselves. Such an approach lowers the barrier to entry, while
keeping a practical implementation.
3 Use of a Generic
Risk-Register
A compliance-only approach will wastefully organize testing around
individual regulatory sources. The burden for such an approach is acutely felt
by IT staff. For example, a system owner must respond to a SOX compliance
test. And then a PCI compliance test. And then, a round of tests for internal
policy compliance.
This all adds up to high compliance costs and may overwhelm staff.
A better approach is to integrate all controls into a single framework, allowing
a single assessment for control definition, and a single testing pass that
measures compliance against all regulatory and internal mandates.
This approach treats Policies and Standards like just another regulatory
mandate and positions the governance documents as the communication
tools they’re intended to be rather than a tool to placate auditors.
4 Overlapping
Assurance Programs
The root cause of the policy and standards stuggle is a failure to build them through
an integrated risk and compliance approach.
We advocate an approach that tightly integrates policies and standards with a risk
register linked to mandates; which is subsequently used to drive control planning
and testing. This approach effectively integrates risk and compliance processes and
avoids the common symptoms mentioned while allowing a CISO to overhaul their
policies and standards in just 2–3 months.
Tackle the Problem with An
Integrated Risk & Compliance Approach
Risk Register
An Integrated Risk and
Compliance Approach...
...Answers Key
CISO Questions
Policies &
Standards
Control
Testing
Control
Planning
Do my Policies & Standards meet the
latest regulatory minimums?
Have I committed to a regulatory
mandate we cannot meet?
Where do my Policies & Standards
under-control or over-control?
Can I measure my Policy 
Standards compliance?
Leveraging our iGRC Content Library as an accelerator, Edgile can help you rapidly deploy a full
refresh of InfoSec policies and standards. At the same time, we establish a GRC foundation that
ensures you can:
Accelerate your journey
Operationalize the controls
in your environment
Assess Once, Test Once and Satisfy both internal
policy and standard compliance and external
compliance (e.g. laws and regulations)
Easily maintain the documents as
regulations evolve
Sustain a Risk Register with
verbatim linkage to laws and
regulations
Benefits of a
Risk-Integrated Approach
This methodology has demonstrated its value with consistent success across
numerous clients. Rather than being a one-off task for auditors, authoring governance
documents becomes a central aspect of the risk and compliance management
program, driving security controls throughout the organization.
The top four benefits we’ve seen from this approach are:
Reduced
Risk
Reduced
Deployment Time
Rapid
Operationalization
Easy
Maintenance
1
2
3
4
The risk register becomes the CISO’s “single source of truth”
regarding compliance and risk mandates. When policies and
standards are mapped to a risk register, an organization can
confidently “right-size” the control environment in a manner
commensurate with its actual and desired risk.
The result is the CISO now has both the insight and the
ability to address areas where the organization is under-
controlled or over-controlled.
1Reduced Risk
2 Reduced
Deployment Time
Historically, the barrier to entry for this approach is untenable:
identifying all regulatory sources, mapping them to a
harmonized control library, and building a risk register.
However, when using our iGRC Content Managed Service, the
hard part is already done. Now, one can simply translate and
apply the identified requirements into policy/standard language
appropriate for the organization’s desired risk posture.
In general, we’ve been able to deploy a risk register and a
draft full-spectrum set of information security policies and
standards in as little as 2-3 months.
Our methodology integrates policy and standards compliance
with other risk and assurance processes.
An optimized framework means simplified deployment and
faster adoption.
This ensures every asset owner clearly knows what controls
they must adhere to. Further, you can assess once, test
once and report on compliance against multiple mandates
using a common process that can be scaled up or down
considering the organization’s assurance requirements.
3 Rapid
Operationalization
4 Easy
Maintenance
Keeping track of new regulatory rules and guidance from state,
federal, and industry-specific authorities is an intensive effort
requiring legal expertise. For most organizations, this requires
expensive, highly skilled dedicated resources.
Our content managed service provide access to the
dedicated Edgile team of attorneys, risk and compliance,
and InfoSec experts. Now you can have your mandates
monitored and harmonized with quarterly updates with a
consistent, high-quality Risk Register delivered at a lower
cost to the organization.
1 2
3 4
Review
CISOs struggle with Information Security Policies and Standards because over time, these Polices
and Standards become complex, bloated and frequently contradictory. Neither security managers
nor internal auditors can confidently attest they meet minimum regulatory compliance and risk
management practices.
The root cause of these
problems:
Failure to build Policies and Standards
with an Integrated Risk and Compliance
Approach.
Simply re-stating
regulatory mandates
Use of “out-of-the-box”
policies
Overlapping assurance
programs
Use of a generic risk-
register
Instead, policies and standards are too often authored with a compliance-only mindset.
There are four common symptoms of this problem:
Edgile’s Integrated Risk and Compliance Approach leverages our iGRC Content Library
to accelerate your deployment. The benefits of our approach include:
Reduced
Risk
Reduced
Deployment Time
Rapid
Operationalization
Easy
Maintenance
1
2
3
4
Edgile is the trusted cyber risk and
compliance partner to the world’s leading
organizations, providing consulting, managed
services, and harmonized regulatory content.
Our strategy-first model optimizes IAM,
GRC, and cybersecurity both on-premises
and in the cloud. By transforming risk into
opportunity, we secure the modern enterprise
through solutions that increase business
agility and create a competitive advantage for
our clients.
For more information about Edgile,
visit www.edgile.com.
About Edgile

More Related Content

What's hot

Seven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance ProgramsSeven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance ProgramsMaria Macri
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310John Reno
 
Hernan Huwyler Corporate Risk Assesstment Compliance Risks
Hernan Huwyler Corporate Risk Assesstment Compliance RisksHernan Huwyler Corporate Risk Assesstment Compliance Risks
Hernan Huwyler Corporate Risk Assesstment Compliance RisksHernan Huwyler, MBA CPA
 
Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...
Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...
Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...PYA, P.C.
 
5 steps for better risk assessment
5 steps for better risk assessment5 steps for better risk assessment
5 steps for better risk assessmentDrMohammedFarid
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance BOC Group
 
E Discovery V2.Pdf
E Discovery V2.PdfE Discovery V2.Pdf
E Discovery V2.PdfFred Travis
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCorporater
 
White Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic reviewWhite Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic reviewLexisNexis Benelux
 
Reciprocity_Consolidated Objectives eBook v2
Reciprocity_Consolidated Objectives eBook v2Reciprocity_Consolidated Objectives eBook v2
Reciprocity_Consolidated Objectives eBook v2justinklooster
 
Third-party Governance and Risk Management - 2018
Third-party Governance and Risk Management - 2018Third-party Governance and Risk Management - 2018
Third-party Governance and Risk Management - 2018Deloitte UK
 
Compliance framework
Compliance frameworkCompliance framework
Compliance frameworkManoj Agarwal
 

What's hot (15)

Compliance Programs Critical Safeguard
Compliance Programs Critical SafeguardCompliance Programs Critical Safeguard
Compliance Programs Critical Safeguard
 
Seven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance ProgramsSeven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance Programs
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310
 
Hernan Huwyler Corporate Risk Assesstment Compliance Risks
Hernan Huwyler Corporate Risk Assesstment Compliance RisksHernan Huwyler Corporate Risk Assesstment Compliance Risks
Hernan Huwyler Corporate Risk Assesstment Compliance Risks
 
Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...
Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...
Managing Organizational Risk: The Mighty Triad of Compliance, Internal Audit,...
 
5 steps for better risk assessment
5 steps for better risk assessment5 steps for better risk assessment
5 steps for better risk assessment
 
Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance
 
E Discovery V2.Pdf
E Discovery V2.PdfE Discovery V2.Pdf
E Discovery V2.Pdf
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance Solutions
 
White Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic reviewWhite Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic review
 
Reciprocity_Consolidated Objectives eBook v2
Reciprocity_Consolidated Objectives eBook v2Reciprocity_Consolidated Objectives eBook v2
Reciprocity_Consolidated Objectives eBook v2
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Third-party Governance and Risk Management - 2018
Third-party Governance and Risk Management - 2018Third-party Governance and Risk Management - 2018
Third-party Governance and Risk Management - 2018
 
Compliance framework
Compliance frameworkCompliance framework
Compliance framework
 

Similar to How to integrate risk into your compliance-only approach

Introduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfIntroduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfSALES97
 
Tips For Being Compliance Ready
Tips For Being Compliance ReadyTips For Being Compliance Ready
Tips For Being Compliance ReadyPeak 10
 
Dimension data pursuing compliance in public cloud white paper
Dimension data pursuing compliance in public cloud white paperDimension data pursuing compliance in public cloud white paper
Dimension data pursuing compliance in public cloud white paperJason Cumberland
 
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...DVV Solutions Third Party Risk Management
 
How an Organization Can Elevate Compliance Standards
How an Organization Can Elevate Compliance StandardsHow an Organization Can Elevate Compliance Standards
How an Organization Can Elevate Compliance Standards360factors
 
Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Lennart Bredberg
 
2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot SpotsRon Steinkamp
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapEstelaJeffery653
 
Is your company risking Non-Compliance
Is your company risking Non-ComplianceIs your company risking Non-Compliance
Is your company risking Non-ComplianceSiddharth Joshi
 
Understanding the Roles and Responsibilities of ISMS Auditor.docx
Understanding the Roles and Responsibilities of ISMS Auditor.docxUnderstanding the Roles and Responsibilities of ISMS Auditor.docx
Understanding the Roles and Responsibilities of ISMS Auditor.docxINTERCERT
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, aMaximaSheffield592
 
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORK
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORKPOSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORK
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORKHaresh Lalwani
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk ConsultingPrashant Jain
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke PatchlinkBen Rothke
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee StudyHiten Sethi
 
SAI-GLOBAL-whitepaper-program-assessment-maturity-curve
SAI-GLOBAL-whitepaper-program-assessment-maturity-curveSAI-GLOBAL-whitepaper-program-assessment-maturity-curve
SAI-GLOBAL-whitepaper-program-assessment-maturity-curveJames D. Meacham, CCEP, CRISC
 

Similar to How to integrate risk into your compliance-only approach (20)

Introduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfIntroduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdf
 
Tips For Being Compliance Ready
Tips For Being Compliance ReadyTips For Being Compliance Ready
Tips For Being Compliance Ready
 
Dimension data pursuing compliance in public cloud white paper
Dimension data pursuing compliance in public cloud white paperDimension data pursuing compliance in public cloud white paper
Dimension data pursuing compliance in public cloud white paper
 
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
 
How an Organization Can Elevate Compliance Standards
How an Organization Can Elevate Compliance StandardsHow an Organization Can Elevate Compliance Standards
How an Organization Can Elevate Compliance Standards
 
Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010
 
2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
 
Is your company risking Non-Compliance
Is your company risking Non-ComplianceIs your company risking Non-Compliance
Is your company risking Non-Compliance
 
Understanding the Roles and Responsibilities of ISMS Auditor.docx
Understanding the Roles and Responsibilities of ISMS Auditor.docxUnderstanding the Roles and Responsibilities of ISMS Auditor.docx
Understanding the Roles and Responsibilities of ISMS Auditor.docx
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, a
 
Compliance risk management planning 2017-02-mattoon
Compliance risk management planning 2017-02-mattoonCompliance risk management planning 2017-02-mattoon
Compliance risk management planning 2017-02-mattoon
 
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORK
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORKPOSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORK
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORK
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk Consulting
 
Ey segregation of_duties
Ey segregation of_dutiesEy segregation of_duties
Ey segregation of_duties
 
How Audit Committees Can Help with Third-Party Risks
How Audit Committees Can Help with Third-Party RisksHow Audit Committees Can Help with Third-Party Risks
How Audit Committees Can Help with Third-Party Risks
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
SAI-GLOBAL-whitepaper-program-assessment-maturity-curve
SAI-GLOBAL-whitepaper-program-assessment-maturity-curveSAI-GLOBAL-whitepaper-program-assessment-maturity-curve
SAI-GLOBAL-whitepaper-program-assessment-maturity-curve
 
develop security policy
develop security policydevelop security policy
develop security policy
 

More from Abhishek Sood

The future of enterprise management
The future of enterprise management The future of enterprise management
The future of enterprise management Abhishek Sood
 
Gain new visibility in your DevOps team
 Gain new visibility in your DevOps team Gain new visibility in your DevOps team
Gain new visibility in your DevOps teamAbhishek Sood
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metricsAbhishek Sood
 
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Abhishek Sood
 
3-part approach to turning IoT data into business power
 3-part approach to turning IoT data into business power 3-part approach to turning IoT data into business power
3-part approach to turning IoT data into business powerAbhishek Sood
 
How a bad HR dept. can lose $9M
 How a bad HR dept. can lose $9M How a bad HR dept. can lose $9M
How a bad HR dept. can lose $9MAbhishek Sood
 
Big news coming for DevOps: What you need to know
 Big news coming for DevOps: What you need to know Big news coming for DevOps: What you need to know
Big news coming for DevOps: What you need to knowAbhishek Sood
 
Microservices best practices: Integration platforms, APIs, and more
 Microservices best practices: Integration platforms, APIs, and more Microservices best practices: Integration platforms, APIs, and more
Microservices best practices: Integration platforms, APIs, and moreAbhishek Sood
 
Why adopt more than one cloud service?
 Why adopt more than one cloud service? Why adopt more than one cloud service?
Why adopt more than one cloud service?Abhishek Sood
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaksAbhishek Sood
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use casesAbhishek Sood
 
How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management Abhishek Sood
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservicesAbhishek Sood
 
How to create a secure high performance storage and compute infrastructure
 How to create a secure high performance storage and compute infrastructure How to create a secure high performance storage and compute infrastructure
How to create a secure high performance storage and compute infrastructureAbhishek Sood
 
Enterprise software usability and digital transformation
Enterprise software usability and digital transformationEnterprise software usability and digital transformation
Enterprise software usability and digital transformationAbhishek Sood
 
Transforming for digital customers across 6 key industries
 Transforming for digital customers across 6 key industries Transforming for digital customers across 6 key industries
Transforming for digital customers across 6 key industriesAbhishek Sood
 
Authentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAuthentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAbhishek Sood
 
Tips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data AnalyticsTips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data AnalyticsAbhishek Sood
 
Attivio discovery insight innovation --Whitepaper
Attivio discovery insight innovation --WhitepaperAttivio discovery insight innovation --Whitepaper
Attivio discovery insight innovation --WhitepaperAbhishek Sood
 

More from Abhishek Sood (20)

The future of enterprise management
The future of enterprise management The future of enterprise management
The future of enterprise management
 
Gain new visibility in your DevOps team
 Gain new visibility in your DevOps team Gain new visibility in your DevOps team
Gain new visibility in your DevOps team
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
 
3-part approach to turning IoT data into business power
 3-part approach to turning IoT data into business power 3-part approach to turning IoT data into business power
3-part approach to turning IoT data into business power
 
How a bad HR dept. can lose $9M
 How a bad HR dept. can lose $9M How a bad HR dept. can lose $9M
How a bad HR dept. can lose $9M
 
Big news coming for DevOps: What you need to know
 Big news coming for DevOps: What you need to know Big news coming for DevOps: What you need to know
Big news coming for DevOps: What you need to know
 
Microservices best practices: Integration platforms, APIs, and more
 Microservices best practices: Integration platforms, APIs, and more Microservices best practices: Integration platforms, APIs, and more
Microservices best practices: Integration platforms, APIs, and more
 
Why adopt more than one cloud service?
 Why adopt more than one cloud service? Why adopt more than one cloud service?
Why adopt more than one cloud service?
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use cases
 
How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservices
 
How to create a secure high performance storage and compute infrastructure
 How to create a secure high performance storage and compute infrastructure How to create a secure high performance storage and compute infrastructure
How to create a secure high performance storage and compute infrastructure
 
Enterprise software usability and digital transformation
Enterprise software usability and digital transformationEnterprise software usability and digital transformation
Enterprise software usability and digital transformation
 
Transforming for digital customers across 6 key industries
 Transforming for digital customers across 6 key industries Transforming for digital customers across 6 key industries
Transforming for digital customers across 6 key industries
 
Authentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAuthentication best practices: Experts weigh in
Authentication best practices: Experts weigh in
 
Tips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data AnalyticsTips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data Analytics
 
Attivio discovery insight innovation --Whitepaper
Attivio discovery insight innovation --WhitepaperAttivio discovery insight innovation --Whitepaper
Attivio discovery insight innovation --Whitepaper
 

Recently uploaded

Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...limedy534
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 

Recently uploaded (20)

Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 

How to integrate risk into your compliance-only approach

  • 1. WHITE PAPER INTEGRATED RISK MANAGEMENT End the Struggle with InfoSec Policies and Standards through Risk & Compliance Integration
  • 2. Information Security Policies and Standards are a Chief Information Security Officer’s primary tool for communicating security expectations throughout the organization. However, for many organizations, they are more a source of confusion, and worse, they can increase the organization’s liability. Employees are forced to sift through bloated, complex, and frequently contradictory documents and then deduce what requirements apply to them in their particular role and circumstance. Neither security managers nor internal auditors can confidently attest they meet minimum regulatory compliance and risk management practices. This is usually a result of a CISO taking a compliance- only approach meant to satisfy an auditor. The hallmark of such an approach is simply restating regulatory mandates into policies and standards or using generic “out-of-the-box” policies. Other symptoms of this mindset include the use of a generic risk register and overlapping assurance programs. Why CISOs Struggle with Information Security Policies and Standards
  • 3. In this situation, policy and standards compliance processes are disconnected from other risk and compliance processes creating confusion for the organization. As regulations evolve, this burden only increases. This is an ineffective approach. Eventually a complete rewrite becomes an easier task than attempting to review and update the current set of documents. When this point is reached, we advocate CISOs take the time to correct the root cause of the problem as we see it: failure to build Policies and Standards with an integrated risk and compliance approach. In this book, we will cover the 4 symptoms of a compliance-only approach and the benefits of a risk-integrated approach.
  • 4. 4 3 2 1 The four symptoms The Symptoms of A Compliance-Only Approach 1 2 3 4 Simply re-stating regulatory mandates into policies and standards without first interpreting and right-sizing for the unique risk posture of the organization. Use of “out-of-the-box” policies obtained through tools or websites that do not meet applicable federal, state, industry and internal mandates. Use of a generic risk-register that doesn’t include internal policies and standards. Overlapping assurance programs, typically aligned against each regulatory mandate, which burden staff and complicate reporting requirements. Although the results of a compliance-only information security mindset show up at various levels throughout the organization, we’ve identified four common symptoms of this problem.
  • 5. 1 Simply Re-Stating Regulatory Mandates The aim of a narrow, compliance-only approach is to survive an audit review of policy documents without any findings. Thus, the tendency is to add any and all mandates to governance documents to minimize chances of a gap. The problem with this approach is it can actually increase an organization’s risk level. Simply restating regulatory mandates into policies and standards can unnecessarily restrict an organization’s compliance options. Whereas before it had the flexibility to identify alternate means to mitigate risk, it has now mandated itself to follow a prescribed approach. Further, many regulatory mandates are more appropriately enforced at the process or procedure level. Take for example, the practice of testing in production. Although broadly recognized as non-ideal, for some environments and situations, it is simply unavoidable. Do your policies generically state this common mandate, or is it tailored to your unique risk? Do they identify alternative controls that equivalently mitigate risk? If an organization fails to make this distinction, it increases exposure to any regulator, auditor, or insurance company that may evaluate the organization’s policy compliance.
  • 6. Excessive focus on a single regulatory source (e.g., HIPAA, PCI, or FFIEC only) and not sufficiently customized to other applicable federal, state and industry-specific sources. Not written for the organization’s current InfoSec maturity and culture. Inclusion of controls the organization cannot meet due to technical or operational infeasibility. Exclusion of or insufficient consideration for internally derived mandates applicable to the organization. A CISO may be attracted to this approach if they are trying to “check the box” on policy compliance. Many GRC tools and websites are populated with generic content for organizations to use. However, we find that such generic content generally has the following shortcomings: The typical result is an organization that is over-controlled in some areas and under- controlled in others – exposing it to unnecessary costs and audit findings. Where should a CISO start? After all, where does one begin organizing the mass of various topics and overlapping requirements? In our experience, CISOs are better off focusing their time on building a strong organization-specific risk register and using it as the spine for developing InfoSec Policies and Standards. This leads directly to the next common symptom. 2 Use of “Out-of- the-box” Policies
  • 7. What are the controls I must address to be compliant? How important are these controls to my organization (what is the inherent risk?) How effective are these controls in my organization (what is the residual risk?) What are the mandates driving the need for those controls? The key to simplifying the risk and compliance challenge is a well-defined, organization-specific risk register. Such a tool clarifies: However, such a tool has historically proven to be a barrier to entry. After all, it takes considerable effort to identify all regulatory sources, map them to a harmonized control library, and allocate associated risk ratings. For this reason, many CISOs will either adopt a generic risk register from a GRC tool or website. Or fail to build a risk register at all–instead adopting a compliance-only approach. We strongly caution CISOs against adoption of a generic risk register as they are typically impractical from an assurance perspective and can significantly drive up testing costs. Instead, we advocate a middle ground where organizations adopt a managed content library that can be rapidly customized to include incorporation of its own policies and standards as sources themselves. Such an approach lowers the barrier to entry, while keeping a practical implementation. 3 Use of a Generic Risk-Register
  • 8. A compliance-only approach will wastefully organize testing around individual regulatory sources. The burden for such an approach is acutely felt by IT staff. For example, a system owner must respond to a SOX compliance test. And then a PCI compliance test. And then, a round of tests for internal policy compliance. This all adds up to high compliance costs and may overwhelm staff. A better approach is to integrate all controls into a single framework, allowing a single assessment for control definition, and a single testing pass that measures compliance against all regulatory and internal mandates. This approach treats Policies and Standards like just another regulatory mandate and positions the governance documents as the communication tools they’re intended to be rather than a tool to placate auditors. 4 Overlapping Assurance Programs
  • 9. The root cause of the policy and standards stuggle is a failure to build them through an integrated risk and compliance approach. We advocate an approach that tightly integrates policies and standards with a risk register linked to mandates; which is subsequently used to drive control planning and testing. This approach effectively integrates risk and compliance processes and avoids the common symptoms mentioned while allowing a CISO to overhaul their policies and standards in just 2–3 months. Tackle the Problem with An Integrated Risk & Compliance Approach Risk Register An Integrated Risk and Compliance Approach... ...Answers Key CISO Questions Policies & Standards Control Testing Control Planning Do my Policies & Standards meet the latest regulatory minimums? Have I committed to a regulatory mandate we cannot meet? Where do my Policies & Standards under-control or over-control? Can I measure my Policy Standards compliance?
  • 10. Leveraging our iGRC Content Library as an accelerator, Edgile can help you rapidly deploy a full refresh of InfoSec policies and standards. At the same time, we establish a GRC foundation that ensures you can: Accelerate your journey Operationalize the controls in your environment Assess Once, Test Once and Satisfy both internal policy and standard compliance and external compliance (e.g. laws and regulations) Easily maintain the documents as regulations evolve Sustain a Risk Register with verbatim linkage to laws and regulations Benefits of a Risk-Integrated Approach This methodology has demonstrated its value with consistent success across numerous clients. Rather than being a one-off task for auditors, authoring governance documents becomes a central aspect of the risk and compliance management program, driving security controls throughout the organization. The top four benefits we’ve seen from this approach are: Reduced Risk Reduced Deployment Time Rapid Operationalization Easy Maintenance 1 2 3 4
  • 11. The risk register becomes the CISO’s “single source of truth” regarding compliance and risk mandates. When policies and standards are mapped to a risk register, an organization can confidently “right-size” the control environment in a manner commensurate with its actual and desired risk. The result is the CISO now has both the insight and the ability to address areas where the organization is under- controlled or over-controlled. 1Reduced Risk
  • 12. 2 Reduced Deployment Time Historically, the barrier to entry for this approach is untenable: identifying all regulatory sources, mapping them to a harmonized control library, and building a risk register. However, when using our iGRC Content Managed Service, the hard part is already done. Now, one can simply translate and apply the identified requirements into policy/standard language appropriate for the organization’s desired risk posture. In general, we’ve been able to deploy a risk register and a draft full-spectrum set of information security policies and standards in as little as 2-3 months.
  • 13. Our methodology integrates policy and standards compliance with other risk and assurance processes. An optimized framework means simplified deployment and faster adoption. This ensures every asset owner clearly knows what controls they must adhere to. Further, you can assess once, test once and report on compliance against multiple mandates using a common process that can be scaled up or down considering the organization’s assurance requirements. 3 Rapid Operationalization
  • 14. 4 Easy Maintenance Keeping track of new regulatory rules and guidance from state, federal, and industry-specific authorities is an intensive effort requiring legal expertise. For most organizations, this requires expensive, highly skilled dedicated resources. Our content managed service provide access to the dedicated Edgile team of attorneys, risk and compliance, and InfoSec experts. Now you can have your mandates monitored and harmonized with quarterly updates with a consistent, high-quality Risk Register delivered at a lower cost to the organization.
  • 15. 1 2 3 4 Review CISOs struggle with Information Security Policies and Standards because over time, these Polices and Standards become complex, bloated and frequently contradictory. Neither security managers nor internal auditors can confidently attest they meet minimum regulatory compliance and risk management practices. The root cause of these problems: Failure to build Policies and Standards with an Integrated Risk and Compliance Approach. Simply re-stating regulatory mandates Use of “out-of-the-box” policies Overlapping assurance programs Use of a generic risk- register Instead, policies and standards are too often authored with a compliance-only mindset. There are four common symptoms of this problem: Edgile’s Integrated Risk and Compliance Approach leverages our iGRC Content Library to accelerate your deployment. The benefits of our approach include: Reduced Risk Reduced Deployment Time Rapid Operationalization Easy Maintenance 1 2 3 4
  • 16. Edgile is the trusted cyber risk and compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content. Our strategy-first model optimizes IAM, GRC, and cybersecurity both on-premises and in the cloud. By transforming risk into opportunity, we secure the modern enterprise through solutions that increase business agility and create a competitive advantage for our clients. For more information about Edgile, visit www.edgile.com. About Edgile