SlideShare a Scribd company logo
1 of 38
An Effective Security
and Compliance Office
UC Davis Security Symposium 2013
Sean Cordero, Cloud Watchmen
Kevin Mazzone, UC Davis Health System
June 18, 2013
About the presenters
Sean Cordero, CISSP,
CISM, CISA, CRISC
• Founder Cloud Watchmen
– Provides InfoSec and
compliance services
• 14+ years experience
• Consults with C-level
management at public
and private enterprises
• Regular speaker at
security conferences
• Former CSO of EdFund
and Charlotte Russe
Kevin Mazzone, PMP,
CEH
• M.S. Information
Management & InfoSec
from Syracuse University
• Security and compliance
experience – Intel,
EdFund, UCDHS,
MAXIMUS
• 15+ years of experience
• Former ISO
• Candidate for CISSP
2
Objectives
• Based on our experiences, we’ll talk about:
• Engage & approach in a different way
• Establishing relationships and human factors
– Communication tools & standardized reporting
– Show risk & effectuate IT management
• Ensure security agenda is pushed forward
3
Overview
• Traditional model
• Proposed model
• Relationship
• Communications
• Summary – Questions & Answers
4
Traditional Model
5
Traditional model
CEO
CIO
IT Apps
IT Facilities
IT Infra
IT Sec
Compliance
HR
Legal
Physical Security
Records
• IT Sec “enforcer”
• Doesn’t work with
traditional
organizational
constraints
• “Begger-Prince”
• Security team has no
power
• Company policy
– “Crying to Mom”
Traditional model gaps
Traditional models don’t address…
• Physical risks
• Non-electronic data
– Records mgmt. & records retention
7
Traditional model doesn’t work
• A CIO makes sure information systems are
effectively managed & to get the information to
users - fast
• ISO protects and ensure CIA
• ISO should be the CSO & report to CEO/ COO
• Alternatively, ISO reports to CSO
• Avoid conflict of interest
– Lateral with CIO
8Source: Kovcich
Even more…
• Technical reviewer
– Security skills < IT apps and infrastructure
• Policy developer
– Vacuum = useless; important what is done
• Assessor
• Competency of ISO
– Need to manage up & force written decisions
– Fails at: building external relationships, articulating risks,
marketing, create win/win, over reliance on tech fixes to
human factor
9
Proposed Model
10
Organizational overview
CEO
CIO
IT AppsIT FacilitiesIT Infra
Compliance
HR
Information
Security
Legal Physical
Security
Records
ConsumersofITServices
• Security becomes a
consumer
• Requirements &
expectations based
• Ends Conflict of
interest
• End 2 End risk
understanding
• Carnegie Mellon
placement
Proposed Org Benefits
• Influence with biz and support groups
– HR, Legal, Finance, Physical Sec, Biz Units, etc.
– Peer Management Review Committees (MRCs)
• Risk acceptance & documentation
• Buy-off on IA response
• Security governance
12
Reality…
• In most orgs, security is already a part of IT
• Establishing & maintaining relationships with the
other consumers of IT is key
13
Relationships
14
Relationships = Enabler
• “Make the most of what you’ve got”
– Up & out relations – Legal, HR, line of biz, etc.
• IT InfoSec conduit between biz groups and rest
of IT
• IT InfoSec as enabler
– Not just validator
– Sec can run vuln scan
– Poor relationship = backfire
15
16
Goals & desires of IT InfoSec
+ up & out depts. = risk
mgmt. goal
Types of engagements
1. Internal IT
2. Lateral
3. Up & out
4. External 3rd parties
– SME
– External auditors (BSA, Joint Commission, PCI,
etc.)
17
Internal IT
• Upward to management
• Lateral to support groups
– Infrastructure
– Project management / business analysts
– Applications
• Non-functional requirements
18
Internal IT management
• Communicate security & compliance risks!
• Address costs, resource requirements, time,
scope
– Security & remediation not effectively accounted for
in new projects or KTBR
• Security technologies not budgeted
• Resources not assigned security control & remediation
tasks
– CIO can assign more resources or extend the time
• Document decisions
19
IT mgmt. comms gone wrong
• When CIO disavows from identified security or
compliance risks & makes determination not work
on through decree or priority they are failing org,
not doing job, and taking on board role
– CIO makes risk decision for entire company
– Blind decision and not represent company
– Bad CIO does whatever can to shut down process
• Document decision
20
Up & out engagement
• Conversation - unified way to report, measure,
rank, and how to communicate to up & out
stakeholders
– Meaningless to Legal – x vulnerabilities in patching
• Way to begin holding IT accountable even though
role of sec is to “open the kimono”
• Establish on-going relationship
• Establishes expectations
21
3rd party engagement
• Scope & engagement – top down
– May or may not be from board or audit committee
– Ex: E&Y, BSA, PCI Assessor, FISMA/ FEDRAMP
readiness review, HITECH/ HIPPA comply review,
SOx audit (§404)
• Best way to engage: pen. test, vuln. assessment,
effectiveness reviews
22
Communication tools
23
• Communication types
– Indirect – written loop back to decision maker
– Direct – 1:1 engagement
• Disclosure levels
– Full – show all the dirty laundry
– Limited – minimal amount of information
• Matrix
– Column team – consumer arm (legal, HR, 3rd party,
SMO, 3rd party auditor, internal cust (line-of biz,
QA, UAT,…), external customers, cio, board/
governance committee, cfo/ finance, proj mgmt.,
procurement
– Top – raci basterdized
• influencer – enforcer
• Decision maker
25
• Type of engagement and expected outcome
– Direct with IA = bad
• nature, level of disclosure, org risk, dealing w/ auditor
provide min info and just enough to pass
• 3rd party SME = direct, full
• CIO = direct full disclosure sco to cio, indirect
mod to full to lateral groups
26
Communication tools
• Written communication & agreements
– IT SLAs to consumer – codified and written; measurable
– Incident response
– Inventory/ asset mgmt.
– Patch / system upkeep
– Base-line configuration
– Email - per our convorsation…
– Policies – vetted, approved
• Up and out groups, external 3rd party, CIO enabler
27
Communication tools (cont’d)
• Audit reports
• Checklists
• SOWs / RFP
• Change management
• Risk Assessments
• Management level reports
– -ISO to CIO, Audit Committee, stakeholders/ consumers of IT services
– Measure/ metrics baseline SLA between consumer and IT
– Internal measures / metrics
28
Checklists
• Direct communications
• Implementation up for
interpretation
– Security SME sees
requirements one way; IT
another
• Formal support / written
from exec mgmt.
– Let go of non-supported /
legal issue esc to Legal
for resolution
29
Indirect audit reports
• Indirect communications
• Finding  go fix it
• Force finding through internal risk acceptance
process and make executive mgmt./ board sign
off & approve to accept
– Forced: prioritization change for IT projects
30
Respond to audit reports
• Response is too often date focused
– Consider LOE, costs (ops + expenses), risk,
duration, and time
• Executive management must make decision on
project prioritization, and when to start
– This decision establishes date
– Future date = temporary risk acceptance
– Document mgmt. decision
31
SOW / RFP
• Including security requirements as part of
procurement process
• Implementation include security non-functional
requirements
– Often solution supports security controls but they
need to be turned on
32
Change management
• Full disclosure
• Operations (upgrades &
KTBR) & project focused
• Non-functional
requirements
– Not going to do; decision
made, documented, and
approved
• Type of risk assessment
33
Management level reports
• Full disclosure
• State of compliance
• Unaddressed risks
• Measures related to SLA with IT
– Patching timelines, etc.
34
Summary
35
Summary
• Security is a consumer of IT
– HR, Legal, Physical Security, Compliance, etc. are
consumers
• Relationships are key
• Communications – tailored for the consumer
– Methods - Indirect v. direct
– Tools
Questions and Answers
37
Citations
• Kovacich, Dr. Gerald L., CISSP, CFE, CPP. The
information systems security officer's guide,
establishing and managing an information
protection program. 2nd ed. Butterworth-
Heinemann, 2003. Print.
38

More Related Content

What's hot

William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015William Tanenbaum
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10David X Martin
 
It and business risk alignment guide
It and business risk alignment guideIt and business risk alignment guide
It and business risk alignment guideAstalapulosListestos
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
Governance, risk and compliance framework
Governance, risk and compliance frameworkGovernance, risk and compliance framework
Governance, risk and compliance frameworkCeyeap
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20Marc S. Sokol
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackMekhi Da ‘Quay Daniels
 
IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?Eryk Budi Pratama
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 

What's hot (20)

Task 2
Task 2Task 2
Task 2
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10
 
task 1
task 1task 1
task 1
 
It and business risk alignment guide
It and business risk alignment guideIt and business risk alignment guide
It and business risk alignment guide
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Mandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINALMandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINAL
 
2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data
 
Governance, risk and compliance framework
Governance, risk and compliance frameworkGovernance, risk and compliance framework
Governance, risk and compliance framework
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
It alignment-who-is-in-charge
It alignment-who-is-in-chargeIt alignment-who-is-in-charge
It alignment-who-is-in-charge
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Presentation on the Proposed Technology-related Revisions to the Code
Presentation on the Proposed Technology-related Revisions to the CodePresentation on the Proposed Technology-related Revisions to the Code
Presentation on the Proposed Technology-related Revisions to the Code
 

Viewers also liked

Element 2 - Internet and Multimedia
Element 2 - Internet and MultimediaElement 2 - Internet and Multimedia
Element 2 - Internet and MultimediaAndres Morales
 
Transforming Dinosaurs into Vampires
Transforming Dinosaurs into VampiresTransforming Dinosaurs into Vampires
Transforming Dinosaurs into VampiresJohn Passy
 
Audience Feedback
Audience FeedbackAudience Feedback
Audience Feedbackjoe_deeer
 
Ketidakadilan hukum indonesia sebuah refleksi sila kelima pancasila
Ketidakadilan hukum indonesia sebuah refleksi sila kelima pancasilaKetidakadilan hukum indonesia sebuah refleksi sila kelima pancasila
Ketidakadilan hukum indonesia sebuah refleksi sila kelima pancasilaMeilana Lestari
 
Options Trading Strategies
Options Trading StrategiesOptions Trading Strategies
Options Trading Strategiesluv_sharma
 
【J-SHIS】地震の発生確率と地震動の超過確率
【J-SHIS】地震の発生確率と地震動の超過確率【J-SHIS】地震の発生確率と地震動の超過確率
【J-SHIS】地震の発生確率と地震動の超過確率NIED
 
Compliance Office Overview
Compliance Office OverviewCompliance Office Overview
Compliance Office Overviewjohngcollins
 
Annual corporate compliance training (1)
Annual corporate compliance training (1)Annual corporate compliance training (1)
Annual corporate compliance training (1)Bobby Dillard
 
7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategyMaarten BOONEN
 
Compliance - Desafios para ir da Teoria à Prática - Pharma Summit 2010 Alexan...
Compliance - Desafios para ir da Teoria à Prática - Pharma Summit 2010 Alexan...Compliance - Desafios para ir da Teoria à Prática - Pharma Summit 2010 Alexan...
Compliance - Desafios para ir da Teoria à Prática - Pharma Summit 2010 Alexan...Alexandre da Cunha Serpa, CCEP, CFE
 
Etapas para implantação de mecanismos de compliance
Etapas para implantação de mecanismos de complianceEtapas para implantação de mecanismos de compliance
Etapas para implantação de mecanismos de complianceFernando S. Marcato
 
Ongoing & Suspended Projects as of September 2011
Ongoing & Suspended Projects as of September 2011Ongoing & Suspended Projects as of September 2011
Ongoing & Suspended Projects as of September 2011cmogsc
 
Maturidade do Compliance no Brasil
Maturidade do Compliance no BrasilMaturidade do Compliance no Brasil
Maturidade do Compliance no BrasilEdgar Gonçalves
 

Viewers also liked (20)

Show Flyers
Show FlyersShow Flyers
Show Flyers
 
Element 2 - Internet and Multimedia
Element 2 - Internet and MultimediaElement 2 - Internet and Multimedia
Element 2 - Internet and Multimedia
 
Transforming Dinosaurs into Vampires
Transforming Dinosaurs into VampiresTransforming Dinosaurs into Vampires
Transforming Dinosaurs into Vampires
 
Kump liza
Kump lizaKump liza
Kump liza
 
Audience Feedback
Audience FeedbackAudience Feedback
Audience Feedback
 
How to make a PC
How to make a PCHow to make a PC
How to make a PC
 
Ketidakadilan hukum indonesia sebuah refleksi sila kelima pancasila
Ketidakadilan hukum indonesia sebuah refleksi sila kelima pancasilaKetidakadilan hukum indonesia sebuah refleksi sila kelima pancasila
Ketidakadilan hukum indonesia sebuah refleksi sila kelima pancasila
 
Options Trading Strategies
Options Trading StrategiesOptions Trading Strategies
Options Trading Strategies
 
Maths in food
Maths in foodMaths in food
Maths in food
 
【J-SHIS】地震の発生確率と地震動の超過確率
【J-SHIS】地震の発生確率と地震動の超過確率【J-SHIS】地震の発生確率と地震動の超過確率
【J-SHIS】地震の発生確率と地震動の超過確率
 
Aghatha 02 overview_consultoria_processos_de_ti_versao_slide_share
Aghatha 02 overview_consultoria_processos_de_ti_versao_slide_shareAghatha 02 overview_consultoria_processos_de_ti_versao_slide_share
Aghatha 02 overview_consultoria_processos_de_ti_versao_slide_share
 
Compliance Office Overview
Compliance Office OverviewCompliance Office Overview
Compliance Office Overview
 
Kump liza
Kump lizaKump liza
Kump liza
 
Annual corporate compliance training (1)
Annual corporate compliance training (1)Annual corporate compliance training (1)
Annual corporate compliance training (1)
 
7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy
 
Compliance no Brasil
Compliance no BrasilCompliance no Brasil
Compliance no Brasil
 
Compliance - Desafios para ir da Teoria à Prática - Pharma Summit 2010 Alexan...
Compliance - Desafios para ir da Teoria à Prática - Pharma Summit 2010 Alexan...Compliance - Desafios para ir da Teoria à Prática - Pharma Summit 2010 Alexan...
Compliance - Desafios para ir da Teoria à Prática - Pharma Summit 2010 Alexan...
 
Etapas para implantação de mecanismos de compliance
Etapas para implantação de mecanismos de complianceEtapas para implantação de mecanismos de compliance
Etapas para implantação de mecanismos de compliance
 
Ongoing & Suspended Projects as of September 2011
Ongoing & Suspended Projects as of September 2011Ongoing & Suspended Projects as of September 2011
Ongoing & Suspended Projects as of September 2011
 
Maturidade do Compliance no Brasil
Maturidade do Compliance no BrasilMaturidade do Compliance no Brasil
Maturidade do Compliance no Brasil
 

Similar to Effective Security and Compliance Through Relationships and Communication

Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
 
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.pptEDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.pptPreethamS41
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Managementbanerjeerohit
 
Sask 3.0 Summit Pci dss presentation Bashir Fancy
Sask 3.0 Summit  Pci dss presentation   Bashir FancySask 3.0 Summit  Pci dss presentation   Bashir Fancy
Sask 3.0 Summit Pci dss presentation Bashir FancySaskSummit
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and TrendsMaclear LLC
 
Certification+: The Most Comprehensive Compliance Solution
Certification+: The Most Comprehensive Compliance SolutionCertification+: The Most Comprehensive Compliance Solution
Certification+: The Most Comprehensive Compliance SolutionPYA, P.C.
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehAnne Starr
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response PlanResilient Systems
 
Enterprise Data World 2018
Enterprise Data World 2018Enterprise Data World 2018
Enterprise Data World 2018jadams6
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response FunctionResilient Systems
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingTory Quinton
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
CISM_WK_1.pptx
CISM_WK_1.pptxCISM_WK_1.pptx
CISM_WK_1.pptxdotco
 
How To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their TracksHow To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their TracksResilient Systems
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptxdotco
 

Similar to Effective Security and Compliance Through Relationships and Communication (20)

Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.pptEDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
Sask 3.0 Summit Pci dss presentation Bashir Fancy
Sask 3.0 Summit  Pci dss presentation   Bashir FancySask 3.0 Summit  Pci dss presentation   Bashir Fancy
Sask 3.0 Summit Pci dss presentation Bashir Fancy
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
Certification+: The Most Comprehensive Compliance Solution
Certification+: The Most Comprehensive Compliance SolutionCertification+: The Most Comprehensive Compliance Solution
Certification+: The Most Comprehensive Compliance Solution
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
Enterprise Data World 2018
Enterprise Data World 2018Enterprise Data World 2018
Enterprise Data World 2018
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response Function
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
insider threat research
insider threat researchinsider threat research
insider threat research
 
CISM_WK_1.pptx
CISM_WK_1.pptxCISM_WK_1.pptx
CISM_WK_1.pptx
 
How To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their TracksHow To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their Tracks
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptx
 

Recently uploaded

Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 

Recently uploaded (20)

Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 

Effective Security and Compliance Through Relationships and Communication

  • 1. An Effective Security and Compliance Office UC Davis Security Symposium 2013 Sean Cordero, Cloud Watchmen Kevin Mazzone, UC Davis Health System June 18, 2013
  • 2. About the presenters Sean Cordero, CISSP, CISM, CISA, CRISC • Founder Cloud Watchmen – Provides InfoSec and compliance services • 14+ years experience • Consults with C-level management at public and private enterprises • Regular speaker at security conferences • Former CSO of EdFund and Charlotte Russe Kevin Mazzone, PMP, CEH • M.S. Information Management & InfoSec from Syracuse University • Security and compliance experience – Intel, EdFund, UCDHS, MAXIMUS • 15+ years of experience • Former ISO • Candidate for CISSP 2
  • 3. Objectives • Based on our experiences, we’ll talk about: • Engage & approach in a different way • Establishing relationships and human factors – Communication tools & standardized reporting – Show risk & effectuate IT management • Ensure security agenda is pushed forward 3
  • 4. Overview • Traditional model • Proposed model • Relationship • Communications • Summary – Questions & Answers 4
  • 6. Traditional model CEO CIO IT Apps IT Facilities IT Infra IT Sec Compliance HR Legal Physical Security Records • IT Sec “enforcer” • Doesn’t work with traditional organizational constraints • “Begger-Prince” • Security team has no power • Company policy – “Crying to Mom”
  • 7. Traditional model gaps Traditional models don’t address… • Physical risks • Non-electronic data – Records mgmt. & records retention 7
  • 8. Traditional model doesn’t work • A CIO makes sure information systems are effectively managed & to get the information to users - fast • ISO protects and ensure CIA • ISO should be the CSO & report to CEO/ COO • Alternatively, ISO reports to CSO • Avoid conflict of interest – Lateral with CIO 8Source: Kovcich
  • 9. Even more… • Technical reviewer – Security skills < IT apps and infrastructure • Policy developer – Vacuum = useless; important what is done • Assessor • Competency of ISO – Need to manage up & force written decisions – Fails at: building external relationships, articulating risks, marketing, create win/win, over reliance on tech fixes to human factor 9
  • 11. Organizational overview CEO CIO IT AppsIT FacilitiesIT Infra Compliance HR Information Security Legal Physical Security Records ConsumersofITServices • Security becomes a consumer • Requirements & expectations based • Ends Conflict of interest • End 2 End risk understanding • Carnegie Mellon placement
  • 12. Proposed Org Benefits • Influence with biz and support groups – HR, Legal, Finance, Physical Sec, Biz Units, etc. – Peer Management Review Committees (MRCs) • Risk acceptance & documentation • Buy-off on IA response • Security governance 12
  • 13. Reality… • In most orgs, security is already a part of IT • Establishing & maintaining relationships with the other consumers of IT is key 13
  • 15. Relationships = Enabler • “Make the most of what you’ve got” – Up & out relations – Legal, HR, line of biz, etc. • IT InfoSec conduit between biz groups and rest of IT • IT InfoSec as enabler – Not just validator – Sec can run vuln scan – Poor relationship = backfire 15
  • 16. 16 Goals & desires of IT InfoSec + up & out depts. = risk mgmt. goal
  • 17. Types of engagements 1. Internal IT 2. Lateral 3. Up & out 4. External 3rd parties – SME – External auditors (BSA, Joint Commission, PCI, etc.) 17
  • 18. Internal IT • Upward to management • Lateral to support groups – Infrastructure – Project management / business analysts – Applications • Non-functional requirements 18
  • 19. Internal IT management • Communicate security & compliance risks! • Address costs, resource requirements, time, scope – Security & remediation not effectively accounted for in new projects or KTBR • Security technologies not budgeted • Resources not assigned security control & remediation tasks – CIO can assign more resources or extend the time • Document decisions 19
  • 20. IT mgmt. comms gone wrong • When CIO disavows from identified security or compliance risks & makes determination not work on through decree or priority they are failing org, not doing job, and taking on board role – CIO makes risk decision for entire company – Blind decision and not represent company – Bad CIO does whatever can to shut down process • Document decision 20
  • 21. Up & out engagement • Conversation - unified way to report, measure, rank, and how to communicate to up & out stakeholders – Meaningless to Legal – x vulnerabilities in patching • Way to begin holding IT accountable even though role of sec is to “open the kimono” • Establish on-going relationship • Establishes expectations 21
  • 22. 3rd party engagement • Scope & engagement – top down – May or may not be from board or audit committee – Ex: E&Y, BSA, PCI Assessor, FISMA/ FEDRAMP readiness review, HITECH/ HIPPA comply review, SOx audit (§404) • Best way to engage: pen. test, vuln. assessment, effectiveness reviews 22
  • 24. • Communication types – Indirect – written loop back to decision maker – Direct – 1:1 engagement • Disclosure levels – Full – show all the dirty laundry – Limited – minimal amount of information
  • 25. • Matrix – Column team – consumer arm (legal, HR, 3rd party, SMO, 3rd party auditor, internal cust (line-of biz, QA, UAT,…), external customers, cio, board/ governance committee, cfo/ finance, proj mgmt., procurement – Top – raci basterdized • influencer – enforcer • Decision maker 25
  • 26. • Type of engagement and expected outcome – Direct with IA = bad • nature, level of disclosure, org risk, dealing w/ auditor provide min info and just enough to pass • 3rd party SME = direct, full • CIO = direct full disclosure sco to cio, indirect mod to full to lateral groups 26
  • 27. Communication tools • Written communication & agreements – IT SLAs to consumer – codified and written; measurable – Incident response – Inventory/ asset mgmt. – Patch / system upkeep – Base-line configuration – Email - per our convorsation… – Policies – vetted, approved • Up and out groups, external 3rd party, CIO enabler 27
  • 28. Communication tools (cont’d) • Audit reports • Checklists • SOWs / RFP • Change management • Risk Assessments • Management level reports – -ISO to CIO, Audit Committee, stakeholders/ consumers of IT services – Measure/ metrics baseline SLA between consumer and IT – Internal measures / metrics 28
  • 29. Checklists • Direct communications • Implementation up for interpretation – Security SME sees requirements one way; IT another • Formal support / written from exec mgmt. – Let go of non-supported / legal issue esc to Legal for resolution 29
  • 30. Indirect audit reports • Indirect communications • Finding  go fix it • Force finding through internal risk acceptance process and make executive mgmt./ board sign off & approve to accept – Forced: prioritization change for IT projects 30
  • 31. Respond to audit reports • Response is too often date focused – Consider LOE, costs (ops + expenses), risk, duration, and time • Executive management must make decision on project prioritization, and when to start – This decision establishes date – Future date = temporary risk acceptance – Document mgmt. decision 31
  • 32. SOW / RFP • Including security requirements as part of procurement process • Implementation include security non-functional requirements – Often solution supports security controls but they need to be turned on 32
  • 33. Change management • Full disclosure • Operations (upgrades & KTBR) & project focused • Non-functional requirements – Not going to do; decision made, documented, and approved • Type of risk assessment 33
  • 34. Management level reports • Full disclosure • State of compliance • Unaddressed risks • Measures related to SLA with IT – Patching timelines, etc. 34
  • 36. Summary • Security is a consumer of IT – HR, Legal, Physical Security, Compliance, etc. are consumers • Relationships are key • Communications – tailored for the consumer – Methods - Indirect v. direct – Tools
  • 38. Citations • Kovacich, Dr. Gerald L., CISSP, CFE, CPP. The information systems security officer's guide, establishing and managing an information protection program. 2nd ed. Butterworth- Heinemann, 2003. Print. 38