SlideShare a Scribd company logo
1 of 15
Information Security Program
Committee
Information Security Department




                      XXXXXXX 20XX
Introduction


2
Introduction
    √ Objective
      Oversee the development, implementation,
      and maintenance of the bank's information
      security program, including assigning specific
      responsibility for its implementation and
      reviewing reports from management.


3
Introduction
√ Information Security Program
     PART 1.    NETWORK SECURITY AND CONTROLS
     PART 2.    CORE PROCESING SYSTEMS SECURITY AND CONTROL
     PART 3.    OTHER SYSTEMS AVAILABILITY, SECURITY AND CONTROLS
     PART 4.    PERSONAL COMPUTERS
     PART 5.    PAPER BASE INFORMATION SECURITY
     PART 6.    SERVICE PROVIDER ADMINISTRATION
     PART 7.    DEBIT / ATM CARDS
     PART 8.    PHYSICAL SECURITY
     PART 9.    EMPLOYEE BACKGROUND CHECKS
     PART 10.   INFORMATION SECURITY PROGRAM COMMITTEE
     PART 11.   ANNUAL REPORTING TO THE BOARD


4
Information Risk Assessment



5
Information Risk Assessment
    √ Annual compliance with the Gramm-Leach-Bliley
      Act (GLBA).
      – Information Security Risk Assessment
             Worked with Integrated Compliance Solutions to
             develop the annual Information Security Risk
             Assessment.
          Information Security Assessment
             Reviewed Compushare’s Vulnerability Test
             Report.

6
Information Security Risk Assessment
    √   Findings: Closed
        –   Controls over the securing of current and next-day backup tapes.
                  Policy and Procedure Modified.
                  Storing current and next-day backup tapes in the computer room.
            Insufficient controls for enterprise-wide automatic lockout settings on all
            PCs
                  Information Security Policy and Program Modified.
                  Enabling automatic lock-out in active domain with standard business practice
                  10 minutes of non-use.
        –   Ensure that all fax cover sheets in every department and branch contain a
            standardized legal disclaimer..
                  Implementation of corporate fax cover sheet, including a standardized legal
                  disclaimer.
        –   Install a polarizing screen at CSR desk.
                  Defined CSR desks in risk.
                  Installed polarizing screen in seven branches.

7
Information Security Risk Assessment

    √ Findings: Open
    “Fax machine uses film-style cartridge which leaves an impression on the film
       ribbon which could disclose confidential information on all faxes received if
       discarded used cartridge is taken by an unauthorized person.”

    Risks Involved:
    √ Reputational
    √ Operational :
              Internal Fraud
              External Fraud
              Legal


8
Faxes Replacement


9
Analysis
     Facsimiles. According to the last asset inventory :
     Total                          38
     Film Ribbon Cartridge (FRC) 14 (36 %)
                                                Branches = 31
                                                FRC 45%
     √ No Control in the ribbon cartridge disposal
     √ No Procedure for discard of used cartridge
     √ Type of ribbon cartridge:
            Brother PC-201

10
Mitigation Options
     Current Options
     √ Facsimile Replacement
     √ Branch Destruction
     √ Third Party Destruction




11
Facsimile Replacement
     √ The IT Department made an extensive Thermal
       Fax Analysis
            Selected Facsimile : Brother Intellifax 4100e
                Laser 15 pages per minute
                Toner Yield: 6000 pages
                Fax, copy, telephone
        –   Discount Trade: Buy back Brother 1270e
     √ Risk Eliminated
     √ One time investment $3,829.00

12
Branch Destruction
     √   Develop a Destruction Procedure
     √   Develop an Internal Control
     √   Branch Manager, Teller and Head Office Supervisor time consumption
     √   Risk Mitigated
     √   Monthly Cost : $6,722.80
     √   Assumptions
             Monthly
                  Branch Manager: 10 minutes
                  Teller: 1 hour
                  Head Office Supervisor: 5 hours
                  Number of Branches Disposal : 8
             Number of Years: 5
             Interest Rate: 5%
             Non Customer Legal Action versus BBVA Bancomer USA for ID Theft



13
Third Party Destruction
     √   Search and Hired Destruction Company
     √   Develop a Confidentiality Agreement
     √   Risk Shifted
     √   Monthly Cost : $3,933.55
     √   Assumptions
            Monthly
                 Branch Manager: 10 minutes
                 Head Office Supervisor: 5 hours
                 Number of Branches Disposal : 8
            Number of Years: 5
            Interest Rate: 5%
            Non Customer Legal Actions versus BBVA Bancomer USA for ID Theft


14
Summary
                       Facsimile            Branch                  Third Party
                      Replacement         Destruction               Destruction
     Present Net     $3,829.00        $6,722.80                 $3,933.55
     Value (5%,5Y)

     Risk            Eliminated       Mitigated                 Shifted
                                      √Branch Manager           √Branch Manager
     Human           None             √Teller                   √Head Office Supervisor
     Resources                        √Head Office Supervisor   √Third Party Manager


     Strength        Risk Eradication Internal Control          Low Cost

     Weakness        One Time         Time                      External
                     Investment       Consuming                 Control
15

More Related Content

What's hot

What's hot (20)

Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Business impact.analysis based on ISO 22301
Business impact.analysis based on ISO 22301Business impact.analysis based on ISO 22301
Business impact.analysis based on ISO 22301
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk management
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
CISSP Chapter 1 BCP
CISSP Chapter 1 BCPCISSP Chapter 1 BCP
CISSP Chapter 1 BCP
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directors
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 

Viewers also liked

Updated Use Case Narratives
Updated Use Case NarrativesUpdated Use Case Narratives
Updated Use Case Narratives
Jhoy Pedreza
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Bill Annibell
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
Jerod Brennen
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
Irsandi Hasan
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 

Viewers also liked (19)

Updated Use Case Narratives
Updated Use Case NarrativesUpdated Use Case Narratives
Updated Use Case Narratives
 
Acitivity diagram
Acitivity diagramAcitivity diagram
Acitivity diagram
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applications
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
 
From ISO to Implementation A framework for ECM Implementation
From ISO to Implementation  A framework for ECM ImplementationFrom ISO to Implementation  A framework for ECM Implementation
From ISO to Implementation A framework for ECM Implementation
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
 
NISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best Practice
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - Mindmap
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Measuring Success - Security KPIs
Measuring Success - Security KPIsMeasuring Success - Security KPIs
Measuring Success - Security KPIs
 

Similar to Information Security Committee Presentation Sample

Ibm odm fraud detection & management system
Ibm odm   fraud detection & management systemIbm odm   fraud detection & management system
Ibm odm fraud detection & management system
sflynn073
 

Similar to Information Security Committee Presentation Sample (20)

ROI On DLP
ROI On DLPROI On DLP
ROI On DLP
 
Business Case For IT Asset Management
Business Case For IT Asset ManagementBusiness Case For IT Asset Management
Business Case For IT Asset Management
 
RISK: When What Can Never Happen — Does
RISK: When What Can Never Happen — DoesRISK: When What Can Never Happen — Does
RISK: When What Can Never Happen — Does
 
idBUSINESS Red Flag Rules For Dentists
idBUSINESS Red Flag Rules For DentistsidBUSINESS Red Flag Rules For Dentists
idBUSINESS Red Flag Rules For Dentists
 
Business Resilience
Business ResilienceBusiness Resilience
Business Resilience
 
Ivanti Neurons - Lunch and Learn
Ivanti Neurons - Lunch and LearnIvanti Neurons - Lunch and Learn
Ivanti Neurons - Lunch and Learn
 
Franklin Press Capabilities Overview
Franklin Press Capabilities OverviewFranklin Press Capabilities Overview
Franklin Press Capabilities Overview
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
 
Bank Branch Statutory Audit
Bank Branch Statutory AuditBank Branch Statutory Audit
Bank Branch Statutory Audit
 
Preparing Your Business For A Disaster
Preparing Your Business For A DisasterPreparing Your Business For A Disaster
Preparing Your Business For A Disaster
 
CFITS Disaster Recovery 2009
CFITS Disaster Recovery 2009CFITS Disaster Recovery 2009
CFITS Disaster Recovery 2009
 
Connected Service: Leveraging M2M and IoT Data to Create Proactive 1:1 Custom...
Connected Service: Leveraging M2M and IoT Data to Create Proactive 1:1 Custom...Connected Service: Leveraging M2M and IoT Data to Create Proactive 1:1 Custom...
Connected Service: Leveraging M2M and IoT Data to Create Proactive 1:1 Custom...
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)
 
Is Software Testing a Zero Sum Game??
Is Software Testing a Zero Sum Game??Is Software Testing a Zero Sum Game??
Is Software Testing a Zero Sum Game??
 
Conducting a fraud audit
Conducting a fraud auditConducting a fraud audit
Conducting a fraud audit
 
2013 PMA Business Security Insights
2013 PMA Business Security Insights2013 PMA Business Security Insights
2013 PMA Business Security Insights
 
Ibm odm fraud detection & management system
Ibm odm   fraud detection & management systemIbm odm   fraud detection & management system
Ibm odm fraud detection & management system
 
Analytics in the Manufacturing industry
Analytics in the Manufacturing industryAnalytics in the Manufacturing industry
Analytics in the Manufacturing industry
 
Newport Computers: IT Asset Recovery Computer Recycling, Refurbished Computer...
Newport Computers: IT Asset Recovery Computer Recycling, Refurbished Computer...Newport Computers: IT Asset Recovery Computer Recycling, Refurbished Computer...
Newport Computers: IT Asset Recovery Computer Recycling, Refurbished Computer...
 
2012 Safety Academy: Compliance Overview
2012 Safety Academy: Compliance Overview2012 Safety Academy: Compliance Overview
2012 Safety Academy: Compliance Overview
 

Information Security Committee Presentation Sample

  • 1. Information Security Program Committee Information Security Department XXXXXXX 20XX
  • 3. Introduction √ Objective Oversee the development, implementation, and maintenance of the bank's information security program, including assigning specific responsibility for its implementation and reviewing reports from management. 3
  • 4. Introduction √ Information Security Program PART 1. NETWORK SECURITY AND CONTROLS PART 2. CORE PROCESING SYSTEMS SECURITY AND CONTROL PART 3. OTHER SYSTEMS AVAILABILITY, SECURITY AND CONTROLS PART 4. PERSONAL COMPUTERS PART 5. PAPER BASE INFORMATION SECURITY PART 6. SERVICE PROVIDER ADMINISTRATION PART 7. DEBIT / ATM CARDS PART 8. PHYSICAL SECURITY PART 9. EMPLOYEE BACKGROUND CHECKS PART 10. INFORMATION SECURITY PROGRAM COMMITTEE PART 11. ANNUAL REPORTING TO THE BOARD 4
  • 6. Information Risk Assessment √ Annual compliance with the Gramm-Leach-Bliley Act (GLBA). – Information Security Risk Assessment Worked with Integrated Compliance Solutions to develop the annual Information Security Risk Assessment. Information Security Assessment Reviewed Compushare’s Vulnerability Test Report. 6
  • 7. Information Security Risk Assessment √ Findings: Closed – Controls over the securing of current and next-day backup tapes. Policy and Procedure Modified. Storing current and next-day backup tapes in the computer room. Insufficient controls for enterprise-wide automatic lockout settings on all PCs Information Security Policy and Program Modified. Enabling automatic lock-out in active domain with standard business practice 10 minutes of non-use. – Ensure that all fax cover sheets in every department and branch contain a standardized legal disclaimer.. Implementation of corporate fax cover sheet, including a standardized legal disclaimer. – Install a polarizing screen at CSR desk. Defined CSR desks in risk. Installed polarizing screen in seven branches. 7
  • 8. Information Security Risk Assessment √ Findings: Open “Fax machine uses film-style cartridge which leaves an impression on the film ribbon which could disclose confidential information on all faxes received if discarded used cartridge is taken by an unauthorized person.” Risks Involved: √ Reputational √ Operational : Internal Fraud External Fraud Legal 8
  • 10. Analysis Facsimiles. According to the last asset inventory : Total 38 Film Ribbon Cartridge (FRC) 14 (36 %) Branches = 31 FRC 45% √ No Control in the ribbon cartridge disposal √ No Procedure for discard of used cartridge √ Type of ribbon cartridge: Brother PC-201 10
  • 11. Mitigation Options Current Options √ Facsimile Replacement √ Branch Destruction √ Third Party Destruction 11
  • 12. Facsimile Replacement √ The IT Department made an extensive Thermal Fax Analysis Selected Facsimile : Brother Intellifax 4100e Laser 15 pages per minute Toner Yield: 6000 pages Fax, copy, telephone – Discount Trade: Buy back Brother 1270e √ Risk Eliminated √ One time investment $3,829.00 12
  • 13. Branch Destruction √ Develop a Destruction Procedure √ Develop an Internal Control √ Branch Manager, Teller and Head Office Supervisor time consumption √ Risk Mitigated √ Monthly Cost : $6,722.80 √ Assumptions Monthly Branch Manager: 10 minutes Teller: 1 hour Head Office Supervisor: 5 hours Number of Branches Disposal : 8 Number of Years: 5 Interest Rate: 5% Non Customer Legal Action versus BBVA Bancomer USA for ID Theft 13
  • 14. Third Party Destruction √ Search and Hired Destruction Company √ Develop a Confidentiality Agreement √ Risk Shifted √ Monthly Cost : $3,933.55 √ Assumptions Monthly Branch Manager: 10 minutes Head Office Supervisor: 5 hours Number of Branches Disposal : 8 Number of Years: 5 Interest Rate: 5% Non Customer Legal Actions versus BBVA Bancomer USA for ID Theft 14
  • 15. Summary Facsimile Branch Third Party Replacement Destruction Destruction Present Net $3,829.00 $6,722.80 $3,933.55 Value (5%,5Y) Risk Eliminated Mitigated Shifted √Branch Manager √Branch Manager Human None √Teller √Head Office Supervisor Resources √Head Office Supervisor √Third Party Manager Strength Risk Eradication Internal Control Low Cost Weakness One Time Time External Investment Consuming Control 15