Mitigating Application Risk
Upfront
Without increased hair loss Randy Moeller
Randy Moeller - Bio
• Global Records & Information Governance Manager
• 35 years in RIM
• Usual responsibilities (policy, certification, RRS etc.)
• RRS online since 1985
• 70% time on iRisk/IT consulting
P&G
• 93k employees, 60+ countries
• 66 brand lines, 170+ countries
• 9 entrepreneurial businesses
• 10k applications (most with DB)
• Make, pack, ship - #1 daily job
Governance in P&G – brief history
• 2008 – First Team; Ethics, RIM, Information Security
• 2009 – Launched combined training, saved work 80k hrs.
• 2010 – Governance, Risk & Compliance formed
• RIM included in Business Conduct
• 2013 – iRisk launched (application compliance review)
• 2015 – iRisk2 launched (self assessment added)
• 2018 – iRisk3 launched (concierge service added)
iRisk?
• Application risk review/mitigate process
• Built on RSA’s Archer platform
• Use of workflow stages
• Upfront Concierge Service
• Questionnaire determines compliance groups
• Enterprise Architecture & InfoSec next
• Rest of compliance groups
Why? Data wreck.
Security not properly designed
Use of ‘free’ apps
Questionable cloud/SaaS sites
Piles of useless information
Bleeding information = money
publicdomainpictures.net
Compliance Groups
• Employee Relations
• Global Security
• IT Continuity
• Labor Relations
• Network Capacity
• Privacy
• Germany IT
• Payment Card
• Rec & Info Governance
• Reg Computer Validation
• Tax
• 3rd Party Risk Management
• Legal/IP
Create Assessment
Title, geography, etc.
MEGA – application about applications
- Regulated
- PII
- Sox
- Vendor
- Business impact assessment
- Data classification
Concierge
Architecture & InfoSec
Records & Information Governance
• Database Name
• System or Application Name
• Type of Data
• Legal Entities
• Data Age Range
• Record Series & Record Name
• Company official or copy records
• Retention time
• Records Review & Disposal Process, Auto,
Semi-auto, Manual
• Outline disposal logic to identify records
to be destroyed
• Title of document that contains the
Record Review & Disposal process
• Downstream system(s) that receive feeds
from this application
• Upstream systems(s) that sends data to
this application
Compliance Area
Status
Awaiting Review = my Inbox to review
Rest represents it will be, has been and will
be again
The hook?
Incorporated into two development
processes
• SIMPL – Standard development process
for project not led by IT
• IT Stewardship Checklist – Used by IT
when they lead a project
No iRisk = no further funding
Internal Audit ding
This Photo by Unknown Author is licensed under CC BY
The Good
• Apps are compliant
• Process flow is right
• Concierge
• No fixed meetings with unprepared folks
• Architecture and InfoSec consulting
• Reminder emails to assessment owners
• Past assessments as a foundation
The Bad
• Concierge, Architecture & InfoSec staff availability
• No fixed meeting with well prepared folks
• More investigating, questions
• Email intensive
• No automated ‘on hold’ process
• Reporting needs work
The Ugly
• Be careful of what you ask for
• 2015/16 – 479 assessments
• 2017/18 – 750 assessments
• 30-60% first time users
• The lazy few
Starting Point
• Don’t have $$$?
• See posted Excel file
Thank You
• Randy Moeller
• moeller.rj@pg.com
• @RJMrim – Twitter
• www.linkedin.com/in/rjmpg

Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair Loss)

  • 1.
    Mitigating Application Risk Upfront Withoutincreased hair loss Randy Moeller
  • 2.
    Randy Moeller -Bio • Global Records & Information Governance Manager • 35 years in RIM • Usual responsibilities (policy, certification, RRS etc.) • RRS online since 1985 • 70% time on iRisk/IT consulting
  • 3.
    P&G • 93k employees,60+ countries • 66 brand lines, 170+ countries • 9 entrepreneurial businesses • 10k applications (most with DB) • Make, pack, ship - #1 daily job
  • 4.
    Governance in P&G– brief history • 2008 – First Team; Ethics, RIM, Information Security • 2009 – Launched combined training, saved work 80k hrs. • 2010 – Governance, Risk & Compliance formed • RIM included in Business Conduct • 2013 – iRisk launched (application compliance review) • 2015 – iRisk2 launched (self assessment added) • 2018 – iRisk3 launched (concierge service added)
  • 5.
    iRisk? • Application riskreview/mitigate process • Built on RSA’s Archer platform • Use of workflow stages • Upfront Concierge Service • Questionnaire determines compliance groups • Enterprise Architecture & InfoSec next • Rest of compliance groups
  • 6.
    Why? Data wreck. Securitynot properly designed Use of ‘free’ apps Questionable cloud/SaaS sites Piles of useless information Bleeding information = money publicdomainpictures.net
  • 7.
    Compliance Groups • EmployeeRelations • Global Security • IT Continuity • Labor Relations • Network Capacity • Privacy • Germany IT • Payment Card • Rec & Info Governance • Reg Computer Validation • Tax • 3rd Party Risk Management • Legal/IP
  • 8.
    Create Assessment Title, geography,etc. MEGA – application about applications - Regulated - PII - Sox - Vendor - Business impact assessment - Data classification
  • 9.
  • 10.
  • 12.
    Records & InformationGovernance • Database Name • System or Application Name • Type of Data • Legal Entities • Data Age Range • Record Series & Record Name • Company official or copy records • Retention time • Records Review & Disposal Process, Auto, Semi-auto, Manual • Outline disposal logic to identify records to be destroyed • Title of document that contains the Record Review & Disposal process • Downstream system(s) that receive feeds from this application • Upstream systems(s) that sends data to this application
  • 13.
    Compliance Area Status Awaiting Review= my Inbox to review Rest represents it will be, has been and will be again
  • 14.
    The hook? Incorporated intotwo development processes • SIMPL – Standard development process for project not led by IT • IT Stewardship Checklist – Used by IT when they lead a project No iRisk = no further funding Internal Audit ding This Photo by Unknown Author is licensed under CC BY
  • 15.
    The Good • Appsare compliant • Process flow is right • Concierge • No fixed meetings with unprepared folks • Architecture and InfoSec consulting • Reminder emails to assessment owners • Past assessments as a foundation
  • 16.
    The Bad • Concierge,Architecture & InfoSec staff availability • No fixed meeting with well prepared folks • More investigating, questions • Email intensive • No automated ‘on hold’ process • Reporting needs work
  • 17.
    The Ugly • Becareful of what you ask for • 2015/16 – 479 assessments • 2017/18 – 750 assessments • 30-60% first time users • The lazy few
  • 18.
    Starting Point • Don’thave $$$? • See posted Excel file
  • 19.
    Thank You • RandyMoeller • moeller.rj@pg.com • @RJMrim – Twitter • www.linkedin.com/in/rjmpg