SlideShare une entreprise Scribd logo
1  sur  11
 Information Security Program  Program Elements  Administration and Oversight  Information Security Council  Getting Started – Next Steps  Logistics
Information Security Program Umbrella framework for the ongoing stewardship of personal information, risk management and compliance efforts Developed in order to comply with stated or implied mandates as specified by multiple legal statutes, regulations, executive orders and contractual agreements Incorporates recommendations from the Commonwealth of Massachusetts Office of the State Auditor Formally establishes information security as an institutional priority and a shared responsibility among all academic departments, administrative offices and third party service providers Establish and maintain ongoing practices that mitigate potential financial, legal, operational, and/or reputational consequences of a security breach, system failure, and non-compliance
Program Elements Records Management  Access Controls Technical and Operational Safeguards Procurement Standards Workforce Hiring and Ongoing Training Risk Management Incident Response
Program Administration & Oversight President’s Council (joint oversight of institutional provisions) Information Security Council*(implements, reviews and updates the Program with input and involvement from relevant administrative offices, academic departments and third party service providers) Vice Presidents (ensure appropriate and auditable information security controls implemented within division and job descriptions include individual responsibilities related to information security) Cross Functional Administrative and Student InformationManagement Team (develops, recommends, and implements approved policies that support broad institutional commitment to stewardship of institutional data) Data Incident Response Team (determines what follow-up may be required in response to any major or significant incident that warrants investigation including triage, escalation, and/or notification)
Information Security Council Develop action plans based on third party risk assessments, compliance audits and applicable mandates  Provide relevant administrative offices and academic departments with support and guidance Ensure that general awareness and training is made available Identify and address (accept, mitigate or transfer) reasonably foreseeable internal and external risks to the security of protected information and systems Evaluate the effectiveness of safeguards for controlling these risks Regularly monitor and evaluate the effectiveness of applied aspects of the Program at least annually, or whenever there is a material change in administrative practices and/or academic programs that may have implications for the security or integrity of PI
So Where Do We Start? Develop and/or Update Policies Develop and Rollout Annual Awareness and Training Implement an Identity Management Solution Complete Remaining Payment Card Industry Data Security Standard (PCI DSS) Remediation Complete Annual PCI DSS Risk Assessment and Attestation of Compliance
Policies Records Management Online Identity Management* Data Stewardship Security Breach Response Plan* Payment Processing
Awareness and Training Increase Awareness - Students Inform and Build Knowledge – Faculty and Staff* Application of Knowledge – Faculty and Staff Master Concepts, Rules and Regulations – Faculty and Staff
PCI DSS Remediation (Complete by March 31st) Documentation of Policies and Procedures Awareness and Training Administration of Access Privileges Implementation of Technical and Operational Safeguards Develop and Communicate Incident Response Plan for Suspected or Actual Security Breach
PCI DSS Compliance (Complete by April 30th) Lighthouse Audit (Begins April 1st and Ends April 30th) Documentation of Policies and Procedures Documentation of Payment Processing Environment Network Scanning and Vulnerability Test Results Interviews Walkthroughs Third Party Certifications of Compliance Self-Assessment Questionnaire and Attestation of Compliance
Logistics Scheduling of Meetings Collaboration Outside of Meetings Gathering Input from the Community Communicating Out to the Community

Contenu connexe

Tendances

4 users an inseparable part of a system
4 users   an inseparable part of a system4 users   an inseparable part of a system
4 users an inseparable part of a systemHaa'Meem Mohiyuddin
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit ProcessRam Srivastava
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuillermo Remache
 
Control System Cyber Security - A Different Approach
Control System Cyber Security - A Different ApproachControl System Cyber Security - A Different Approach
Control System Cyber Security - A Different ApproachJim Cahill
 
Security
SecuritySecurity
Securitya1aass
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuityDhani Ahmad
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke PatchlinkBen Rothke
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...Dr. Rosemarie Sibbaluca-Guirre
 
Blue and orange bar marketing presentation
Blue and orange bar marketing presentationBlue and orange bar marketing presentation
Blue and orange bar marketing presentationabhishek1712
 
Software asset management
Software asset managementSoftware asset management
Software asset managementICSM 2010
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanBill Ross
 
ICT Implementation Process
ICT Implementation ProcessICT Implementation Process
ICT Implementation ProcessChanda Nsofu
 

Tendances (20)

Chapter005
Chapter005Chapter005
Chapter005
 
4 users an inseparable part of a system
4 users   an inseparable part of a system4 users   an inseparable part of a system
4 users an inseparable part of a system
 
Chapter008
Chapter008Chapter008
Chapter008
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit Process
 
Security audit
Security auditSecurity audit
Security audit
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information Systems
 
Control System Cyber Security - A Different Approach
Control System Cyber Security - A Different ApproachControl System Cyber Security - A Different Approach
Control System Cyber Security - A Different Approach
 
Security
SecuritySecurity
Security
 
Auditing information System
Auditing information SystemAuditing information System
Auditing information System
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
 
Security Audit View
Security Audit ViewSecurity Audit View
Security Audit View
 
Models and approaches to decentralized evaluation system - considerations for...
Models and approaches to decentralized evaluation system - considerations for...Models and approaches to decentralized evaluation system - considerations for...
Models and approaches to decentralized evaluation system - considerations for...
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...
 
Blue and orange bar marketing presentation
Blue and orange bar marketing presentationBlue and orange bar marketing presentation
Blue and orange bar marketing presentation
 
Facets of Educational Technology
Facets of Educational TechnologyFacets of Educational Technology
Facets of Educational Technology
 
Software asset management
Software asset managementSoftware asset management
Software asset management
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition Plan
 
Expert systems
Expert systemsExpert systems
Expert systems
 
ICT Implementation Process
ICT Implementation ProcessICT Implementation Process
ICT Implementation Process
 

Similaire à Establish an Information Security Program

Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfpriyanshamadhwal2
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
Roger Sloan Resume
Roger Sloan ResumeRoger Sloan Resume
Roger Sloan ResumeRoger Sloan
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Rbms 45 Min Tfm Show Final 4.10.06
Rbms 45 Min Tfm Show Final 4.10.06Rbms 45 Min Tfm Show Final 4.10.06
Rbms 45 Min Tfm Show Final 4.10.06rpetitte
 
Toler Resume 2016
Toler Resume 2016Toler Resume 2016
Toler Resume 2016Pat Toler
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
QI Security Framework_v2007_7
QI Security Framework_v2007_7QI Security Framework_v2007_7
QI Security Framework_v2007_7Hong Sin Kwek
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016Leon Blum
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 
Professional Roles and Responsibilities
Professional Roles and ResponsibilitiesProfessional Roles and Responsibilities
Professional Roles and ResponsibilitiesMahesh Hiremath
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxAzra'ee Mamat
 
Professional Roles and Responsibilities
Professional Roles and ResponsibilitiesProfessional Roles and Responsibilities
Professional Roles and ResponsibilitiesMahesh Hiremath
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
Key Safety Initiatives1
Key Safety Initiatives1Key Safety Initiatives1
Key Safety Initiatives1wallstreet1
 

Similaire à Establish an Information Security Program (20)

Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdf
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Roger Sloan Resume
Roger Sloan ResumeRoger Sloan Resume
Roger Sloan Resume
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Rbms 45 Min Tfm Show Final 4.10.06
Rbms 45 Min Tfm Show Final 4.10.06Rbms 45 Min Tfm Show Final 4.10.06
Rbms 45 Min Tfm Show Final 4.10.06
 
Matrix consultancy services
Matrix consultancy servicesMatrix consultancy services
Matrix consultancy services
 
Toler Resume 2016
Toler Resume 2016Toler Resume 2016
Toler Resume 2016
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
QI Security Framework_v2007_7
QI Security Framework_v2007_7QI Security Framework_v2007_7
QI Security Framework_v2007_7
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
Professional Roles and Responsibilities
Professional Roles and ResponsibilitiesProfessional Roles and Responsibilities
Professional Roles and Responsibilities
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptx
 
Professional Roles and Responsibilities
Professional Roles and ResponsibilitiesProfessional Roles and Responsibilities
Professional Roles and Responsibilities
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Key Safety Initiatives1
Key Safety Initiatives1Key Safety Initiatives1
Key Safety Initiatives1
 

Establish an Information Security Program

  • 1. Information Security Program Program Elements Administration and Oversight Information Security Council Getting Started – Next Steps Logistics
  • 2. Information Security Program Umbrella framework for the ongoing stewardship of personal information, risk management and compliance efforts Developed in order to comply with stated or implied mandates as specified by multiple legal statutes, regulations, executive orders and contractual agreements Incorporates recommendations from the Commonwealth of Massachusetts Office of the State Auditor Formally establishes information security as an institutional priority and a shared responsibility among all academic departments, administrative offices and third party service providers Establish and maintain ongoing practices that mitigate potential financial, legal, operational, and/or reputational consequences of a security breach, system failure, and non-compliance
  • 3. Program Elements Records Management Access Controls Technical and Operational Safeguards Procurement Standards Workforce Hiring and Ongoing Training Risk Management Incident Response
  • 4. Program Administration & Oversight President’s Council (joint oversight of institutional provisions) Information Security Council*(implements, reviews and updates the Program with input and involvement from relevant administrative offices, academic departments and third party service providers) Vice Presidents (ensure appropriate and auditable information security controls implemented within division and job descriptions include individual responsibilities related to information security) Cross Functional Administrative and Student InformationManagement Team (develops, recommends, and implements approved policies that support broad institutional commitment to stewardship of institutional data) Data Incident Response Team (determines what follow-up may be required in response to any major or significant incident that warrants investigation including triage, escalation, and/or notification)
  • 5. Information Security Council Develop action plans based on third party risk assessments, compliance audits and applicable mandates Provide relevant administrative offices and academic departments with support and guidance Ensure that general awareness and training is made available Identify and address (accept, mitigate or transfer) reasonably foreseeable internal and external risks to the security of protected information and systems Evaluate the effectiveness of safeguards for controlling these risks Regularly monitor and evaluate the effectiveness of applied aspects of the Program at least annually, or whenever there is a material change in administrative practices and/or academic programs that may have implications for the security or integrity of PI
  • 6. So Where Do We Start? Develop and/or Update Policies Develop and Rollout Annual Awareness and Training Implement an Identity Management Solution Complete Remaining Payment Card Industry Data Security Standard (PCI DSS) Remediation Complete Annual PCI DSS Risk Assessment and Attestation of Compliance
  • 7. Policies Records Management Online Identity Management* Data Stewardship Security Breach Response Plan* Payment Processing
  • 8. Awareness and Training Increase Awareness - Students Inform and Build Knowledge – Faculty and Staff* Application of Knowledge – Faculty and Staff Master Concepts, Rules and Regulations – Faculty and Staff
  • 9. PCI DSS Remediation (Complete by March 31st) Documentation of Policies and Procedures Awareness and Training Administration of Access Privileges Implementation of Technical and Operational Safeguards Develop and Communicate Incident Response Plan for Suspected or Actual Security Breach
  • 10. PCI DSS Compliance (Complete by April 30th) Lighthouse Audit (Begins April 1st and Ends April 30th) Documentation of Policies and Procedures Documentation of Payment Processing Environment Network Scanning and Vulnerability Test Results Interviews Walkthroughs Third Party Certifications of Compliance Self-Assessment Questionnaire and Attestation of Compliance
  • 11. Logistics Scheduling of Meetings Collaboration Outside of Meetings Gathering Input from the Community Communicating Out to the Community