SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Strategy to Implement a GRC Software Solution
(Governance, Risk, and Compliance)
Keys to Success in Implementing
a GRC Software Solution
 Identify VP Level Sponsor & local Department Champions
 Implement in Phases – guarantee some ‘WINs’
 Develop and Publish a RACI Matrix – explain who does what…?
 Identify Minimum Workflows and Decision‐points
 Data‐Migration – identify key‐data to import and ‘cleanse’ before usage
 Normalize (Key) Roles based on importance, build‐in SoD Security
 Leverage the 80/20 Rule – ok to have exceptions
 Develop a ‘Virtual Org‐Chart’ for system
 Use/ Leverage the ‘SandBox’ Environment – to ‘Test‐Drive’ the system
and ‘get your feet wet…’
 Create ‘simple’ End‐user Documentation / Training Guides
 Implementation Plan – validate the right‐people are free for ‘Go‐Live’
 Document decisions and Configuration values as you go…
 Communicate Goals and ‘sell’ Benefits / ROI to company
“we didn’t Plan to Fail…. we Failed to Plan…”
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Identify Sponsor / Champions
Reason for Most‐Common Failure – Lack of Support & ‘Buy‐in’…
• Enterprise‐Level Projects (like GRC rollouts) will
fail without CxO Sponsorship,
• GRC Projects will require a ‘champion’ from
every key Dept / Line‐function to serve as
liaison and assist in implementation, training
• Regular Communication is essential with all the
Stakeholders, throughout the Project’s life
• Weekly Communication should include –
Status, % Complete, Issues/Risks, and Key
Dates
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Implement the GRC system in ‘Phases’
Guaranteeing some ‘Wins’ will guarantee overall ‘Success’
• Grab the ‘low‐hanging fruit’ (simple functions
like SURVEYs) to show progress, quick ‘wins’
and results, begin to engage the users,
• Phased approach is the ‘safest’ and progress is
easily measured,
• Engage the end‐user to review (and sign‐off) on
all Major changes / updates to GRC System,
• Engage Line‐Management to review / assist in
developing Training Material and format
(e.g. CBT vs Live/In‐person), & take ownership
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Create a RACI Matrix during Design
Give all Users some guidance on ‘who does what’…
• R – responsible
• A – Accountable
• C – Consulted
• I ‐ Informed
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
R
e
q
u
e
s
t
E
x
e
c
u
t
i
o
n
M
a
n
a
g
e
S
c
a
n
n
i
n
g
S
c
h
e
d
u
l
e
C
o
l
l
e
c
t
D
a
t
a
&
A
n
a
l
y
s
i
s
d
o
c
s
/
U
p
l
o
a
d
f
o
r
T
e
s
t
i
n
g
C
o
n
d
u
c
t
S
u
r
v
e
y
s
/
E
x
e
c
u
t
e
S
c
a
n
C
o
l
l
e
c
t
s
/
R
e
v
i
e
w
s
O
u
t
p
u
t
M
e
e
t
i
n
g
‐
R
e
v
i
e
w
R
e
s
u
l
t
s
A
d
d
r
e
s
s
/
R
e
m
e
d
i
a
t
e
/
R
e
s
o
l
v
e
I
s
s
u
e
s
S
u
b
m
i
t
D
o
c
s
,
U
p
d
a
t
e
/
c
l
e
a
n
s
e
,
R
e
I
s
s
u
e
R
e
p
o
r
t
R
e
T
e
s
t
/
V
a
l
i
d
a
t
e
F
i
x
e
s
p
e
r
R
e
m
e
d
i
a
t
i
o
n
CxO / Executive R C I I C
Business Owner R R C R R/A
Program Mgr (Angel) I R / A R R/A C
Developer / Tech SME C I C R R/A
Process Owner C R R R C
Department SME I C R/A ‐‐ ‐‐
Line Manager I C R/A ‐‐ ‐‐
Data‐Migration and ‘Cleansing’
If you don’t need it… don’t pack it up and take it with you.
• Identify Core‐Data and plan to migrate only
‘Key Data’ to the new system
• Take this as an opportunity to ‘cleanse’ your
data / formats – don’t move your old Dirt…
• Focus on the ‘minimum necessary data’ to
integrate into your GRC System (you can add
more later)
• Plan to have your data ‘cleansed’ and ready to
migrate 1 month before ‘Go‐Live’
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Workflows and Required Use‐Cases (minimum)
Implement ‘most‐needed’ / Common Functions 1st – biggest ‘bang’
• Self‐Service User – Password Reset / Change
• Login (access) as Manager
• View (staff) Reports, by Manager
• View Assigned Roles and Available Roles,
• Request basic (minimum) account –Email, Active Dir, etc.
• Provision / Request access to Role – Add (new) user
• Update / Change user access to (role)
• De‐Provision – Remove (delete/terminate) user
• Route Approval‐Request
• Approve Request(s)
• Reject Request(s)
• Request additional info on Request
Integrate Separation‐of‐Duties (SoD) into design of (New) Roles
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Use standard Workflows
Success in GRC depends on – People / Process / Technology
You are in charge of your People… and You acquired the Technology…
but is your Process documented … before you Automate it?…
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Leverage the “80/20” Rule
It’s ok to have ‘exceptions’ as long as they don’t become the Rule
• Should be able to Normalize 80% of the Roles
using only 20% of the overall ‘effort’
• Remaining 20% of the Roles will require the
balance (80%) of the ‘effort’ to standardize…
• Pick your Battles – what Roles are important to
have as ‘exceptions’ – Mgmt / Oversight…?
– Require Line‐Mgmt to ‘defend’ need for exceptions
• GRC will always have ‘exceptions’ – which ones
are important to you / company….?
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Develop a Virtual Org‐Chart
Who is Important in the Company (to use the GRC System) ?
• CxO’s and Legal Dept
• Line‐Management
• Audit / Compliance
• SME’s (subject‐matter experts)
• I/T Support – but …not everybody needs to be included..
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Create / use the ‘SandBox’ Environment
Let the Users / Mgmt get a feel for the system in a ‘safe’ place…
• Allows for Real‐Time Feedback on system,
• Provide Logins for all SME’s and Key
Stakeholders to explore the system,
• Safe‐Environment permits faster adoption of
system
• Allow end‐users way to identify problems and
updates required before Go‐Live,
• Create Action‐List for system‐updates / fixes,
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Documentation / Training Guide
Make it easy to Read / Understand / Follow – using R‐SAM
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Documentation / Training Guide
Use screen‐shots of system’s actual screens to help users navigate and use the software
Make it easy to Read / Understand / Follow – using R‐SAM
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Documentation / Training Guide
Make it easy to Read / Understand / Follow‐ MetricStream
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Documentation / Training Guide
Make it easy to Read / Understand / Follow‐ MetricStream
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Documentation / Training Guide
Make it easy to Read / Understand / Follow‐ MetricStream
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Documentation / Training Guide
Make it easy to Read / Understand / Follow – AVATIER / AIMS
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Documentation / Training Guide
Create a CBT (computer) version for the Remote office / Country staff
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Integrate Risk‐Analysis Process
Automate the Manual Process of Analyzing Risk
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Document Config‐Values and Decisions
Ensure you meet Regulatory / Compliance Requirements as you go…
• Document all Configuration / setup Values ‘as
you go’ when setting up GRC System,
– At minimum, use screen‐prints in a Word file to
track entries and values, will need it later on
• Document all (Key) Decisions by both Tech Staff
and CxO / Management (including Emails),
• Save, backup, and store in duplicate, and
• Will be required for Maintenance / Support /
Regulatory and Compliance‐discussions.
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Implementation Plan for ‘Go‐Live’
A Migration‐Plan will keep the ship heading in the right direction
• Verify your Key people will be available during
the ‘Go‐Live’ period (e.g. vacation / holidays)
• Sync up the GRC Migration with the current
Maintenance Windows calendar
• Confirm Dependency‐Milestone‐dates will be
completed prior to Migration (critical‐path)
• Conduct Desk‐walkthrough of the Migration
Plan to avoid obvious mistakes / oversights,
• Validate that the Target‐Environment is set up
the same as the Test / Sandbox Environment
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Sell Benefits / ROI and Communicate
Facilitate acceptance by selling benefits / communicating Goals to company / Staff
• Leverage Status Reports to ‘spread the word’…
• Document efficiency gained via Usage by SME’s,
• Communicate to all Stakeholders about new
Functionality and Milestones completed,
• Create Login ID’s for all major Stakeholders so
they can ‘see and touch’ the system,
• Use Vendor WhitePapers to impress the overall
Benefits of using the new GRC System,
• Hold company‐wide ‘Kick‐Off’ Announcement
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Role‐Management
Governance (and Review) Process
Start
Provisioning
Security‐Mgmt /
Network‐Mgmt
Bi‐Annual /
QTR Review
Exceptions
Consider
Creation of a
New Role
Document
Mgmt‐Approval
and Signoff
END
Send Request for
New Role to IdM
Roles‐Admin
ROLE‐GOVERNANCE
BOARD
• C I S O / Director of
Security
• Information Security
• Provisioning Staff / Supv
• I/T Service‐Desk
• Human Resources
• Dept Head (s)
Evaluate Individual Cases and Compare Exceptions to Existing Roles
How
Frequently
are New
Roles
Requested
?
How Close
is New Role
to Existing
Roles ?
How
Important
is New Role
to Org ?
Add New Role to
Roles List and
Distribute
REPORT
Exceptions
& Problems
Develop a Process to (regularly) Review / Maintain Key Roles
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
Patrick Angel
Roles: Asst CISO / GRC-Implementation Prog Mgr
Director PMO / Enterprise I/T Security-Architect
Areas: R-SAM / MetricStream / AVATIER (AIMS), COBIT
Framework / ISO-27002 Controls Testing
Education
Bachelors in Information Systems (MIS)
Masters Business Administration (MBA)
Years of Experience
20+ years in Information Systems
15+ years of SDLC and Governance, Risk and Compliance
Hands-on Software Developer, Application-Testing, I-T Auditing
Certifications and Associations include -
(In-progress)
Get Started Now…
‘…Chance favors the prepared Mind’
For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
www.RandomAccessTechnology.com
(214) 826‐3812

Contenu connexe

Similaire à Strategy to Design / Implement a GRC Sys

S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptxS4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
ITAdmin28
 
Linkedin presentation
Linkedin presentationLinkedin presentation
Linkedin presentation
John Dailey
 

Similaire à Strategy to Design / Implement a GRC Sys (20)

DCE - IBM Blueworks LIVE
DCE - IBM Blueworks LIVEDCE - IBM Blueworks LIVE
DCE - IBM Blueworks LIVE
 
ITAM Tools Day, November 2015 - Concorde
ITAM Tools Day, November 2015 - ConcordeITAM Tools Day, November 2015 - Concorde
ITAM Tools Day, November 2015 - Concorde
 
Webinar- Leveraging Reporting-As-A-Service to Improve Agility and Reduce Unit...
Webinar- Leveraging Reporting-As-A-Service to Improve Agility and Reduce Unit...Webinar- Leveraging Reporting-As-A-Service to Improve Agility and Reduce Unit...
Webinar- Leveraging Reporting-As-A-Service to Improve Agility and Reduce Unit...
 
WSO2Con USA 2015: The Needs of Next Generation Giants
WSO2Con USA 2015: The Needs of Next Generation GiantsWSO2Con USA 2015: The Needs of Next Generation Giants
WSO2Con USA 2015: The Needs of Next Generation Giants
 
SAP License Services by Crayon Software Experts
SAP License Services by Crayon Software ExpertsSAP License Services by Crayon Software Experts
SAP License Services by Crayon Software Experts
 
ClearCase Version Importer - a migration tool to Rational Team Concert SCM
ClearCase Version Importer - a migration tool to Rational Team Concert SCMClearCase Version Importer - a migration tool to Rational Team Concert SCM
ClearCase Version Importer - a migration tool to Rational Team Concert SCM
 
Saas challenges and solutions
Saas challenges and solutionsSaas challenges and solutions
Saas challenges and solutions
 
AJC Brochure
AJC BrochureAJC Brochure
AJC Brochure
 
Click Earn Grow 2009 Original Concept Next Generation Online Betting Technolo...
Click Earn Grow 2009 Original Concept Next Generation Online Betting Technolo...Click Earn Grow 2009 Original Concept Next Generation Online Betting Technolo...
Click Earn Grow 2009 Original Concept Next Generation Online Betting Technolo...
 
Accelerating Application Development and Rollout for Business
Accelerating Application Development and Rollout for BusinessAccelerating Application Development and Rollout for Business
Accelerating Application Development and Rollout for Business
 
D365 crm on-premise to d365 online migration
D365   crm on-premise to d365 online migrationD365   crm on-premise to d365 online migration
D365 crm on-premise to d365 online migration
 
Presentation on six sigma
Presentation on six sigmaPresentation on six sigma
Presentation on six sigma
 
Building a scalable and profitable saa s business model
Building a scalable and profitable saa s business modelBuilding a scalable and profitable saa s business model
Building a scalable and profitable saa s business model
 
Slcm webinar
Slcm webinarSlcm webinar
Slcm webinar
 
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptxS4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
 
Impact 2012 1640 - BPM Design considerations when optimizing business process...
Impact 2012 1640 - BPM Design considerations when optimizing business process...Impact 2012 1640 - BPM Design considerations when optimizing business process...
Impact 2012 1640 - BPM Design considerations when optimizing business process...
 
Sell Security Programs To Sr Mgt
Sell Security Programs To Sr MgtSell Security Programs To Sr Mgt
Sell Security Programs To Sr Mgt
 
Crm implementation (oracle)
Crm implementation (oracle)Crm implementation (oracle)
Crm implementation (oracle)
 
Linkedin presentation
Linkedin presentationLinkedin presentation
Linkedin presentation
 
Hiran Hari_CV
Hiran Hari_CVHiran Hari_CV
Hiran Hari_CV
 

Dernier

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Dernier (20)

Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 

Strategy to Design / Implement a GRC Sys

  • 1. Strategy to Implement a GRC Software Solution (Governance, Risk, and Compliance)
  • 2. Keys to Success in Implementing a GRC Software Solution  Identify VP Level Sponsor & local Department Champions  Implement in Phases – guarantee some ‘WINs’  Develop and Publish a RACI Matrix – explain who does what…?  Identify Minimum Workflows and Decision‐points  Data‐Migration – identify key‐data to import and ‘cleanse’ before usage  Normalize (Key) Roles based on importance, build‐in SoD Security  Leverage the 80/20 Rule – ok to have exceptions  Develop a ‘Virtual Org‐Chart’ for system  Use/ Leverage the ‘SandBox’ Environment – to ‘Test‐Drive’ the system and ‘get your feet wet…’  Create ‘simple’ End‐user Documentation / Training Guides  Implementation Plan – validate the right‐people are free for ‘Go‐Live’  Document decisions and Configuration values as you go…  Communicate Goals and ‘sell’ Benefits / ROI to company “we didn’t Plan to Fail…. we Failed to Plan…” For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 3. Identify Sponsor / Champions Reason for Most‐Common Failure – Lack of Support & ‘Buy‐in’… • Enterprise‐Level Projects (like GRC rollouts) will fail without CxO Sponsorship, • GRC Projects will require a ‘champion’ from every key Dept / Line‐function to serve as liaison and assist in implementation, training • Regular Communication is essential with all the Stakeholders, throughout the Project’s life • Weekly Communication should include – Status, % Complete, Issues/Risks, and Key Dates For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 4. Implement the GRC system in ‘Phases’ Guaranteeing some ‘Wins’ will guarantee overall ‘Success’ • Grab the ‘low‐hanging fruit’ (simple functions like SURVEYs) to show progress, quick ‘wins’ and results, begin to engage the users, • Phased approach is the ‘safest’ and progress is easily measured, • Engage the end‐user to review (and sign‐off) on all Major changes / updates to GRC System, • Engage Line‐Management to review / assist in developing Training Material and format (e.g. CBT vs Live/In‐person), & take ownership For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 5. Create a RACI Matrix during Design Give all Users some guidance on ‘who does what’… • R – responsible • A – Accountable • C – Consulted • I ‐ Informed For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA® R e q u e s t E x e c u t i o n M a n a g e S c a n n i n g S c h e d u l e C o l l e c t D a t a & A n a l y s i s d o c s / U p l o a d f o r T e s t i n g C o n d u c t S u r v e y s / E x e c u t e S c a n C o l l e c t s / R e v i e w s O u t p u t M e e t i n g ‐ R e v i e w R e s u l t s A d d r e s s / R e m e d i a t e / R e s o l v e I s s u e s S u b m i t D o c s , U p d a t e / c l e a n s e , R e I s s u e R e p o r t R e T e s t / V a l i d a t e F i x e s p e r R e m e d i a t i o n CxO / Executive R C I I C Business Owner R R C R R/A Program Mgr (Angel) I R / A R R/A C Developer / Tech SME C I C R R/A Process Owner C R R R C Department SME I C R/A ‐‐ ‐‐ Line Manager I C R/A ‐‐ ‐‐
  • 6. Data‐Migration and ‘Cleansing’ If you don’t need it… don’t pack it up and take it with you. • Identify Core‐Data and plan to migrate only ‘Key Data’ to the new system • Take this as an opportunity to ‘cleanse’ your data / formats – don’t move your old Dirt… • Focus on the ‘minimum necessary data’ to integrate into your GRC System (you can add more later) • Plan to have your data ‘cleansed’ and ready to migrate 1 month before ‘Go‐Live’ For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 7. Workflows and Required Use‐Cases (minimum) Implement ‘most‐needed’ / Common Functions 1st – biggest ‘bang’ • Self‐Service User – Password Reset / Change • Login (access) as Manager • View (staff) Reports, by Manager • View Assigned Roles and Available Roles, • Request basic (minimum) account –Email, Active Dir, etc. • Provision / Request access to Role – Add (new) user • Update / Change user access to (role) • De‐Provision – Remove (delete/terminate) user • Route Approval‐Request • Approve Request(s) • Reject Request(s) • Request additional info on Request Integrate Separation‐of‐Duties (SoD) into design of (New) Roles For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 8. Use standard Workflows Success in GRC depends on – People / Process / Technology You are in charge of your People… and You acquired the Technology… but is your Process documented … before you Automate it?… For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 9. Leverage the “80/20” Rule It’s ok to have ‘exceptions’ as long as they don’t become the Rule • Should be able to Normalize 80% of the Roles using only 20% of the overall ‘effort’ • Remaining 20% of the Roles will require the balance (80%) of the ‘effort’ to standardize… • Pick your Battles – what Roles are important to have as ‘exceptions’ – Mgmt / Oversight…? – Require Line‐Mgmt to ‘defend’ need for exceptions • GRC will always have ‘exceptions’ – which ones are important to you / company….? For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 10. Develop a Virtual Org‐Chart Who is Important in the Company (to use the GRC System) ? • CxO’s and Legal Dept • Line‐Management • Audit / Compliance • SME’s (subject‐matter experts) • I/T Support – but …not everybody needs to be included.. For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 11. Create / use the ‘SandBox’ Environment Let the Users / Mgmt get a feel for the system in a ‘safe’ place… • Allows for Real‐Time Feedback on system, • Provide Logins for all SME’s and Key Stakeholders to explore the system, • Safe‐Environment permits faster adoption of system • Allow end‐users way to identify problems and updates required before Go‐Live, • Create Action‐List for system‐updates / fixes, For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 12. Documentation / Training Guide Make it easy to Read / Understand / Follow – using R‐SAM For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 13. Documentation / Training Guide Use screen‐shots of system’s actual screens to help users navigate and use the software Make it easy to Read / Understand / Follow – using R‐SAM For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 14. Documentation / Training Guide Make it easy to Read / Understand / Follow‐ MetricStream For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 15. Documentation / Training Guide Make it easy to Read / Understand / Follow‐ MetricStream For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 16. Documentation / Training Guide Make it easy to Read / Understand / Follow‐ MetricStream For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 17. Documentation / Training Guide Make it easy to Read / Understand / Follow – AVATIER / AIMS For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 18. Documentation / Training Guide Create a CBT (computer) version for the Remote office / Country staff For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 19. Integrate Risk‐Analysis Process Automate the Manual Process of Analyzing Risk For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 20. Document Config‐Values and Decisions Ensure you meet Regulatory / Compliance Requirements as you go… • Document all Configuration / setup Values ‘as you go’ when setting up GRC System, – At minimum, use screen‐prints in a Word file to track entries and values, will need it later on • Document all (Key) Decisions by both Tech Staff and CxO / Management (including Emails), • Save, backup, and store in duplicate, and • Will be required for Maintenance / Support / Regulatory and Compliance‐discussions. For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 21. Implementation Plan for ‘Go‐Live’ A Migration‐Plan will keep the ship heading in the right direction • Verify your Key people will be available during the ‘Go‐Live’ period (e.g. vacation / holidays) • Sync up the GRC Migration with the current Maintenance Windows calendar • Confirm Dependency‐Milestone‐dates will be completed prior to Migration (critical‐path) • Conduct Desk‐walkthrough of the Migration Plan to avoid obvious mistakes / oversights, • Validate that the Target‐Environment is set up the same as the Test / Sandbox Environment For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 22. Sell Benefits / ROI and Communicate Facilitate acceptance by selling benefits / communicating Goals to company / Staff • Leverage Status Reports to ‘spread the word’… • Document efficiency gained via Usage by SME’s, • Communicate to all Stakeholders about new Functionality and Milestones completed, • Create Login ID’s for all major Stakeholders so they can ‘see and touch’ the system, • Use Vendor WhitePapers to impress the overall Benefits of using the new GRC System, • Hold company‐wide ‘Kick‐Off’ Announcement For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 23. Role‐Management Governance (and Review) Process Start Provisioning Security‐Mgmt / Network‐Mgmt Bi‐Annual / QTR Review Exceptions Consider Creation of a New Role Document Mgmt‐Approval and Signoff END Send Request for New Role to IdM Roles‐Admin ROLE‐GOVERNANCE BOARD • C I S O / Director of Security • Information Security • Provisioning Staff / Supv • I/T Service‐Desk • Human Resources • Dept Head (s) Evaluate Individual Cases and Compare Exceptions to Existing Roles How Frequently are New Roles Requested ? How Close is New Role to Existing Roles ? How Important is New Role to Org ? Add New Role to Roles List and Distribute REPORT Exceptions & Problems Develop a Process to (regularly) Review / Maintain Key Roles For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA®
  • 24. Patrick Angel Roles: Asst CISO / GRC-Implementation Prog Mgr Director PMO / Enterprise I/T Security-Architect Areas: R-SAM / MetricStream / AVATIER (AIMS), COBIT Framework / ISO-27002 Controls Testing Education Bachelors in Information Systems (MIS) Masters Business Administration (MBA) Years of Experience 20+ years in Information Systems 15+ years of SDLC and Governance, Risk and Compliance Hands-on Software Developer, Application-Testing, I-T Auditing Certifications and Associations include - (In-progress)
  • 25. Get Started Now… ‘…Chance favors the prepared Mind’ For customers of Random Access Technologies, Inc. only ‐ Patrick Angel, CISM® CRISC® CISA® www.RandomAccessTechnology.com (214) 826‐3812