Management Awareness Training Boilerplate

advertisement
Awareness Training Series
Management
Awareness Training
Dan Hadaway CISA, CISM
Managing Partner
infotex
infotex
Objectives
• What is IT Governance, and what does a
typical IT Governance program look like?
• What is the management team’s role in
the IT Governance Program?
• What is the ISO’s role?
• What should the management team know
to ensure proper IT Governance?
• How can management help manage
technology risk?
infotex
Today’s Agenda
• Management Awareness Resources
• Five Tenets of IT Governance
• The IT Governance Program
–
–
–
–
The Risk Assessment
Information Technology Audits
Vendor Due Diligence
Awareness Training
• New Risks for 2011/2012
• The 2011 Audit Results
infotex
Today’s Agenda
• Management Awareness Resources
• Five Tenets of IT Governance
• The IT Governance Program
–
–
–
–
The Risk Assessment
Information Technology Audits
Vendor Due Diligence
Awareness Training
• New Risks for 2011/2012
• The 2011 Audit Results
infotex
In this next section
• We will become familiar with the
“workshop portal” and this
presentation.
• We will hear credentials that can be
used to log onto the workshop
portal.
• We will learn what is on the
“workshop portal.”
infotex
Available Tools . . .
•
•
•
•
IT Audit Test Types
The ISO Job Description
Awareness Training Procedure
Management Awareness
Training Procedure
• Governance Policy
Development Chart
infotex
Available Tools . . .
• Management Guidelines for
Social Media
• User Guidelines for Social
Media
• Management Talking Points for
Mobile Banking and Social
Media
infotex
Available Tools . . .
• Wireless Banking Article
(Top Five Risks)
• Wireless Banking Article
• Wireless Banking Risk
Assessment
• Wireless Banking Due
Diligence Kit
infotex
Our Credentials
• Information Security
–
–
–
–
CISAs, CISMs, CISSPs
Developed my first AUP in 1988
Updating our process annually
Been doing Annual UAT for banks since 2002
• GLBA, BSA, OFAC, FACTA, HIPAA
• Assessments, IT Audits, Consulting
• Managed Services (Network Monitoring)
infotex
Nomenclature
• Information Security Strategy
• Information Security Program
• IT Risk Management Program
• IT Governance Program
Essentially the same thing.
infotex
IT Governance Program
• Combines:
– Serve Business Mission
– Manage Technology Risk
(information security)
infotex
Today’s Agenda
• Management Awareness Resources
• Five Tenets of IT Governance
• The IT Governance Program
–
–
–
–
The Risk Assessment
Information Technology Audits
Vendor Due Diligence
Awareness Training
• New Risks for 2011/2012
• The 2011 Audit Results
infotex
In this next section
• We will learn five basic tenets of IT
Governance that all management
team members should know.
• We will learn why IT Governance is
concerned with Risk Management
• We will learn “the one control” and
why this workshop is important.
infotex
infotex
#1: Serve the Mission
Information Technology must
be aligned with the Business
Strategy of the bank!
infotex
Strategy Alignment
• Facilitate business tactics
– Assists in business processes
– Creates a competitive edge
– Increases Communication with “all four
corners of the bank” especially
customers.
– Provides accurate information to
management
infotex
Strategy Alignment
• Deliver a Return on Investment
– Tangible Return
• Check 21 takes advantage of quicker check
processing. Imaging System reduces paper
costs.
• Fees charged for various services.
– Intangible Return
• Firewall mitigates risk of internet hacking.
• On-line Banking provides convenience to
customers.
infotex
Management Role
• Determine technologies that will best
facilitate business tactics.
• Determine appropriate time to
deploy new technologies
(Apply Pressure)
infotex
Management Role
• Search and Selection Process
– Cost/Benefit  Benefit/Risk  When???
– Risk Analysis
– Requirements Definition
– Request for Proposal
infotex
Management Role
• Negotiate Contracts
(as per Vendor Management Procedure)
• Implementation
– From a user perspective
– Return to risk analysis
– Return to cost/benefit analysis
– Return to features analysis
• Ongoing Vendor Due Diligence
(as per Vendor Management Procedure)
infotex
When is the appropriate time?
infotex
infotex
1. Align IT with Business Strategy
Roger’s Diffusion Theory of Innovation
• Innovators
• Early adopters
• Early majority
• Late majority
• Laggards
Everett M. Rogers' Diffusion of Innovations
infotex
1. Align IT with Business Strategy
Stages of Innovation
• Knowledge
• Persuasion
• Decision
• Implementation
Risk
Assessment?
Security
Controls
• Confirmation
Everett M. Rogers' Diffusion of Innovations
infotex
1. Align IT with Business Strategy
Early Adopters in Banking
• Physical Security
• Information Security
Dan’s Interpretation of Everett M. Rogers' Diffusion of Innovations
infotex
1. Align IT with Business Strategy
Late Majority / Laggard
• Virtualization
• Cloud Computing
• Social Media
• Telecommuting
Softwareforcloudcomputing.com
Dan’s Interpretation of Everett M. Rogers' Diffusion of Innovations
infotex
1. Align IT with Business Strategy
Risk/Benefit Evolution Curve
Value
Price, Problems
Features, Sophistication
Time
infotex
1. Align IT with Business Strategy
Risk/Benefit Evolution Curve
Value
Price, Problems
Features, Sophistication
Time
infotex
1. Align IT with Business Strategy
Risk/Benefit Evolution Curve
Price, Problems
Value
Early Majority
Late Majority
Laggards
Innovator
Early Adopter
Features, Sophistication
Time
Digital Video Security
• Innovators
• Early adopters
• Early majority
• Late majority
• Laggards
2012
infotex
Secure Messaging
• Innovators
• Early adopters
• Early majority
• Late majority
• Laggards
2012
infotex
Remote Access in Banks
• Innovators
• Early adopters
• Early majority
• Late majority
• Laggards
2010
infotex
Social Media in Banks
• Innovators
• Early adopters
• Early majority
• Late majority
• Laggards
2011
infotex
Wireless Banking
• Innovators
• Early adopters
• Early majority
• Late majority
• Laggards
2013
infotex
infotex
#2: Manage the Risk
Information,
Technology,
and Information Technology
expose the bank to risk!
infotex
#2) The Risk Spectrum
• There is no such
thing as 100%
security!
Ignore it?
Obsession?
infotex
#2) The Risk Spectrum
• There is no such
thing as 100%
security!
Ignore it?
FFIEC Guidelines
infotex
How do you decide?
• There is no such
thing as 100%
security!
Ignore it?
Risk-based
Remediation
FFIEC Guidelines
infotex
Principle Number Two
Information Security is about
ACCEPTING RISK.
infotex
infotex
A process question
When you
are
finished
serving a
customer,
what do
you
typically
do?
A. Cross Customer Service
off the to-do list.
B. File the experience
away as one you hope
you’ll never have to do
again.
C. Learn from the
experience and
try to serve the next
customer better.
D. Move on to the next
project.
infotex
Fundamental #3
infotex
Which means . . .
• No crossing it off the list.
• No filing it away.
• No wishing you never have to deal
with it again.
infotex
And means . . .
• Its cyclical.
• You learn from each cycle.
• It is constantly improving (we hope).
• It’s about managing risk and
ensuring alignment with other
business processes.
infotex
And to improve . . . .
• We must start by measuring.
But remember that
metrics are all relative.
infotex
Fundamental #3
infotex
infotex
Important Point Question
A. Pretext Calling
What is the
Number 1 form
of Identity
Theft?
B. Drive-by Attacks (Trojan
Horses installed by
rogue websites.)
C. Insider Data Theft
D. Phishing
E. Other
infotex
Source: Javelin Research 2009 Identity Fraud Survey Report
a survey of 25,000 adults.
infotex
4) It’s not really Technical
People
Technology
Policy
Process
infotex
IT requires a Team Approach
• Risk must be measured and
managed using a multi-disciplinary
approach.
• Risk is mitigated by establishing
controls in the form of policies,
procedures, and tools.
• Risk Management Controls involve
“all four corners of the bank.”
infotex
Four Corners of the Bank
infotex
Four Corners of the Bank
Board of Directors
Customers
Vendors
Law Enforcement
Academia
Users
Oversight
Committee
Management
Team
Technical Team
infotex
Information Security Officer
• Measures, Manages, Reports
Information Security Risk
• Interacts with all four corners.
• Facilitates development and
continuous improvement of security
controls.
• Delivers an Annual Report directly to
the board.
infotex
Information Security Officer
• Works with Management to:
– Measure and Control Risk
– Develop and enforce Security Controls
– Plan Response to Negative Incidents
(Policy Violation, Security, Disaster)
– Manage Vendor Risk
– Authorize Access to IT Assets
– Inventory and manage IT Assets
– Escalate Risk Acceptance Decisions
(to the Board of Directors)
infotex
infotex
infotex
Four Risk Factors
Threats
Likelihood
Vulnerabilities
Impact Severity
infotex
Threats
• Terrorists
• Hackers
• Scammers / Conmen /Fraudsters /
Thieves
• Vandals
• Technology Itself
• Users / Vendors
• Nosy Neighbors
• Ex-Spouses
infotex
We can’t take it lightly
• Zeus
• Software suite designed to help
hackers attack banks.
infotex
Marc Rogers, Purdue University
infotex
. . . zooming in . . .
infotex
Vulnerabilities
•
•
•
•
•
Airplanes
Ports
Subway System
Buildings
Public Places
• E-mail
• Browsers
• Network Access
• Users
• > 300 considered
in Risk Assessment
infotex
Impact Severity
• Almost 3000
people
• Financial System
• Airlines
• Convenience
• Customers’
Identities
• Horror Stories
• Heartland Payment
System ($7/card,
20,000 cards)
• Reputation
infotex
Likelihood
• It can happen on
American Soil
• Technology Itself
Very High
• Pretext Calling High
• Phishing High
• Hacking Medium
• Physical Breach Low
– Still happens though!
infotex
Today’s Agenda
• Management Awareness Resources
• Five Tenets of IT Governance
• The IT Governance Program
–
–
–
–
The Risk Assessment
Information Technology Audits
Vendor Due Diligence
Awareness Training
• New Risks for 2011/2012
• The 2011 Audit Results
infotex
In this next section
• We will learn about the Federal Financial
Institution Examination Council (FFIEC)
and it’s published “guidelines” for
information technology, and why these
guidelines become audit frameworks.
• We will see a quick summary of
“management responsibilities for IT.”
• We will review a “map” of the typical
bank’s IT Governance Program
• We will learn how the management team
“plugs in” to the IT Governance Program.
infotex
Types of Risk
• Transaction Risk
– Data Corruption Problems
– Social Engineering
– Customer Errors (Internet Banking)
• Legal Risk
– Obscene Jokes in E-mail
– Privacy Violations
– Unlicensed Software
infotex
Types of Risk
• Financial Risk
– Early Adapter of Technology
– Vendor Solvency
– Cost of Security Breaches
• Operational Risk
– Virus Attacks
– Denial of Service (DoS) Attacks
– Project Management Risk
infotex
Types of Risk
• Reputational Risk
– Any Security Incident
presents some
reputational risk.
– Poor Incident Response
can turn a minor incident
into a major incident.
infotex
Types of Risk
• Compliance Risk
– GLBA
– HIPAA, CIPA, SOX
– PCI, BS12000, ITIL, CobiT
– BSA, OFAC, US Patriot Act
– FACTA
– SB1386
infotex
Gramm Leach Bliley Act
Specifically, Title V of the GLBA, called
"Disclosure of Nonpublic Personal
Information," is intended to ensure
security and confidentiality of customers'
records and information, protect the
integrity of such information, and protect
against unauthorized access to such
information.
infotex
Thank goodness for the . . .
infotex
The FFIEC
• Federal Reserve System (FRB)
• Federal Deposit Insurance
Corporation (FDIC)
• National Credit Union Administration
(NCUA)
• Office of the Comptroller of the
Currency (OCC)
• Office of Thrift Supervision (OTS)
infotex
The FFIEC
Information
Security
Work Program
IT Audit
Handbook
Boilerplates
Information
Security
Handbook
IT Audit
Work Program
infotex
Awareness Training Series
Management
Responsibilities
A quick summary
infotex
Summary of Responsibilities
• Understand how IT aligns with bank and
department business strategy and work
with IT to ensure appropriate alignment.
• Know the IT Governance program, how it
works, the ISO’s role, and your role in the
various sub-programs.
• Be familiar with technology risk that the
bank faces.
• Enforce technology controls.
• Activate awareness of staff members.
infotex
What does an IT Governance
Program include?
(according to FFIEC
Guidelines)
infotex
The FFIEC
Information
Security
Work Program
How about
a map?
IT Audit
Handbook
Boilerplates
Information
Security
Handbook
IT Audit
Work Program
infotex
IT Governance Program
Policy
Procedure
Tools
(standards, guidelines,
applications, forms, websites, etc.)
The
combined
policy,
procedures,
and tools
about a
particular
issue can be
referred
to as a
“Program.”
infotex
Authentication Example
AUP
Authentication
Procedures
A procedure
enforces a
board level
policy using
tools called
for in the
procedure.
Passwords
Out-of-Pocket Questions
Visitor Authorization Process
infotex
Access
Management
Risk
Analysis
Information
Technology
Governance
Program
Awareness
Incident
Response
Governance
Policy
Asset
Management
Business
Continuity
Security
Standards
Vendor
Management
infotex
Access
Management
Risk
Analysis
Information
Technology
Governance
Program
Awareness
Incident
Response
Governance
Policy
Asset
Management
Business
Continuity
Security
Standards
Vendor
Management
infotex
Risk Analysis
Program
infotex
Access
Management
Risk
Analysis
Information
Technology
Governance
Program
Awareness
Incident
Response
Governance
Policy
Asset
Management
Business
Continuity
Security
Standards
Vendor
Management
infotex
Access
Management
infotex
Access
Management
Risk
Analysis
Information
Technology
Governance
Program
Awareness
Incident
Response
Governance
Policy
Asset
Management
Business
Continuity
Security
Standards
Vendor
Management
infotex
Incident
Response
Program
infotex
Incident Response
• Awareness is an
important part of
incident response.
• Board of Directors
• Law Enforcement
• Customers
(Could be steering committee.)
CIRT
ISO
Everybody
infotex
Access
Management
Risk
Analysis
Information
Technology
Governance
Program
Awareness
Incident
Response
Governance
Policy
Asset
Management
Business
Continuity
Security
Standards
Vendor
Management
infotex
Asset
Management
Program
infotex
Access
Management
Risk
Analysis
Information
Technology
Governance
Program
Awareness
Incident
Response
Governance
Policy
Asset
Management
Business
Continuity
Security
Standards
Vendor
Management
infotex
Business
Continuity
Program
infotex
Business Continuity Program
Business
Continuity Plan
Risk Analysis
Scenario
Responses
Pandemic
Ice Storm
Tornado
Flood
Fire
infotex
Access
Management
Risk
Analysis
Information
Technology
Governance
Program
Awareness
Incident
Response
Governance
Policy
Asset
Management
Business
Continuity
Security
Standards
Vendor
Management
infotex
Vendor Management
Program
Governance
Policy
Vendor
Management
Policy
Search
and Selection
Contract
Negotiations
Threshold
Risk Assessment
Assigned Security
Responsibility
Security Sanctions
Policy
Ongoing
Due Diligence
Vendor Agreement
Template
Risk Analysis
Procedure
Threshold
Risk Assessment
Vendor Request
Vendor Risk
Determination Table
Detailed Risk
Assessment
Checklists
infotex
Access
Management
Risk
Analysis
Information
Technology
Governance
Program
Awareness
Incident
Response
Governance
Policy
Asset
Management
Business
Continuity
Security
Standards
Vendor
Management
infotex
Security
Standards
infotex
Security
Standards
infotex
Access
Management
Risk
Analysis
Information
Technology
Governance
Program
Awareness
Incident
Response
Governance
Policy
Asset
Management
Business
Continuity
Security
Standards
Vendor
Management
infotex
Awareness Program
Governance
Policy
Awareness
Program
Management
Awareness
Training
Technical
Awareness
Training
User
Awareness
Training
Customer
Awareness
Training
Board of Directors
Management Team
infotex
Awareness Program
Governance
Policy
Awareness
Program
Management
Awareness
Training
Technical
Awareness
Training
Board of Directors
User
Awareness
Training
Customer
Awareness
Training
Vendor Management
Program
Due Diligence
Request Letter
Management Team
infotex
Access
Management
Risk
Analysis
Information
Technology
Governance
Program
Awareness
Incident
Response
Governance
Policy
Asset
Management
Business
Continuity
Security
Standards
Vendor
Management
infotex
IT Governance Policy
Align IT
with Business
Board Member
Define
Governance
End Users
(rotated)
Management
Team
Committee
Membership
Establish Steering
Committee
Authorize the ISO
Requires Training
at all levels
Report Critical
Security Breaches
Delineates Annual
Report to the Board
infotex
Today’s Agenda
• Management Awareness Resources
• Five Tenets of IT Governance
• The IT Governance Program
–
–
–
–
The Risk Assessment
Information Technology Audits
Vendor Due Diligence
Awareness Training
• New Risks for 2011/2012
• The 2011 Audit Results
infotex
In this next section
• We will learn why a multidisciplinary
approach to technology risk
assessments is critical.
• We will find out the types of threats
that need to be considered in a risk
assessment.
• We will see a typical risk assessment
process.
infotex
Summary: Managers Should
• Clearly support all aspects of the
information security program;
• Implement the information security
program as approved by the board of
directors;
• Establish appropriate policies, procedures,
and controls;
• Participate in assessing the effect of
security issues on the financial institution
and its business lines and processes;
infotex
Summary: Managers Should
• Delineate clear lines of responsibility
and accountability for information
security risk management decisions;
• Define risk measurement definitions
and criteria;
• Establish acceptable levels of
information security risks; and
• Oversee risk mitigation activities.
infotex
That’s straight out of FFIEC
guidelines (page 6,
Information Security
Handbook)
infotex
Information Security Program
Equals
IT Governance Program
infotex
Access
Management
Risk
Analysis
Information
Technology
Governance
Program
Awareness
Incident
Response
Governance
Policy
Asset
Management
Business
Continuity
Security
Standards
Vendor
Management
infotex
Risk Analysis
Program
infotex
Four Primary Risk Assessments
Risk
Assessments
Business
Impact Analysis
Asset
Criticality
Analysis
Technology
Risk Assessment
Vendor
Risk Determination
infotex
Today’s Agenda
• Management Awareness Resources
• Five Tenets of IT Governance
• The IT Governance Program
–
–
–
–
The Risk Assessment
Information Technology Audits
Vendor Due Diligence
Awareness Training
• New Risks for 2010/2011
• ISO Job Description & Interactions
infotex
In this next section
• We will learn the primary purposes of
an IT Audit.
• We will understand the need for riskbased auditing
• We will learn the different types of
audit tests.
• We will be exposed to the need for
good IT Audit metrics.
infotex
The IT Audit
infotex
Three Primary Purposes
• Alignment with business mission
• Appropriate risk management
• Compliance with applicable law
infotex
Alignment w/ Business Mission
• Strategy Alignment
• Facilitate Execution of Business
Tactics
• Demonstrate Return on Investment
infotex
Risk Management Assurance
• Test of Risk Assessment Process
• Test of Management Awareness
• Test of Declared Controls
• Test of User Awareness
• Escalate Risk Acceptance decisions to
the Board of Directors
infotex
Comply with the Law!
• FFIEC Guidelines as the Framework
• CobiT as Framework for SOX banks
• State laws may introduce individual
compliance framework needs
(SB1386 in California)
infotex
Risk-based Auditing
• Ensures testing is appropriate
• Delivers Value to Audit Process
• Relies heavily on bank risk
assessment
infotex
Risk-based Auditing
• Test the controls that protect the
highest value assets.
• Test the controls that protect the
most likely targeted assets.
• Test the controls that management
has declared mitigate the MOST risk
(highest delta control value).
infotex
Risk-based Auditing
Inherent Risk
Residual Risk
Delta Control
infotex
Types of IT Audit Tests
• Technical
• Non-technical
infotex
But first …
• Capture-the-flag versus assessment
infotex
Types of IT Audit Tests
• IT Governance Review
–
–
–
–
GLBA Compliance
Policy and Procedure Review
Testing of Non-technical Controls
Involves interviewing “all four corners”
of the bank
infotex
Types of IT Audit Tests
• Technical Vulnerability Assessments
– Perimeter
• Penetration Testing
• Vulnerability Scanning of Perimeter
• Confirmation
– Internal Network
• Vulnerability Scanning
• Network Configuration Audit
• Confirmation
infotex
Types of IT Audit Tests
• Social Engineering Tests
– Two purposes
• Test Awareness
• Test Incident Response
– Spear Phishing
– Pretext Calling
– Password File Analysis
– Orchestrated Attacks
infotex
IT Physical Security
• Physical Breach Tests
• Walk-through’s
• Dumpster Diving
– Trash-can Diving
• Physical Security Checklists
infotex
Checklist Tests
• IT Governance
• Physical Security
• Network Configuration Audits
Be careful that findings
are risk ranked.
infotex
Risk Metrics
• Should be based on likelihood and
impact
• Some auditors will also factor in ease
of remediation
• You should be interested in residual
risk, anticipated residual risk, and
risk reduction (or “delta control”)
infotex
Risk Metrics
• Comparing risk from one year to the
next, or from one bank to the next,
is difficult
• What’s important is knowing that the
management team understands the
metrics and the risk
infotex
Today’s Agenda
• Management Awareness Resources
• Five Tenets of IT Governance
• The IT Governance Program
–
–
–
–
The Risk Assessment
Information Technology Audits
Vendor Due Diligence
Awareness Training
• New Risks for 2011/2012
• The 2011 Audit Results
infotex
In this next section
• We will learn the primary purposes of
the annual Vendor Due Diligence
Review.
infotex
Vendor Management
Program
Governance
Policy
Vendor
Management
Policy
Search
and Selection
Contract
Negotiations
Threshold
Risk Assessment
Assigned Security
Responsibility
Security Sanctions
Policy
Ongoing
Due Diligence
Vendor Agreement
Template
Risk Analysis
Procedure
Threshold
Risk Assessment
Vendor Request
Vendor Risk
Determination Table
Detailed Risk
Assessment
Checklists
infotex
Selection Process
Risk Assessment
Requirements
Definition vs. RFP
Responses
Due Diligence
Evaluation
infotex
Vendor Due Diligence
Checklist
• Makes the annual review go so much
better!
• . . . . . . at least after the first one.
infotex
Vendor Risk Assessment
Process
Threshold
Risk
Assessment
Risk
Management
Program
Vendor Due Diligence
Request
Due Diligence
Checklist
Report
to Board
Detailed
Risk Assessment
Missing Controls
infotex
Outputs of Annual Review
Missing controls and
anticipated safeguards should
input into the IT Risk
Assessment.
infotex
Remember this diagram?
Risk
Assessments
Business
Impact Analysis
Technology
Risk Assessment
Vendor
Due Diligence
infotex
Remember this diagram?
Risk
Assessments
Business
Impact Analysis
Technology
Risk Assessment
Vendor
Due Diligence
This (and missing vendor controls)
is where Vendor Due Diligence plugs
into the overall Risk Assessment
Process.
infotex
Outputs of Annual Review
Missing controls and
anticipated safeguards should
input into the IT Risk
Assessment.
They will be deployed as per
risk severity in a reasonable
period of time.
infotex
Outputs of Annual Review
Finally, risk acceptance
decisions should be escalated
to the board of directors by
the ISO in the Annual Report.
infotex
Today’s Agenda
• Management Awareness Resources
• Five Tenets of IT Governance
• The IT Governance Program
–
–
–
–
The Risk Assessment
Information Technology Audits
Vendor Due Diligence
Awareness Training
• New Risks for 2011/2012
• The 2011 Audit Results
infotex
In this next section
• We will learn some of the
fundamental responsibilities of the
Information Security Officer.
• We will see how the ISO interacts
with various areas of the bank.
• We will understand how we can
utilize the ISO to better manage our
own technology risk.
infotex
Access
Management
Risk
Analysis
Information
Technology
Governance
Program
Awareness
Incident
Response
Governance
Policy
Asset
Management
Business
Continuity
Security
Standards
Vendor
Management
infotex
Awareness Program
Governance
Policy
Awareness
Program
Management
Awareness
Training
Technical
Awareness
Training
Board of Directors
User
Awareness
Training
Customer
Awareness
Training
Vendor Management
Program
Due Diligence
Request Letter
Management Team
infotex
Awareness Program
Governance
Policy
Awareness
Program
Management
Awareness
Training
Technical
Awareness
Training
User
Awareness
Training
Customer
Awareness
Training
Board of Directors
Management Team
infotex
Risk Management
Program
Awareness
Program
Management
Awareness
Training
Technical
Awareness
Training
User
Awareness
Training
Customer
Awareness
Training
Board of Directors
Management Team
infotex
BAT Tools
• Board Awareness Training (video webcast
is available)
• Annual Report
–
–
–
–
Risk Analysis Executive Summary
Vendor Due Diligence Results
Summary of Critical Security Breaches
Strategy
• Policy Approval Process
infotex
Today’s Agenda
• Management Awareness Resources
• Five Tenets of IT Governance
• The IT Governance Program
–
–
–
–
The Risk Assessment
Information Technology Audits
Vendor Due Diligence
Awareness Training
• New Risks for 2011/2012
• The 2011 Audit Results
infotex
New Risks in 2011/2012
• Targeted Malware attacks
(Zeus, Russian Business Network,
Chinese, and spin-offs)
• Social Media Usage
(by employees AND the bank)
• Mobile Banking Deployment
infotex
Orchestrated Attacks
• Usually combining:
– Malware from drive-by attack sites
– Phishing
– Pretext Calling
• Assets Attacked:
– Customer credentials
– ACH
– On-line Banking
infotex
Social Media
• Bank site risks
– Compliance (disclosures)
– Negative Comments
– Poor Content
• Employee risks
– General Users
– Management Team Members
infotex
infotex
Horse Before the Cart: Top 5 Mobile Banking Risks
Wireless Banking Risks
1.
2.
3.
4.
5.
Late Majority Adoption
Tepid Adoption
Security Risk
Compliance Risk
Strategic Risk
infotex
Today’s Agenda
• Management Awareness Resources
• Five Tenets of IT Governance
• The IT Governance Program
–
–
–
–
The Risk Assessment
Information Technology Audits
Vendor Due Diligence
Awareness Training
• New Risks for 2011/2012
• The 2011 Audit Results
infotex
In this next section
• We will learn some of the
fundamental responsibilities of the
Information Security Officer.
• We will see how the ISO interacts
with various areas of the bank.
• We will understand how we can
utilize the ISO to better manage our
own technology risk.
infotex
ISO Job Description
• The single point of contact . . .
liaison . . . for all matters involving
Information Security (and often IT
Governance as a whole.)
• The “inside consultant” on IT
Security Matters.
• The person who teaches us how to
manage technology risk.
infotex
ISO Teams
• Steering Committee: Member
• Technical Staff: Member
• CIRT: Team Leader
• Risk Assessment: Team Leader
• Vendor Management: Team Leader
• Business Continuity Plan:
sometimes the BCP coordinator, often not.
infotex
What the ISO does . . .
• Writes policies and procedures.
• Filters vulnerability news down to
what the bank needs to know.
• Writes agendas and reports for
various meetings.
• Activates awareness through
reminders, tests, and training.
infotex
ISO Job Description
• Maintain the IT Governance Program
• Ensure through measurement and
testing that the controls in the IT
Governance Program are adequate
and are being enforced.
• Escalate Risk Acceptance Decisions
to the Board
• Educate, Motivate, and Activate
Awareness.
infotex
Awareness Life Cycle
Educate
Motivate
Activate
infotex
Four Corners
Board of Directors
Customers
Oversight
Committee
Management
Team
Vendors
Users
Technical Team
infotex
Board Level
• Educate
• Annual Report, Awareness
Training
• Motivate
• Risk Analysis, VDD Results,
Audit Findings
• Activate
• Policy Approval, Strategy, Budget
infotex
Management Team
• Educate
• Motivate
• Activate
• Annual Awareness Training,
Applicable Policies and
Procedures (see distribution
list)
• Annual Report to the Board,
Audit Results
• Risk Analysis, Vendor Due
Diligence
infotex
Technical Team
• Educate
• Motivate
• Activate
• IT Audit Program, Security
Standards, Policies and
Procedures, Comprehension
Testing, BCP Testing Plan
• Auditing, Monitoring, Testing,
Vulnerability Assessments
• Vulnerability Reports,
Conferences, CPE
infotex
Users
• Educate
• Motivate
• Activate
• Acceptable Use Policy
• Annual Awareness Training,
Comprehension Tests
• Social Engineering Tests,
Exercises, Reminders
infotex
Customers
• Educate
• Motivate
• Activate
• Flyers, Knowledgeable
Employees
• Annual Awareness Training
• Stuffers, Web Site
Announcements
infotex
Vendors
• Educate
• Motivate
• Activate
• Due Diligence Request
Letter, Phone Call
• Contract Negotiations, Due
Diligence Request Letter, AP
New Vendor Form
• Ongoing discussion
emphasizing security. A call
when something doesn’t
seem right.
infotex
On the Portal . . .
• Information Security Officer
Job Description
infotex
How should
we summarize?
infotex
Interactions
infotex
ISO must interact with:
• Board of Directors
– Annual Report to the Board
– Risk Acceptance Decisions
– Policy Approval
infotex
ISO must interact with:
• Oversight Committee
– Internal Auditing
– Monitoring
– Audit Reports
– Vulnerability Assessments
infotex
ISO must interact with:
• Management Team
– Risk Analysis
– Training
– Vendor Due Diligence
– Access Authorization Review
– Budget
– Incident Response
infotex
ISO Must Interact With:
• The you-wouldn’t-expect interactions
– Human Resources
• Policy Development and Enforcement
• Incident Response Team
• Risk Assessment
• Orientation
– Marketing
• Customer Awareness Training
• Public Presence Security Controls
• Use of Social Media
infotex
ISO must interact with:
• Technical Team
– Security Standards
– Incident Response
– Vulnerability Assessments
– Audits
– Network Monitoring
infotex
ISO must interact with:
• Users (all employees)
– Acceptable Use Policy
– Annual Awareness Training
– Policy Enforcement
– Security Reminders and Notices
– Testing
– Incident Response
– Answering Questions
infotex
ISO must interact with:
• Vendors
– Vendor Risk Analysis
– Vendor Due Diligence Requirements
– Risk Acceptance
infotex
ISO must interact with:
• Customers
– Customer Awareness Training
– Incident Response
infotex
Thank you!
Don’t
forget the
Evaluations!
infotex
The Workshop Portal
• List of boilerplates and related websites.
• Electronic Version of Documents, Articles,
and Boilerplates for your use.
– mat2009.infotex.com (all lower case)
– Your user name . . . mat2009 (all lower case)
– Th3!b@#1 is the password.
• Portal is classified “internal use.”
infotex
Download