SlideShare une entreprise Scribd logo
1  sur  22
Information security and risk management remains a
top concern for information managers. What are the
current and emerging issues in information security?
How are leading organizations dealing with these
issues? What best practices are being utilized to meet
ongoing security risks?

This presentation will attempt to answer these
questions by reviewing global trends in information
security and discussing real-life examples of how
organizations are meeting the ongoing security
challenges.
Evolution of information security
Current state
Current and Emerging issues
High

                                                       Productivity Improvement
                                   Mobile
Reliance on IT
                                                             Increased Risk
Impact of Failure
                              Internet

                         Client/
                         Server
                        MF

                 Low      1970s    1980s    1990s   2000s
                        Low                           High
                                     IT Usage
                             Probability of Failure
Information Security Organizations
 •ASIS           •ISACA
 •ACSE           •ISSA
 • CSIS          •IACSS
 •CSI            •ISC2
 •CompTIA        •ITGI
 •HTCIA          •SANS Institute


       Founded in 1989, (ISC)² has certified over
       60,000 information security professionals
       in over 135 countries
       ISACA has 55,000 certified information
       system auditors
Critical infrastructure includes…
• agriculture, food
• healthcare
• water
• energy
• banking and finance
• national monuments and icons
• defense industrial base
Featuring selected results of the 2008 Ernst & Young Global Information
Security Survey
The survey:
  Conducted in June-August 2008
  Nearly 1,400 organizations participated
  50 countries and all major industries represented
Areas covered:
  Governance and measurement
  Drivers
  Organization
  Standards
  Activities
Survey report available at: www.ey.com
Documented information security strategy for next 1-3 years?

           18%


                             33%
                                         Yes, as an integrated part of the
                                         organization's IT strategy

                                         No


     20%
                                         Yes, specifically for information security


                                         Yes, as an integrated part of the
                                         organization's business strategy


                    29%




“The challenge for many organizations…is not how to make
security work better with the business but to make it part of the
business”
Information security is considered a key dimension of
business risk
Common framework and process for decision accountability
and issue identification
Metrics captured and shared with all levels of management
(including the Board of Directors)
Business initiatives include budget to address security issues
Information ownership and accountability a foundation for
the prioritization and development of security policies
  Cross organizational custodians implement security controls defined
  by information owners
  Most critical information assets have been identified using some
  risk/value method
Significant or Very Significant Consequence if Organization’s Information is Lost,
                            Compromised or Unavailable




“The need to protect reputation and brand has moved many companies
beyond the requirements of regulatory compliance”
Technology assets identified, ownership and custodial
responsibilities assigned
Data identified and linked to business processes,
applications and data stores
Owners have authority and accountability for information
assets (including protection requirements)
Custodians implement confidentiality, integrity, availability
and privacy controls
Repository of information assets maintained
Formal risk assessment process to allocate security
resources, linked to business continuity
Security Activities Outsourced or Considered for Outsourcing

                                                                                          Under evaluation /
                                                     No plans to   Currently outsourced     planned for
                                                     outsource        (full or partial)     outsourcing

Security Assessments/Audits                             35%                50%                  15%

Attack and Penetration testing                          23%                59%                  18%

Application Testing                                     56%                30%                  14%

Security Training & Awareness                           62%                21%                  17%

Vulnerability/Patch management                          67%                24%                   9%

Disaster Recovery/Business Continuity Management        65%                22%                  13%

eDiscovery, Forensics / Fraud Support                   66%                19%                  15%

Incident Response                                       77%                15%                   8%

                                                                                                 7%
Help Desk (password reset/access issues)                66%                27%                   6%




 “So much emphasis is often placed on technology that the “people”
 component of information security is frequently overlooked”
Outsourcing of certain security functions
Security policy and compliance functions report
outside of IT, typically to a risk function
Roles and responsibilities are defined using a model
such as “RACI” (Responsible, Accountable,
Informed, Consulted)
Training, development and certification of
personnel with security responsibilities
Security awareness /education program
implemented for various audiences
Managing to many different standards
Managing security in the extended enterprise
Determining the “right” investment in information
security
Integrating security into the enterprise architecture
and planning process
Data-centric vs. perimeter protection security
Managing identities and access
Dealing with changing threat/technology
environment
How involved is your information security team with
enterprise risk assessment?
What management reports are provided on
information security? To whom?
How are information security needs identified?
How sustainable are information security compliance
efforts?
Have you identified all your vendor relationships and
data interchanges?
How are you managing vendor security-related risks?
What type of controls have you implemented to
protect personal information?
How integrated are privacy and security efforts?
How do you evaluate information security?
How complete is your business continuity program?
Stoddard Manikin
Graeme Payne
                       Stoddard.Manikin@ey.com
payney@bellsouth.net
                       404 817 5349
770 619 4278

Contenu connexe

Tendances

SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013SolarWinds
 
SBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesSBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesEMC
 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurestorm
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Janghyuck Choi
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionRamón Gómez de Olea y Bustinza
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
FIS Profile Summary V7.3
FIS Profile Summary V7.3FIS Profile Summary V7.3
FIS Profile Summary V7.3Jorge Sebastiao
 
Cognitive Security Case Study
Cognitive Security Case StudyCognitive Security Case Study
Cognitive Security Case StudyCredo Ventures
 
Organizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC ApproachOrganizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC ApproachPECB
 
Transform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and OrchestrationTransform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and OrchestrationEnterprise Management Associates
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistancePaul-Charife Allen
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Education & Training Boards
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHanaysha
 
Coso deloitte-managing-cyber-risk-in-a-digital-age
Coso deloitte-managing-cyber-risk-in-a-digital-ageCoso deloitte-managing-cyber-risk-in-a-digital-age
Coso deloitte-managing-cyber-risk-in-a-digital-ageLuisMiguelPaz4
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsPaul Feldman
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIsSteven Aiello
 
White Paper: Aligning application security and compliance
White Paper: Aligning application security and complianceWhite Paper: Aligning application security and compliance
White Paper: Aligning application security and complianceSecurity Innovation
 

Tendances (20)

SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013
 
SBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesSBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic Technologies
 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk Managment
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
FIS Profile Summary V7.3
FIS Profile Summary V7.3FIS Profile Summary V7.3
FIS Profile Summary V7.3
 
Cognitive Security Case Study
Cognitive Security Case StudyCognitive Security Case Study
Cognitive Security Case Study
 
Organizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC ApproachOrganizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC Approach
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Transform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and OrchestrationTransform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and Orchestration
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistance
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq Hanaysha
 
Coso deloitte-managing-cyber-risk-in-a-digital-age
Coso deloitte-managing-cyber-risk-in-a-digital-ageCoso deloitte-managing-cyber-risk-in-a-digital-age
Coso deloitte-managing-cyber-risk-in-a-digital-age
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
White Paper: Aligning application security and compliance
White Paper: Aligning application security and complianceWhite Paper: Aligning application security and compliance
White Paper: Aligning application security and compliance
 

En vedette

En vedette (7)

InfoSEC10062016Vlinkedin
InfoSEC10062016VlinkedinInfoSEC10062016Vlinkedin
InfoSEC10062016Vlinkedin
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Information Security Life Cycle
Information Security Life CycleInformation Security Life Cycle
Information Security Life Cycle
 
Bcm 50 system overview
Bcm 50 system overviewBcm 50 system overview
Bcm 50 system overview
 
1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt
 
Basic of SSDLC
Basic of SSDLCBasic of SSDLC
Basic of SSDLC
 
Operational risk management (orm)
Operational risk management (orm)Operational risk management (orm)
Operational risk management (orm)
 

Similaire à Microsoft Power Point Information Security And Risk Managementv2

Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
SANS Report: The State of Security in Control Systems Today
SANS Report: The State of Security in Control Systems TodaySANS Report: The State of Security in Control Systems Today
SANS Report: The State of Security in Control Systems TodaySurfWatch Labs
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceChristian F. Nissen
 
ITS Datamatix Gitex Conference 2009 New ICT Security V2
ITS Datamatix Gitex Conference 2009 New ICT Security V2ITS Datamatix Gitex Conference 2009 New ICT Security V2
ITS Datamatix Gitex Conference 2009 New ICT Security V2Jorge Sebastiao
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need LR_Yanus
 
ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
ML in GRC: Cybersecurity versus Governance, Risk Management, and ComplianceML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
ML in GRC: Cybersecurity versus Governance, Risk Management, and ComplianceBigML, Inc
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience InsuranceAccenture Insurance
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 

Similaire à Microsoft Power Point Information Security And Risk Managementv2 (20)

Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
SANS Report: The State of Security in Control Systems Today
SANS Report: The State of Security in Control Systems TodaySANS Report: The State of Security in Control Systems Today
SANS Report: The State of Security in Control Systems Today
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
ITS Datamatix Gitex Conference 2009 New ICT Security V2
ITS Datamatix Gitex Conference 2009 New ICT Security V2ITS Datamatix Gitex Conference 2009 New ICT Security V2
ITS Datamatix Gitex Conference 2009 New ICT Security V2
 
Insights on it risk bcm
Insights on it risk bcmInsights on it risk bcm
Insights on it risk bcm
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need L
 
ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
ML in GRC: Cybersecurity versus Governance, Risk Management, and ComplianceML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Unlocking High Fidelity Security
Unlocking High Fidelity SecurityUnlocking High Fidelity Security
Unlocking High Fidelity Security
 

Microsoft Power Point Information Security And Risk Managementv2

  • 1.
  • 2. Information security and risk management remains a top concern for information managers. What are the current and emerging issues in information security? How are leading organizations dealing with these issues? What best practices are being utilized to meet ongoing security risks? This presentation will attempt to answer these questions by reviewing global trends in information security and discussing real-life examples of how organizations are meeting the ongoing security challenges.
  • 3. Evolution of information security Current state Current and Emerging issues
  • 4.
  • 5. High Productivity Improvement Mobile Reliance on IT Increased Risk Impact of Failure Internet Client/ Server MF Low 1970s 1980s 1990s 2000s Low High IT Usage Probability of Failure
  • 6. Information Security Organizations •ASIS •ISACA •ACSE •ISSA • CSIS •IACSS •CSI •ISC2 •CompTIA •ITGI •HTCIA •SANS Institute Founded in 1989, (ISC)² has certified over 60,000 information security professionals in over 135 countries ISACA has 55,000 certified information system auditors
  • 7. Critical infrastructure includes… • agriculture, food • healthcare • water • energy • banking and finance • national monuments and icons • defense industrial base
  • 8.
  • 9.
  • 10. Featuring selected results of the 2008 Ernst & Young Global Information Security Survey
  • 11. The survey: Conducted in June-August 2008 Nearly 1,400 organizations participated 50 countries and all major industries represented Areas covered: Governance and measurement Drivers Organization Standards Activities Survey report available at: www.ey.com
  • 12. Documented information security strategy for next 1-3 years? 18% 33% Yes, as an integrated part of the organization's IT strategy No 20% Yes, specifically for information security Yes, as an integrated part of the organization's business strategy 29% “The challenge for many organizations…is not how to make security work better with the business but to make it part of the business”
  • 13. Information security is considered a key dimension of business risk Common framework and process for decision accountability and issue identification Metrics captured and shared with all levels of management (including the Board of Directors) Business initiatives include budget to address security issues Information ownership and accountability a foundation for the prioritization and development of security policies Cross organizational custodians implement security controls defined by information owners Most critical information assets have been identified using some risk/value method
  • 14. Significant or Very Significant Consequence if Organization’s Information is Lost, Compromised or Unavailable “The need to protect reputation and brand has moved many companies beyond the requirements of regulatory compliance”
  • 15. Technology assets identified, ownership and custodial responsibilities assigned Data identified and linked to business processes, applications and data stores Owners have authority and accountability for information assets (including protection requirements) Custodians implement confidentiality, integrity, availability and privacy controls Repository of information assets maintained Formal risk assessment process to allocate security resources, linked to business continuity
  • 16. Security Activities Outsourced or Considered for Outsourcing Under evaluation / No plans to Currently outsourced planned for outsource (full or partial) outsourcing Security Assessments/Audits 35% 50% 15% Attack and Penetration testing 23% 59% 18% Application Testing 56% 30% 14% Security Training & Awareness 62% 21% 17% Vulnerability/Patch management 67% 24% 9% Disaster Recovery/Business Continuity Management 65% 22% 13% eDiscovery, Forensics / Fraud Support 66% 19% 15% Incident Response 77% 15% 8% 7% Help Desk (password reset/access issues) 66% 27% 6% “So much emphasis is often placed on technology that the “people” component of information security is frequently overlooked”
  • 17. Outsourcing of certain security functions Security policy and compliance functions report outside of IT, typically to a risk function Roles and responsibilities are defined using a model such as “RACI” (Responsible, Accountable, Informed, Consulted) Training, development and certification of personnel with security responsibilities Security awareness /education program implemented for various audiences
  • 18.
  • 19. Managing to many different standards Managing security in the extended enterprise Determining the “right” investment in information security Integrating security into the enterprise architecture and planning process Data-centric vs. perimeter protection security Managing identities and access Dealing with changing threat/technology environment
  • 20.
  • 21. How involved is your information security team with enterprise risk assessment? What management reports are provided on information security? To whom? How are information security needs identified? How sustainable are information security compliance efforts? Have you identified all your vendor relationships and data interchanges? How are you managing vendor security-related risks? What type of controls have you implemented to protect personal information? How integrated are privacy and security efforts? How do you evaluate information security? How complete is your business continuity program?
  • 22. Stoddard Manikin Graeme Payne Stoddard.Manikin@ey.com payney@bellsouth.net 404 817 5349 770 619 4278