SlideShare una empresa de Scribd logo
1 de 29
IT COMPLIANCE
Group 8:
- Phan Dinh Vuong
- Vuong Tat Khang
Instructor: Prof.Dr.Martin Knahl
Compliance means?
Obey, follow the laws, rules,
demands,etc.
Big Deal
Source: hotdeal.vn 18/08/2013
Question mark
Question 1: Can we export this
successful model of “HOTDEAL”
Service to Germany?
Question 2: If the “Hotdeal” service is
at highest level of IT security (data
protection, encryption, etc.). Would it
be sufficient to export to Germany?
Question mark
1. Why IT Compliance.
2. What is IT Compliance.
3. Framework, standards,
practices
4. How to Assess IT Compliance
5. Cost framework of IT Compliance
6. Compliance Vs Non-Compliance.
7. Practical Results from market
research.
Main
Points
ENRON Scandal 2001
THE BIG FOURONCE WAS THE BIG FIVE
Source: http://www.articula.us/blog/wp-content/uploads/2012/07/Big4Logos.jpg
http://cdn.list25.com/wp-content/uploads/2013/01/Slide79.jpg
http://static1.businessinsider.com/image/4ae49adf0000000000a1ac51-1200/enron-broadband.jpg
BIG FOUR’S SECURITY SURVEY (IN 2006)
Source: Ernst & Young. 2006 Global Information Security Survey. Technical report, 2006. Available at
http://www.ey.com/global/assets.nsf/International/TSRS_-_GISS_2006/$file/EY_GISS2006.pdf.
Trend 4
Trend 5
Trend 6
The impact of compliance continues to grow.
Compliance is promoting teaming between information security and
other functional business groups.
Compliance is improving information security.
- Laws, rules and regulations
(could be industry specific)
- Considered as mandatory
Example: National Data
Protection Acts, Informatic
and liberty Law, Financial
Security law, SOX,
EUROSoX, Basel II, HIPPA,
- Standards, Frameworks
and Security Practices.
- Optimization perspective
Example: ISO 9000, ISO
13335, ISO 17799:2005, ISO
2700x, COBIT, COSO etc.
Source: http://www.j4vv4d.com/wp-content/uploads/2011/10/secVcomp.jpg
http://www.redspin.com/blog/wp-content/uploads//2011/05/SECvsCOMP.png
Focus on validating of following the Rules
Static and slow to be updated
Focus on protection
Dynamic
IT Compliance types
Regulation Compliance
• E.g. working 9ham – 5hpm, VAT 10%
Legal (Law) Compliance
• E.g:Killing people is against the law
Industry-specific Compliance
• Food, pharmacy industry law suites
IT Compliance frameworks, standards,
practices
SOX
• Enhanced standards certify accuracy of financial info
COSO
• Mgmt & governance critical aspects: risk mgmt, fraud,etc.
COBIT
• Best practice Framework for IT Mgmt & IT Governance
ISO 9000, ISO 2700x, etc.
Typical Information Security Compliance Assessement
Source: Tashi, Igli. (2009). Regulatory Compliance and Information
INTER-RELATIONSHIP
• Regulatory penalties.
• Brand damages.
• Loss of customer’s trust.
Source: http://learnatvivid.files.wordpress.com/2012/07/non_compliance_costs.jpg
Findings from Market research
- Conduct independent
research on privacy, data
protection and information
security policy
- Benchmark study 2011.
- 46 multinational companies - 160 functional
leaders (CFO, CIO, etc).
Framework
Source: Ponemon Institute| Benchmark Study | January 2011
Cost comparison
Compliance cost Vs Non-compliance
cost?
Framework
Source: Ponemon Institute| Benchmark Study | January 2011
IT Appliance Cost
Framework
Source: Ponemon Institute| Benchmark Study | January 2011
WHAT AFFECTS COST OF COMPLIANCE & NON-
COMPLIANCE?
•Industry & organizational size
•Laws & regulations are main drivers for
investment
COMPLIANCE & NON-COMPLIANCE SUPPORT
•Effective security strategy  Lower cost of non-compliance
•On-going internal Compliance audits  reduce total cost of
Compliance.
GAP BETWEEN COMPLIANCE & NON-COMPLIANCE
COST
•Related to number of records lost or stolen
in data breaches (break/compromise the
laws)
10 EFFECTIVENESS ATTRIBUTES
1. Appoint high-level individual to lead compliance
2. Ensure over-sight compliance activities
3. Budget to meet goals, objectives
4. Cross-functional committee oversee local
requirements
5. Implement metrics.
6. Senior executives receive critical reports, crisis
level.
7. Reduce risk in business & threats of change.
8. Keep pace between changing workforce &
security.
Summary
1. Why IT Compliance.
2. What is IT Compliance.
3. Framework, standards,
practices
4. How to Assess IT Compliance
5. Cost framework of IT Compliance
6. Compliance Vs Non-Compliance.
7. Practical Results from market
research.
Q&A
THANK YOU!
REFERENCES
• Tashi, Igli. (2009). Regulatory Compliance and Information
Security. IEEE.
• Ponemon Institute (2011). The True Cost of Compliance.
Benchmark Study of Multinational Organizations.
• Big Four’s Security Survey: Ernst & Young. Global
Information Security Survey, Technical report, 2006.

Más contenido relacionado

La actualidad más candente

ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
PECB
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 

La actualidad más candente (20)

ISO 27001
ISO 27001ISO 27001
ISO 27001
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and Challenges
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and Certification
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
Compliance framework
Compliance frameworkCompliance framework
Compliance framework
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 

Similar a IT compliance

Chapter 7 Does IT Matter from Information Systems for Busine.docx
Chapter 7 Does IT Matter from Information Systems for Busine.docxChapter 7 Does IT Matter from Information Systems for Busine.docx
Chapter 7 Does IT Matter from Information Systems for Busine.docx
robertad6
 
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Assespro Nacional
 
USA Information Security Compliance Market Overview
USA Information Security Compliance Market OverviewUSA Information Security Compliance Market Overview
USA Information Security Compliance Market Overview
Niraj Singhvi
 
Assessment Methodology Transfer Case
Assessment Methodology Transfer CaseAssessment Methodology Transfer Case
Assessment Methodology Transfer Case
FITT
 
CompTIA Security Study [Report]
CompTIA  Security Study [Report]CompTIA  Security Study [Report]
CompTIA Security Study [Report]
Assespro Nacional
 
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docx
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docxPart 1Strategic Management Case Study #6—IKEA (Case Study In.docx
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docx
danhaley45372
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
Gene Kim
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India Summary
CompTIA
 
International Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan SummaryInternational Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan Summary
CompTIA
 

Similar a IT compliance (20)

International Technology Adoption & Workforce Issues Study - German Summary
International Technology Adoption & Workforce Issues Study - German SummaryInternational Technology Adoption & Workforce Issues Study - German Summary
International Technology Adoption & Workforce Issues Study - German Summary
 
Chapter 7 Does IT Matter from Information Systems for Busine.docx
Chapter 7 Does IT Matter from Information Systems for Busine.docxChapter 7 Does IT Matter from Information Systems for Busine.docx
Chapter 7 Does IT Matter from Information Systems for Busine.docx
 
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
 
How Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a PandemicHow Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a Pandemic
 
USA Information Security Compliance Market Overview
USA Information Security Compliance Market OverviewUSA Information Security Compliance Market Overview
USA Information Security Compliance Market Overview
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Assessment Methodology Transfer Case
Assessment Methodology Transfer CaseAssessment Methodology Transfer Case
Assessment Methodology Transfer Case
 
CompTIA Security Study [Report]
CompTIA  Security Study [Report]CompTIA  Security Study [Report]
CompTIA Security Study [Report]
 
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docx
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docxPart 1Strategic Management Case Study #6—IKEA (Case Study In.docx
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docx
 
Outsourcing
OutsourcingOutsourcing
Outsourcing
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India Summary
 
5 essential-facts-about-cobit
5 essential-facts-about-cobit5 essential-facts-about-cobit
5 essential-facts-about-cobit
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 
The impact of GDPR on UK employers
The impact of GDPR on UK employersThe impact of GDPR on UK employers
The impact of GDPR on UK employers
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT Product
 
ETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco securityETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco security
 
CGI Final
CGI FinalCGI Final
CGI Final
 
International Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan SummaryInternational Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan Summary
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Último (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

IT compliance

  • 1. IT COMPLIANCE Group 8: - Phan Dinh Vuong - Vuong Tat Khang Instructor: Prof.Dr.Martin Knahl
  • 2. Compliance means? Obey, follow the laws, rules, demands,etc.
  • 4. Question mark Question 1: Can we export this successful model of “HOTDEAL” Service to Germany?
  • 5. Question 2: If the “Hotdeal” service is at highest level of IT security (data protection, encryption, etc.). Would it be sufficient to export to Germany? Question mark
  • 6. 1. Why IT Compliance. 2. What is IT Compliance. 3. Framework, standards, practices 4. How to Assess IT Compliance 5. Cost framework of IT Compliance 6. Compliance Vs Non-Compliance. 7. Practical Results from market research. Main Points
  • 8. THE BIG FOURONCE WAS THE BIG FIVE Source: http://www.articula.us/blog/wp-content/uploads/2012/07/Big4Logos.jpg http://cdn.list25.com/wp-content/uploads/2013/01/Slide79.jpg http://static1.businessinsider.com/image/4ae49adf0000000000a1ac51-1200/enron-broadband.jpg
  • 9. BIG FOUR’S SECURITY SURVEY (IN 2006) Source: Ernst & Young. 2006 Global Information Security Survey. Technical report, 2006. Available at http://www.ey.com/global/assets.nsf/International/TSRS_-_GISS_2006/$file/EY_GISS2006.pdf. Trend 4 Trend 5 Trend 6 The impact of compliance continues to grow. Compliance is promoting teaming between information security and other functional business groups. Compliance is improving information security.
  • 10. - Laws, rules and regulations (could be industry specific) - Considered as mandatory Example: National Data Protection Acts, Informatic and liberty Law, Financial Security law, SOX, EUROSoX, Basel II, HIPPA, - Standards, Frameworks and Security Practices. - Optimization perspective Example: ISO 9000, ISO 13335, ISO 17799:2005, ISO 2700x, COBIT, COSO etc.
  • 12. IT Compliance types Regulation Compliance • E.g. working 9ham – 5hpm, VAT 10% Legal (Law) Compliance • E.g:Killing people is against the law Industry-specific Compliance • Food, pharmacy industry law suites
  • 13. IT Compliance frameworks, standards, practices SOX • Enhanced standards certify accuracy of financial info COSO • Mgmt & governance critical aspects: risk mgmt, fraud,etc. COBIT • Best practice Framework for IT Mgmt & IT Governance ISO 9000, ISO 2700x, etc.
  • 14. Typical Information Security Compliance Assessement Source: Tashi, Igli. (2009). Regulatory Compliance and Information
  • 16. • Regulatory penalties. • Brand damages. • Loss of customer’s trust. Source: http://learnatvivid.files.wordpress.com/2012/07/non_compliance_costs.jpg
  • 17. Findings from Market research - Conduct independent research on privacy, data protection and information security policy - Benchmark study 2011. - 46 multinational companies - 160 functional leaders (CFO, CIO, etc).
  • 18. Framework Source: Ponemon Institute| Benchmark Study | January 2011
  • 19. Cost comparison Compliance cost Vs Non-compliance cost?
  • 20. Framework Source: Ponemon Institute| Benchmark Study | January 2011
  • 21. IT Appliance Cost Framework Source: Ponemon Institute| Benchmark Study | January 2011
  • 22. WHAT AFFECTS COST OF COMPLIANCE & NON- COMPLIANCE? •Industry & organizational size •Laws & regulations are main drivers for investment
  • 23. COMPLIANCE & NON-COMPLIANCE SUPPORT •Effective security strategy  Lower cost of non-compliance •On-going internal Compliance audits  reduce total cost of Compliance.
  • 24. GAP BETWEEN COMPLIANCE & NON-COMPLIANCE COST •Related to number of records lost or stolen in data breaches (break/compromise the laws)
  • 25. 10 EFFECTIVENESS ATTRIBUTES 1. Appoint high-level individual to lead compliance 2. Ensure over-sight compliance activities 3. Budget to meet goals, objectives 4. Cross-functional committee oversee local requirements 5. Implement metrics. 6. Senior executives receive critical reports, crisis level. 7. Reduce risk in business & threats of change. 8. Keep pace between changing workforce & security.
  • 26. Summary 1. Why IT Compliance. 2. What is IT Compliance. 3. Framework, standards, practices 4. How to Assess IT Compliance 5. Cost framework of IT Compliance 6. Compliance Vs Non-Compliance. 7. Practical Results from market research.
  • 27. Q&A
  • 29. REFERENCES • Tashi, Igli. (2009). Regulatory Compliance and Information Security. IEEE. • Ponemon Institute (2011). The True Cost of Compliance. Benchmark Study of Multinational Organizations. • Big Four’s Security Survey: Ernst & Young. Global Information Security Survey, Technical report, 2006.

Notas del editor

  1. A successful E-commerce web-site in Vietnam. It provides the sales off, hotdeal of the different goods, services.
  2. Four biggest Audit Firmthe need to generate some new legislation to prevent, detect and correct such aberrations appearsBest way to inspire trust to organizations’ stakeholders or governmental agenciesrequired for an organization to remain legal
  3. Compliance: VN rule is Helmet when riding MotorbikeSecurity: Wearing strong helmet + jacket…
  4. Regulations: working 9ham – 5hpm, VAT 10%, Laws: Killing people is against the law. Industry-specific: Food, pharmacy industry law suites.
  5. Control Objectives for Information and Related Technology (COBIT) is a framework created by ISACA for information technology (IT) management and IT governance. It is a supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks.Committee of Sponsoring Organizations (COSO): providing thought leadership to executive management and governance entities on critical aspects of organizational governance, business ethics, internal control, enterprise risk management, fraud, and financial reportingSarbanes–Oxley Act (SOX): Enhanced strandards for all U.S. public company boards, management and public accounting firms. Individually certify the accuracy of financial information. Increase the independence of the outside auditors
  6. NIST: National Institute of Standards and Technology
  7. Compliance policies: Activities creation and dissemination of policies, protection of confidential or sensitive information such as customer data, employee records, financial information, intellectual properties and others.Direct cost – the direct expense outlay to accomplish a given activity.Indirect cost – the amount of time, effort and other organizational resources spent, but not as a direct cash outlay.Opportunity cost – the cost resulting from lost business opportunities as a result of compliance infractions that diminish the organization’s reputation and goodwill.