SlideShare a Scribd company logo
1 of 27
5 Insider Tips:  Using IT Audits to Maximize Security Mike Chapple – Senior Director for Enterprise Support Services 		  at the University of Notre Dame Renee Bradshaw – Senior Product Marketing Manager, NetIQ
An Insider’s Guide to Effective Audits  Treat audits as a lifecycle process.  Understand the scope. You shouldn’t learn anything! Don’t be afraid to speak up! Embrace findings. Aligning Compliance, Security, and Business Goals Q and A Agenda
About the Speaker  Mike Chapple Senior Director for Enterprise Support Services at the University of Notre Dame ,[object Object]
Former senior advisor to the Executive Vice President at University of Notre Dame
Former Executive Vice President and Chief Information Officer at Brand Institute
Former active duty intelligence officer in the U.S. Air Force
Published author, including the best-selling CISSP: Certified Information Systems Security Professional Study Guide
Ph.D. and BS, Computer Science and Engineering, University of Notre Dame; MBA, Auburn University; MS, Computer Science, University of Idaho,[object Object]
Tip #1 Treat Audits as a Lifecycle Process
Audits Shouldn’t be your Super Bowl
But More Like a Doctor’s Visit
Auditing as a Lifecycle
Tip #2 Understand the Scope
Covered Devices
Business Processes
Standards SAS 70 PCI DSS SOX FISMA COBIT HIPAA GLBA
Audit Process
Tip #3 You Shouldn’t Learn Anything!
This is Not the Time for Discovery!
Tip #4 Don’t be Afraid to Speak Up!
It’s Now or Never
Just Keep It Civil
Tip #5 Embrace Findings
Learn and Adapt
Auditing as a Lifecycle
5 Insider Tips Using IT Audits to Maximize Security Mike Chapple, Ph.D Senior Director,  Enterprise Support Services University of Notre Dame mchapple@nd.edu
Aligning Compliance, Security, and Business Goals Renee Bradshaw – Senior Product Marketing Manager, NetIQ

More Related Content

What's hot

Risk and Testing
Risk and TestingRisk and Testing
Risk and TestingNolaCita
 
EHS Leading Indicators, from Defining to Designing
EHS Leading Indicators, from Defining to DesigningEHS Leading Indicators, from Defining to Designing
EHS Leading Indicators, from Defining to DesigningTriumvirate Environmental
 
Risk and Testing by Graham et al
Risk and Testing by Graham et al Risk and Testing by Graham et al
Risk and Testing by Graham et al Emi Rahmi
 
Jim Dean Marketing One Pager
Jim Dean Marketing One PagerJim Dean Marketing One Pager
Jim Dean Marketing One PagerJames Dean
 
Taking Control Of Workplace Safety
Taking Control Of Workplace SafetyTaking Control Of Workplace Safety
Taking Control Of Workplace Safetyladukepc
 
Creating safety cultures
Creating safety culturesCreating safety cultures
Creating safety culturesPhil La Duke
 
How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for YouCigital
 
Securing Information Servicesv1.0
Securing Information Servicesv1.0Securing Information Servicesv1.0
Securing Information Servicesv1.0Vibi Abraham
 
7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimmMarie Peters
 
Behaviour-based safety (BBS) is the “application of science of behaviour chan...
Behaviour-based safety (BBS) is the “application of science of behaviour chan...Behaviour-based safety (BBS) is the “application of science of behaviour chan...
Behaviour-based safety (BBS) is the “application of science of behaviour chan...Indohaan Technology
 
Napeo Loss Prevention Presentation
Napeo Loss Prevention PresentationNapeo Loss Prevention Presentation
Napeo Loss Prevention PresentationPraxiom
 
5 Essential Security Tips for Startups
5 Essential Security Tips for Startups5 Essential Security Tips for Startups
5 Essential Security Tips for StartupsHeal Quick
 
Boosting Your Small Business's Cybersecurity
Boosting Your Small Business's CybersecurityBoosting Your Small Business's Cybersecurity
Boosting Your Small Business's CybersecurityW. Patric Gregory
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing Cultureladukepc
 
Siemens Industrial Services: Know-how Exchange
Siemens Industrial Services: Know-how ExchangeSiemens Industrial Services: Know-how Exchange
Siemens Industrial Services: Know-how Exchangewebbjy
 

What's hot (19)

Risk and Testing
Risk and TestingRisk and Testing
Risk and Testing
 
EHS Leading Indicators, from Defining to Designing
EHS Leading Indicators, from Defining to DesigningEHS Leading Indicators, from Defining to Designing
EHS Leading Indicators, from Defining to Designing
 
Risk and Testing by Graham et al
Risk and Testing by Graham et al Risk and Testing by Graham et al
Risk and Testing by Graham et al
 
Jim Dean Marketing One Pager
Jim Dean Marketing One PagerJim Dean Marketing One Pager
Jim Dean Marketing One Pager
 
Behavioral Safety: Past Present & Future
Behavioral Safety: Past Present & FutureBehavioral Safety: Past Present & Future
Behavioral Safety: Past Present & Future
 
Jan28 Safety Handbook Webinar
Jan28 Safety Handbook WebinarJan28 Safety Handbook Webinar
Jan28 Safety Handbook Webinar
 
Taking Control Of Workplace Safety
Taking Control Of Workplace SafetyTaking Control Of Workplace Safety
Taking Control Of Workplace Safety
 
Creating safety cultures
Creating safety culturesCreating safety cultures
Creating safety cultures
 
How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for You
 
Securing Information Servicesv1.0
Securing Information Servicesv1.0Securing Information Servicesv1.0
Securing Information Servicesv1.0
 
7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm
 
Behaviour-based safety (BBS) is the “application of science of behaviour chan...
Behaviour-based safety (BBS) is the “application of science of behaviour chan...Behaviour-based safety (BBS) is the “application of science of behaviour chan...
Behaviour-based safety (BBS) is the “application of science of behaviour chan...
 
Napeo Loss Prevention Presentation
Napeo Loss Prevention PresentationNapeo Loss Prevention Presentation
Napeo Loss Prevention Presentation
 
Cyber Risk and Security Analyst Job Desc
Cyber Risk and Security Analyst Job DescCyber Risk and Security Analyst Job Desc
Cyber Risk and Security Analyst Job Desc
 
5 Essential Security Tips for Startups
5 Essential Security Tips for Startups5 Essential Security Tips for Startups
5 Essential Security Tips for Startups
 
Medgate: How Communication Builds Safety Culture
Medgate: How Communication Builds Safety CultureMedgate: How Communication Builds Safety Culture
Medgate: How Communication Builds Safety Culture
 
Boosting Your Small Business's Cybersecurity
Boosting Your Small Business's CybersecurityBoosting Your Small Business's Cybersecurity
Boosting Your Small Business's Cybersecurity
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing Culture
 
Siemens Industrial Services: Know-how Exchange
Siemens Industrial Services: Know-how ExchangeSiemens Industrial Services: Know-how Exchange
Siemens Industrial Services: Know-how Exchange
 

Similar to 5 insider tips for using it audits to maximize security

Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramCigital
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Michael Kaishar, MSIA | CISSP
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
ISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationIrmaBrkic1
 
Process Maturity Assessment
Process Maturity AssessmentProcess Maturity Assessment
Process Maturity Assessmentpchronis
 
Enterprise security incident management
Enterprise security incident managementEnterprise security incident management
Enterprise security incident managementzapp0
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC Advisory Group
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiDaneWarren
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolioKaloyan Krastev
 
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartnerASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartnerPlatformSecurityManagement
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application SecurityCigital
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsVMware Tanzu
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 

Similar to 5 insider tips for using it audits to maximize security (20)

Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security Program
 
Continuous safety improvement
Continuous safety improvementContinuous safety improvement
Continuous safety improvement
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
 
Forrester Infographic
Forrester Infographic Forrester Infographic
Forrester Infographic
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...
3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...
3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...
 
ISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementation
 
Process Maturity Assessment
Process Maturity AssessmentProcess Maturity Assessment
Process Maturity Assessment
 
Continuous safety improvement
Continuous safety improvementContinuous safety improvement
Continuous safety improvement
 
Unlocking High Fidelity Security
Unlocking High Fidelity SecurityUnlocking High Fidelity Security
Unlocking High Fidelity Security
 
Enterprise security incident management
Enterprise security incident managementEnterprise security incident management
Enterprise security incident management
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
 
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartnerASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application Security
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 

More from NetIQ

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows NetIQ
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility NetIQ
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your BusinessNetIQ
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014 NetIQ
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.NetIQ
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerNetIQ
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...NetIQ
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessNetIQ
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQNetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerNetIQ
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNetIQ
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bankNetIQ
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...NetIQ
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQNetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQNetIQ
 

More from NetIQ (20)

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
 

Recently uploaded

Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...pujan9679
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSkajalroy875762
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTSkajalroy875762
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowranineha57744
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxDitasDelaCruz
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubaijaehdlyzca
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Availablepr788182
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 

Recently uploaded (20)

Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 

5 insider tips for using it audits to maximize security

  • 1. 5 Insider Tips: Using IT Audits to Maximize Security Mike Chapple – Senior Director for Enterprise Support Services at the University of Notre Dame Renee Bradshaw – Senior Product Marketing Manager, NetIQ
  • 2. An Insider’s Guide to Effective Audits Treat audits as a lifecycle process. Understand the scope. You shouldn’t learn anything! Don’t be afraid to speak up! Embrace findings. Aligning Compliance, Security, and Business Goals Q and A Agenda
  • 3.
  • 4. Former senior advisor to the Executive Vice President at University of Notre Dame
  • 5. Former Executive Vice President and Chief Information Officer at Brand Institute
  • 6. Former active duty intelligence officer in the U.S. Air Force
  • 7. Published author, including the best-selling CISSP: Certified Information Systems Security Professional Study Guide
  • 8.
  • 9. Tip #1 Treat Audits as a Lifecycle Process
  • 10. Audits Shouldn’t be your Super Bowl
  • 11. But More Like a Doctor’s Visit
  • 12. Auditing as a Lifecycle
  • 13. Tip #2 Understand the Scope
  • 16. Standards SAS 70 PCI DSS SOX FISMA COBIT HIPAA GLBA
  • 18. Tip #3 You Shouldn’t Learn Anything!
  • 19. This is Not the Time for Discovery!
  • 20. Tip #4 Don’t be Afraid to Speak Up!
  • 21. It’s Now or Never
  • 22. Just Keep It Civil
  • 23. Tip #5 Embrace Findings
  • 25. Auditing as a Lifecycle
  • 26. 5 Insider Tips Using IT Audits to Maximize Security Mike Chapple, Ph.D Senior Director, Enterprise Support Services University of Notre Dame mchapple@nd.edu
  • 27. Aligning Compliance, Security, and Business Goals Renee Bradshaw – Senior Product Marketing Manager, NetIQ
  • 28. Plan for Good Security Direct compliance efforts towards risk mitigation Compliance should be a “by-product” of security efforts. Compliance mandates only provide minimum standard Focus first on minimizing risk and improving security. Leverage your audit findings Define tools and controls which align to risk tolerance and business objectives Realize improvement in overall security posture 24
  • 29. Ease the Compliance Burden Create an adaptable compliance program Implement a common set of controls Encompasses regulatory, industry, and internal corporate mandates Simplifies audits; provides reporting framework Avoids conflicting controls and unnecessary expense Adds controls as the regulatory environment changes Improve security and efficiency of IT environment Automates routine, labor-intensive tasks Reduces the cost of compliance Avoids “audit panic” 25
  • 30. Back to Basics Good security makes compliance easier The best way to achieve compliance is to get the security basics right. Realize positive, long-term business impact. Reduce breach risk Avoid non-compliance penalties Operational efficiencies Improve security posture 26
  • 31. Complete our survey. Enter for a chance to win an Apple iPad! Access informative white papers; gain insight. “Achieving ROI from your PCI DSS Investment” “Sustainable Compliance: How to Align Compliance, Security and Business Goals” Learn More at NetIQ.com 27 tinyurl.com/ROIfromPCI tinyurl.com/sustainable-compliance

Editor's Notes

  1. Good afternoon! My name is Renee Bradshaw and it is my pleasure to welcome you to our webinar, “5 Insider Tips: Using IT Audits to Maximize Security.”Today we are very excited to have as our guest speaker: Mr. Mike Chapple, Senior Director for Enterprise Support Services at theUniversity of Notre DameToday, Mike will identify and discuss 5 Key Tips to help you get the most out of your next audit. You’ll leave here today with a clear idea of how to leverage your IT audit process to achieve your compliance objectives and improve your organization’s security posture. Before getting into the Agenda and introducing Mike formally, I have a few housekeeping notes:At the end of the presentation, we have set aside time for Q and A. We’re looking forward to hearing from you, so please join us for that section of the presentation. Finally, shortly before we end the Q and A session, you will have the opportunity to complete a survey and enter for a chance to win an Apple iPad. You won’t want to miss this opportunity, so please stick around!
  2. First on the Agenda today, will be our Guest Speaker. Mike will present to us “An Insider’s Guide to Effective Audits.” Too often, IT auditors are seen as a hindrance, and the audit itself as a chore to be disposed of quickly. Such a “check-box” mentality can lead to costly breaches, because compliance alone will not keep your environment secure. Sound security principles and controls, implemented in an effective and lasting manner are the key to an improved security posture. And compliance should result as a by-product of good security. Today, Mike will demonstrate how you can develop sound security controls and IT practices, as well as streamline your compliance efforts, by following a few simple steps to increase the effectiveness of your IT audit process.Then, I will wrap up with a short summary and discussion on how to leverage your audit findings to identify the right security controls, tools, and frameworks to improve the efficiency and security of your computing environment, while easing your compliance burden and meeting your business objectives.Finally, we will end today’s session with an informative Q&A and your chance to win an Apple iPad!
  3. And with that, it’s my great pleasure to introduce you to Mike Chapple!Mike is Senior Director for Enterprise Support Services at the University of Notre Dame.  In this role, he oversees the information security, IT architecture, project management, strategic planning and communications functions for the Office of Information technology.  Mike also serves as a concurrent assistant professor in the University's Computer Applications Department where he teaches an undergraduate course on Information Security.Mike previously served as Senior Advisor to the Executive Vice President at Notre Dame and was Program Manager of the University’s Information Security Program. Prior to these engagements, Mike served as Executive Vice President and Chief Information Officer of the Brand Institute, a Miami-based marketing consultancy.  Mike also spent four years in the information security research group at the National Security Agency and served as an active duty intelligence officer in the U.S. Air Force.  He is a technical editor for Information Security Magazine and has written several books, including the best-selling CISSP: Certified Information Systems Security Professional Study Guide, Microsoft SQL Server 2008 For Dummies, and Information Security Illuminated.Mike is also a regular contributor to SearchSecurity.com and About.com Guide to Databases. Mike earned both his bachelor’s and doctoral degrees from Notre Dame in computer science & engineering.  He also holds a MS in computer science from the University of Idaho and an MBA from Auburn University.  An information security professional with over 10 years of experience in government, the private sector and higher education, Mike is a recognized thought leader in the field of information security management. We are very happy to have him here with us today, and we hope you find your time with him just as valuable as we have here at NetIQ.And without any further delay, I will now turn it over to Mike.
  4. Renee’s notes: Mike will speak to value of auditing here which is to help assess security controls; he will share “comments” he hears about auditors and the audit itself .
  5. Renee’s notes: Mike will share examples of clients who were constantly rushing to prepare, esp. military example; comparisons to other events, such as tax-day.
  6. Renee’s notes: But Mike’s point is that efforts to achieve crash compliance fall apart, should treat it as a doctor visit.
  7. Renee’s notes: Mike will here tell a story about the client that had a misalignment between what they thought was being audited, and what was actually being audited. Really bad outcome!
  8. Renee’s notes: Mike will talk here about PCI DSS at Notre Dame.
  9. Renee’s notes: Mike will talk about the different types of standards and how it is important to make sure in advance what standards are being used in the IT audit process.
  10. Renee’s notes: Mike will share story about a company where the audit uncovered huge vulnerabilities. Whole team got let go.
  11. Renee’s notes: You are the expert!
  12. Renee’s notes: Mike will relate that no matter how well prepped you are, expect at least one finding. Use the management response and view this as an opportunity to improve your security program.
  13. Thank you, Mike, for that insightful presentation. I especially appreciated the stories you related about organizations who were not following the “audit as a lifecycle model” – and what were their results. I’m curious now about the IT audit processes of our listening audience…so, we’ve got a quick poll to assess that. Please push the poll. While waiting 30 seconds for results…Mike: Based on your experience, what would you expect to see in the results we’ll see in a moment?Thank audience for participation, then move on: Now, I want to wrap up with a few words about our thoughts on how to improve the efficiency and security of your computing environment, while easing your compliance burden and meeting your business objectives.
  14. Link to Mike’s preso: You heard Mike discuss the governmental agency that did not follow a lifecycle approach to audits.  Instead, they scrambled to rush preparations for each audit two weeks before the auditors showed up.  This obviously did not work out well for them, as the auditors always had some embarrassing findings and management was always quite disappointed.The sad fact is, many compliance efforts tend to focus solely on meeting audit criteria rather than on minimizing risk and improving overall security.  Compliance as a By-Product of Good Security The mandatory nature of regulatory compliance, combined with specific and quantifiable penalties for non-compliance, has directed a large portion of overall security spending toward compliance efforts, on the premise that this will improve security and reduce breach risk. But compliance mandates provide only a minimum standard. Case in point: Both Heartland Payment Systems and T.J. Maxx had achieved or were achieving PCI compliance when their systems were breached by a global identity theft ring, resulting in two of the largest breaches of credit card data in history.Ask yourself: Does compliance drive your security program without always improving security? Focus first on Good Security When security projects are focused solely on meeting a minimal set of audit criteria rather than minimizing risk, much of the potential benefit of this funding is wasted. Allowing the “accredit and forget it” approach (much like the governmental agency) to drive security priorities is like cramming for an exam. You may pass the exam (or the audit), but you are unlikely to retain the benefits you would have gained from careful study and planning.Case in point: An astounding 86 percent of data breach victims had evidence in their log files prior to being breached, according to the 2010 Data Breach Investigations Report. By not reviewing the logs, these organizations left themselves open to a breach. This behavior exemplifies the danger of a “check-the-box” approach to compliance.A highly effective security team will direct compliance efforts toward a comprehensive risk mitigation program that is aligned with the risk tolerance and business objectives of the organization. By focusing on “security first”, the overall security posture of the organization is improved and compliance is achieved as a by-product of security efforts.
  15. Link to Mike’s preso: You heard Mike discuss the case he was involved in where the auditors and auditees did not explicitly agree on a standard before the audit began. Instead, they had a general conversation about the principles that would be covered and everyone felt good going into the audit. When the report came out, it was a disaster. Management was expecting a clean bill of health while the auditors had several extremely critical findings. This could have been avoided if both parties had agreed upon an objective standard in advance.The best way to achieve and sustain compliance with PCI DSS and other regulations is to implement and manage to a harmonized set of controls that meet your evolving regulatory and corporate mandates. Leveraging a common set of controls simplifies audits and provides a framework for audit reporting based on how the controls map to a given mandate. As the regulatory environment evolves, controls can be added to this common set, allowing the organization to quickly adapt their compliance program. Achieving Harmonized Controls Encompass regulatory, industry, and internal corporate mandates Internal mandates that are aligned to business objectives Appropriate controls must safeguard critical information and infrastructure wherever it may beCase in point: Cloud computing, enables both large and small organizations to reduce cost and increase flexibility within IT. Case in point:“Insiders” who have access to this critical information may not be who they seem, and as a result, all activity must be monitored and no one can be completely trusted. Improve Security and Efficiency of the IT environment with Workflow Automation Benefits of automating routine, labor-intensive, or highly volatile tasks include: Reduced human errorDecreased training costs for new employees Decreased risk in highly volatile processes Helps ensure reliable, repeatable processes and strict adherence to policy Value-add Improved security, reduced costs, and streamlined compliance Better able to demonstrate compliance Reduce costly audit findings Case in point:Automated attestation of group rights saved the AD administrators at one large, US-based energy company about 1 weeks’ worth of man-effort (1 day for every 400 users), removing room for error and leaving them time to do more interesting things. Case in point: Automated user account provisioning at the same large energy company helped them to manage the risk associated with new user account creation and modification for employees and contractors in their call centers (100% annual turnover.) Helped the company to accurately and rapidly create and modify user accounts, significantly reducing the ability of any one employee to abuse his or her privileges. Make sure that the solutions you select provide the level of automation your organization needsNote for speaker only: The Unified Compliance Framework harmonizes controls across hundreds of different regulations, allowing your organization to comply once and attest to many different requirements, including PCI, SOX, HIPAA/HITECH, CobiT, NIST and hundreds more. The Unified Compliance Framework approach to compliance is effective, sustainable, and scalable – enabling your to achieve your compliance objectives (aside: will make auditing and reporting easier) and improve the overall security posture of your organization.
  16. What we know today is that data security is a critical or high priority for 89% of organizations, according to Jonathan Penn at Forrester Research. Organizations are concerned about the evolving nature of threats both from the inside and the outside. They wonder where their critical data resides, who is accessing it, and is it being changed in any way? They are concerned about the damaging affects of a data breach on their organization, both in the short-term with fines and mandated disclosure laws, and in the long-term, with loss of brand, competitiveness, consumer confidence – leading to lost revenues and profitability. Their concerns about data breach costs is warranted: According to Ponemon’s “2010 Annual Study: U.S. Cost of a Data Breach,” the average organizational cost of a data breach is approximately $7.2 million dollars, up 7% from last year. And while compliance mandates are designed to provide a minimum standard of security controls to protect your critical data, compliance in itself won’t keep you safe from these damaging breaches. What we’ve learned from the Verizon “Data Breach Investigations” and Ponemon “Cost of a Data Breach” Reports is that basic controls and monitoring can prevent most data breaches. Rather than focusing on compliance, organizations should start with strong data protection and get the security basics right. Rather than being the end-game, compliance should be a “by-product” of good security controls. Only an integrated, automated approach to compliance rooted in sound security principles is effective, sustainable, and scalable. This type of approach can help your organization to realize positive, long-term business impact in terms of reduced breach risk, avoidance of penalties associated with noncompliance, operational efficiencies, and an improved security posture.This concludes our presentation for today.