five questions to evaluate any privacy or security program
play

Five Questions to Evaluate any Privacy or Security Program Wyoming - PowerPoint PPT Presentation

Five Questions to Evaluate any Privacy or Security Program Wyoming Cybersecurity Symposium August 6 & 7, 2019 October 23, 2019 SPEAKER BIO CISO at Holland & Hart Past President, Denver Chapter ISSA 18 years of Computer &


  1. Five Questions to Evaluate any Privacy or Security Program Wyoming Cybersecurity Symposium August 6 & 7, 2019 October 23, 2019

  2. SPEAKER BIO • CISO at Holland & Hart • Past President, Denver Chapter ISSA • 18 years of Computer & Information Security Leadership in Fortune 100 and 500 companies – government & private sectors • 3 years security consulting • CISSP and PMP • Based in Denver, CO James Johnson CISSP, PMP, STS CISO, Holland & Hart LLP 555 17th Street, Suite 3200, Denver, CO 80202 303.295.8563 jbjohnson@hollandhart.com 2

  3. THE PROBLEM Too many standards. Too many controls and requirements. SECURITY PRIVACY Standard Controls Standard Controls GDPR 99 HIPAA 56+ HIPAA 6 CSF 98 ISO Adds 15 NIST 800-171 109 27701:2019 ISO 27001 114 NIST 800-53 26 PCI-DSS 200 50 States varies NIST 800-53 303 3

  4. SIMPLE PRIVACY & CYBER SECURITY MEASURING SCALE Good Great No Story Story Story How does your Privacy & Security Book Read? 4

  5. THE REALITY Security and Privacy are merging rapidly! Privacy Security Incident Response Breach Notification Security & Privacy Controls Business Continuity Plan Business Impact Assessment Data Inventory & Classification 5

  6. DEFINITIONS - SECURITY Confidentiality DATA SECURITY DEFINITIONS Availability Integrity Confidentiality : Data being stored is safe from “CIA Triad” unauthorized access and use Integrity : Data is reliable and accurate Availability : Data is available for use when it is needed 6

  7. DEFINITIONS - PRIVACY Data Collection Data Breach Data Litigation Storage, Protection, and Security Data Life Cycle PRIVACY DEFINITIONS Data Breach Data Use Prevention and • and Marketing Collecting personal information Readiness • Using and disclosing personal information Data • Ensuring data quality Destruction Compliance • Controlling access to personal information • Confidentiality of sensitive data not defined as PII 7

  8. THE SOLUTION The proposed model of five questions is: • Meant to be a high-level evaluation. • Not meant to replace detailed standards and compliance framework reviews! 8

  9. THE SOLUTION 5 Security Questions 1. What security methodology or standards are followed? 2. Who is the one person assigned security responsibility and oversight? 3. Are there written and approved security policies and procedures? 4. Are the key stakeholders (CEO, CIO, BoD, etc.) briefed routinely on security risks? 5. Is the security program independently tested or audited? 9

  10. THE SOLUTION 5 Privacy Questions 1. What Privacy methodology or standards are followed? 2. Who is the one person assigned privacy responsibility and oversight? 3. Are there written and approved privacy policies and procedures? 4. Are the key stakeholders (CEO, CIO, BoD, etc.) briefed routinely on privacy risks? 5. Is the privacy program independently tested or audited? 10

  11. THE SOLUTION What level is the person assigned Privacy – Security? Depends upon organization size and type Security: 5,000+ should have CISO 500+ should have position assigned security exclusively <500 should have defined security roles but may have other responsibilities. Privacy: 10,000+ should have CDPO 1,000+ should have position assigned privacy exclusively <1,000 should have defined privacy roles but may have other responsibilities. 11

  12. RATING A PRIVACY & CYBER SECURITY PROGRAM Security Scoring Question (0) (1) (2) None Working on it Certified / Compliant 1. What security methodology or standards are followed? No one Identified but reports Identified and reports 2. Who is the one person assigned security responsibility and low in the org high in the organization oversight? None Some written and Written, approved and 3. Are there written and approved security policies and maybe some communicated procedures? approved Yes – Annually or on Yes – Weekly or monthly Never or only 4. Are the key stakeholders (CEO, CIO, BoD, etc.) when issues occasion briefed routinely on security risks? Yes – Once in the last Yes – At least annually or No 5. Is the security program independently tested or few years has certification audited? Column Scores 0 Overall Score 12

  13. RATING A PRIVACY & CYBER SECURITY PROGRAM Privacy Scoring Question (0) (1) (2) None Working on it Certified / Compliant 1. What privacy methodology or standards are followed? No one Identified but reports Identified and reports 2. Who is the one person assigned privacy responsibility and low in the org high in the organization oversight? None Some written and Written, approved and 3. Are there written and approved privacy policies and maybe some communicated procedures? approved Yes – Annually or on Yes – Weekly or monthly Never or only 4. Are the key stakeholders (CEO, CIO, BoD, etc.) when issues occasion briefed routinely on privacy risks? Yes – Once in the last Yes – At least annually or No 5. Is the privacy program independently tested or few years has certification audited? Column Scores 0 Overall Score 13

  14. RATING A PRIVACY & CYBER SECURITY PROGRAM Security or Privacy Scoring Question (0) (1) (2) 1. What security or privacy methodology or standards are followed? 2. Who is the one person assigned security or privacy responsibility and oversight? 3. Are there written and approved security or privacy policies and procedures? 4. Are the key stakeholders (CEO, CIO, BoD, etc.) briefed routinely on security or privacy risks? 5. Is the security or privacy program independently tested or audited? Column Scores 0 Overall Score 14

  15. RATING A PRIVACY & CYBER SECURITY PROGRAM Security or Privacy Example Scoring Question (0) (1) (2) 1. What security or privacy methodology or standards are followed? 0 2. Who is the one person assigned security or privacy responsibility and oversight? 1 3. Are there written and approved security or privacy policies and 2 procedures? 4. Are the key stakeholders (CEO, CIO, BoD, etc.) briefed routinely 2 on security or privacy risks? 5. Is the security or privacy program independently tested or audited? 1 Column Scores 0 2 4 Overall Score 6 15

  16. SIMPLE PRIVACY & CYBER SECURITY MEASURING SCALE Regulatory Now with more information how does your program rate? Requirements Non-Compliant Nearing- Compliant Compliance 0 1 2 3 4 5 6 7 8 9 10 16

  17. STORY AND MEASURING CORRELATION Nearing- Non-Compliant Compliant Compliance 0 1 2 3 4 5 6 7 8 9 10 No Story Good Story Great Story 17

  18. HELPFUL HINT WHEN EVALUATING SAAS When evaluating a SaaS take a quick look at the T&C’s no other work may be required “ -----y.com agrees during the Term to implement reasonable security measures to protect Customer Data and will, at a minimum, utilize industry standard security procedures. However, because of the nature of the Service, which combines public and private information that is conveyed over the public internet, to the maximum extent permitted by law: (i) -----y.com shall not be held liable for any damage caused as a result of your use of the Service ” 18

  19. PRESENTATION SUMMARY • 5 questions can be used to evaluate security or privacy • Process can be used for an organization of supplier • Meant to be done quickly – may save time on a full analysis 19

  20. Questions & Discussion James Johnson CISSP, PMP, STS CISO JBJohnson@hollandhart.com 303.295.8563 Holland & Hart LLP | 555 17th Street, Suite 3200 | Denver, CO 80202 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend