Five Questions to Evaluate any Privacy or Security Program Wyoming - - PowerPoint PPT Presentation

five questions to evaluate any privacy or security program
SMART_READER_LITE
LIVE PREVIEW

Five Questions to Evaluate any Privacy or Security Program Wyoming - - PowerPoint PPT Presentation

Five Questions to Evaluate any Privacy or Security Program Wyoming Cybersecurity Symposium August 6 & 7, 2019 October 23, 2019 SPEAKER BIO CISO at Holland & Hart Past President, Denver Chapter ISSA 18 years of Computer &


slide-1
SLIDE 1

August 6 & 7, 2019 October 23, 2019

Five Questions to Evaluate any Privacy or Security Program

Wyoming Cybersecurity Symposium

slide-2
SLIDE 2

2

SPEAKER BIO

James Johnson CISSP, PMP, STS CISO, Holland & Hart LLP 555 17th Street, Suite 3200, Denver, CO 80202 303.295.8563 jbjohnson@hollandhart.com

  • CISO at Holland & Hart
  • Past President, Denver Chapter ISSA
  • 18 years of Computer & Information Security Leadership in

Fortune 100 and 500 companies – government & private sectors

  • 3 years security consulting
  • CISSP and PMP
  • Based in Denver, CO
slide-3
SLIDE 3

3

THE PROBLEM

Too many standards. Too many controls and requirements. SECURITY PRIVACY Standard Controls HIPAA 56+ CSF 98 NIST 800-171 109 ISO 27001 114 PCI-DSS 200 NIST 800-53 303 Standard Controls GDPR 99 HIPAA 6 ISO 27701:2019 Adds 15 NIST 800-53 26 50 States varies

slide-4
SLIDE 4

4

SIMPLE PRIVACY & CYBER SECURITY MEASURING SCALE

No Story Good Story Great Story

How does your Privacy & Security Book Read?

slide-5
SLIDE 5

5

THE REALITY

Security and Privacy are merging rapidly!

Security Privacy

Incident Response Breach Notification Security & Privacy Controls Business Continuity Plan Business Impact Assessment Data Inventory & Classification

slide-6
SLIDE 6

6

DEFINITIONS - SECURITY

SECURITY DEFINITIONS Confidentiality: Data being stored is safe from unauthorized access and use Integrity: Data is reliable and accurate Availability: Data is available for use when it is needed DATA Integrity Confidentiality Availability

“CIA Triad”

slide-7
SLIDE 7

7

DEFINITIONS - PRIVACY

PRIVACY DEFINITIONS

  • Collecting personal information
  • Using and disclosing personal information
  • Ensuring data quality
  • Controlling access to personal information
  • Confidentiality of sensitive data not defined as

PII

Data Collection Data Storage, Protection, and Security Data Use and Marketing Data Destruction Compliance Data Breach Prevention and Readiness Data Breach Litigation

Data Life Cycle

slide-8
SLIDE 8

8

THE SOLUTION

The proposed model of five questions is:

  • Meant to be a high-level evaluation.
  • Not meant to replace detailed standards and

compliance framework reviews!

slide-9
SLIDE 9

9

THE SOLUTION

  • 1. What security methodology or standards are followed?
  • 2. Who is the one person assigned security responsibility and
  • versight?
  • 3. Are there written and approved security policies and

procedures?

  • 4. Are the key stakeholders (CEO, CIO, BoD, etc.) briefed

routinely on security risks?

  • 5. Is the security program independently tested or audited?

5 Security Questions

slide-10
SLIDE 10

10

THE SOLUTION

  • 1. What Privacy methodology or standards are followed?
  • 2. Who is the one person assigned privacy responsibility and
  • versight?
  • 3. Are there written and approved privacy policies and

procedures?

  • 4. Are the key stakeholders (CEO, CIO, BoD, etc.) briefed

routinely on privacy risks?

  • 5. Is the privacy program independently tested or audited?

5 Privacy Questions

slide-11
SLIDE 11

11

THE SOLUTION

Depends upon organization size and type

Security: 5,000+ should have CISO 500+ should have position assigned security exclusively <500 should have defined security roles but may have other responsibilities. Privacy: 10,000+ should have CDPO 1,000+ should have position assigned privacy exclusively <1,000 should have defined privacy roles but may have other responsibilities.

What level is the person assigned Privacy – Security?

slide-12
SLIDE 12

12

RATING A PRIVACY & CYBER SECURITY PROGRAM

Security Scoring Question (0) (1) (2)

  • 1. What security methodology or standards are followed?

None Working on it Certified / Compliant

  • 2. Who is the one person assigned security responsibility and
  • versight?

No one Identified but reports low in the org Identified and reports high in the organization

  • 3. Are there written and approved security policies and

procedures?

None Some written and maybe some approved Written, approved and communicated

  • 4. Are the key stakeholders (CEO, CIO, BoD, etc.)

briefed routinely on security risks?

Never or only when issues Yes – Annually or on

  • ccasion

Yes – Weekly or monthly

  • 5. Is the security program independently tested or

audited?

No Yes – Once in the last few years Yes – At least annually or has certification

Column Scores Overall Score

slide-13
SLIDE 13

13

RATING A PRIVACY & CYBER SECURITY PROGRAM

Privacy Scoring Question (0) (1) (2)

  • 1. What privacy methodology or standards are followed?

None Working on it Certified / Compliant

  • 2. Who is the one person assigned privacy responsibility and
  • versight?

No one Identified but reports low in the org Identified and reports high in the organization

  • 3. Are there written and approved privacy policies and

procedures?

None Some written and maybe some approved Written, approved and communicated

  • 4. Are the key stakeholders (CEO, CIO, BoD, etc.)

briefed routinely on privacy risks?

Never or only when issues Yes – Annually or on

  • ccasion

Yes – Weekly or monthly

  • 5. Is the privacy program independently tested or

audited?

No Yes – Once in the last few years Yes – At least annually or has certification

Column Scores Overall Score

slide-14
SLIDE 14

14

RATING A PRIVACY & CYBER SECURITY PROGRAM

Security or Privacy Scoring Question (0) (1) (2)

  • 1. What security or privacy methodology or standards are followed?
  • 2. Who is the one person assigned security or privacy responsibility and oversight?
  • 3. Are there written and approved security or privacy policies and

procedures?

  • 4. Are the key stakeholders (CEO, CIO, BoD, etc.) briefed routinely
  • n security or privacy risks?
  • 5. Is the security or privacy program independently tested or audited?

Column Scores Overall Score

slide-15
SLIDE 15

15

RATING A PRIVACY & CYBER SECURITY PROGRAM

Security or Privacy Example Scoring Question (0) (1) (2)

  • 1. What security or privacy methodology or standards are followed?
  • 2. Who is the one person assigned security or privacy responsibility and oversight?

1

  • 3. Are there written and approved security or privacy policies and

procedures? 2

  • 4. Are the key stakeholders (CEO, CIO, BoD, etc.) briefed routinely
  • n security or privacy risks?

2

  • 5. Is the security or privacy program independently tested or audited?

1 Column Scores 2 4 Overall Score 6

slide-16
SLIDE 16

16

SIMPLE PRIVACY & CYBER SECURITY MEASURING SCALE

Regulatory Requirements 0 1 2 3 4 5 6 7 8 9 10 Nearing- Compliance Non-Compliant Compliant Now with more information how does your program rate?

slide-17
SLIDE 17

17

STORY AND MEASURING CORRELATION

No Story Good Story Great Story

0 1 2 3 4 5 6 7 8 9 10

Nearing- Compliance Non-Compliant Compliant

slide-18
SLIDE 18

18

HELPFUL HINT WHEN EVALUATING SAAS

When evaluating a SaaS take a quick look at the T&C’s no other work may be required

“-----y.com agrees during the Term to implement reasonable security measures to protect Customer Data and will, at a minimum, utilize industry standard security procedures. However, because of the nature of the Service, which combines public and private information that is conveyed over the public internet, to the maximum extent permitted by law: (i) -----y.com shall not be held liable for any damage caused as a result of your use of the Service”

slide-19
SLIDE 19

19

PRESENTATION SUMMARY

  • 5 questions can be used to evaluate security or

privacy

  • Process can be used for an organization of supplier
  • Meant to be done quickly – may save time on a full

analysis

slide-20
SLIDE 20

20

Questions & Discussion

James Johnson CISSP, PMP, STS

CISO JBJohnson@hollandhart.com

303.295.8563 Holland & Hart LLP | 555 17th Street, Suite 3200 | Denver, CO 80202