+ All Categories
Home > Documents > Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From...

Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From...

Date post: 22-Sep-2020
Category:
Upload: others
View: 2 times
Download: 1 times
Share this document with a friend
35
Peter Murray Co-Chair Higher Ed Information Security Council (HEISC) Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel
Transcript
Page 1: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Peter Murray

Co-Chair Higher Ed Information Security Council (HEISC)

Moving From Security to �Governance, Risk, and Compliance?�Campus Perspectives Panel�

Page 2: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

© 2014 Internet2

[ ‹#› ]

Today’s Panelists

•  Peter Murray – University of Maryland

•  Rob Adams – University of Florida

•  Michele Norin – University of Arizona

•  Joe St. Sauver – University of Oregon

Page 3: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Moving From Security to �Governance, Risk, and Compliance?�

Campus Perspectives Panel�

Joe St Sauver, Ph.D. ([email protected])��

Internet2 Global Summit, Denver Colorado �Tuesday, April 8th, 2014 8:45-10:00AM�

Governor's Square 11 ��

http://pages.uoregon.edu/joe/security-to-grc/��

Disclaimer: all opinions expressed are strictly my own.�

Page 4: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

A  Lot  Has  Been  Changing  in  Security,  Par7cularly  in  the  Higher  Ed  Community  

•  Higher  ed  organiza7ons  that  have  been  involved  with  security  have  been  evolving  (including  the  Higher  Educa7on  Informa7on  Security  Council  (HEISC).  

•  Personnel  and  their  roles  have  also  been  changing,    and  some  higher  ed  security  ac7vi7es  have  (for  whatever  reason)  seemingly  have  gone  dormant.  

•  Security  threats  haven't  disappeared,  however.  We're  s7ll  seeing  as  many  or  MORE  technical  security  threats  as  in  the  past.  

•  Our  topic  today,  however,  relates  to  the  (poten7al)  evolu7on  of  higher  "opera7onal/technical  security"  to  "governance,  risk  and  compliance"  (hereaHer  "GRC").  

4  

Page 5: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Paul  Proctor  (Gartner)  on  "What  Is  GRC?"  •  "GRC  is  the  most  worthless  term  in  the  vendor  lexicon.  Vendors  use  it  to  describe  whatever  they  are  selling  and  Gartner  clients  use  it  to  describe  whatever  problem  they  have.  For  seven  years  I  have  baLled  this  monolithic  term  and  I  fear  I’m  losing  the  baLle.  The  alterna7ve  is  to  try  to    bring  some  clarity  to  its  usage  by  defining  some  boundaries.  

•  "Here  is  our  published  GRC  defini7on,  which  I  [e.g.,  Paul  Proctor]  like[s]:    "GRC  is  neither  a  project  nor  a  technology,  but  a  corporate  objec7ve  for  improving  governance  through  more-­‐effec7ve  compliance  and  a  beLer  understanding  of  the  impact  of  risk  on  business  performance.  Governance,  risk  management  and  compliance  have  many  valid  defini7ons.  The  following  defini7ons  illustrate  the  rela7onship  of  the  three  terms  and  serve  for  Gartner’s  GRC  research:  

– Governance  —  The  process  by  which  policy  is  set  and  decision  making  is  executed.  – Risk  Management  —  The  process  for  preven7ng  an  unacceptable  level  of  uncertainty  in  business  objec7ves  with  a  balance  of  avoidance  through  reconsidera7on  of  objec7ves,  mi7ga7on  through  the  applica7on  of  controls,  transfer  through  insurance  and  acceptance  through  governance  mechanisms.  It  is  also  the  process  to  ensure  that  important  business  processes  and  behaviors  remain  within  the  tolerances  associated  with  policies  and  decisions  set  through  the  governance  process.  

– Compliance  —  The  process  of  adherence  to  policies  and  decisions.  Policies  can  be  derived  from  internal  direc7ves,  procedures  and  requirements,  or  external  laws,  regula7ons,  standards  and  agreements."  

•  hLp://blogs.gartner.com/paul-­‐proctor/2013/05/13/why-­‐i-­‐hate-­‐the-­‐term-­‐grc/  

5  

Page 6: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Opera7onal/Tech  Security  vs  GRC  

•  Opera7onal/Tech  Security:  –  Technical  focus  –  Audiences:  users,  "techies"  –  Prac77oner  background:  o`en  computer  science  

–  Tools:  improved  coding,  encryp7on,  ac7ve  scanning,  passive  monitoring,  firewalls,  an7-­‐virus,  forensics,  etc.  

–  Success?  system  usable  and  not  hacked/cracked;  no  breach  of  PII,  etc.  

–  Some  Challenges:  personnel  (huge  demand  for  technical  talent,  limited  pipeline);  resources  (huge  popula7on  to  help  but  few  resources);  security  v.  user  convenience  

•  GRC  –  NON-­‐technical  focus  –  Audience:  board,  sr.  execs,  auditors,  policy  folks  

–  Prac77oner  background:  o`en  law,  public  policy,  management,  etc.  

–  Tools:  statutes/regula7ons/  policies,  plans,  audits/other  reports,  cost  analyses,  resource  alloca7on  choices  

–  Success?  Followed  plan  and  on  budget;  complied  with  all  laws/specs;  no  bad  publicity.  

–  Some  Challenges:  s7ll  seeing  breaches  even  when  "fully  compliant;"  all  that  "techie"  security  stuff...  

6  

Page 7: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

CIOs/CISOs  And  How  We're  GeTng  To  GRC...  

•  Assume  you're  a  Chief  Informa7on  Officer  (CIO)    [or  maybe  a  Chief  Informa7on  Security  Officer  (CISO)].  

•  Cyber  security  is  increasingly  "in  the  news."  •  Execu7ve  leadership  wants  to  know  "what's  going  on"  in  cyber  security  and  "what  steps  are  being  taken  to  keep  our  ins7tu7on  safe?"  

•  Given  the  "importance  of  the  issue"  you've  been  given  a  "long"  presenta7on  slot  (e.g.,  ten  minutes)  at  the  next  execu7ve  leadership  mee7ng  to  explain  "in  detail"  what's  being  done  [including  five  minutes  for  Q&A].  

•  Members  of  the  execu7ve  leadership  team  are  smart    men  and  women,  but  they're  juggling  a  million  other  major  issues,  too,  and  they're  not  really  highly  technical  people.  

•  So  what  do  you  cover  during  that  session?  7  

Page 8: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Maybe  Opera7onal  Security  Issues?  

•  The  implica7ons  of  MS  Windows  XP  going  end-­‐of-­‐life  and  no  longer  gejng  security  patches  from  Microso`,  including  your  strategy  for  handling  those  EOL  systems?  

•  Recent  aLempts  to  phish  members  of  the  campus  community,  and  the  role  of  mul7factor  authen7ca7on?  

•  Cryptolocker  and  other  major  recent  malware  threats?  •  New  results  from  scanning  the  campus  for  hitherto-­‐unknown  caches  of  personally  iden7fiable  informa7on?  

•  The  security  benefits  of  the  latest  cloud-­‐based  security  applica7on  the  university  would  like  to  adopt,  if  funded?  

•  All  terrific  and  important  opera7onal  security  topics,  but  NONE  can  be  part  of  your  presenta7on  to  the  board:  it  would  take  too  long  to  cover  even  just  one  such  topic.  

•  Mr.  Fail  Boat  says,  "Ah  ooh  gah...  now  depar7ng,  pier  #1..."  8  

Page 9: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

OR...  Do  You  Talk  About  "GRC"?  

•  Governance:  someone's  in  charge  of  cybersecurity.  There's  a  firm  hand  on  the  security  7ller,  and  oversight.    An  "adult"  is  paying  aLen7on  to  what's  going  on  in  that  area.  

•  Risk:  We're  "business  savvy."  We  "get  it"  that  fixing  stuff  costs  money.  We're  not  going  to  try  to  fix  "everything,"    or  buy  solu7ons  just  because  they're  technically  "cool,"  we're  only  going  to  fix  the  security  stuff  that's  really  a  problem,  and  only  when  it  makes  financial  sense.  There's    a  responsible  hand  on  the  ins7tu7onal  checkbook.  

•  Compliance:  If  the  law  says  we  have  to  do  something  (par7cularly  i`here  are  consequences  if  we  don't),  we  know  what  we're  supposed  to  do  and  we're  going  to  do  it,  we're  not  ignoring  specific  legal  requirements.  Audits  aren't  going  to  come  back  full  of  embarrassing  findings.  

•  GRC  ==  a  well-­‐tailored  approach  for  *that*  audience.   9  

Page 10: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

GRC  Uptake  Is  Also  Driven  By  "The  Cloud"  

•  If  you're  outsourcing  facili7es  and  applica7ons  to  third  par7es,  your  ability  to  even  a/empt  to  do  technical  security  may  be  disappearing  (you  may  simply  not  have  the  access  you  need  to  do  technical  security  any  more  –  e.g.,  you  may  not  be  allowed  to  check  data  center  physical  security,  sniff  traffic  or  ac7vely  scan  the  systems  that  are  hos7ng  your  cloud  based  applica7ons).  So  what's  le`?  

•  Governance  decisions  about  what  applica7ons  will  move  to  the  cloud  and  who  the  organiza7on  will  use  and  trust.  

•  Risk  management  via  SLAs  and  contractually  enforced  protec7ve  mechanisms  

•  Audit  reports  aLes7ng  to  compliance  with  all  applicable  standards  and  requirements...  

•  If  you're  going  to  the  cloud,  you  ARE  going  toward  GRC.  10  

Page 11: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Contras7ng  Approaches:  Awareness  &  Training  

•  Opera7onal  security  approach:  many  of  the  vulnerabili7es  we  see  are  associated  with  badly  wriLen  web  applica7ons.  Let's  bring  in  some  experts  in  the  OWASP  Top  10  web  security  issues,  and  ensure  our  developers  know  how  to  avoid  accidentally  allowing  those  bugs  into  the  applica7ons  that  they  write.  [in-­‐depth  technical  training,  selec7vely  targeted,  driven  by  observed  local  vulnerabili7es]  

•  The  GRC  approach:  The  security  framework  we've  adopted  requires  us  to  do  annual  security  awareness  training  for  our  community,  and  if  we  don't  do  that  training,  we  won't  be  in  compliance  –  and  some  users  may  end  up  gejng  phished.  Let's  buy  SANS  "Securing  the  Human"  training  for  end  users.  It  not  only  ensures  we're  compliant,  "it  offers  training  that  changes  behaviors  and  reduces  risk."  

•  Non-­‐rhetorical  ques7on:  which  approach  is  "beLer?"   11  

Page 12: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Compe77on  for  Resources  

•  In  an  ideal  world,  we'd  want  BOTH  opera7onal/technical  security  AND  GRC-­‐based  approaches.  

•  Unfortunately,  in  the  real  world,  you've  got  finite  budget  and  personnel  slots.  If  you  buy  more  OpSec  people,  you  have  less  money  le`  for  GRC  people,  and  vice-­‐versa.  

•  Note  that  GRC  has  an  "unfair"  advantage  in  this  compe77on:  GRC-­‐oriented  people  have  direct  access  to  senior  leadership,  and  "they  talk  the  language  of  those  that  hold  the  purse  strings:"  we've  got  a  plan,  there's  an  adult  in  charge,  we're  business  savvy,  and  if  you  do  what  we  tell  you,  you  won't  end  up  embarrassed.  

•  But  "bea7ng"  OpSec  people  and  successfully  pushing  GRC-­‐based  approaches  may  be  a  Pyrrhic  victory  (a  victory  with  such  a  terrible  cost  that  it  is  tantamount  to  defeat).  

12  

Page 13: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

100%  Compliant,  But  Also  100%  P0n3d?  

•  You've  made  some  hard  choices,  and    allocated  your  limited  resources.    You're  100%  compliant  with  all    applicable  requirements.  You've    assessed  the  risks  your  school  faces,    and  your  governance  commiLee  has    signed  off  on  a  plan  that  follows  a    well  known  security  framework.  Unfortunately,  doing  so  has  meant  that  you  didn't  have  much  money  (or  many  staff  slots)  le`  for  opera7onal/technical  cyber  security.    

•  Late  one  Friday  night  you're  contacted  by  a  reporter  from  CNN...  the  "unthinkable"  has  happened  and  a  major  breach  has  occurred,  exploi7ng  a  technical  vulnerability  that  you  knew  about,  but  which  was  deemed  "low  risk...."  

 [Pinkie  Pie  graphic  from  hLp://mlp.wikia.com/wiki/Pinkie_Pie  ,  CC-­‐BY-­‐SA]  

13  

Page 14: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

What  Will  You  Say/Do?  

•  We  can  talk  about  the  hypothe7cal  case  from  the  preceding  slide,  or  about  decisions  in  real  life  (someday,  the  two  may  even  be  exactly  the  same,  unfortunately)  

•  You  can  fully  meet  all  expecta7ons  of  a  GRC-­‐oriented  approach,  and  STILL  end  up  experiencing  a  breach.  

•  If  you'd  spent  more  of  your  resources  on  technical/opera7onal  security,  you  might  not  have  experienced  a  breach  -­‐-­‐  but  then  again,  inves7ng  in  technical/opera7onal  security  also  might  make  no  difference.  

•  What  will  YOU  say/do?  14  

Page 15: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

 Governance,  

Risk,  &  Compliance  

15  

Page 16: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Governance  –  Engaging  the  Campus  

•  Security  landscape  is  changing  •  Level  of  resources  can’t  compete  •  Openness  vs.  lock-­‐down  strained  •  Assets  at  risk  are  shi`ing  •  Rethinking  tolerance  for  risk    •  Need  more  ver7cal  and  horizontal  involvement  in  security  planning    

16  

Page 17: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Commonly  targeted  types  of  data*  Sensi7ve  Enterprise  Data  •  Employee  data  

•  Student  records  

•  Financial  data  

•  Recruitment  and  marke7ng  data  

Research  with  Poten7al  Economic  Value  

•  Energy  technology  

•  Biotechnology,  medical,  and  pharmaceu7cals  

•  Engineering  •  New  materials,  such  as  semi-­‐conductors  

•  Informa7on  technology  

Poli7cally  or  Commercially  Sensi7ve  Informa7on  

•  Climate  modeling  •  Economic  data  and  projec7ons  

•  Live  animal  research  

•  Product  development  data  

•  Informa7on  used  for  expert  tes7mony  

17  *  Adapted  from:  Universi7es  UK.  “Cyber  security  and  universi7es:  managing  the  risk.”  November  2013.  

Page 18: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Poten7al  impact  of  cyber  aLacks  Reputa7on  •  May  harm  the  University’s  reputa7on  in  the  eyes  of  alumni,  students,  partners,  businesses,  and  government  agencies  

Legal  •  May  leave  the  University  in  viola7on  of  laws  or  contract  requirements  •  Risk  of  prosecu7on,  financial  penal7es,  or  withdrawal  of  exis7ng  and  future  funding  

Economic  •  May  undermine  the  University’s  ability  to  capitalize  on  poten7al  intellectual  property  or  knowledge  transfer  

Opera7onal  •  May  disrupt  normal  opera7ons  and  result  in  significant  remedial  cost  

18  

Page 19: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

 Governance,  

Risk,  &  Compliance  

19  

Page 20: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Moving  From  Security  to  Governance,  Risk  and  Compliance  Informa7on  Security  

•  Informa7on  Security  and  the  Informa7on  Security  Council  (HEISC)    

•  Established  by  EDUCAUSE  and  Internet2  in  July  2000  ➢  Successfully  providing  a  wealth  of  helpful  resources  to  the  higher  educa7on  

community  

•  The  Higher  Educa7on  Informa7on  Security  Council  (HEISC)  mission  has  been  to  improve  informa7on  security,  data  protec7on,  and  privacy  programs  across  the  higher  educa7on  sector.    

•  It  has  ac7vely  developed  and  promoted  leadership;  awareness  and  understanding;  effec7ve  prac7ces  and  policies;  and  solu7ons  for  the  protec7on  of  cri7cal  data,  IT  assets,  and  infrastructures  for  the  higher  educa7on  community.  

Page 21: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

       

 

Moving  From  Security  to  Governance,  Risk  and  Compliance  Three  Areas  of  Focus  for  HEISC  in  2014  

 Strengthen  Founda7ons  

•  The  council  will  strengthen  communica7ons  and  marke7ng  of  exis7ng  resources,  especially  to  CIOs.    

•  HEISC  will  strengthen  collabora7on  and  coordinate  conversa7ons  and  ac7vi7es  with  partner  organiza7ons  such  as  Educause,  Internet2,  InCommon,  and  the  REN-­‐ISAC.  

 Con7nue  to  Build  the  Informa7on  Security  Profession    

•  Annual  Security  Professionals  Conference    •  Expand  and  enhance  a  mentoring  pilot  program,  while  crea7ng  career  development  tools  and  

resources  that  balance  the  technical  and  business  needs  of  the  profession.    •  Promote  the  use  of  its  key  publica7on,  the  InformaDon  Security  Guide,  to  security  

prac77oners  and  other  campus  business  groups.    

Advance  Informa7on  Security  Strategies  in  Higher  Educa7on  •  Begin  building  an  Informa7on  Security  Peer  Review  Program  to  be  used  by  ins7tu7ons  for  

benchmarking  and  maturity  assessment.    •  Assist  with  building  the  EDUCAUSE  Governance,  Risk,  and  Compliance  (GRC)  program.  

   

Page 22: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Moving  From  Security  to  Governance,  Risk  and  Compliance  Governance,  Risk  and  Compliance  (GRC)  

•  Moving  from  a  specific  focus  on  informa7on  security  ac7vi7es  to:  

•  An  alignment  with  an  ins7tu7on’s  broader  strategic  goals;  

•  A  process  for  iden7fying,  assessing  and  mi7ga7ng  risks;  

•  Policies  and  procedures  for  complying  with  audit  requirements,  laws  and  regula7ons.    

Page 23: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Moving  From  Security  to  Governance,  Risk  and  Compliance  Let’s  Talk  About  the  “R”:  IT  Risk  Management  

•  IT  risk  management  refers  to  the  process  of  iden7fying  risk,  assessing  risk,  and  priori7za7on  of  the  major  IT  risks  associated  with  the  organiza7on’s  key  objec7ves.  

•  Once  the  risks  have  been  priori7zed,  the  organiza7on  proceeds  with  taking  steps  to  reduce  risk  to  acceptable  levels,  or  in  some  cases,  to  assume  the  iden7fied  risk.  

•  This  typically  means  developing  policies,  procedures  and  ac7on  items  (projects)  to  engage  changes  to  exis7ng  systems,  and  integra7ng  risk  mi7ga7on  strategies  into  the  life  cycle  for  new  systems.  

•  The  process  includes  monitoring  risk  mi7ga7on  ac7vi7es  to  ensure  that  the  risk  has  been  reduced.      

   

Page 24: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Moving  From  Security  to  Governance,  Risk  and  Compliance  Let’s  Talk  About  the  “R”:  Enterprise  IT  Risk  Management  

•  Enterprise  IT  risk  management  programs  move  beyond  informa7on  systems  and  security  risks  associated  with  the  IT  organiza7on.      

•  Ins7tu7onal  focus,  not  unit-­‐specific.  

•  Aligns  and  priori7zes  ac7vi7es  to  address  the  iden7fied  IT  risks  that  impact  university-­‐wide  academic  and  business  opera7ons.  

•  These  are  IT  risks  that  have  a  substan7al  financial  impact,  lead  to  lost  produc7vity,  a  distrac7on  from  ins7tu7onal  goals,  cause  nega7ve  publicity,  affect  ins7tu7onal  reputa7on,  etc.  

•  Enterprise  IT  risk  management  strategies  help  protect  the  ins7tu7on  so  that  it  can  achieve  its  strategic  goals.  

•  Enterprise  IT  risk  management  requires  collabora7on  between  IT  and  the  other  academic  and  business  areas  of  the  university…it  will  not  be  effec7ve  if  it  is  just  an  IT  organiza7on  ac7vity.  

•  One  ques7on  to  ask  in  iden7fying  these  enterprise  IT  risks  is:  ➢  What  are  the  IT  risks  that  would  cause  the  university  to  fail  to  achieve  its  ins7tu7onal  goals  and  

opera7onal  excellence?  

Page 25: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Moving  From  Security  to  Governance,  Risk  and  Compliance  Let’s  Talk  About  the  “R”:  Enterprise  Risk  Management  

•  Enterprise  risk  management  (ERM)  is  con7nuing    to  mature  and  be  implemented  in  higher  educa7on  ins7tu7ons.  

•  In  2003,  Felix  Kloman,  founder  and  editor  of  Risk  Management  Reports,  said  that  in  the  future  ins7tu7ons  will  look  at  risks  affec7ng  the  whole  of  an  organiza7on  and  they  will  be  enterprise-­‐wide,  integrated  and  holis7c.  1  

•  In  2013,  Janice  M.  Abraham,  President  and  CEO  of  United  Educators,  says  the  future  is  here  for  enterprise  risk  management.  1  

•  Colleges  and  universi7es  are  assessing  risks  associated  with  physical  assets,  people  assets,  and  cyber  assets.  

     1  “Good  Risk  Management  Is  Good  Governance”  an  ar7cle  excerpted  from  Risk  Management:  An  Accountability  Guide  for  University  and  College  Boards  (AGB  Press,  2013),  by  Janice  M.  Abraham.  

Page 26: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Moving  From  Security  to  Governance,  Risk  and  Compliance  Let’s  Talk  About  the  “R”:  Enterprise  Risk  Management  

•  Sponsored  and  led  by  the  President;  

•  It  is  a  process  effected  by  an  organiza7on’s  leadership;  

•  Developed  and  managed  at  the  ‘enterprise’  level  with  all  key  academic  and  business  areas  included;      

•  Designed  to  iden7fy  and  mi7gate  risks  that  would  impact  strategic  objec7ves;  

•  Provides  a  framework  for  determining  risk  tolerance,  developing  mi7ga7ng  strategies,  and  alloca7ng  resources.  

Page 27: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Moving  From  Security  to  Governance,  Risk  and  Compliance  Let’s  Talk  About  the  “R”:  Enterprise  Risk  Management  

ERM  Structure  at  the  University  of  Maryland,  Bal7more  •  President  •  Execu7ve  Commimee  •  ERM  Steering  Commimee  •  Subject  Area  Workgroups:  

➢  IT  Systems  and  Security  ➢  Academic  Affairs  ➢  Campus  security  and  public  safety  ➢  Clinical  prac7ce  ➢  External  and  internal  rela7ons  ➢  Facili7es  ➢  Environmental  Health  and  Safety  ➢  Finance  and  internal  controls  ➢  Global  ac7vi7es  ➢  Government  regulatory/compliance  ➢  Human  resources  ➢  Research  ➢  Risk  management  and  insurance  

•  Collabora7on  across  the  enterprise  •  Added  visibility  and  value  to  IT  Systems  and  Security    

Page 28: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Moving  From  Security  to  Governance,  Risk  and  Compliance  Let’s  Talk  About  the  “R”:  Enterprise  Risk  Management  

•  The  ERM  process  is  just  as  important  as  the  product…it’s  a  process  not  a  project;  

•  Creates  a  risk  aware  culture  throughout  the  enterprise;  

•  And  influences  an  important  posi7ve  change  as  the  ins7tu7on  moves  from  security  to  an  enterprise  program  of  governance,  risk  and  compliance.    

Page 29: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

 Governance,  

Risk,  &  

Compliance  

29  

Page 30: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Compliance:  Not  Alphabet  Soup…  

ECPA

CFAA

DPPA ITAD

A

CP

NI

GLBA

pcidss

Page 31: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

▪  “The  process  of  adherence  to  policies  and  decisions.  Policies  can  be  derived  from  internal  direc7ves,  procedures  and  requirements,  or  external  laws,  regula7ons,  standards  and  agreements.”  

– Compliance  focuses  on  valida7on,  security  focuses  on  protec7on  

– Compliance  standards  tend  to  be  sta7c  in  nature  and  are  slow  to  be  updated  where  security  is  dynamic  and  ever  changing  

What  is  Compliance?  

hLp://blogs.gartner.com/paul-­‐proctor/2013/05/13/why-­‐i-­‐hate-­‐the-­‐term-­‐grc/  

Page 32: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

▪  It  is  achieved  through  management  processes  which    –  Iden7fy  the  applicable  requirements  (e.g.  laws,  regula7ons,  contracts)  

– Assess  the  current  state  of  compliance  – Assess  the  risks  and  poten7al  costs  of  non-­‐compliance  against  the  projected  expenses  to  achieve  compliance  

– Priori7ze  and  ini7ate  any  correc7ve  ac7ons  deemed  necessary  

How  is  Compliance  Achieved?  

Page 33: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Two  different  measurements  which  are  not  interchangeable  

You  may  be  secure,  yet  not  compliant  

You  may  be  compliant,  yet  not  secure    

Does  Compliance  Equal  Security?  

Page 34: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

The  Evolving  Landscape  

▪  ALacks  con7nue  to  grow  beyond  most  preven7on  &  detec7on  technologies  and  techniques    

▪  Barriers  to  entry  for  bad  actors  are  low  

▪  Ability  to  apply  invasive  controls  will  be  limited  as  IT  will  not  directly  own  a  user’s  device  or  the  services  provisioned  to  the  device  

Page 35: Moving From Security to Governance, Risk, and Compliance? …€¦ · 07/04/2014  · Moving From Security to Governance, Risk, and Compliance? Campus Perspectives Panel Joe St Sauver,

Risk  Decisions  •  Transfer  •  Accept  •  Reduce  •  Share  University  Mission  •  Pa7ent  care  •  Service  •  Research  •  Educa7on  

▪  The  goal  is  to  reduce  adverse  impacts  to  an  acceptable  level  of  risk  –  Balance  risk  with  the  missions  of  educa7on,  

research,  service  and  pa7ent  care.  

▪  Informa7on  security  is  not  only  a  technical  issue  –  It  is  a  business  and  governance  challenge  that  involves  adequate  risk  management,  repor7ng  and  accountability.  

–  Effec7ve  security  requires  the  ac7ve  involvement  of  management  to  assess  emerging  threats  and  the  response  to  them.  

Importance  of  Governance,  Risk  Management  and  Compliance  


Recommended