What is the current NIST guidance for how often to change your password, based on passage of time?
a) 30 days b) 42 days c) 90 days d) never
d. Never
What do Regulations help to do?
What is SP 800-37
Risk Management Framework
What is SP 800-53
Security Controls for IT Systems
What is SP 800-82
Security Controls for Industrial Control Systems
What is SP 800-171
Security Controls for Nonfederal systems processing Controlled Unclassified Information
Special Publication 800-37 is centered on the Risk Management Framework (RMF), which outlines six steps federal agencies must take to secure their information systems.
WHAT ARE THOSE SIX STEPS?
CSCAAM
NIST SP 800-37
The overall goals of the guidelines in 800-37 are?
The Purpose of NIST SP 800-53 Revision 4: (Security and Privacy Controls for Federal Information Systems and Organizations) is to?
EU-US Privacy Shield
PCI-DSS
Payment Card Industry Data Security Standards
Gramm- Leach- Bliley Act
Organizations that provide services to the financial industry
Originally SAS-70 requirements
SAS-70 replaced by Statement on Standards for Attestation Engagements No. 16 (SSAE-16)
SSAE-16 defined and formalized security audits, management duties, etc.
Security Program: Set yourself up for success!
Compliance Creep
Requirements expand over time
Techniques for Compliance
Value in Compliance
How many types of Auditors? and what are they?
FOUR
Preparing employees for an audit
Part 1
• Don’t“coach”employees–it makes them nervous and ticks off the auditor
• Don’t guess–“I don’t know” is perfectly reasonable.If followed up by “but this is the person/system I would go to in order to find out,” all the better
• Time is money–don’t waste it
• Don’t try to be a lawyer–speak straight forwardly, avoid
jargon
• Auditor is not a whistleblower hotline
Preparing for an audit -part 2
• Prepare early–don’t rush the documentation
• Maintain a steady strain–a little at a time over time is
much better than rushing to document everything
• “Done right”»_space; “Done quickly”
• Understand the requirements and start early
• Strategic Speed: reducing the time it takes to deliver value
• High performing companies encourage innovative thought, allow time for reflection and learn from the past
Building Trust with Audit Team
1914 Federal Trade Commission Act
Prohibits “unfair or deceptive acts or practices in or affecting commerce”
This broad statement has far-reaching implications on cybersecurity
• Established (by extension) a minimum set of cybersecurity practices
• Protects the privacy and security of non-public information
Sarbanes-Oxley Act (2002)
Not as prescriptive as GLBA from an IT perspective
Focused primarily on internal controls over financial reporting
Created a linkage between accounting and business process and the underlying IT infrastructure
Designed to restore confidence in the market as a result of Enron and Arthur Anderson
An Effective Security Program
Three Questions to ask yourself