Current Issues and Careers in BCP. Al Berman, President DRI International

Size: px
Start display at page:

Download "Current Issues and Careers in BCP. Al Berman, President DRI International"

Transcription

1 Current Issues and Careers in BCP Al Berman, President DRI International

2 Business Continuity What s Important Now

3 Who we are We provide education, accreditation, and thought leadership in business continuity and related fields. We offer in-depth courses ranging from introductory to masters level, as well as specialty certifications. Founded in 1988, we are the oldest and largest organization of our kind.

4 What we do and where we do it 1 Certified Organization 14,000+ Certified Professionals Classes offered in 14 Languages Certified Professionals in 100+ Countries Courses held in 50 Countries

5 International Government Collaboration Europe: Presented at the Interparliamentary Center for Parliamentary Studies (Belgium) and the IDRC (Davos, Switzerland) APEC: Only officially recognized business continuity certification DRI Canada is a member of the Technical Committee for the CSA Z1600 Standard UAE: Member of Standards Committee Advisory Team Nigeria: Participate in regular embassy drills Malaysia: Annual DRI conference with the Ministry of Science, Technology and Innovation Japan: Joint Declaration on overcoming future crises with municipal governments Singapore: Exclusive training partner for Singapore Business Federation United States: Chair, Alfred P. Sloan Committee to draft the Framework for Preparedness that is the foundation for the Title IX Implementation. Member, U.S. Chamber of Commerce Homeland Security Task Force Member, Council of Experts for ANSI-ANAB Member, FEMA National Advisory Council Private Sector Subcommittee Member, Advisory Committee for Congressionally funded Project for National Security Reform Advisor, Special Assistant to The President for Homeland Security Standards Policy Mexico: National standards advisor

6 Conferences Urban Security Event Rome, Italy Business Continuity Forum Doha, Qatar Global Risk Forum Davos, Switzerland Business Continuity Forum Istanbul, Turkey World Conference of Disaster Risk Reduction Sendai, Japan Crisis and Emergency Management Conference Abu Dhabi, United Arab Emirates Low Carbon Earth Summit Qingdao, China Knowledge Grows by Sharing Hyderabad and Bangalore, India KL2013 KL2014 KL 2015 KL 2016 Kuala Lumpur, Malaysia The State of The Art of Business Continuity and Disaster Recovery ISACA: True Risk Management The Road to Convergence Singapore The Role of the Central Bank and BCM Manila, Philippines DRI BJ 2015 Beijing, China Great Lakes Business Recovery Group Michigan, United States RIMS PERK Presentation Kansas City, KS DRI2013 Philadelphia, United States DRI2012 New Orleans, United States DRI2015 San Antonio, United States Leadership for Peace and Prosperity Conference San Diego, United States PwC International BCM Conference San Juan, Costa Rica ACP Liberty Valley Meeting Pennsylvania, United States NYU Intercep Global Risk Forum New York, United States Mid-Maryland ACP Meeting Maryland, United States DRI2014 Atlanta, United States Congreso BCM y ERM Mexico City, Mexico Congreso ALCONT Medellin, Colombia DRI Day Sao Paolo, Brazil

7 United Nations Collaboration DRI is a member of the Private Sector Partner Working Group of the United Nations Office for Disaster Risk Reduction DRI is representing the private sector to the UNISDR Disaster Management Terminology Committee Research conducted in partnership with the European Commission DRI s International Glossary for Resiliency is a source document DRI hosted a Public Forum in conjunction with the launch of the Hyogo Framework for Action 2 at the World Conference for Disaster Risk Reduction Providing access and voice heard by global policymakers

8 The Most Used Standard in the World Most Used Standard for BCM BC Management 2013

9 Outreach

10 Charitable Giving and Volunteerism Vision Resilient communities worldwide Mission To promote disaster risk reduction through partnership and education To aid recovery efforts through fundraising and volunteerism

11

12 Education

13 Academic recognition

14 Working with the academic community DRI International Collegiate Conferences One-day conference in conjunction with an institution of higher learning Admission - $50 tax-deductible donation to the DRI Foundation (students are Free) A chance for professionals and academics to meet Meet Potential Employers 2016 Schedule University of St. Thomas, Houston, Texas: April 23, 2016 St. John s University, Queens, New York: Sept 12, 2016 Saint Louis University, St. Louis, Missouri: Sept 15, 2016 Centennial College, Toronto, Canada: 11/3/2016

15 Helping pay for college through scholarship To help pay for rising education costs $5,000 for a high school senior $5,000 for an Undergraduate Student Parent or legal guardian must be a Certified Professional in good standing For Undergraduate Scholarship: Applicant may be a DRI Certified Professional in good standing Focus Area: Education

16 Business Continuity as a Career

17 Job Trends

18 Let s Talk Money

19 Job Openings

20 Most sought-after credential DRI International November 25, 2015

21 Helping Those That Protect Us

22 Veteran s Outreach Program To establish a Veterans Outreach Program where recently separated or near-term separation military members can participate in a DRI program focused on career development, transitioning to the corporate (both public and private) sector Helping those who protect us Providing free training (sponsored or Montgomery GI Bill) Providing career guidance Reaching out to military and veterans organizations to provide free seminars

23 Veteran s Outreach Program New education program RP6 s mission is to guide service members, veterans and their families to their next objective BCP 501 to be delivered for RP6 veterans community Held April 27-29, 2016 in Lakewood, Washington

24 BCM, Resiliency & Risk Management

25 BCM, Resiliency & Risk Management

26 Business Continuity Management

27 Disaster Response Components Emergency Response Crisis Management Business Continuity Activity Inception - Duration

28 Combining Disciplines More Integrated Solution Business Continuity Disaster Recovery (IT Recovery and Continuity) Emergency Response Crisis Management UNDER THE BANNER OF BUSINESS CONTINUITY MANAGEMENT

29 Why BCM?

30 Reasons for Business Continuity External Drivers Impacts Pressure from audit committees Pressure from financial institutions Pandemic concern New threats & risks since 9/11 Demands from customers Increased regulatory and self-regulated requirements Loss of customers or inability to attract new customers Loss of revenue Decrease in stock value Increase of insurance premiums Loss of assets and employees Regulatory sanctions

31 Reasons for Business Continuity

32 Reasons for Business Continuity Customer Focused

33 Reasons for Business Continuity External Drivers Impacts Pressure from audit committees Pressure from financial institutions Pandemic concern New threats & risks since 9/11 Demands from customers Increased regulatory and self-regulated requirements Loss of customers or inability to attract new customers Loss of revenue Decrease in stock value Increase of insurance premiums Loss of assets and employees Regulatory sanctions

34 Business Continuity Laws, Regulations and Standards Pre-9/11 Post-9/11 Consumer Credit Protection Act OMB Circular A-130 FEMA Guidance Document Paperwork Reduction Act ISO (Previously ISO17799) FFIEC BCP Handbook Computer Security Act 12 CFR Part 18 Presidential Decision Directive 67 FDA Guidance on Computerized Systems used in Clinical Trials ANSI/NFPA Standard 1600 Turnbull Report (UK) ANAO Best Practice Guide (Australia) SEC Rule 17 a-4 FEMA FPC 65 CAR JHACO Sarbanes-Oxley Act of 2002 HIPAA, Final Security Rule FFIEC BCP Handbook -2003/ 2008 Fair Credit Reporting Act NASD Rule 3510 NERC Security Guidelines FERC Security Standards NAIC Standard on BCP NIST Contingency Planning Guide FRB-OCC-SEC Guidelines for Strengthening the Resilience of US Financial System NYSE Rule 446 California SB 1386 Australia Standards BCM Handbook GAO Potential Terrorist Attacks Guideline Federal and Legislative BC Requirements for IRS Basel Capital Accord MAS Proposed BCP Guidelines (Singapore) NFA Compliance Rule 2-38 FSA Handbook (UK) BCI Standard, PAS 56 (UK) Civil Contingencies Bill (UK) NFPA: PS-Prep Sarbanes-Oxley 2002 Safety Act FCD-1/2 NYS Circular Letter 7 ASIS State of NY FIRM White Paper on CP NISCC Good Practices (Telecomm) Australian Prudential Standard on BCM HB221 HB292 BS25999 SS507 SS540 TR19 CA Z1600 ISO/PAS HiTech Act of 2009 NZ 5050 ISO22301 FINRA 4370 UAE SEC - Compliance Programs Dodd-Frank Wall Street Reform Act ISO22301 NFPA:

35 BCM, Resiliency, Risk Management

36 Resiliency Enterprise Risk Risks associated with not only accidental losses, but also financial, strategic, operational, and other risks. Operational Risk Risks associated with internal inadequacies of an organization or a breakdown of its controls, operations or procedures. Business Continuity Reducing the impacts that occur when there is a failure in Enterprise or Operational Risk Management

37 Cause vs. Effect Risk Management Anticipates Causes (Risks) Identifies Threats (Facility, Environmental, Climatic, Geopolitical, Personnel, Business, Technology, etc) Recommends Mitigation Probability Cost of Mitigation BCM - Deals with Effects What are the Implications of failing to mitigate or prevent Preparation Structure, planning, resources, testing Execution Relocation, operating under duress

38 Risk Assessment Preparing to Deal with Causes Power Failure Location 1 Possible Scenarios Primary Workspace Primary Systems & Electronic Data Key Personnel Key Vendors and Services Vital Records (Paper Files & Mail) Electric Internal G Y G G G Con Ed failure G Y G G G Back-up Generators failure G Y G G G Gas Leaks R R R G G Communications Loss of Vendor Service G R G R G Loss of Voice Service G G G R G Loss of Cellular Service G G G Y G Loss of Data Transmissions G R G R G Router / Hub Failure/Firewall G R G R G Overloaded: Performance failure G R G R G IT Processing Software failure G R G G Y Infrastructure damaged G R G R Y Mainframe failure G R G R Y Server failure G R G R Y Router failure G R G R Y Hubs Failure G R G R Y Water / Plumbing / Sprinkler Malfunction G Y R

39 Cause vs. Effect Risk Management Anticipates Causes (Risks) Identifies Threats (Facility, Environmental, Climatic, Geopolitical, Personnel, Business, Technology, etc) Recommends Mitigation Probability Cost of Mitigation BCM - Deals with Effects What are the Implications of failing to mitigate or prevent Preparation Structure, planning, resources, testing Execution Relocation, operating under duress

40 BCM Focuses on Effects, Impacts, Consequences INCIDENT OCCURS Facilities Business or Operational Technology Organization Fire Flood Bomb Scare SARS,H1N1, H5N1 Terrorism etc. Supply Chain Process Error Transit Strike SARS, H1N1, H5N1 Labor Strike etc. Network Problem Application Error Hardware Failure Virus Power Problem etc. M & A Succession IP Issue Audit Issues Financial Problems etc.

41 Cause vs. Effect Risk Management Anticipates Reducing Causes Causes (Risks) Identifies Threats (Facility, Environmental, Climatic, Geopolitical, Personnel, Business, Technology, etc) Recommends Mitigation Probability Cost of Mitigation Reducing Effects BCM - Deals with Effects What are the Implications of failing to mitigate or prevent Preparation Structure, planning, resources, testing Execution Relocation, operating under duress

42 Business Continuity Management Today

43 A Few Issues of Concern Supply Chain From Albuquerque to Sendai & Beyond Cyber Threat Insurance Risk Transfer Business Interruption Extra Expense and BCP Technology Clouds and Resiliency Standards Laws Regulations Standards

44 A Look at Supply Chain Issues

45 Challenges Supply Chain From Albuquerque to Sendai & Beyond Cyber Threats Extending Supply Chain Scope Insurance Risk Transfer Real ROI

46 Supply Chain From Albuquerque to Sendai & Beyond

47 Supply Chain

48 Supply Chain Procurement and Strategic Sourcing Transportation Management Inventory Planning and Management Physical Distribution Customer Service and Support

49 Nokia vs. Ericsson -- March 17, 2000 Pre Fire Ranking Nokia (32%) Motorola (22%) Ericsson (12%) 10 Minute Fire in Albuquerque Philips Microchip Plant Post Fire Ranking Nokia shipments grew by 10.5 percent over the previous year, to 140 million units. Motorola shipments dropped by 1.7 percent to 59 million units. Siemens shipments grew by 10.2 percent to 30 million units. Samsung shipments grew by 36.8 percent to 28 million units. Ericsson shipments dropped by 35 percent to 27 million units. On July 20, 2000, Ericsson reported that the fire and component shortages had caused a second-quarter operating loss of $200 million in its mobile phone division. Total loss $400 million

50 Why Nokia Gained and Ericsson Lost Preparation - Nokia Considered solutions before event occurred Understood the need Implemented recovery at other Philips plants Believed early reports of little damage and interruption Smart people will find a solution Wishful Thinking - Ericsson

51 Once Burned: Better BCM Means More Reliable Suppliers Business Interruption and Recovery Plan Supplier will provide Motorola with a detailed, written business interruption and recovery plan, including business impact and risk assessment, crisis management, information technology disaster recovery, and business continuity. Supplier will update the plan annually. Supplier will notify Motorola in writing within twenty-four (24) hours of any activation of the plan. Motorola Corp 2002

52 Japanese Impact Upon Supply Chain GM shuts down for lack of supplies Chrysler Ford no Red Black Pigments Apple ipad2 Backorder Chip shortage Chip increased prices Case Polishing

53 Japan as a Supplier

54 Changing Direction Moving More Production Off Shore Some 70 per cent of domestic manufacturers expect at least one partner in their supply chains to speed up relocation efforts overseas, a trade ministry poll showed, accelerating a nearly two decade-long migration of Japanese manufacturing capability overseas. "Relocating is on the table for many executives. If a key supplier or partner moves, that could trigger a large exodus," said Shuzo Takada, director of the ministry's industrial revitalisation division.

55 Changing Direction Moving More Production Off Shore Off Shore Back Up Renesas Electronics, plans to increase offshore production from 8% - 25% Fujitsu plans to shift more chip output to a factory in China Hoya, is planning its first overseas plant in China Mitsui Mining & Smelting, which supplies 90 percent of the ultra-thin copper foil used in smartphones, is building a backup production line in Malaysia. Japanese Firms Plan to Set Up Backup Production Bases in Taiwan The two Japanese firms, one a semiconductorequipment maker and the other an electronic chemical material supplier, plan to make investments totaling NT$600 million in value.

56 Mapping Risk in Supply Chain

57 Emerging Supply Chain Risks Risk & Insurance Magazine

58 Cyber Threats Extending Supply Chain Scope

59 Cyber Crimes In The News

60 The New Attacks Easy Source of Attacks Find a trusted source (third party vendor) One with less than adequate security phish, hack Steal credentials Gain entry to Target POS Test the hack Spread to rest of POS system live Credit/Debit card info Upload (FTP) data to innocent servers in Miami and Brazil Data winds up in Russia and Eastern Europe SUPPLY CHAIN WEAKNESS AFFECTED CUSTOMER CREATED POTENTIAL LEGAL LIABILITY SUIT SETTLED WITH 40,000,000 CUSTOMERS GUESS HOW MUCH? $10 MILLION - 25 CENTS PER PLAINTIFF

61 ENTER THE GOVERNMENT

62 More Pressure to Perform Due Diligence on Supply Chain New Regulations to Ensure Vendor Security HIPAA Omnibus Rules Vendor Due Diligence FFIEC Third-Party Providers, Key Suppliers, and Business Partners Cybersecurity Assessment Pilot Program OCC Third Party Relationships FINRA PCI Assessing how firms manage cybersecurity threats Credit Card Processing (Outsourcing cloud services provider, hosted call-center, IT services firm, disaster recovery location, document storage company)

63 Bulletin OCC A bank should adopt risk management processes commensurate with the level of risk and complexity of its third-party relationships. A bank should ensure comprehensive risk management and oversight of third-party relationships involving critical activities. An effective risk management process throughout the life cycle of the relationship includes: plans that outline the bank s strategy, identify the inherent risks of the activity, and detail how the bank selects, assesses, and oversees the third party. proper due diligence in selecting a third party. written contracts that outline the rights and responsibilities of all parties. ongoing monitoring of the third party s activities and performance. contingency plans for terminating the relationship in an effective manner. clear roles and responsibilities for overseeing and managing the relationship and risk management process. Documentation and reporting that facilitates oversight, accountability, monitoring, and risk management. Independent reviews that allow bank management to determine that the bank s process aligns with its strategy and effectively manages risks. The OCC charters, regulates, and supervises all national banks and federal savings associations as well as federal branches and agencies of foreign banks. The OCC is an independent bureau of the U.S. Department of the Treasury. Mission To ensure that national banks and federal savings associations operate in a safe and sound manner, provide fair access to financial services, treat customers fairly, and comply with applicable laws and regulation

64 HIPPA Business Associates Concerned with ephi Focus Area Change Required Internal Existing Agreements With Business Associate Addenda Existing Relationships without Business Associate Addenda All Covered Entities must review their existing vendor relationships and affiliations to determine whether any relationship meets the new Business Associate Criteria. All Business Associates must review their existing subcontractor arrangements for compliance purposes. Identify Vendors and/or affiliates or affiliation relationships which involve access or disclosure of PHI and which do not have documented BA addenda. RHIO relationships must include a Business Associate Addendum. A parent or affiliate which provides quality assurance or other functions involving access or review of PHI must have a Business Associate Addendum in place. Vendors who provide PHI to patients must have a Business Associate Addendum in place. Other entities, such as document storage and/or disposal vendors must have a Business Associate Addendum in place. HIPAA Inventory all existing contracts and identify all signed Business Associate Addenda and/or subcontractor agreements. Review contracts signed prior to January 25, 2013 and determine end date for compliance as per transitional rule. Conduct a risk assessment of all vendor relationships to identify those that may fall within the new regulatory definitions. Do not overlook corporate relationships with affiliates which do not involve the exchange of information for treatment purposes. For individuals employed by vendors or affiliates but who may fall within a covered entity s or Business Associate s work force, assure proper designation and training. Hybrid Entities Hybrid Entities that perform multiple functions and roles (such as operating a hospital and university) must now include any Business Associate functions under the health care component of its operations subject to the new rules. Review internal designations of health component for any Hybrid Entity. Assure direct compliance with HIPAA/HITECH as to Business Associate functions carried out by organization.

65 And One for the US Government FISMA- (Federal Information Security Management Act) Federal Highway Administration bid solicitation Security assessment: formal evaluation of control environment (annual) Plan of action: plan to mitigate assessment findings (quarterly) System security plan: documentation of all controls (annual) Security categorization: impact level of each system (annual) System contingency plan: documentation of redundancy (annual) Security policy and workforce training records (annual) Interconnection agreements from sub-contractors (annual)

66 Government Contract Lost Oct 10, 2014, 7:01am EDT Dayton Business Journal It seems that being the victim of a data breach could lead to companies losing government contracts, according to a report by the Washington Business Journal. The Office of Personnel Management s decision not to renew two contracts with US Investigations Services LLC might have set a precedent for how government handles contractor breaches, according to the report. As a reminder, in July 2014, USIS was hit by a cyber attack that reportedly affected 25,000 government employees. USIS suspected it to be "state-sponsored." The government quickly suspended work with USIS and then opted to drop its contracts with the company. Robert Nichols, a lawyer specializing in government contracts at D.C. firm, Covington & Burling LLP, says the lost contracts could place higher demands on contractors in securing their work with government data, according to Federal Computer Week. For this reason alone, government contractors must have adequate system protections in place to keep data safe.

67 Timeline March Attempted OPM Attack June USIS - Contractor Notifies Government of Breach July 9, NY Times First Reveals Attempted OPM Hack August 6, USIS Acknowledges Breach September Previously Undisclosed Hack at KeyPoint Contractor Notification sent in June 2015 USIS contract not renewed December Another Hack Disclosed; OPM Systems Successfully Breached April OPM Detects Hack of Personnel Files May OPM Learns Background Check Data At Risk June 4, OPM Announces Massive Breach of Personnel Files June 12, OPM Confirms Related Breach of Background Check Files June 16, OPM Blames Lax Security on Outdated Technology

68 OPM

69 Our Policy Director of National Intelligence James Clapper testifies on Capitol Hill in Washington, Thursday, Sept. 10, 2015, before the House Intelligence Committee hearing on cyber threats. "Until such time as we do create both the substance and the mindset of deterrence, this sort of thing is going to continue,"

70 Balancing Security and Privacy Apple vs. FBI vs. Department of Justice Issue Governments Right to Access Information Vs. Individuals Right to Privacy Underlying Issue Trusting the Government Government Security Abuse (stringrays)

71 We can all sleep better at night "Gates is absolutely right," maintained Al Berman, President of DRI International.

72 Thank You Questions, Comments

An Introduction for the ACP LA Chapter August 11, 2015

An Introduction for the ACP LA Chapter August 11, 2015 An Introduction for the ACP LA Chapter August 11, 2015 We provide education, accreditation, and thought leadership in business continuity and related fields. We offer in-depth courses ranging from introductory

More information

Current Issues and Careers in Business Continuity

Current Issues and Careers in Business Continuity Current Issues and Careers in Business Continuity Chloe Demrovsky Executive Director, DRI International DRI Collegiate Conference De La Salle University March 2017 Who we are We provide education, accreditation,

More information

The Value of Certification with DRI International Presented by Chloe Demrovsky Director of Global Operations, DRI International

The Value of Certification with DRI International Presented by Chloe Demrovsky Director of Global Operations, DRI International The Value of Certification with DRI International Presented by Chloe Demrovsky Director of Global Operations, DRI International Mumbai, India January 17, 2011 DRI International DRI has Certified INDIVIDUALS

More information

Resilience is a competitive advantage: How to be a reliable supplier

Resilience is a competitive advantage: How to be a reliable supplier Resilience is a competitive advantage: How to be a reliable supplier Chloe Demrovsky Executive Director, DRI International Electrical Safety, Reliability and Sustainability Conference April 7, 2017 Who

More information

DRI Professional Practices: What Has Changed and What It Means For You THE WEBINAR WILL BEGIN IN SHORTLY. PLEASE STAND BY.

DRI Professional Practices: What Has Changed and What It Means For You THE WEBINAR WILL BEGIN IN SHORTLY. PLEASE STAND BY. DRI Professional Practices: What Has Changed and What It Means For You THE WEBINAR WILL BEGIN IN SHORTLY. PLEASE STAND BY. Welcome to today s webinar Today s Presenters Chloe Demrovsky, Executive Director,

More information

Global Statement of Business Continuity

Global Statement of Business Continuity Business Continuity Management Version 1.0-2017 Date January 25, 2017 Status Author Business Continuity Management (BCM) Table of Contents 1. Credit Suisse Business Continuity Statement 3 2. BCM Program

More information

Driving Global Resilience

Driving Global Resilience Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute

More information

Opening Remarks. Al Berman. DRI International President & CEO

Opening Remarks. Al Berman. DRI International President & CEO Opening Remarks Al Berman DRI International President & CEO Welcome to DRI2017 Mayor of Las Vegas Proclaims February 25 DRI Foundation Day Proclamation from Mayor of Las Vegas Whereas; The DRI Foundation

More information

MassMutual Business Continuity Disclosure Statement

MassMutual Business Continuity Disclosure Statement MassMutual Business Continuity Disclosure Statement Overview Resiliency is a high priority at Massachusetts Mutual Life Insurance Company ( MassMutual or the Company ). To that end, significant investments

More information

Legal and Regulatory Developments for Privacy and Security

Legal and Regulatory Developments for Privacy and Security Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

UL and Business Continuity

UL and Business Continuity UL and Business Continuity David Stowe, CBCP Business Continuity Manager APEC EPWG Workshop: Private Sector Emergency Preparedness Hotel Monterey Sendai 3 rd August 2011 2011 Underwriters Laboratories

More information

Cybersecurity and Data Protection Developments

Cybersecurity and Data Protection Developments Cybersecurity and Data Protection Developments Nathan Taylor March 8, 2017 NY2 786488 MORRISON & FOERSTER LLP 2017 mofo.com Regulatory Themes 2 A Developing Regulatory Environment 2016 2017 March CFPB

More information

COMMENTARY. Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards

COMMENTARY. Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards November 2016 COMMENTARY Federal Banking Agencies Propose Enhanced Cyber Risk Management Standards The Board of Governors of the Federal Reserve System ( Federal Reserve Board ), the Federal Deposit Insurance

More information

SOC 3 for Security and Availability

SOC 3 for Security and Availability SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2015 through September 30, 2016 Independent SOC 3 Report for the Security and Availability Trust

More information

Exploring the Maturity of Risk Management Process in Government: An Integrated ERM Model at the U.S. Department of Education

Exploring the Maturity of Risk Management Process in Government: An Integrated ERM Model at the U.S. Department of Education Exploring the Maturity of Risk Management Process in Government: An Integrated ERM Model at the U.S. Department of Education FEDERAL STUDENT AID ENTERPRISE RISK MANAGEMENT GROUP Cynthia Vitters 1. ERM

More information

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp Agenda Introductions HIPAA Background and History Overview of HIPAA Requirements

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

MultiPlan Selects CyrusOne for Exceptional Colocation and Flexible Solutions

MultiPlan Selects CyrusOne for Exceptional Colocation and Flexible Solutions CASE STUDY MultiPlan Selects CyrusOne for Exceptional Scalable, secure and reliable data center solution keeps healthcare company operating seamlessly MultiPlan Inc., the industry s most comprehensive

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

CYBERSECURITY AND THE MIDDLE MARKET

CYBERSECURITY AND THE MIDDLE MARKET CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE

More information

Kansas City s Metropolitan Emergency Information System (MEIS)

Kansas City s Metropolitan Emergency Information System (MEIS) Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

BCP Certification for the Public Sector Professional

BCP Certification for the Public Sector Professional May 2013 Walter E. Washington Convention Center Washington, DC BCP Certification for the Public Sector Professional Daniel Mikulsky, MBCP DRI International DRI International A Global Non-Profit Organization

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

TABLE OF CONTENTS ONLY IT Resiliency Benchmarking Report

TABLE OF CONTENTS ONLY IT Resiliency Benchmarking Report TABLE OF CONTENTS ONLY IT Resiliency Benchmarking Report Prepared by BC Management, Inc. October 2016 Benchmarking. Plan Ahead. Be Ahead. Data collected between July September 2016 Table of Contents Reporting

More information

Putting It All Together:

Putting It All Together: Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,

More information

PIPELINE SECURITY An Overview of TSA Programs

PIPELINE SECURITY An Overview of TSA Programs PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the

More information

SAS 70 Audit Concepts. and Benefits JAYACHANDRAN.B,CISA,CISM. August 2010

SAS 70 Audit Concepts. and Benefits JAYACHANDRAN.B,CISA,CISM. August 2010 JAYACHANDRAN.B,CISA,CISM jb@esecurityaudit.com August 2010 SAS 70 Audit Concepts and Benefits Agenda Compliance requirements Overview Business Environment IT Governance and Compliance Management Vendor

More information

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015 ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters

More information

Business Continuity Planning

Business Continuity Planning Business Continuity Planning The Unexpected Happens Be Ready Copyright -Business Survival Partners, llc. 2011 - All Rights Reserved www.survivalpartners.biz RISK 2 Risks to National Security A secure and

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA?

Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA? Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA? A brief overview of security requirements for Federal government agencies applicable to contracted IT services,

More information

Data Backup and Contingency Planning Procedure

Data Backup and Contingency Planning Procedure HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

FDIC InTREx What Documentation Are You Expected to Have?

FDIC InTREx What Documentation Are You Expected to Have? FDIC InTREx What Documentation Are You Expected to Have? Written by: Jon Waldman, CISA, CRISC Co-founder and Executive Vice President, IS Consulting - SBS CyberSecurity, LLC Since the FDIC rolled-out the

More information

The U.S. Manufacturing Extension Partnership - MEP

The U.S. Manufacturing Extension Partnership - MEP The U.S. Manufacturing Extension Partnership - MEP Roger D. Kilmer Director, MEP National Institute of Standards and Technology (NIST) U.S. Department of Commerce roger.kilmer@nist.gov 301-975-5020 http://www.nist.gov/mep/

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

About Issues in Building the National Strategy for Cybersecurity in Vietnam

About Issues in Building the National Strategy for Cybersecurity in Vietnam Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

01.0 Policy Responsibilities and Oversight

01.0 Policy Responsibilities and Oversight Number 1.0 Policy Owner Information Security and Technology Policy Policy Responsibility & Oversight Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 1. Policy Responsibilities

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

Requirements and Benefits of Programmatic vs. Project Driven Approach to New Build. Jay Brister, Vice President, Business Development, Power

Requirements and Benefits of Programmatic vs. Project Driven Approach to New Build. Jay Brister, Vice President, Business Development, Power Requirements and Benefits of Programmatic vs. Project Driven Approach to New Build Jay Brister, Vice President, Business Development, Power April 23, 2015 AECOM Overview Page 2 AECOM Overview AECOM is

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

Business Continuity An Integral Part of Risk Management At Constellation Energy

Business Continuity An Integral Part of Risk Management At Constellation Energy Business Continuity An Integral Part of Risk Management At Constellation Energy World Disaster Management Conference Toronto, Canada June 19, 2006 Robert W. Cornelius Director Business Continuity Operating

More information

WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT

WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT WELCOME TO ISACA 2015 Claudio CILLI, CISA, CISM, CRISC, CGEIT cilli@di.uniroma1.it http://dsi.uniroma1.it/~cilli WHO IS ISACA? ABOUT ISACA The trusted source of guidance, networking and career development

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

Overview of Customs-Trade Partnership Against Terrorism (C-TPAT)

Overview of Customs-Trade Partnership Against Terrorism (C-TPAT) Overview of Customs-Trade Partnership Against Terrorism (C-TPAT) Our Mission We are the guardians of our Nation s borders. We are America s frontline. We safeguard the American homeland at and beyond our

More information

Response to Wood Buffalo Wildfire KPMG Report. Alberta Municipal Affairs

Response to Wood Buffalo Wildfire KPMG Report. Alberta Municipal Affairs Response to Wood Buffalo Wildfire KPMG Report Alberta Municipal Affairs Background To ensure continuous enhancement and improvement of Alberta s public safety system, the Alberta Emergency Management Agency

More information

Introduction to Business Continuity Management

Introduction to Business Continuity Management Introduction to Business Continuity Management Audio Presented by ABD s Occupational Health and Safety Team Featuring The Cross Connection JULY 24, 2018 Speaker Panel ABD Insurance & Financial Services

More information

Managing the Cybersecurity Threat

Managing the Cybersecurity Threat Managing the Cybersecurity Threat State of the Art Trade Secrets Protection Strategies Washington, DC Nov. 15, 2011 David Z. Bodenheimer Partner Crowell & Moring LLP 2011 Crowell & Moring LLP Cyber Spies

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company Written Statement of Timothy J. Scott Chief Security Officer The Dow Chemical Company Representing The Dow Chemical Company and the American Chemistry Council To the United States Senate Committee on Homeland

More information

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements

More information

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased

More information

GDPR: A QUICK OVERVIEW

GDPR: A QUICK OVERVIEW GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance

More information

Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery

Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Dave Komendat Chief Security Officer The Boeing Company What We Do Today Design, assemble and support

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Minnesota RIMS 39 th Annual Seminar Risk 2011-2012: Can You Hack

More information

Ensuring Privacy and Security of Health Information Exchange in Pennsylvania

Ensuring Privacy and Security of Health Information Exchange in Pennsylvania Ensuring Privacy and Security of Health Information Exchange in Pennsylvania The Pennsylvania ehealth Initiative in collaboration with the Pennsylvania ehealth Partnership Authority Introduction The Pennsylvania

More information

DeMystifying Data Breaches and Information Security Compliance

DeMystifying Data Breaches and Information Security Compliance May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts

More information

DFARS Cyber Rule Considerations For Contractors In 2018

DFARS Cyber Rule Considerations For Contractors In 2018 Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com DFARS Cyber Rule Considerations For Contractors

More information

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your). Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations

More information

National Defense University and IRMC. National Defense University

National Defense University and IRMC. National Defense University The Forgotten Information Assurance Professional - Educating the Senior IT Manager Robert C. Norris, Jr. Information Resources Management College National Defense University 1 Overview Intro to IRMC and

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

Cybersecurity for the Electric Grid

Cybersecurity for the Electric Grid Cybersecurity for the Electric Grid Electric System Regulation, CIP and the Evolution of Transition to a Secure State A presentation for the National Association of Regulatory Utility Commissioners March

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

NOW IS THE TIME. to secure our future

NOW IS THE TIME. to secure our future NOW IS THE TIME to secure our future A FRAMEWORK FOR UNITING THE CANADIAN ACCOUNTING PROFESSION VISION FOR THE PROFESSION To be the pre-eminent, internationally recognized Canadian accounting designation

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives

More information

Deciphering Overlapping Standards and Requirements, Using the BCP Genome

Deciphering Overlapping Standards and Requirements, Using the BCP Genome Deciphering Overlapping Standards and Requirements, Using the BCP Genome Disaster Recovery Journal Webinar Series February 13, 2013 2013 Strategic BCP, Inc. All rights reserved. strategicbcp.com 1 Today

More information

Information Governance, the Next Evolution of Privacy and Security

Information Governance, the Next Evolution of Privacy and Security Information Governance, the Next Evolution of Privacy and Security Katherine Downing, MA, RHIA, CHPS, PMP Sr. Director AHIMA IG Advisors Follow me @HIPAAQueen 2017 2017 Objectives Part Part I IG Topic

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES DOCUMENT DETAIL Security Classification Unclassified Authority National Information Technology Authority - Uganda

More information

Cybersecurity in Higher Ed

Cybersecurity in Higher Ed Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,

More information

Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013

Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013 + Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013 Jeffrey R. Pillon, Director, Energy Assurance Programs National Association of State

More information

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,

More information

POWERING NETWORK RESILIENCY WITH UPS LIFECYCLE MANAGEMENT

POWERING NETWORK RESILIENCY WITH UPS LIFECYCLE MANAGEMENT POWERING NETWORK RESILIENCY WITH UPS LIFECYCLE MANAGEMENT Network downtime is a business disrupter, cutting off communication between employees and customers, bringing service delivery to a halt. Yet all

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit Development of your Company s Record Information System and Disaster Preparedness The National Emergency Management Summit Thomas D. Anthony Frost Brown Todd LLC Attorneys at Law 201 E. Fifth Street Cincinnati,

More information

CLE Alabama. Banking Law Update. Embassy Suites Hoover Hotel Birmingham, Alabama Friday, February 19, 2016

CLE Alabama. Banking Law Update. Embassy Suites Hoover Hotel Birmingham, Alabama Friday, February 19, 2016 CLE Alabama Banking Law Update Embassy Suites Hoover Hotel Birmingham, Alabama Friday, February 19, 2016 Best Practices on Managing Cyber-Security Risks J.T. Malatesta III and Sarah S. Glover Maynard Cooper

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

10 Cybersecurity Questions for Bank CEOs and the Board of Directors 4 th Annual UBA Bank Executive Winter Conference February, 2015 10 Cybersecurity Questions for Bank CEOs and the Board of Directors Dr. Kevin Streff Founder, Secure Banking Solutions 1 Board of Directors

More information

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services. Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services. June 2017 Melanie Duerr Fazzi Associates Partner, Director of Coding Operations Jami Fisher Fazzi Associates Chief Information

More information

Post-Secondary Institution Data-Security Overview and Requirements

Post-Secondary Institution Data-Security Overview and Requirements Post-Secondary Institution Data-Security Overview and Tiina K.O. Rodrigue, EdDc, CISSP, CISM, PMP, CSM, CEA, ITIL, ISC2 Compliance Mapper, A+ Senior Advisor Cybersecurity - 2017 Agenda Who needs to worry

More information

HCISPP HealthCare Information Security and Privacy Practitioner

HCISPP HealthCare Information Security and Privacy Practitioner HCISPP HealthCare Information Security and Privacy Practitioner William Buddy Gillespie, HCISPP Global Academic Instructor (ISC)² Former Healthcare CIO Chair Advocacy Committee, CPAHIMSS budgill@aol.com

More information

History of NERC December 2012

History of NERC December 2012 History of NERC December 2012 Timeline Date 1962-1963 November 9, 1965 1967 1967-1968 June 1, 1968 July 13-14, 1977 1979 1980 Description Industry creates an informal, voluntary organization of operating

More information

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance Russell L. Jones Partner Health Sciences Sector Deloitte & Touche LLP Security & Privacy IMLA 2013 Annual Conference San

More information

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every

More information

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90 th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information