Consolidation Committee Final Report

Similar documents
Security Readiness Assessment

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Certified Information Security Manager (CISM) Course Overview

Consolidation Committee Final Report

Building a Resilient Security Posture for Effective Breach Prevention

Manchester Metropolitan University Information Security Strategy

locuz.com SOC Services

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

SIEM: Five Requirements that Solve the Bigger Business Issues

Introducing Cyber Observer

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Industrial Defender ASM. for Automation Systems Management

Nebraska CERT Conference

Cybersecurity Auditing in an Unsecure World

Automating the Top 20 CIS Critical Security Controls

External Supplier Control Obligations. Cyber Security

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

RSA NetWitness Suite Respond in Minutes, Not Months

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Enabling Security Controls, Supporting Business Results

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Aligning IT, Security and Risk Management Programs. Ahmed Qurram Baig, CISSP, CBCP, CRISC, CISM Information Security & GRC Expert

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

to Enhance Your Cyber Security Needs

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

FDIC InTREx What Documentation Are You Expected to Have?

Symantec Security Monitoring Services

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

BUILDING AND MAINTAINING SOC

White Paper. How to Write an MSSP RFP

itsmf ITIL V3: Accelerate Success with Tools Maria A Medvedeva, PMP, ITIL Regional Director CA, Inc. itsmf Middle East Board of Directors

Cyber security - why and how

Designing and Building a Cybersecurity Program

Best Practices in Securing a Multicloud World

NEXT GENERATION SECURITY OPERATIONS CENTER

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Reinvent Your 2013 Security Management Strategy

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

One Hospital s Cybersecurity Journey

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations

Total Protection for Compliance: Unified IT Policy Auditing

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

ITG. Information Security Management System Manual

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

HP Fortify Software Security Center

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

CompTIA CASP (Advanced Security Practitioner)

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Bringing Cybersecurity to the Boardroom Bret Arsenault

ISE North America Leadership Summit and Awards

Rethinking Information Security Risk Management CRM002

Information Technology Branch Organization of Cyber Security Technical Standard

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

UNB S CYBERSECURITY PROGRAM

Information Security and Service Management. Security and Risk Management ISSM and ITIL/ITSM Interrelationship

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

CA Security Management

01.0 Policy Responsibilities and Oversight

How to Write an MSSP RFP. White Paper

SECURITY INCIDENT MANAGEMENT. Solution Primer. Jenn Black. Senior Research AnalystSolutions Research and Development Office of the CISO, Optiv

Popular SIEM vs aisiem

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Traditional Security Solutions Have Reached Their Limit

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

SDLC Maturity Models

CCISO Blueprint v1. EC-Council

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

GDPR Update and ENISA guidelines

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

Security Operations & Analytics Services

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation

Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

OA Cyber Security Plan FY 2018 (Abridged)

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

Sneak Peak at CIS Critical Security Controls V 7 Release Date: March Presented by Kelli Tarala Principal Consultant Enclave Security

Device Discovery for Vulnerability Assessment: Automating the Handoff

ISE Canada Executive Forum and Awards

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

CYBER RESILIENCE & INCIDENT RESPONSE

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

Transcription:

Committee Details Date: November 14, 2015 Committee Name: 36.6 : Information Security Program Committee Co- Chairs: Ren Flot; Whitfield Samuel Functional Area: IT Functional Area Coordinator: Phil Ventimiglia List the major tasks your committee will need to take to accomplish your deliverables. Please provide more details for the tasks leading up to the SACSCOC Prospectus development. Major Tasks for Committee Tracker from Final Planning Document and Recommendations Task: Program Security and Risk Management Maturity Cyber Security Governance: Recommends GSU adopt the Gartner Information Security Governance (ISG) model. This includes establishing governance bodies with clear goals, scopes of control and guidance, and ensuring the appropriate level of membership in these bodies is maintained over time. o Information Security Charter has been drafted and submitted to Executive Leadership for approval. o Review of regulatory requirements (Federal, State, BOR, etc.) and a GAP Analysis of current GSU/GPC policies and standards is underway. Policy Initiative: Recommends GSU adopt the ACUPA model for policy development, which aligns with the NIST standards, BOR IT Handbook, and GTA policy models in use currently. It is also recommended part of this initiative should include a comprehensive review, consolidation and reconciliation of all current security policies for both institutions. o Review of current security policies for both institutions is underway. Gartner ITScore Assessments: Recommends GSU utilize the Gartner ITScore o All assessments have been completed for both IT organizations; analyses are underway (partnership with IIT Security Team and Gartner). Cyber Security Strategic Planning: Recommends development of a strategic plan to o The analysis of the Gartner assessments will drive the Short- term tactical and Long- term strategic plans for the consolidated institution. Risk Assessments for Colleges and Business Units: Recommends a risk assessment be Task: Establish and Formalize Information Security Governance Page 1 of 5

Cyber Security Governance: Recommends GSU adopt the Gartner Information Security Governance (ISG) model. This includes establishing governance bodies with clear goals, scopes of control and guidance, and ensuring the appropriate level of membership in these bodies is maintained over time. Policy Initiative: Recommends GSU adopt the ACUPA model for policy development, which aligns with the NIST standards, BOR IT Handbook, and GTA policy models in use currently. It is also recommended part of this initiative should include a comprehensive review, consolidation and reconciliation of all current security policies for both institutions. Cyber Security Strategic Planning: Recommends development of a strategic plan to Task: Develop Strategic Plan for Information Security Program Cyber Security Strategic Planning: Recommends development of a strategic plan to Risk Assessments for Colleges and Business Units: Recommends a risk assessment be Task: Scale Risk Assessment to Business Units & Colleges Risk Assessments for Colleges and Business Units: Recommends a risk assessment be Gartner ITScore Assessments: Recommends GSU utilize the Gartner ITScore Task: Build Team (Extended to IT Departments/Bus/Colleges) Develop Training Plan for Security Personnel: Recommends GSU InfoSec develop a training and education plan for department security practitioners, including training for the planned extended security team and ISO s within the colleges, business units, extended IT and IS&T. Security Tool Review: Recommends a review of all security- related tools and solutions being utilized throughout the enterprise at both institutions. This review should be conducted within the areas of IT, including enterprise systems, network and infrastructure, application development, client services (helpdesk support and desktop engineering), and the project office, to get overall consensus. Second phase review will be extended to the distributed IT units. Page 2 of 5

o Security review had been completed for both IT organizations. Task: Plan Training for Team and External Resources Develop Training Plan for Security Personnel: Recommends GSU InfoSec develop a training and education plan for department security practitioners, including training for the planned extended security team and ISO s within the colleges, business units, extended IT and IS&T. Security Awareness, Training and Education: Recommends GSU unify on a common security- training platform for delivery to meet awareness, training, and education needs and requirements. Task: GSU ITScore Assessment Organization and Information Security Gartner ITScore Assessments: Recommends GSU utilize the Gartner ITScore o The Organization and Information Security assessment has been completed for both IT organizations. Task: Review of Tool Sets Security Tool Review: Recommends a review of all security- related tools and solutions being utilized throughout the enterprise at both institutions. This review should be conducted within the areas of IT, including enterprise systems, network and infrastructure, application development, client services (helpdesk support and desktop engineering), and the project office, to get overall consensus. Second phase review will be extended to the distributed IT units. o Security review had been completed for both IT organizations. Task: Staffing Plan Change Management Realignment: The Change Management function within IS&T should be realigned within the organization and moved from the InfoSec office where it currently resides, to the PMO function. o Realignment with PMO will not move forward at this time. Task: Review of Projects & Initiatives Review of InfoSec Projects and Initiative: Recommends a comprehensive review of all Page 3 of 5

current Information Security projects and initiatives for both institutions be conducted. Endpoint Security Standardization: Recommends GSU and GPC standardize on an endpoint security solution that meets the compliance requirements of the BOR IT Handbook, and which also covers security best practices for computing endpoints. Network Infrastructure Analysis and Audit Tool: Recommends investment in a network firewall and switch audit tool to automate and simplify security operations including troubleshooting, auditing and risk analysis, allowing for optimization of the configuration of firewalls, routers, load balancers and web proxies to ensure security and compliance. Network Infrastructure 2.0: Recommends GSU networking and infrastructure, design and implement a new network for the newly consolidated institution, allowing for a move away from the legacy designs of old, to a modern network, designed and built with security at its core, to defend against modern malware and the way networks are attacked today. MSSP for SOC: Recommends USG contract with a commercial Managed Security Services Provider (MSSP) for operations security monitoring and incident management. Web Application Firewall (WAF): Recommends GSU invest in a commercial Web Application Firewall tool for protection of the web and application development, and production environments. Database Activity Monitor (DAM): Recommends GSU invest in a commercial Database Activity Monitor, a proactive, automated protection, audit, and compliance tool. Currently, neither of the two institutions have any purpose- built, automated database protections in place. SIEM and Logging Infrastructure: Recommends GSU invest in a Security Information Events Monitor (SIEM) tool, used in security operations for malicious threat detection, aggregation and correlation, alerting, and logging. The SIEM is an extremely vital tool, considered standard to good security and central to a layered, defense- in- depth strategy. Currently, neither GSU nor GPS have these solutions deployed. Data Loss Prevention (DLP): Recommends GSU invest in a content- aware Data Loss Prevention (DLP) tool. DLP is a strategy for making sure that end users do not send sensitive or critical information outside of GSU s network. The term is also used to describe software products that help our network administrators control what data end users can transfer outside of the network. Standard Asset Management Platform: Recommends IS&T select and standardize on a unified asset lifecycle management platform. This solution must include automated asset discovery; have the ability to identify all manner of network- connected devices; and be utilized as an enterprise configuration and vulnerability management tool. Page 4 of 5

Standardized Naming Convention: Recommends GSU standardize on a coherent device- naming scheme. Neither institution currently has a standard naming scheme for devices connecting to the network. This causes many issues that negatively affect performance and efficiency for daily operations and productivity, complicating troubleshooting, equipment deployment, documentation, and automation efforts. Other/Final Comments (if any): Page 5 of 5