SlideShare a Scribd company logo
1 of 10
Jerry Sto. Tomas, CISM, CISSP
Global Information Security Officer
Allergan, Inc.
Allergan currently employs 100 external solutions to
support critical business functions. This number is growing
by 50% in 2011. A consistent solution lifecycle process has
not been used in 60%. An audit finding has confirmed that
significant business risk exists for external solutions. Gaps
and variations in current processes make comprehensive
review impossible without additional resources.
IS Team - Mini Kaizen
January 13, 2011
Architecture
Review
Technical Assessment
• assures the solution’s
agility, reliability,
scalability, and alignment
to IT standards
• assures vendor has
contingency measures and
incident management
Vendor
Due Diligence
Vendor Assessment
• assures vendor’s ability to
maintain confidentiality
and integrity of company
data
• assures quality or
availability of service
Vendor
Management
Periodic Audit
• re-assessment for
expanded services
• re-assessment and
audit based vendor’s
risk profile (e.g., High
value data, regulated, or
core business)
• review of provider
certifications and 3rd
party audit reports
Off-boarding
• Transfer of company
data
• Verification of data
destruction by vendor
Financial Viability
• assessment of the
vendor’s financial strength
to remain in business
Contract
Management
• Security and Privacy
amendments
• confirm sufficiency of
confidentiality clause, right
to audit, breach
notification, and liability
limitations
1a
1b
2a
2b
3
What How By Whom
Business Owner Preliminary Vendor Risk Assessment survey Business Owner
Architecture Review Architecture Questions for Application & Service Provider, sent to
vendor to complete then a phone call/meeting occurs
EA / Security
Cloud Architecture and Security Evaluation report, sent to project
team providing “final score”
EA / Security
Due Diligence Evaluate business and regulatory risk posed by vendor (VERMA),
subjective but informed decision
Security
Where it fits, rely on industry certifications (ISO Standards, PCI)
provided by vendor.
For example, PCI AOC if vendor relationship involves credit card.
Security
Where no certification is available or can be relied upon, perform
due diligence by completing (in VERMA)
• IT General Controls Review
• SSAE16 Report Review
• Security & Privacy Review
• GxP Regulatory Review
Which review is performed depends on business and regulatory risk
assessed
Security
Feedback to project team (via email, VERMA is printed if requested) Security
Collaboration and Partnership
IT Groups, Sourcing, Legal
Socialize the Process
C-suite and Board of Directors
IT Business Relationship Managers (R&D, Commercial, Manufacturing, Corporate)
Policies and Standards
Finance and Accounting Global Policy
Any IT and Cloud Computing transaction must require IT Approval
IT Policy
IT Business Relationship Managers and Site Managers accountability
Executed On-Boarding Process in the US (Retroactively and Proactively)
250+ Vendors in Inventory, 150+ Architecture Review, 140+ Contract Addendum
re-negotiated/signed
 Forge Partnerships
◦ General Counsel
 Enforcement of Security and Privacy Addendum
 Education of Contract Management Group (i.e.,
Paralegals)
◦ Sourcing
 Sales & Marketing service providers (usual culprits)
◦ Finance and Accounting (and IT)
 Enforcement of policy
◦ Internal Audit
 Test effectivity of process controls
 Streamline and Automate Due Diligence Process
◦ Risk-based approach
◦ Onsite due diligence vs. SSAE 16 or 3rd party audit
reports
◦ Internal risk grading vs. 3rd Party risk grading service
 Integration of entire workflow into an enterprise
GRC software
 Challenges
◦ Mobile Application + 3rd Party Service Provider
 Multiple due diligence
◦ How about 4th Party Service Provider?
 Contractual obligations
 Enabling Privacy and Security
◦ Share or well-understood business goals
◦ Platform and Technology
 IAM, Encryption, Secure FTP/Web, Disaster Recovery
◦ Security Management and Controls
 Security Architecture Standards
 Vulnerability scanning of 3rd party hosted website
◦ Contracts and Service Level Agreements
 Security Addendum in Contracts
◦ Due Diligence Assessment
 Vendor assessment and certification
 Each vendor type is NOT the same
◦ ASP, SaaS, PaaS, IaaS will have different sets of process
and technology controls

More Related Content

What's hot

Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?
EDR
 

What's hot (19)

What Every Procurement Professional Should Know About Supplier Risk Managemen...
What Every Procurement Professional Should Know About Supplier Risk Managemen...What Every Procurement Professional Should Know About Supplier Risk Managemen...
What Every Procurement Professional Should Know About Supplier Risk Managemen...
 
Vendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto SeriesVendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto Series
 
GRC
GRCGRC
GRC
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk management
 
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
Third Party Risk Assessment Due Diligence - Managed Service as Best PracticeThird Party Risk Assessment Due Diligence - Managed Service as Best Practice
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
 
Third Party Risk Management Introduction
Third Party Risk Management IntroductionThird Party Risk Management Introduction
Third Party Risk Management Introduction
 
Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?
 
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIECVendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
 
Vendor Selection Best Practices - Crowe Mead
Vendor Selection Best Practices - Crowe MeadVendor Selection Best Practices - Crowe Mead
Vendor Selection Best Practices - Crowe Mead
 
Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
Hernan Huwyler Corporate Risk Assesstment Compliance Risks
Hernan Huwyler Corporate Risk Assesstment Compliance RisksHernan Huwyler Corporate Risk Assesstment Compliance Risks
Hernan Huwyler Corporate Risk Assesstment Compliance Risks
 
Privacy & Security Controls In Vendor Management Al Raymond
Privacy & Security Controls In Vendor Management   Al RaymondPrivacy & Security Controls In Vendor Management   Al Raymond
Privacy & Security Controls In Vendor Management Al Raymond
 
Information Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksInformation Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT Risks
 
Compliance Capability
Compliance CapabilityCompliance Capability
Compliance Capability
 
IE Corporate Risk Assessment 1-6 - Hernan huwyler
IE Corporate Risk Assessment 1-6 - Hernan huwyler   IE Corporate Risk Assessment 1-6 - Hernan huwyler
IE Corporate Risk Assessment 1-6 - Hernan huwyler
 
Why businesses need to integrate their GRC now!
Why businesses need to integrate their GRC now!Why businesses need to integrate their GRC now!
Why businesses need to integrate their GRC now!
 
Supplier Management- HICX Solutions
Supplier Management- HICX SolutionsSupplier Management- HICX Solutions
Supplier Management- HICX Solutions
 

Similar to Cloud Securiy: A Vendor Risk Management Perspective

2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Yde2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Yde
mikaelyde
 
CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard
Jim Robins
 
Bayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance AnalystBayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore.
 
2014-10-15 Agility Solution DF Session Slides
2014-10-15 Agility Solution DF Session Slides2014-10-15 Agility Solution DF Session Slides
2014-10-15 Agility Solution DF Session Slides
Geoff Rothman
 

Similar to Cloud Securiy: A Vendor Risk Management Perspective (20)

TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Yde2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Yde
 
it grc
it grc it grc
it grc
 
GRC-Xrev
GRC-XrevGRC-Xrev
GRC-Xrev
 
CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard
 
What is Data Governance and why it’s crucial for PropTech
What is Data Governance and why it’s crucial for PropTechWhat is Data Governance and why it’s crucial for PropTech
What is Data Governance and why it’s crucial for PropTech
 
CMLGroup - What is GRC?
CMLGroup - What is GRC?CMLGroup - What is GRC?
CMLGroup - What is GRC?
 
Bayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance AnalystBayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance Analyst
 
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
 
Government and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP SystemsGovernment and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP Systems
 
Crossland Advisors Services
Crossland Advisors ServicesCrossland Advisors Services
Crossland Advisors Services
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Adaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_studyAdaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_study
 
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
 
2014-10-15 Agility Solution DF Session Slides
2014-10-15 Agility Solution DF Session Slides2014-10-15 Agility Solution DF Session Slides
2014-10-15 Agility Solution DF Session Slides
 
Brainwave GRC - Continuous Audit and Controls at ISACA event
Brainwave GRC - Continuous Audit and Controls at ISACA eventBrainwave GRC - Continuous Audit and Controls at ISACA event
Brainwave GRC - Continuous Audit and Controls at ISACA event
 
Best Practices & Considerations in “IT Suppliers Audit”
Best Practices & Considerations in “IT Suppliers Audit”Best Practices & Considerations in “IT Suppliers Audit”
Best Practices & Considerations in “IT Suppliers Audit”
 

More from Argyle Executive Forum

More from Argyle Executive Forum (20)

Rethink App Delivery with Workspace as a Service
Rethink App Delivery with Workspace as a ServiceRethink App Delivery with Workspace as a Service
Rethink App Delivery with Workspace as a Service
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
Become the CEO: An Employee Excitement Survey
Become the CEO: An Employee Excitement SurveyBecome the CEO: An Employee Excitement Survey
Become the CEO: An Employee Excitement Survey
 
Social Support and Total Community
Social Support and Total CommunitySocial Support and Total Community
Social Support and Total Community
 
Marketing to the Power of ONE!
Marketing to the Power of ONE!Marketing to the Power of ONE!
Marketing to the Power of ONE!
 
The New Era of Engagement Marketing
The New Era of Engagement MarketingThe New Era of Engagement Marketing
The New Era of Engagement Marketing
 
Re-Think App Delivery with Workspace as a Service
Re-Think App Delivery with Workspace as a ServiceRe-Think App Delivery with Workspace as a Service
Re-Think App Delivery with Workspace as a Service
 
Delighting Customers with Information Technology
Delighting Customers with Information TechnologyDelighting Customers with Information Technology
Delighting Customers with Information Technology
 
Top 12 Threats to Enterprise
Top 12 Threats to EnterpriseTop 12 Threats to Enterprise
Top 12 Threats to Enterprise
 
9.35am presentation - john landy
9.35am   presentation - john landy9.35am   presentation - john landy
9.35am presentation - john landy
 
Keeping a Seat at the Table: Remaining Relevant
Keeping a Seat at the Table: Remaining RelevantKeeping a Seat at the Table: Remaining Relevant
Keeping a Seat at the Table: Remaining Relevant
 
Succession Matters: Effective Succession Management Planning
Succession Matters: Effective Succession Management PlanningSuccession Matters: Effective Succession Management Planning
Succession Matters: Effective Succession Management Planning
 
It's a Balancing Act
It's a Balancing ActIt's a Balancing Act
It's a Balancing Act
 
Getting to the Heart of your Customer
Getting to the Heart of your CustomerGetting to the Heart of your Customer
Getting to the Heart of your Customer
 
9.35am robert humphrey
9.35am robert humphrey9.35am robert humphrey
9.35am robert humphrey
 
Deliver any app to any device in 60 minutes
Deliver any app to any device in 60 minutesDeliver any app to any device in 60 minutes
Deliver any app to any device in 60 minutes
 
Enabling Opportunity to Transform Company Culture
Enabling Opportunity to Transform Company CultureEnabling Opportunity to Transform Company Culture
Enabling Opportunity to Transform Company Culture
 
The Future of Work
The Future of WorkThe Future of Work
The Future of Work
 
The Challenge of Information Self-Service
The Challenge of Information Self-ServiceThe Challenge of Information Self-Service
The Challenge of Information Self-Service
 
The Role of the General Counsel in the Boardroom
The Role of the General Counsel in the BoardroomThe Role of the General Counsel in the Boardroom
The Role of the General Counsel in the Boardroom
 

Cloud Securiy: A Vendor Risk Management Perspective

  • 1. Jerry Sto. Tomas, CISM, CISSP Global Information Security Officer Allergan, Inc.
  • 2. Allergan currently employs 100 external solutions to support critical business functions. This number is growing by 50% in 2011. A consistent solution lifecycle process has not been used in 60%. An audit finding has confirmed that significant business risk exists for external solutions. Gaps and variations in current processes make comprehensive review impossible without additional resources. IS Team - Mini Kaizen January 13, 2011
  • 3. Architecture Review Technical Assessment • assures the solution’s agility, reliability, scalability, and alignment to IT standards • assures vendor has contingency measures and incident management Vendor Due Diligence Vendor Assessment • assures vendor’s ability to maintain confidentiality and integrity of company data • assures quality or availability of service Vendor Management Periodic Audit • re-assessment for expanded services • re-assessment and audit based vendor’s risk profile (e.g., High value data, regulated, or core business) • review of provider certifications and 3rd party audit reports Off-boarding • Transfer of company data • Verification of data destruction by vendor Financial Viability • assessment of the vendor’s financial strength to remain in business Contract Management • Security and Privacy amendments • confirm sufficiency of confidentiality clause, right to audit, breach notification, and liability limitations 1a 1b 2a 2b 3
  • 4. What How By Whom Business Owner Preliminary Vendor Risk Assessment survey Business Owner Architecture Review Architecture Questions for Application & Service Provider, sent to vendor to complete then a phone call/meeting occurs EA / Security Cloud Architecture and Security Evaluation report, sent to project team providing “final score” EA / Security Due Diligence Evaluate business and regulatory risk posed by vendor (VERMA), subjective but informed decision Security Where it fits, rely on industry certifications (ISO Standards, PCI) provided by vendor. For example, PCI AOC if vendor relationship involves credit card. Security Where no certification is available or can be relied upon, perform due diligence by completing (in VERMA) • IT General Controls Review • SSAE16 Report Review • Security & Privacy Review • GxP Regulatory Review Which review is performed depends on business and regulatory risk assessed Security Feedback to project team (via email, VERMA is printed if requested) Security
  • 5. Collaboration and Partnership IT Groups, Sourcing, Legal Socialize the Process C-suite and Board of Directors IT Business Relationship Managers (R&D, Commercial, Manufacturing, Corporate) Policies and Standards Finance and Accounting Global Policy Any IT and Cloud Computing transaction must require IT Approval IT Policy IT Business Relationship Managers and Site Managers accountability Executed On-Boarding Process in the US (Retroactively and Proactively) 250+ Vendors in Inventory, 150+ Architecture Review, 140+ Contract Addendum re-negotiated/signed
  • 6.
  • 7.
  • 8.  Forge Partnerships ◦ General Counsel  Enforcement of Security and Privacy Addendum  Education of Contract Management Group (i.e., Paralegals) ◦ Sourcing  Sales & Marketing service providers (usual culprits) ◦ Finance and Accounting (and IT)  Enforcement of policy ◦ Internal Audit  Test effectivity of process controls
  • 9.  Streamline and Automate Due Diligence Process ◦ Risk-based approach ◦ Onsite due diligence vs. SSAE 16 or 3rd party audit reports ◦ Internal risk grading vs. 3rd Party risk grading service  Integration of entire workflow into an enterprise GRC software  Challenges ◦ Mobile Application + 3rd Party Service Provider  Multiple due diligence ◦ How about 4th Party Service Provider?  Contractual obligations
  • 10.  Enabling Privacy and Security ◦ Share or well-understood business goals ◦ Platform and Technology  IAM, Encryption, Secure FTP/Web, Disaster Recovery ◦ Security Management and Controls  Security Architecture Standards  Vulnerability scanning of 3rd party hosted website ◦ Contracts and Service Level Agreements  Security Addendum in Contracts ◦ Due Diligence Assessment  Vendor assessment and certification  Each vendor type is NOT the same ◦ ASP, SaaS, PaaS, IaaS will have different sets of process and technology controls