SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
How do you tell what you need to tell?
How do you know what you need to know?
Outsourcing Provides
       Notable Rewards

    Reduced Operating Costs
    Streamlined Operations
    Time to Market
    Flexibility
Rewards don’t come without Risk …..
Outsourcing Creates
     Notable Risks

    Data Breach Requiring Notification
    Failure to Comply with Laws/Regulations


                             Intellectual Property Disclosure
                             Failure to meet Service Level
                              Agreements


                              Douglas Curling, President of Choicepoint
Increasing pressure from
Regulators/ Auditors to ensure that
we can prove that key vendors are
secure and compliant …
One key point …
You can Outsource … your Call Center
You can Outsource …
          your Application Development Center
You can even Outsource … your Entire IT Operation
But you CAN’T Outsource Responsibility or Liability
   Offshore the dev/hosting of an app that
    processes ePHI/accepts credit card
    payments
    • Dev shop colo’s the application in US
         EC2 leveraged for redundancy/capacity
    •   Payments via separate third party transaction
    •   Dev shop & we enjoy privileged access to app
    •   Managed security provided by 3rd Party Soc
    •   Oracle personnel manage RAC implementation
How do I know we/they are secure?
How do I prove we/they are compliant?
What attestation do I ask for ?
    From whom?
   Infinite Outsourcing Scenarios -
                       some can get very interesting
    • A G2000 that has outsourced its entire IT operations?
    • What happens when SOX auditors discover that AD accounts
      for key IP stakeholders (that were fired for cause) have been
      re-enabled?
Pharmaceutical Client Data Flow




1
                                   User LAN Zone

                                        XX Smith St
                                                                     2                                         3
                                                                                                                     Worker
                                                                                                                                                         • Understanding information
                                                                                                                                                           security requirements and
                 Submission of                                                          SMB?
                 Docs, Disks &            (Scanner &        SMB?                                                    machines
                    Drives              Physical Media)
                                                                                                               4a

                                                                                                                  XXX App


                                                                                                                                                           the need to establish policy
                                                                         Smith I
                S-FTP submission        S-FTP Server       Unknown                 4    SMB?                    for Research
                                                                          NAS
                                                                                                                  Services

                Email submission         Mail Server        SMB?                                                   MS SQL DB



                                                                                                                                                           and objectives

                                                                                                                       Unknown
                                   4b XXX App                                                                                              VPN Zone
    Pharma                               For                 SMB?

                                                                                        EDP LAN Zone
                                                                                                                                           5a
                                                                                                                                                XXX


                                                                                                                                                         • Implementing/operating
    Clients                        Pharmaceutical                                                          5                      Paper
                                     Research,                                                                    ZZZ                          London
                                    Production &                                                           (CC Export System)
                                   Hosting Services                                                          For Production               Out-of-Scope
                                                                                                                Services


                                                                                                                                                           controls to manage
                                        Apache(?)                                                                                Deliverable    Client
                      SSL
                                        Web Server                                                                     SQL?
                                        Oracle DB

                                                                                                       6


                                                                                                                                                           information security risks
                              7                                                                                  XXX & ZZZ
                                      XXX & YYY                                                                Hosting Systems
                    SSL                                                  SQL?
                                    Hosting Systems
                                                                                                           MS SQL Server DBs



                                                                                                                                                         • Monitoring/reviewing the
                                    IIS Web Servers
     External                           DMZ Zone                                   Servers LAN Zone




                                                                                                                                                           ISMS’s effectiveness
                                                                                                                                                         • Continual Improvement
   Inter-related ISMS’s will
    have overlap
    • You & Vendor/Partner
    • Across multiple
      vendors/partners
   Common Overlaps
    • Risk Assessment
    • Incident Response
    • Security Awareness &
      Training
    • Managing 3rd Party
      Relationships
   A.6.2 External Parties
    • Objective: To maintain the security of the organization’s information
      and information processing facilities that are accessed, processed,
      communicated to, or managed by external parties.
    • A.6.2.1 Identification of Risks Related to External Parties
    • A.6.2.2 Addressing Security When Dealing with
      Vendors/Customers/Partners
    • A.6.2.3 Addressing Security in Third Party Agreements
   Defining used to be hard … but it’s gotten much easier …
Old School:                           New School:
    $1B+ eCommerce Refresh             Major City eCommerce Refresh

• Custom Security Standard         • Leveraged 27001, OWASP
• Defined 100+ Controls            • Defined 15 Risks/Monitoring
• Many man-months of effort        • Several man-weeks of effort
• Potential Vendors resisted RFP   • Vendor immediately embraced
  response                           model
• Ongoing maintenance effort is    • Ongoing maintenance effort is
  notable (refine controls)          minimal (refine risks)
• Prohibitively expensive          • Relatively inexpensive
• Project is stalled               • Project is gaining momentum
   A.10.2 Third Party Service Delivery Management
    Objective: To implement and maintain the appropriate level of information
      security and service delivery in line with third party service delivery
      agreements.
    • A.10.2.1 Service Delivery Control
    • A.10.2.2 Monitoring & Review of Third Party Services
    • A.10.2.3 Managing Changes to Third Party Services

   Validating can be challenging if risk/compliance is high
    • What form of testing is most suitable for the risks defined? (Design,
      Compliance, Substantiative)
    • What form of assurance/attestation is best? (us, them, third party,
      certification)
    • What direct access/testing is required for incident response/monitoring?
    • What reporting and SLA’s (think beyond Availability) do we need to
      monitor?
   Integrate InfoSec into your existing Vendor/Risk
    Management Program
    • You likely have one that measures “business risk”
      (financials, insurance)
   Conduct a “Risk Assessment”
   Define your compliance/security requirements
    • Preferably leveraging a risk and standards based
      approach
   Define the monitoring, attestation, and SLAs
    needed to govern the relationship and assure risk
    is mitigated to an acceptable level
   Use security incidents coupled with monitoring to
    improve internal and external processes
You can’t outsource your responsibility/liability/ISMS




           +                               =

Mais conteúdo relacionado

Mais procurados

Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Resolver Inc.
 
Strategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management RightStrategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management RightProformative, Inc.
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & GovernanceEDR
 
Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates VISTA InfoSec
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 StandardTharindunuwan9
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013scttmcvy
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterTuan Phan
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEryk Budi Pratama
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident responseBrian Honan
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2Tanmay Shinde
 
business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929Andy Willams
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 

Mais procurados (20)

Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
Strategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management RightStrategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management Right
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
 
ISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdfISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdf
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
 
Integrated GRC
Integrated GRCIntegrated GRC
Integrated GRC
 
Vendor Risk Management
Vendor Risk ManagementVendor Risk Management
Vendor Risk Management
 
Compliance Risk Assessment
Compliance Risk AssessmentCompliance Risk Assessment
Compliance Risk Assessment
 
Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 Standard
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
FSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoVFSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoV
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 

Destaque

Third-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightThird-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightNICSA
 
Third Party Risk Management Introduction
Third Party Risk Management IntroductionThird Party Risk Management Introduction
Third Party Risk Management IntroductionNaveen Grover
 
viaLegal Webinar_ FCPA Training for a Global Workforce
viaLegal Webinar_ FCPA Training for a Global WorkforceviaLegal Webinar_ FCPA Training for a Global Workforce
viaLegal Webinar_ FCPA Training for a Global WorkforceVIA
 
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsGRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsKate Tomlinson
 
9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption PreventionKendal Peterson
 
Top 10 Mega Trends- to understand the China Landscape
Top 10 Mega Trends- to understand the China LandscapeTop 10 Mega Trends- to understand the China Landscape
Top 10 Mega Trends- to understand the China LandscapeDr Neale O'Connor, CPA (Aust)
 
Vendor Security Practices: Turn the Rocks Over Early and Often
Vendor Security Practices: Turn the Rocks Over Early and OftenVendor Security Practices: Turn the Rocks Over Early and Often
Vendor Security Practices: Turn the Rocks Over Early and OftenPriyanka Aash
 
Corporate Compliance Overview
Corporate Compliance OverviewCorporate Compliance Overview
Corporate Compliance OverviewSam Carr
 
ppt of vendor management
ppt of vendor management ppt of vendor management
ppt of vendor management rohit12692
 
Sales budget ,forcasting and control
Sales budget ,forcasting and controlSales budget ,forcasting and control
Sales budget ,forcasting and controljack99
 
Buyer supplier relationship
Buyer supplier relationshipBuyer supplier relationship
Buyer supplier relationshipAnkit
 
Outsourcing and Vendor management
Outsourcing and Vendor managementOutsourcing and Vendor management
Outsourcing and Vendor managementRaminder Pal Singh
 

Destaque (13)

Third-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightThird-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in Oversight
 
Third Party Risk Management Introduction
Third Party Risk Management IntroductionThird Party Risk Management Introduction
Third Party Risk Management Introduction
 
viaLegal Webinar_ FCPA Training for a Global Workforce
viaLegal Webinar_ FCPA Training for a Global WorkforceviaLegal Webinar_ FCPA Training for a Global Workforce
viaLegal Webinar_ FCPA Training for a Global Workforce
 
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsGRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
 
9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention
 
Top 10 Mega Trends- to understand the China Landscape
Top 10 Mega Trends- to understand the China LandscapeTop 10 Mega Trends- to understand the China Landscape
Top 10 Mega Trends- to understand the China Landscape
 
Vendor Security Practices: Turn the Rocks Over Early and Often
Vendor Security Practices: Turn the Rocks Over Early and OftenVendor Security Practices: Turn the Rocks Over Early and Often
Vendor Security Practices: Turn the Rocks Over Early and Often
 
Corporate Compliance Overview
Corporate Compliance OverviewCorporate Compliance Overview
Corporate Compliance Overview
 
ppt of vendor management
ppt of vendor management ppt of vendor management
ppt of vendor management
 
Sales budget ,forcasting and control
Sales budget ,forcasting and controlSales budget ,forcasting and control
Sales budget ,forcasting and control
 
Vendor Management
Vendor ManagementVendor Management
Vendor Management
 
Buyer supplier relationship
Buyer supplier relationshipBuyer supplier relationship
Buyer supplier relationship
 
Outsourcing and Vendor management
Outsourcing and Vendor managementOutsourcing and Vendor management
Outsourcing and Vendor management
 

Semelhante a How to Securely Outsource IT Operations

Two Steps Forward and One Step Back: The Real Path of HR Metrics and Analyti...
Two Steps Forward and One Step Back:  The Real Path of HR Metrics and Analyti...Two Steps Forward and One Step Back:  The Real Path of HR Metrics and Analyti...
Two Steps Forward and One Step Back: The Real Path of HR Metrics and Analyti...HR Network marcus evans
 
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise ITIT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise ITBob Rhubart
 
Integrated Campus Management System on Axpert™
Integrated Campus Management System on Axpert™ Integrated Campus Management System on Axpert™
Integrated Campus Management System on Axpert™ AGILE LABS,INDIA
 
Data Governance
Data GovernanceData Governance
Data GovernanceRob Lux
 
Sdf Panel Nice 2009 V1.0
Sdf Panel Nice 2009 V1.0Sdf Panel Nice 2009 V1.0
Sdf Panel Nice 2009 V1.0lgradina
 
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAUVærdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAUInfinIT - Innovationsnetværket for it
 
DeepNines Ds Bandwidth Manager 0909 Lr[1]
DeepNines Ds Bandwidth Manager 0909 Lr[1]DeepNines Ds Bandwidth Manager 0909 Lr[1]
DeepNines Ds Bandwidth Manager 0909 Lr[1]DeepNines Technologies
 
Replication for Business Continuity, Disaster Recovery and High Availability
Replication for Business Continuity, Disaster Recovery and High AvailabilityReplication for Business Continuity, Disaster Recovery and High Availability
Replication for Business Continuity, Disaster Recovery and High AvailabilityTony Pearson
 
Business Intelligence - Architecture & Execution Done Right
Business Intelligence - Architecture & Execution Done RightBusiness Intelligence - Architecture & Execution Done Right
Business Intelligence - Architecture & Execution Done RightDavid Sogn
 
BI Self-Service Keys to Success and QlikView Overview
BI Self-Service Keys to Success and QlikView OverviewBI Self-Service Keys to Success and QlikView Overview
BI Self-Service Keys to Success and QlikView OverviewSenturus
 
Itac benoit long deck final eng - feb 12 2013
Itac benoit long deck   final eng - feb 12 2013Itac benoit long deck   final eng - feb 12 2013
Itac benoit long deck final eng - feb 12 2013KBIZEAU
 
Infosys – Cloud Business Value Architecture
Infosys – Cloud Business Value ArchitectureInfosys – Cloud Business Value Architecture
Infosys – Cloud Business Value ArchitectureInfosys
 
MetaSource BPO Solutions
MetaSource BPO SolutionsMetaSource BPO Solutions
MetaSource BPO SolutionsRussell Thomas
 
Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015Richard Minor
 
Pdf Tax Form Services Whitepaper V1.1
Pdf Tax Form Services   Whitepaper V1.1Pdf Tax Form Services   Whitepaper V1.1
Pdf Tax Form Services Whitepaper V1.1amau2000
 
Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PManaging the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PColloquium
 
IBM Watson vs. Your Data Center
IBM Watson vs. Your Data CenterIBM Watson vs. Your Data Center
IBM Watson vs. Your Data CenterHerb Hernandez
 
Putnam f01
Putnam f01Putnam f01
Putnam f01anissa18
 

Semelhante a How to Securely Outsource IT Operations (20)

Two Steps Forward and One Step Back: The Real Path of HR Metrics and Analyti...
Two Steps Forward and One Step Back:  The Real Path of HR Metrics and Analyti...Two Steps Forward and One Step Back:  The Real Path of HR Metrics and Analyti...
Two Steps Forward and One Step Back: The Real Path of HR Metrics and Analyti...
 
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise ITIT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
 
Integrated Campus Management System on Axpert™
Integrated Campus Management System on Axpert™ Integrated Campus Management System on Axpert™
Integrated Campus Management System on Axpert™
 
Data Governance
Data GovernanceData Governance
Data Governance
 
Sdf Panel Nice 2009 V1.0
Sdf Panel Nice 2009 V1.0Sdf Panel Nice 2009 V1.0
Sdf Panel Nice 2009 V1.0
 
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAUVærdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
 
DeepNines Ds Bandwidth Manager 0909 Lr[1]
DeepNines Ds Bandwidth Manager 0909 Lr[1]DeepNines Ds Bandwidth Manager 0909 Lr[1]
DeepNines Ds Bandwidth Manager 0909 Lr[1]
 
Replication for Business Continuity, Disaster Recovery and High Availability
Replication for Business Continuity, Disaster Recovery and High AvailabilityReplication for Business Continuity, Disaster Recovery and High Availability
Replication for Business Continuity, Disaster Recovery and High Availability
 
Business Intelligence - Architecture & Execution Done Right
Business Intelligence - Architecture & Execution Done RightBusiness Intelligence - Architecture & Execution Done Right
Business Intelligence - Architecture & Execution Done Right
 
Messing
MessingMessing
Messing
 
BI Self-Service Keys to Success and QlikView Overview
BI Self-Service Keys to Success and QlikView OverviewBI Self-Service Keys to Success and QlikView Overview
BI Self-Service Keys to Success and QlikView Overview
 
Itac benoit long deck final eng - feb 12 2013
Itac benoit long deck   final eng - feb 12 2013Itac benoit long deck   final eng - feb 12 2013
Itac benoit long deck final eng - feb 12 2013
 
Infosys – Cloud Business Value Architecture
Infosys – Cloud Business Value ArchitectureInfosys – Cloud Business Value Architecture
Infosys – Cloud Business Value Architecture
 
Mashups
MashupsMashups
Mashups
 
MetaSource BPO Solutions
MetaSource BPO SolutionsMetaSource BPO Solutions
MetaSource BPO Solutions
 
Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015
 
Pdf Tax Form Services Whitepaper V1.1
Pdf Tax Form Services   Whitepaper V1.1Pdf Tax Form Services   Whitepaper V1.1
Pdf Tax Form Services Whitepaper V1.1
 
Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PManaging the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-P
 
IBM Watson vs. Your Data Center
IBM Watson vs. Your Data CenterIBM Watson vs. Your Data Center
IBM Watson vs. Your Data Center
 
Putnam f01
Putnam f01Putnam f01
Putnam f01
 

Último

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

How to Securely Outsource IT Operations

  • 1. How do you tell what you need to tell? How do you know what you need to know?
  • 2. Outsourcing Provides Notable Rewards  Reduced Operating Costs  Streamlined Operations  Time to Market  Flexibility
  • 3. Rewards don’t come without Risk …..
  • 4. Outsourcing Creates Notable Risks  Data Breach Requiring Notification  Failure to Comply with Laws/Regulations  Intellectual Property Disclosure  Failure to meet Service Level Agreements Douglas Curling, President of Choicepoint
  • 5. Increasing pressure from Regulators/ Auditors to ensure that we can prove that key vendors are secure and compliant …
  • 7. You can Outsource … your Call Center
  • 8. You can Outsource … your Application Development Center
  • 9. You can even Outsource … your Entire IT Operation
  • 10. But you CAN’T Outsource Responsibility or Liability
  • 11. Offshore the dev/hosting of an app that processes ePHI/accepts credit card payments • Dev shop colo’s the application in US  EC2 leveraged for redundancy/capacity • Payments via separate third party transaction • Dev shop & we enjoy privileged access to app • Managed security provided by 3rd Party Soc • Oracle personnel manage RAC implementation
  • 12. How do I know we/they are secure? How do I prove we/they are compliant? What attestation do I ask for ? From whom?
  • 13. Infinite Outsourcing Scenarios - some can get very interesting • A G2000 that has outsourced its entire IT operations? • What happens when SOX auditors discover that AD accounts for key IP stakeholders (that were fired for cause) have been re-enabled?
  • 14.
  • 15.
  • 16. Pharmaceutical Client Data Flow 1 User LAN Zone XX Smith St 2 3 Worker • Understanding information security requirements and Submission of SMB? Docs, Disks & (Scanner & SMB? machines Drives Physical Media) 4a XXX App the need to establish policy Smith I S-FTP submission S-FTP Server Unknown 4 SMB? for Research NAS Services Email submission Mail Server SMB? MS SQL DB and objectives Unknown 4b XXX App VPN Zone Pharma For SMB? EDP LAN Zone 5a XXX • Implementing/operating Clients Pharmaceutical 5 Paper Research, ZZZ London Production & (CC Export System) Hosting Services For Production Out-of-Scope Services controls to manage Apache(?) Deliverable Client SSL Web Server SQL? Oracle DB 6 information security risks 7 XXX & ZZZ XXX & YYY Hosting Systems SSL SQL? Hosting Systems MS SQL Server DBs • Monitoring/reviewing the IIS Web Servers External DMZ Zone Servers LAN Zone ISMS’s effectiveness • Continual Improvement
  • 17.
  • 18. Inter-related ISMS’s will have overlap • You & Vendor/Partner • Across multiple vendors/partners  Common Overlaps • Risk Assessment • Incident Response • Security Awareness & Training • Managing 3rd Party Relationships
  • 19. A.6.2 External Parties • Objective: To maintain the security of the organization’s information and information processing facilities that are accessed, processed, communicated to, or managed by external parties. • A.6.2.1 Identification of Risks Related to External Parties • A.6.2.2 Addressing Security When Dealing with Vendors/Customers/Partners • A.6.2.3 Addressing Security in Third Party Agreements  Defining used to be hard … but it’s gotten much easier …
  • 20. Old School: New School: $1B+ eCommerce Refresh Major City eCommerce Refresh • Custom Security Standard • Leveraged 27001, OWASP • Defined 100+ Controls • Defined 15 Risks/Monitoring • Many man-months of effort • Several man-weeks of effort • Potential Vendors resisted RFP • Vendor immediately embraced response model • Ongoing maintenance effort is • Ongoing maintenance effort is notable (refine controls) minimal (refine risks) • Prohibitively expensive • Relatively inexpensive • Project is stalled • Project is gaining momentum
  • 21. A.10.2 Third Party Service Delivery Management Objective: To implement and maintain the appropriate level of information security and service delivery in line with third party service delivery agreements. • A.10.2.1 Service Delivery Control • A.10.2.2 Monitoring & Review of Third Party Services • A.10.2.3 Managing Changes to Third Party Services  Validating can be challenging if risk/compliance is high • What form of testing is most suitable for the risks defined? (Design, Compliance, Substantiative) • What form of assurance/attestation is best? (us, them, third party, certification) • What direct access/testing is required for incident response/monitoring? • What reporting and SLA’s (think beyond Availability) do we need to monitor?
  • 22.
  • 23. Integrate InfoSec into your existing Vendor/Risk Management Program • You likely have one that measures “business risk” (financials, insurance)  Conduct a “Risk Assessment”  Define your compliance/security requirements • Preferably leveraging a risk and standards based approach  Define the monitoring, attestation, and SLAs needed to govern the relationship and assure risk is mitigated to an acceptable level  Use security incidents coupled with monitoring to improve internal and external processes
  • 24. You can’t outsource your responsibility/liability/ISMS + =