• Tidak ada hasil yang ditemukan

ERM 2015 Session 4 Managing Risks to Information

N/A
N/A
Protected

Academic year: 2017

Membagikan "ERM 2015 Session 4 Managing Risks to Information"

Copied!
21
0
0

Teks penuh

(1)

Managing Risks to Information

Mike Usher

Director, Information Risk and Privacy,

Asia

(2)

Who am I?

Director, Information Risk and Privacy, Asia

30+ years experience in managing risks to

Information and Privacy

Governments

Telecommunications

Financial services

Consultancy

15 years working for Prudential

12 years in Asia

mike.usher@prudential.com.my

(3)

Raw Material

• Information about

• Products

• Customers

• Staff

(4)

Regulators

Governments

Customers

Stakeholders

Expectations

(5)

Insider

Insider

Outsider

Outsider

Accidental

Accidental

Deliberate

Deliberate

Threats

Threats

(6)

Understanding

Understanding

Behaviour

Behaviour

Change

Change

People

People

Challenges

Challenges

(7)

7

Cyberattacks

a

re growing

every day

in

strength and

velocity across the

globe!

(8)

People

Process

T

e

chnology

8

(9)

Technology

9

Technology Components

Principles

Policies

Standards

Architecture

Infrastructure

(10)

Process

10

Process components

Principles

Policies

Procedures

(11)

People

11

People components

Management

Awareness

Training

(12)

Overview

Policies

Governance

Risk based

People

A

w

areness

T

raining

Guidance

(13)

PCA Bestsellers …

Range of policy documents covering different areas

(14)

PCA Information Risk and Privacy Principles

PCA Information Risk and Privacy

Version 2015.1.0

December 2014

PCA Information Risk and

Privacy Policies

PCA Information Risk and Privacy

Version 2015.1.0

(15)

Policy structure

15 Principles: Core principles that the business SMT and ExCo should focus on Policies: Mandatory Policy Statements -basis for Audit and Governance Processes

Policy measures:

Non-mandatory Measures of policy effectiveness for local and PCA Information Risk and Privacy use

Guides:

Non-mandatory guides to allow you to implement policies in your business Supporting material: Checklists, awarenesss material and tools Best Practice: Recommended best practice drawn from business operations

13 Principles

13 Policies

220 Statements

597 Measures

21 Guides

Glossary

Intranet

(16)

The Principles

16

1. An appropriate management structure is in place.

2. Awareness campaigns and training are conducted

3. Information Risk, Privacy, Cyber and Technology related incidents are reported on a monthly basis both locally and regionally.

4. Processing, storage, transmission and destruction of information is done according to its sensitivity.

5. Personally Identifiable Information (PII) is managed appropriately and in line with local laws and regulations.

6. Sensitive information and physical assets of value are stored and managed securely.

7. Appropriate steps are taken to manage information loss.

8. Access to removable devices and media is controlled and managed.

9. User Developed Applications (UDAs) are controlled and managed.

10. Content available from the internet on internal networks is controlled and managed.

11. Internal and external transfers of sensitive information are controlled and managed.

12. The use of mobile devices is controlled and managed.

(17)

Areas to consider

Sensitive information (e.g. Sony incident)

Understand you need to identify and protect information that

would cause harm to your business if something happened

Mobile devices (e.g. Japan incident)

Increasing use of smartphones and tablets increase exposure

to information loss

Removable media (e.g. Korea incident)

Control and manage access to prevent people walking out

with your information

Shared folders (e.g. “everyone” access)

Think about where information is stored and ensure it is

managed wherever it is

(18)

Policy is the first step

It starts at the top……

Ownership

Accountability

Measurement

How well is it implemented?

What is happening internally?

What is happening externally?

Governance

Reporting

Risk committees

C-Level

18

Incidents

(19)

AWARENESS!!!!!!!

(20)

Awareness and training

20

Most incidents and internal audit findings

are caused by people………..

Passwords

PII not shredded

Payment information not secure

Don’t forget simple things

Removable media

Phishing and Social Engineering

(21)

Referensi

Dokumen terkait

Untuk Tahun Yang Berakhir Tanggal 31 Desember

mencari perbedaan dari segi perilaku sosialnya. Pencak silat adalah olahraga individu yang didalamnya terdapat unsur. olahraga, beladiri, mental spiritual dan

Hasil penelitian menunjukkan ekstrak etanol buah merica bolong konsentrasi 100 bpj tidak menunjukkan aktivitas penolak serangga, sedangkan konsentrasi 200 bpj, 500 bpj, 1000

Kualifikasi terhadap peserta yang masuk dalam Calon Daftar Pendek. Pembuktian kualifikasi dilakukan dengan cara MELIHAT keaslian seluruh

[r]

Apabila kegiatan kajian pembelajaran dalam implemtasi Kurikulum 2013 dilakukan pada tahapan plan-do-see secara kolaboratif dan terus menerus diharapkan

Model Pembelajaran Inkuiri Berbantuan Simulasi Komputer Untuk Meningkatkan Penguasaan Konsep dan Korelasinya Dengan Keterampilan Berpikir Kritis Siswa Kelas XI Pada

keperawatan 2012 dan semuanya yang telah membantu saya dalam penyusunan Karya. Tulis