1
2
3
www.LearnSecurity.org
4
Albert Gonzalez, 28
With accomplices, he was involved in data
breaches of most of the major data breaches:
Heartland, Hannaford Bros., 7-Eleven, T.J.
Maxx, Marshalls, BJ’s Wholesale Club,
OfficeMax, Barnes & Noble, Sports Authority,
Dave & Busters, Boston Market, Forever 21,
DSW and others.
The public trusts that we will
keep their information safe
from crooks like these.
5
Source:
6
Number of incidents per year.
Source:
7
8
Source:
9
Source:
10
Source:
11
Source:
12
13
Source:
14
15
Source:
16
1. Securing the IT environment
2. Managing and retaining data
3. Managing IT risk and compliance
4. Ensuring privacy
6. Managing System Implementations
7. Preventing and responding to computer fraud
10. Managing vendors and service providers
http://www.aicpa.org/InterestAreas/InformationTechnology/Resources/TopTechnologyInitiatives/Pages/2013TTI.aspx
Orange text are all
PCI related
17
18
Determine
Objectives
Assess
Risk
Apply
Controls
Assess
Controls
Monitor
19
20
Source: Internal Control Guidelines California Local Agencies 2015 SCO
21
 Source: AICPA’s Auditing Standard AU-C §315.A91
22
23
24
25
26
utility model
27
28
Efficiency
Agility
Innovation
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44

More Related Content

PDF
2016 Maze Live Cyber-security for Local Governments
PDF
Logikcull Webinar: Preventing the #1 Litigation Risk
PDF
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
PDF
Chief Audit Execs speak out: Cybersecurity & risk management
PDF
Social media data leakage and data accountability risks
PPTX
Logikcull Webinar: Preventing the Next Panama Papers
PDF
New York State Department of Financial Services Expands Its Cyber Focus to In...
PDF
Data Breach White Paper
2016 Maze Live Cyber-security for Local Governments
Logikcull Webinar: Preventing the #1 Litigation Risk
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Chief Audit Execs speak out: Cybersecurity & risk management
Social media data leakage and data accountability risks
Logikcull Webinar: Preventing the Next Panama Papers
New York State Department of Financial Services Expands Its Cyber Focus to In...
Data Breach White Paper

What's hot (10)

DOCX
ChuckBrooksCYBERSECURITYSUMMIT
PPTX
June 16 2015 P&S Update Webinar
PPTX
(Webinar Slides) Tips and Tricks for Managing Social Media
PDF
DATA BREACH & PREVENTION - Hemali Rangoliya
PPTX
Discoverable Client Issues Using Public Big Data
PDF
(Webinar Slides) How to Ethically Use Technology in Your Practice
PDF
Working with Law Enforcement on Cyber Security Strategies
PPTX
Privacy: Protecting Personal Information
KEY
Chapter 10, part 3
KEY
Maeve mis presentation
ChuckBrooksCYBERSECURITYSUMMIT
June 16 2015 P&S Update Webinar
(Webinar Slides) Tips and Tricks for Managing Social Media
DATA BREACH & PREVENTION - Hemali Rangoliya
Discoverable Client Issues Using Public Big Data
(Webinar Slides) How to Ethically Use Technology in Your Practice
Working with Law Enforcement on Cyber Security Strategies
Privacy: Protecting Personal Information
Chapter 10, part 3
Maeve mis presentation
Ad

Viewers also liked (13)

PDF
Ileana La Jolla AuditReport[1]-1
PDF
Reed Smith - Anticipating the outcome of the 2015 Paris Climate Change Confer...
PPT
English speaking
PPTX
What have you learnt about technologies from the.pptx evalll
DOC
MAHESH PISAL RESUME-
PDF
Adapa tanıtım broşürü
PDF
Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN
PPT
Amos Paran - plenary
 
PDF
Implementing GASB 72: Fair Value Measurement and Application
PDF
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
PPTX
CAMBRIDGE AS GEOGRAPHY REVISION: ROCKS AND WEATHERING - 3.3 SLOPE PROCESSES
PPTX
CAMBRIDGE AS GEOGRAPHY REVISION: ROCKS AND WEATHERING - 3.2 WEATHERING AND ROCKS
PDF
Wie werde ich telc-Prüfer?
Ileana La Jolla AuditReport[1]-1
Reed Smith - Anticipating the outcome of the 2015 Paris Climate Change Confer...
English speaking
What have you learnt about technologies from the.pptx evalll
MAHESH PISAL RESUME-
Adapa tanıtım broşürü
Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN
Amos Paran - plenary
 
Implementing GASB 72: Fair Value Measurement and Application
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
CAMBRIDGE AS GEOGRAPHY REVISION: ROCKS AND WEATHERING - 3.3 SLOPE PROCESSES
CAMBRIDGE AS GEOGRAPHY REVISION: ROCKS AND WEATHERING - 3.2 WEATHERING AND ROCKS
Wie werde ich telc-Prüfer?
Ad

Similar to Cyber Security for Local Gov SAMFOG (20)

PDF
2016 Maze Live Cyber-security for Local Governments
PDF
Cybersecurity for Local Gov for SAMFOG
PDF
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
PDF
Leading Practices in Information Security & Privacy
PPTX
Kaseya Kaspersky Breaches
PPT
George Gavras 2010 Fowler Seminar
PPT
Powerpoint mack jackson
PPTX
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
PPT
Information security management v2010
PDF
Thy myth of hacking Oracle
PPT
Security Compliance Web Application Risk Management
PDF
Data Security Regulatory Lansdcape
PDF
Managed Security For A Not So Secure World Wp090991
PPTX
Risk Management Practices for PCI DSS 2.0
PDF
Why Have A Digital Investigative Infrastructure
PDF
Security For Free
PPTX
ISACA New York Metro April 30 2012
PPTX
ID Theft and Computer Security 2008
PPTX
Cybersecurity Seminar March 2015
PPT
Pci Europe 2009 Underside Of The Compliance Ecosystem
2016 Maze Live Cyber-security for Local Governments
Cybersecurity for Local Gov for SAMFOG
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
Leading Practices in Information Security & Privacy
Kaseya Kaspersky Breaches
George Gavras 2010 Fowler Seminar
Powerpoint mack jackson
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Information security management v2010
Thy myth of hacking Oracle
Security Compliance Web Application Risk Management
Data Security Regulatory Lansdcape
Managed Security For A Not So Secure World Wp090991
Risk Management Practices for PCI DSS 2.0
Why Have A Digital Investigative Infrastructure
Security For Free
ISACA New York Metro April 30 2012
ID Theft and Computer Security 2008
Cybersecurity Seminar March 2015
Pci Europe 2009 Underside Of The Compliance Ecosystem

More from Donald E. Hester (20)

PDF
2017 IT Control Environment for Local Gov
PPTX
What you Need To Know About Ransomware
PDF
CNT 54 Administering Windows Client
PDF
2016 Maze Live Fraud Environment
PDF
GASB 68 and 71 Planning for the Second Year
PDF
2016 Maze Live 1 GASB update
PDF
Annual Maze Live Event 2016 – GASB Updates & Best Practices
PDF
Payment Card Cashiering for Local Governments 2016
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
2017 IT Control Environment for Local Gov
What you Need To Know About Ransomware
CNT 54 Administering Windows Client
2016 Maze Live Fraud Environment
GASB 68 and 71 Planning for the Second Year
2016 Maze Live 1 GASB update
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Payment Card Cashiering for Local Governments 2016
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam

Recently uploaded (20)

PPTX
SlideEgg_66119-Responsible Sourcing.pptx
PPTX
Project Design on Parkisonism disease.pptx
PDF
Firefighter Safety Skills training older version
PPTX
ROADMAP AND PATHWAYS TO EXIT AND SUSTAINABILITY.pptx
PDF
CWTS-WK4-CitizenshipJ-Human-RightsJ-and-Volunteerism.pdf
PPTX
smart_health_monitoring_northeast_india_20250830155837.pptx
PDF
Europe's Political and Economic, Energy Clouds- September 2025 (Updated Draft)
PDF
Buy Naver Account in 2025 — And Why You Ought to Too (1).pdf
PDF
POCSO ACT in India and its implications.
PPTX
一比一原版(MHL毕业证)德国吕贝克音乐学院毕业证文凭学历认证
PPTX
Amyloidosis (4noarhonpathology study amyloidosis immin
PPTX
Human_Population_Growth and demographic crisis.pptx
PPTX
c. b. 3 Basics of BDP geared towards public service.pptx
PPTX
IMPLEMENTING RULES AND REGULATIONS OF REPUBLIC ACT NO. 11058 ENTITLED “AN ACT...
PPTX
CSO filing for accreditation in local government units
PDF
A Comparative Analysis of Digital Transformation in Public Administration.pdf
PDF
Global Peace Index - 2025 - Ghana slips on 2025 Global Peace Index; drops out...
PPTX
A quiz and riddle collection for intellctual stimulation
PPTX
SAR_and_First_Responder_Survey_Training.pptx
PDF
Abhay Bhutada Foundation’s Commitment to SEBI’s 2021 ESG Principles
SlideEgg_66119-Responsible Sourcing.pptx
Project Design on Parkisonism disease.pptx
Firefighter Safety Skills training older version
ROADMAP AND PATHWAYS TO EXIT AND SUSTAINABILITY.pptx
CWTS-WK4-CitizenshipJ-Human-RightsJ-and-Volunteerism.pdf
smart_health_monitoring_northeast_india_20250830155837.pptx
Europe's Political and Economic, Energy Clouds- September 2025 (Updated Draft)
Buy Naver Account in 2025 — And Why You Ought to Too (1).pdf
POCSO ACT in India and its implications.
一比一原版(MHL毕业证)德国吕贝克音乐学院毕业证文凭学历认证
Amyloidosis (4noarhonpathology study amyloidosis immin
Human_Population_Growth and demographic crisis.pptx
c. b. 3 Basics of BDP geared towards public service.pptx
IMPLEMENTING RULES AND REGULATIONS OF REPUBLIC ACT NO. 11058 ENTITLED “AN ACT...
CSO filing for accreditation in local government units
A Comparative Analysis of Digital Transformation in Public Administration.pdf
Global Peace Index - 2025 - Ghana slips on 2025 Global Peace Index; drops out...
A quiz and riddle collection for intellctual stimulation
SAR_and_First_Responder_Survey_Training.pptx
Abhay Bhutada Foundation’s Commitment to SEBI’s 2021 ESG Principles

Cyber Security for Local Gov SAMFOG

Editor's Notes

  • #18: With a risk-based audit approach it is important to understand that there are two areas of concern when evaluating the control environment. There is a financial reporting control environment and an overlapping information technology control environment . This overlap can become larger when the complexity and sophistication of the IT environment increases and when the reliance on the IT controls is greater. This overlapping area creates a potential for the lack of IT controls or IT control failure to increase the risk of material misstatement (RMM).
  • #21: http://sco.ca.gov/Files-AUD/2015_internal_control_guidelines.pdf
  • #26: What is Cloud Computing? The “Cloud” Buzz word Overused cliché Ill defined Many different definitions Marketing term All hype The “unknown path” Service provider “____-as-a-service” Nebulous Image: NASA
  • #27: Definition “..[a] model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, services) that can be provisioned and released with minimal management effort or service provider interactions.” NIST & Cloud Security Alliance A utility model of technology delivery. Photo by Donald E. Hester all rights reserved NIST SP 800-145
  • #28: DoDI 8510.01
  • #29: Reasons “Cloud First policy. This policy is intended to accelerate the pace at which the government will realize the value of cloud computing by requiring agencies to evaluate safe, secure cloud computing options before making any new investments.” “…to be more efficient, agile, and innovative through more effective use of IT investments…” Federal Cloud Computing Strategy, February 2011
  • #30: Cloud Provider Benefits (NIST SP 800-144)
  • #31: Cloud Risks Where’s My Data? The Bad Divorce Trust but Verify “I thought you knew” I didn’t think of that Clarify Consider Expectations, Put it in Writing Compatibility Can you think of some risks not mentioned?
  • #32: Where’s My Data? In the information age your key asset is information. Some information requires protection (Credit Card Data, Student Records, SSN, etc…) Your information could be anywhere in the world You may loss access to your data (availability) ISP failure Service provider failure Failure to pay (service provider stops access) Image: Microsoft Clip Art
  • #33: The Bad Divorce “Vendor Lock” All relationships come to an end Let you down, had a breach, SLA performance etc… The company fails/gets sold Introductory pricing or it goes up over time Transition to new vendor or in-source How will you get your data back? Lack of Portability between PaaS Clouds Example, something built for Google won’t work for SharePoint or Amazon Get a prenup – get it in the contract up front Image: Microsoft Clip Art
  • #34: Trust but Verify Assurance How do you know they are protecting your data? Not everyone is treated the same by service providers Disclosure concerning security posture 3rd party independent verification (audit/assessment) SAS 70 / SSAE 16 SysTrust / WebTrust ISO 27001 Certification Audit / Assessment MOU/MOA & ISA Image: Microsoft Clip Art
  • #35: “I thought you knew” Cloud systems are typically more complex This may create a larger attack surface Breach Notification When do you want to know about a data breach? (Data that you are legal obligated to protect) Typical contracts give wide latitude for service providers Actual verses possible breach Timeliness of notification Image: Microsoft Clip Art
  • #36: I didn’t think of that Dependencies Infrastructure – Internet Authentication management (SSO) Operational budget Greater dependency on 3rd parties Other considerations Complex legal issues Multi-tenancy Transborder data flow Jurisdiction and Regulation Support for Forensics Image: Microsoft Clip Art
  • #37: Clarify What do they mean by “Cloud” Establish clear responsibilities and accountability Your expectations Cost of compensating controls What will happen with billing disputes Will your data be in a multi-tenant environment What controls will you have Image: Microsoft Clip Art
  • #38: Consider The reputation of the service provider Track record of issues Large or small, likelihood of change Vendor ‘supply chain management’ issues The reliability of the service or technology Is the technology time tested Competency of cloud provider Typically you have no control over upgrades and changes Training for staff Image: Microsoft Clip Art
  • #39: Compatibility When will they upgrade their service? Will they be ready when you are ready for an upgrade of dependent software Will you be ready when they are ready to upgrade Browser-based Risks and Risk Remediation What software will be required on the client side? Java Flash Active-X Silverlight HTML 5
  • #40: New attack vectors Hypervisor complexity Data leakage (multi-tenant environment) Man in the Middle Browser vulnerabilities Mobile device vulnerabilities
  • #41: Service Agreements Service Level Agreement (SLA) Some are predefined and non-negotiable Some are negotiable (typically cost more) Terms of Service May cover privacy Breach notification Licensing Acceptable use (What you can and can’t do) Limitations on liability (Typically in the favor of the service provider) Modifications of the terms of service (Do you want this?) Data ownership
  • #42: Traditional risks no matter where you go Insider threat, Instead of your staff it is their staff Access control How can you control and monitor? Authentication Another logon or SSO Data sanitation Is your data really deleted? Others????
  • #44: What to do? Careful planning before engagement Understand the technical aspects of the solution Make sure it will meet your needs (security and privacy) Maintain accountability Define data location restrictions Ensure laws and regulations are met Make sure they can support electronic discovery and forensics Follow NIST and Cloud Security Alliance guidance
  • #45: Resources Cloud Security Alliance cloudsecurityalliance.org ISACA: Cloud Computing Management Audit/Assurance Program, 2010 NIST SP 800-144 (draft) NIST SP 800-145 NIST SP 800-146 (draft) Federal Cloud Computing Strategy, February 2011 CIO.gov Above the Clouds managing Risk in the World of Cloud Computing by McDonald (978-1-84928-031-0) Cloud Computing, Implementation, Management, and Security by Rittinghouse and Ransome (978-1-4398-0680-7) Image: Microsoft Clip Art