SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
How do you tell what you need to tell?
How do you know what you need to know?
Outsourcing Provides
       Notable Rewards

    Reduced Operating Costs
    Streamlined Operations
    Time to Market
    Flexibility
Rewards don’t come without Risk …..
Outsourcing Creates
     Notable Risks

    Data Breach Requiring Notification
    Failure to Comply with Laws/Regulations


                             Intellectual Property Disclosure
                             Failure to meet Service Level
                              Agreements


                              Douglas Curling, President of Choicepoint
Increasing pressure from
Regulators/ Auditors to ensure that
we can prove that key vendors are
secure and compliant …
One key point …
You can Outsource … your Call Center
You can Outsource …
          your Application Development Center
You can even Outsource … your Entire IT Operation
But you CAN’T Outsource Responsibility or Liability
   Offshore the dev/hosting of an app that
    processes ePHI/accepts credit card
    payments
    • Dev shop colo’s the application in US
         EC2 leveraged for redundancy/capacity
    •   Payments via separate third party transaction
    •   Dev shop & we enjoy privileged access to app
    •   Managed security provided by 3rd Party Soc
    •   Oracle personnel manage RAC implementation
How do I know we/they are secure?
How do I prove we/they are compliant?
What attestation do I ask for ?
    From whom?
   Infinite Outsourcing Scenarios -
                       some can get very interesting
    • A G2000 that has outsourced its entire IT operations?
    • What happens when SOX auditors discover that AD accounts
      for key IP stakeholders (that were fired for cause) have been
      re-enabled?
Pharmaceutical Client Data Flow




1
                                   User LAN Zone

                                        XX Smith St
                                                                     2                                         3
                                                                                                                     Worker
                                                                                                                                                         • Understanding information
                                                                                                                                                           security requirements and
                 Submission of                                                          SMB?
                 Docs, Disks &            (Scanner &        SMB?                                                    machines
                    Drives              Physical Media)
                                                                                                               4a

                                                                                                                  XXX App


                                                                                                                                                           the need to establish policy
                                                                         Smith I
                S-FTP submission        S-FTP Server       Unknown                 4    SMB?                    for Research
                                                                          NAS
                                                                                                                  Services

                Email submission         Mail Server        SMB?                                                   MS SQL DB



                                                                                                                                                           and objectives

                                                                                                                       Unknown
                                   4b XXX App                                                                                              VPN Zone
    Pharma                               For                 SMB?

                                                                                        EDP LAN Zone
                                                                                                                                           5a
                                                                                                                                                XXX


                                                                                                                                                         • Implementing/operating
    Clients                        Pharmaceutical                                                          5                      Paper
                                     Research,                                                                    ZZZ                          London
                                    Production &                                                           (CC Export System)
                                   Hosting Services                                                          For Production               Out-of-Scope
                                                                                                                Services


                                                                                                                                                           controls to manage
                                        Apache(?)                                                                                Deliverable    Client
                      SSL
                                        Web Server                                                                     SQL?
                                        Oracle DB

                                                                                                       6


                                                                                                                                                           information security risks
                              7                                                                                  XXX & ZZZ
                                      XXX & YYY                                                                Hosting Systems
                    SSL                                                  SQL?
                                    Hosting Systems
                                                                                                           MS SQL Server DBs



                                                                                                                                                         • Monitoring/reviewing the
                                    IIS Web Servers
     External                           DMZ Zone                                   Servers LAN Zone




                                                                                                                                                           ISMS’s effectiveness
                                                                                                                                                         • Continual Improvement
   Inter-related ISMS’s will
    have overlap
    • You & Vendor/Partner
    • Across multiple
      vendors/partners
   Common Overlaps
    • Risk Assessment
    • Incident Response
    • Security Awareness &
      Training
    • Managing 3rd Party
      Relationships
   A.6.2 External Parties
    • Objective: To maintain the security of the organization’s information
      and information processing facilities that are accessed, processed,
      communicated to, or managed by external parties.
    • A.6.2.1 Identification of Risks Related to External Parties
    • A.6.2.2 Addressing Security When Dealing with
      Vendors/Customers/Partners
    • A.6.2.3 Addressing Security in Third Party Agreements
   Defining used to be hard … but it’s gotten much easier …
Old School:                           New School:
    $1B+ eCommerce Refresh             Major City eCommerce Refresh

• Custom Security Standard         • Leveraged 27001, OWASP
• Defined 100+ Controls            • Defined 15 Risks/Monitoring
• Many man-months of effort        • Several man-weeks of effort
• Potential Vendors resisted RFP   • Vendor immediately embraced
  response                           model
• Ongoing maintenance effort is    • Ongoing maintenance effort is
  notable (refine controls)          minimal (refine risks)
• Prohibitively expensive          • Relatively inexpensive
• Project is stalled               • Project is gaining momentum
   A.10.2 Third Party Service Delivery Management
    Objective: To implement and maintain the appropriate level of information
      security and service delivery in line with third party service delivery
      agreements.
    • A.10.2.1 Service Delivery Control
    • A.10.2.2 Monitoring & Review of Third Party Services
    • A.10.2.3 Managing Changes to Third Party Services

   Validating can be challenging if risk/compliance is high
    • What form of testing is most suitable for the risks defined? (Design,
      Compliance, Substantiative)
    • What form of assurance/attestation is best? (us, them, third party,
      certification)
    • What direct access/testing is required for incident response/monitoring?
    • What reporting and SLA’s (think beyond Availability) do we need to
      monitor?
   Integrate InfoSec into your existing Vendor/Risk
    Management Program
    • You likely have one that measures “business risk”
      (financials, insurance)
   Conduct a “Risk Assessment”
   Define your compliance/security requirements
    • Preferably leveraging a risk and standards based
      approach
   Define the monitoring, attestation, and SLAs
    needed to govern the relationship and assure risk
    is mitigated to an acceptable level
   Use security incidents coupled with monitoring to
    improve internal and external processes
You can’t outsource your responsibility/liability/ISMS




           +                               =

Weitere ähnliche Inhalte

Was ist angesagt?

SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsMark S. Mahre
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementSALIH AHMED ISLAM
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Managementbanerjeerohit
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Information risk management
Information risk managementInformation risk management
Information risk managementAkash Saraswat
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionRishabh Software
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCorporater
 

Was ist angesagt? (20)

ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
Compliance Risk Assessment
Compliance Risk AssessmentCompliance Risk Assessment
Compliance Risk Assessment
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk management
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
Vendor Risk Management
Vendor Risk ManagementVendor Risk Management
Vendor Risk Management
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management Solution
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance Solutions
 

Andere mochten auch

Third-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightThird-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightNICSA
 
Third Party Risk Management Introduction
Third Party Risk Management IntroductionThird Party Risk Management Introduction
Third Party Risk Management IntroductionNaveen Grover
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & GovernanceEDR
 
viaLegal Webinar_ FCPA Training for a Global Workforce
viaLegal Webinar_ FCPA Training for a Global WorkforceviaLegal Webinar_ FCPA Training for a Global Workforce
viaLegal Webinar_ FCPA Training for a Global WorkforceVIA
 
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsGRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsKate Tomlinson
 
9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption PreventionKendal Peterson
 
Top 10 Mega Trends- to understand the China Landscape
Top 10 Mega Trends- to understand the China LandscapeTop 10 Mega Trends- to understand the China Landscape
Top 10 Mega Trends- to understand the China LandscapeDr Neale O'Connor, CPA (Aust)
 
Vendor Security Practices: Turn the Rocks Over Early and Often
Vendor Security Practices: Turn the Rocks Over Early and OftenVendor Security Practices: Turn the Rocks Over Early and Often
Vendor Security Practices: Turn the Rocks Over Early and OftenPriyanka Aash
 
Corporate Compliance Overview
Corporate Compliance OverviewCorporate Compliance Overview
Corporate Compliance OverviewSam Carr
 
ppt of vendor management
ppt of vendor management ppt of vendor management
ppt of vendor management rohit12692
 
Sales budget ,forcasting and control
Sales budget ,forcasting and controlSales budget ,forcasting and control
Sales budget ,forcasting and controljack99
 
Buyer supplier relationship
Buyer supplier relationshipBuyer supplier relationship
Buyer supplier relationshipAnkit
 
Outsourcing and Vendor management
Outsourcing and Vendor managementOutsourcing and Vendor management
Outsourcing and Vendor managementRaminder Pal Singh
 

Andere mochten auch (14)

Third-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightThird-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in Oversight
 
Third Party Risk Management Introduction
Third Party Risk Management IntroductionThird Party Risk Management Introduction
Third Party Risk Management Introduction
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
 
viaLegal Webinar_ FCPA Training for a Global Workforce
viaLegal Webinar_ FCPA Training for a Global WorkforceviaLegal Webinar_ FCPA Training for a Global Workforce
viaLegal Webinar_ FCPA Training for a Global Workforce
 
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsGRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
 
9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention
 
Top 10 Mega Trends- to understand the China Landscape
Top 10 Mega Trends- to understand the China LandscapeTop 10 Mega Trends- to understand the China Landscape
Top 10 Mega Trends- to understand the China Landscape
 
Vendor Security Practices: Turn the Rocks Over Early and Often
Vendor Security Practices: Turn the Rocks Over Early and OftenVendor Security Practices: Turn the Rocks Over Early and Often
Vendor Security Practices: Turn the Rocks Over Early and Often
 
Corporate Compliance Overview
Corporate Compliance OverviewCorporate Compliance Overview
Corporate Compliance Overview
 
ppt of vendor management
ppt of vendor management ppt of vendor management
ppt of vendor management
 
Sales budget ,forcasting and control
Sales budget ,forcasting and controlSales budget ,forcasting and control
Sales budget ,forcasting and control
 
Vendor Management
Vendor ManagementVendor Management
Vendor Management
 
Buyer supplier relationship
Buyer supplier relationshipBuyer supplier relationship
Buyer supplier relationship
 
Outsourcing and Vendor management
Outsourcing and Vendor managementOutsourcing and Vendor management
Outsourcing and Vendor management
 

Ähnlich wie Third Party Vendor Risk Managment

Two Steps Forward and One Step Back: The Real Path of HR Metrics and Analyti...
Two Steps Forward and One Step Back:  The Real Path of HR Metrics and Analyti...Two Steps Forward and One Step Back:  The Real Path of HR Metrics and Analyti...
Two Steps Forward and One Step Back: The Real Path of HR Metrics and Analyti...HR Network marcus evans
 
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise ITIT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise ITBob Rhubart
 
Integrated Campus Management System on Axpert™
Integrated Campus Management System on Axpert™ Integrated Campus Management System on Axpert™
Integrated Campus Management System on Axpert™ AGILE LABS,INDIA
 
Data Governance
Data GovernanceData Governance
Data GovernanceRob Lux
 
Sdf Panel Nice 2009 V1.0
Sdf Panel Nice 2009 V1.0Sdf Panel Nice 2009 V1.0
Sdf Panel Nice 2009 V1.0lgradina
 
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAUVærdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAUInfinIT - Innovationsnetværket for it
 
DeepNines Ds Bandwidth Manager 0909 Lr[1]
DeepNines Ds Bandwidth Manager 0909 Lr[1]DeepNines Ds Bandwidth Manager 0909 Lr[1]
DeepNines Ds Bandwidth Manager 0909 Lr[1]DeepNines Technologies
 
Replication for Business Continuity, Disaster Recovery and High Availability
Replication for Business Continuity, Disaster Recovery and High AvailabilityReplication for Business Continuity, Disaster Recovery and High Availability
Replication for Business Continuity, Disaster Recovery and High AvailabilityTony Pearson
 
Business Intelligence - Architecture & Execution Done Right
Business Intelligence - Architecture & Execution Done RightBusiness Intelligence - Architecture & Execution Done Right
Business Intelligence - Architecture & Execution Done RightDavid Sogn
 
BI Self-Service Keys to Success and QlikView Overview
BI Self-Service Keys to Success and QlikView OverviewBI Self-Service Keys to Success and QlikView Overview
BI Self-Service Keys to Success and QlikView OverviewSenturus
 
Itac benoit long deck final eng - feb 12 2013
Itac benoit long deck   final eng - feb 12 2013Itac benoit long deck   final eng - feb 12 2013
Itac benoit long deck final eng - feb 12 2013KBIZEAU
 
Infosys – Cloud Business Value Architecture
Infosys – Cloud Business Value ArchitectureInfosys – Cloud Business Value Architecture
Infosys – Cloud Business Value ArchitectureInfosys
 
MetaSource BPO Solutions
MetaSource BPO SolutionsMetaSource BPO Solutions
MetaSource BPO SolutionsRussell Thomas
 
Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015Richard Minor
 
Pdf Tax Form Services Whitepaper V1.1
Pdf Tax Form Services   Whitepaper V1.1Pdf Tax Form Services   Whitepaper V1.1
Pdf Tax Form Services Whitepaper V1.1amau2000
 
Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PManaging the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PColloquium
 
IBM Watson vs. Your Data Center
IBM Watson vs. Your Data CenterIBM Watson vs. Your Data Center
IBM Watson vs. Your Data CenterHerb Hernandez
 
Putnam f01
Putnam f01Putnam f01
Putnam f01anissa18
 

Ähnlich wie Third Party Vendor Risk Managment (20)

Two Steps Forward and One Step Back: The Real Path of HR Metrics and Analyti...
Two Steps Forward and One Step Back:  The Real Path of HR Metrics and Analyti...Two Steps Forward and One Step Back:  The Real Path of HR Metrics and Analyti...
Two Steps Forward and One Step Back: The Real Path of HR Metrics and Analyti...
 
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise ITIT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
IT-as-a-Service: Cloud Computing and the Evolving Role of Enterprise IT
 
Integrated Campus Management System on Axpert™
Integrated Campus Management System on Axpert™ Integrated Campus Management System on Axpert™
Integrated Campus Management System on Axpert™
 
Data Governance
Data GovernanceData Governance
Data Governance
 
Sdf Panel Nice 2009 V1.0
Sdf Panel Nice 2009 V1.0Sdf Panel Nice 2009 V1.0
Sdf Panel Nice 2009 V1.0
 
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAUVærdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
 
DeepNines Ds Bandwidth Manager 0909 Lr[1]
DeepNines Ds Bandwidth Manager 0909 Lr[1]DeepNines Ds Bandwidth Manager 0909 Lr[1]
DeepNines Ds Bandwidth Manager 0909 Lr[1]
 
Replication for Business Continuity, Disaster Recovery and High Availability
Replication for Business Continuity, Disaster Recovery and High AvailabilityReplication for Business Continuity, Disaster Recovery and High Availability
Replication for Business Continuity, Disaster Recovery and High Availability
 
Business Intelligence - Architecture & Execution Done Right
Business Intelligence - Architecture & Execution Done RightBusiness Intelligence - Architecture & Execution Done Right
Business Intelligence - Architecture & Execution Done Right
 
Messing
MessingMessing
Messing
 
BI Self-Service Keys to Success and QlikView Overview
BI Self-Service Keys to Success and QlikView OverviewBI Self-Service Keys to Success and QlikView Overview
BI Self-Service Keys to Success and QlikView Overview
 
Itac benoit long deck final eng - feb 12 2013
Itac benoit long deck   final eng - feb 12 2013Itac benoit long deck   final eng - feb 12 2013
Itac benoit long deck final eng - feb 12 2013
 
Infosys – Cloud Business Value Architecture
Infosys – Cloud Business Value ArchitectureInfosys – Cloud Business Value Architecture
Infosys – Cloud Business Value Architecture
 
Mashups
MashupsMashups
Mashups
 
MetaSource BPO Solutions
MetaSource BPO SolutionsMetaSource BPO Solutions
MetaSource BPO Solutions
 
Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015
 
Pdf Tax Form Services Whitepaper V1.1
Pdf Tax Form Services   Whitepaper V1.1Pdf Tax Form Services   Whitepaper V1.1
Pdf Tax Form Services Whitepaper V1.1
 
Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PManaging the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-P
 
IBM Watson vs. Your Data Center
IBM Watson vs. Your Data CenterIBM Watson vs. Your Data Center
IBM Watson vs. Your Data Center
 
Putnam f01
Putnam f01Putnam f01
Putnam f01
 

Kürzlich hochgeladen

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 

Kürzlich hochgeladen (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Third Party Vendor Risk Managment

  • 1. How do you tell what you need to tell? How do you know what you need to know?
  • 2. Outsourcing Provides Notable Rewards  Reduced Operating Costs  Streamlined Operations  Time to Market  Flexibility
  • 3. Rewards don’t come without Risk …..
  • 4. Outsourcing Creates Notable Risks  Data Breach Requiring Notification  Failure to Comply with Laws/Regulations  Intellectual Property Disclosure  Failure to meet Service Level Agreements Douglas Curling, President of Choicepoint
  • 5. Increasing pressure from Regulators/ Auditors to ensure that we can prove that key vendors are secure and compliant …
  • 7. You can Outsource … your Call Center
  • 8. You can Outsource … your Application Development Center
  • 9. You can even Outsource … your Entire IT Operation
  • 10. But you CAN’T Outsource Responsibility or Liability
  • 11. Offshore the dev/hosting of an app that processes ePHI/accepts credit card payments • Dev shop colo’s the application in US  EC2 leveraged for redundancy/capacity • Payments via separate third party transaction • Dev shop & we enjoy privileged access to app • Managed security provided by 3rd Party Soc • Oracle personnel manage RAC implementation
  • 12. How do I know we/they are secure? How do I prove we/they are compliant? What attestation do I ask for ? From whom?
  • 13. Infinite Outsourcing Scenarios - some can get very interesting • A G2000 that has outsourced its entire IT operations? • What happens when SOX auditors discover that AD accounts for key IP stakeholders (that were fired for cause) have been re-enabled?
  • 14.
  • 15.
  • 16. Pharmaceutical Client Data Flow 1 User LAN Zone XX Smith St 2 3 Worker • Understanding information security requirements and Submission of SMB? Docs, Disks & (Scanner & SMB? machines Drives Physical Media) 4a XXX App the need to establish policy Smith I S-FTP submission S-FTP Server Unknown 4 SMB? for Research NAS Services Email submission Mail Server SMB? MS SQL DB and objectives Unknown 4b XXX App VPN Zone Pharma For SMB? EDP LAN Zone 5a XXX • Implementing/operating Clients Pharmaceutical 5 Paper Research, ZZZ London Production & (CC Export System) Hosting Services For Production Out-of-Scope Services controls to manage Apache(?) Deliverable Client SSL Web Server SQL? Oracle DB 6 information security risks 7 XXX & ZZZ XXX & YYY Hosting Systems SSL SQL? Hosting Systems MS SQL Server DBs • Monitoring/reviewing the IIS Web Servers External DMZ Zone Servers LAN Zone ISMS’s effectiveness • Continual Improvement
  • 17.
  • 18. Inter-related ISMS’s will have overlap • You & Vendor/Partner • Across multiple vendors/partners  Common Overlaps • Risk Assessment • Incident Response • Security Awareness & Training • Managing 3rd Party Relationships
  • 19. A.6.2 External Parties • Objective: To maintain the security of the organization’s information and information processing facilities that are accessed, processed, communicated to, or managed by external parties. • A.6.2.1 Identification of Risks Related to External Parties • A.6.2.2 Addressing Security When Dealing with Vendors/Customers/Partners • A.6.2.3 Addressing Security in Third Party Agreements  Defining used to be hard … but it’s gotten much easier …
  • 20. Old School: New School: $1B+ eCommerce Refresh Major City eCommerce Refresh • Custom Security Standard • Leveraged 27001, OWASP • Defined 100+ Controls • Defined 15 Risks/Monitoring • Many man-months of effort • Several man-weeks of effort • Potential Vendors resisted RFP • Vendor immediately embraced response model • Ongoing maintenance effort is • Ongoing maintenance effort is notable (refine controls) minimal (refine risks) • Prohibitively expensive • Relatively inexpensive • Project is stalled • Project is gaining momentum
  • 21. A.10.2 Third Party Service Delivery Management Objective: To implement and maintain the appropriate level of information security and service delivery in line with third party service delivery agreements. • A.10.2.1 Service Delivery Control • A.10.2.2 Monitoring & Review of Third Party Services • A.10.2.3 Managing Changes to Third Party Services  Validating can be challenging if risk/compliance is high • What form of testing is most suitable for the risks defined? (Design, Compliance, Substantiative) • What form of assurance/attestation is best? (us, them, third party, certification) • What direct access/testing is required for incident response/monitoring? • What reporting and SLA’s (think beyond Availability) do we need to monitor?
  • 22.
  • 23. Integrate InfoSec into your existing Vendor/Risk Management Program • You likely have one that measures “business risk” (financials, insurance)  Conduct a “Risk Assessment”  Define your compliance/security requirements • Preferably leveraging a risk and standards based approach  Define the monitoring, attestation, and SLAs needed to govern the relationship and assure risk is mitigated to an acceptable level  Use security incidents coupled with monitoring to improve internal and external processes
  • 24. You can’t outsource your responsibility/liability/ISMS + =