Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

Master Class Cyber Compliance

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Wird geladen in …3
×

Hier ansehen

1 von 50 Anzeige

Master Class Cyber Compliance

In order to comply with increasing data protection regulations and contractual requirements on service availability and quality levels, advisory support in the design and implementation of IT controls opens up concrete job opportunities. Compliance officers have a privileged role in supporting the data security function, defining protocols to meet policy requirements and contractual clauses. In addition, compliance officers help to quantify the risks of breaching both privacy and essential services laws and contracts for data services, cloud infrastructure, software licensing, application development and technology in general. The increasing visibility of the compliance officer’s role in offering advice on information security and data governance requires new skills in risks, system processes and cybersecurity controls. The risks of falling behind the constant vulnerabilities of IT assets and the changing attack strategies of hackers and other criminals require compliance officers to suggest, implement, communicate and audit IT controls based on security policies, contracts and regulations. The new dependency on outsourcing for cloud storage and software services exponentially increases the exposure to data breach risks. The skills of compliance officers evolved to go beyond paper compliance and high-level policy writing in legalese, enabling business decisions by suggesting cost-effective alternatives, minimizing non-compliance risks and protecting intellectual property.

Compliance officers have also helped in quantifying risk exposures for regulatory and contractual requirements on IT assets under different scenarios. By advising the business on maximum and minimum liabilities, fines, claims and penalties regarding contracts and regulations, the compliance function spearheaded the development of data-driven methodologies and tools to quantify risks. These developments made it possible to overcome the shortcomings associated with biased assessments which ignore risk data, such as red, yellow, and green criteria, 5*5 arrays, and arbitrary scoring systems. These misleading qualitative risk methodologies have been refuted by science for more than a decade, and are now forms of malpractice and negligence preventing a strong corporate defense.

Understanding the context of cyber compliance allows consultants to offer differentiated services in the market, and internal compliance officers to take a step forward in becoming influential business advisors. Justifying a lack of technical knowledge about systems, IT controls or data protection practices means that the compliance function turns its back on protecting organizations. In addition, it leaves compliance officers at the mercy of Darwinism in the labor market; unable to offer in-demand and well-paid consulting services.

In order to comply with increasing data protection regulations and contractual requirements on service availability and quality levels, advisory support in the design and implementation of IT controls opens up concrete job opportunities. Compliance officers have a privileged role in supporting the data security function, defining protocols to meet policy requirements and contractual clauses. In addition, compliance officers help to quantify the risks of breaching both privacy and essential services laws and contracts for data services, cloud infrastructure, software licensing, application development and technology in general. The increasing visibility of the compliance officer’s role in offering advice on information security and data governance requires new skills in risks, system processes and cybersecurity controls. The risks of falling behind the constant vulnerabilities of IT assets and the changing attack strategies of hackers and other criminals require compliance officers to suggest, implement, communicate and audit IT controls based on security policies, contracts and regulations. The new dependency on outsourcing for cloud storage and software services exponentially increases the exposure to data breach risks. The skills of compliance officers evolved to go beyond paper compliance and high-level policy writing in legalese, enabling business decisions by suggesting cost-effective alternatives, minimizing non-compliance risks and protecting intellectual property.

Compliance officers have also helped in quantifying risk exposures for regulatory and contractual requirements on IT assets under different scenarios. By advising the business on maximum and minimum liabilities, fines, claims and penalties regarding contracts and regulations, the compliance function spearheaded the development of data-driven methodologies and tools to quantify risks. These developments made it possible to overcome the shortcomings associated with biased assessments which ignore risk data, such as red, yellow, and green criteria, 5*5 arrays, and arbitrary scoring systems. These misleading qualitative risk methodologies have been refuted by science for more than a decade, and are now forms of malpractice and negligence preventing a strong corporate defense.

Understanding the context of cyber compliance allows consultants to offer differentiated services in the market, and internal compliance officers to take a step forward in becoming influential business advisors. Justifying a lack of technical knowledge about systems, IT controls or data protection practices means that the compliance function turns its back on protecting organizations. In addition, it leaves compliance officers at the mercy of Darwinism in the labor market; unable to offer in-demand and well-paid consulting services.

Anzeige
Anzeige

Weitere Verwandte Inhalte

Diashows für Sie (20)

Ähnlich wie Master Class Cyber Compliance (20)

Anzeige

Weitere von Hernan Huwyler, MBA CPA (20)

Aktuellste (20)

Anzeige

Master Class Cyber Compliance

  1. 1. Master Class Cyber compliance Prof. Hernan Huwyler, MBA CPA
  2. 2. IE, top worldwide MBAs
  3. 3. Support IT in embedding compliance controls Challenge
  4. 4. There is not security in IT security Compliant but unprotected No framework is 100% breach-free Challenge
  5. 5. European Critical Infrastructure Directive Energy Transport New European strategy Banking Infrastructure Digital Health Water Waste Space Government 2008 2021
  6. 6. 1st Line IT Process and Contract Mgrs Governance 2nd Line Compliance Privacy, risks, info sec 3rd Line IT Audit
  7. 7. Implement a mobile and endpoint device management Work-from-Anywhere
  8. 8. Enhance requirements for cloud and eCommerce service providers Cloud and eCommerce
  9. 9. Audit internal and 3P controls against ransomware and spearphishing Privacy enforcement
  10. 10. Compliance register Control matrix Policies and procedures IT contracts End-to-end scope 1
  11. 11. SANS policy templates https://www.sans.org/information- security-policy/ 1
  12. 12. Create simple policies to buy software and an inventory of applications to prevent shadow IT Licensing Compliance 2
  13. 13. Implement a monthly reconciliation between the software inventory and the paid licenses Licensing Compliance 2
  14. 14. Implement and train simple policies to buy and approve software by the CISO to prevent shadow IT Licensing Compliance 2
  15. 15. Block accesses to rogue or risky cloud services sites (e.g. Dropbox, Google Docs) Licensing Compliance 2
  16. 16. Request to use probabilistic methodologies to quantify IT risks Corporate defense 3
  17. 17. Request to use probabilistic methodologies to quantify IT risks Corporate defense 3
  18. 18. Strength the scientific basis to invest (or not!) on data security controls for contractual, privacy and corporate criminal laws Corporate defense 3
  19. 19. “appropriate and proportionate technical and organisational measures” Corporate defense 3
  20. 20. The paucity of legal opinion addressing Monte Carlo techniques gives one pause at suggesting that Monte Carlo simulation will ever be challenged, much less successfully, on judicial review. Judges will likely be disinclined to delve into their intricacies, likely characterized as technical and scientific and subject to a longstanding judicial deference.” Susan Poulter Corporate defense 3
  21. 21. IT compliance register 4 GDPR, eCommerce directive Computer crime for corporate criminal responsibility IT services, licenses, and outsourcing contracts Sectorial regulations for essential services
  22. 22. Dumpster diving 5 Ensure physical documents and drives are safely destroyed
  23. 23. Ensure how backups are done and retain for data in the cloud Due diligence for cloud
  24. 24. Ensure who has access to the data in the cloud application Due diligence for cloud
  25. 25. Security settings in the cloud app are aligned to the internal policies Due diligence for cloud
  26. 26. Undestand the locations of the data in transit and at rest for privacy Due diligence for cloud
  27. 27. Request to separate company data from the cloud application to minimize risks Due diligence for cloud
  28. 28. Checklist model https://www.microsoft.com/en/trust- center/compliance/due-diligence-checklist Due diligence for cloud
  29. 29. Due diligence for cloud
  30. 30. Operators of essential services should have risk-based IT and compliance controls with international standards NIS Directive
  31. 31. Operators of essential services should detect and report securitity breaches without undue delay NIS Directive
  32. 32. Secure network NIS Directive Secure systems Continuity plans Incident response Penetration tests 3rd party management
  33. 33. Ensure clients read and accept the privacy policy before they provide personal data eCommerce compliance
  34. 34. Ensure customers are informed about the uses of the cookies eCommerce compliance
  35. 35. Verify that delivery periods, payment methods and cancellation options are communicated eCommerce compliance
  36. 36. Control that the clients can correct and accept the order in local language eCommerce compliance
  37. 37. Verify that prices include clear shipping costs and taxes eCommerce compliance
  38. 38. Monitor contracts and license payments for used software Computer crime
  39. 39. Protect the intellectual property of 3rd parties by employees and contractors Computer crime
  40. 40. Prevent and detect installed software for fraud and hacking abuse Computer crime
  41. 41. Computer crime
  42. 42. Data loss prevention tools prevent exfiltration with forensic evidence Tools
  43. 43. Secure email gateways can filter bulk phishing emails Tools
  44. 44. A data classification policy can ensure compliance while preventing risks Tools
  45. 45. eDiscovery helps to review the record of processing activities for GDPR compliance Tools
  46. 46. Enhanced multi-factor authentication prevents security breaches Tools
  47. 47. Our modular program Compliance Culture Compliance risks Program operations Privacy compliance Control assurance Blended
  48. 48. Our
  49. 49. Case method

×