case study from unc charlotte...case study from unc charlotte presented by: vienna morrill gain...

22
GAIN CONTROL berrydunn.com IT SECURITY RISK ASSESSMENT CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill

Upload: others

Post on 24-Jun-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

GAIN CONTROL berrydunn.com

IT SECURITY RISK ASSESSMENT

CASE STUDY FROM UNC CHARLOTTE

Presented by:Vienna Morrill

Page 2: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

GAIN CONTROL berrydunn.com

VIENNA MORRILL, MSA, CISA

ManagerBerryDunnManagement and IT Consulting Group

Page 3: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

3

AGENDA

1. What is risk?2. Why do an IT Security Risk Assessment? 3. What does the IT Security Risk

Assessment process entail?4. What elements of this approach should

you apply in your organization?

Page 4: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

4

Page 5: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

5

STACKING UP THE RISKS

Winning PowerBall Grand Prize (1 in 175.2M)

Attacked and killed by shark (1 in 3.7M)

Getting a hole in one (1 in 12,750)

Getting struck by lightening (1 in 12,000)

Being audited by the IRS (1 in 175)

Having a security breach at your organizationin the next two years (1 in 5)

Page 6: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

6

COST OF A DATA BREACH

Estimates range from $0.58/record (Verizon Data Breach Investigations Report) to

$201/record (Ponemon Institute Report).

Page 7: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

7

COST OF A DATA BREACH

Source: Verizon 2015 Data Breach Investigations Report

Page 8: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

8

Page 9: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

9

CASE STUDY

Information Technology Security Risk Assessment

Page 10: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

10

THE RISK ASSESSMENT PROCESS

Page 11: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

11

Page 12: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

12

THE QUESTIONNAIRE Included 21 Risk Areas:

1. Systems and Applications

2. Data Storage3. Responsibility and

Oversight4. Information Security

Training and Awareness

5. IT Security Incident Response

6. Access Controls 7. Audit Logs8. Remote Access9. Change Management10. Incident Management11. Physical Security12. Data Transmission13. Service Provider/

Vendor Due Diligence14. Disaster Recovery

Planning15. Data Backups16. Copiers and Multi-

Function Devices17. Hardware Disposal18. Mobile Devices19. Compliance20. Data Protection21. Credit Cards/Payment

Information

Included 21 Risk Areas:

1. Systems and Applications

2. Data Storage3. Responsibility and

Oversight4. Information Security

Training and Awareness

5. IT Security Incident Response

6. Access Controls 7. Audit Logs8. Remote Access9. Change Management10. Incident Management11. Physical Security12. Data Transmission13. Service Provider/

Vendor Due Diligence14. Disaster Recovery

Planning15. Data Backups16. Copiers and Multi-

Function Devices17. Hardware Disposal18. Mobile Devices19. Compliance20. Data Protection21. Credit Cards/Payment

Information

Page 13: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

13

Page 14: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

14

Page 15: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

15

THE IT SECURITY RISK ASSESSMENT MATRIX

Page 16: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

16

HEAT MAPS

Page 17: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

17

Page 18: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

18

OUTCOMES FOR UNC CHARLOTTE

Fostered Collaboration

Developed a Sustainable Approach

Increased Awareness for IT Security Risk

Established Priorities for Addressing Gaps

Page 19: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

19

Page 20: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

20

TAKEAWAYS

Engagement of stakeholders and

executive level support are critical.

It’s a risky world and security breaches are

expensive.

Conducting an Information Security

Risk Assessment doesn’t have to be

complicated.

An IT security risk assessment is not an

audit.

Page 21: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

21

QUESTIONS

Page 22: CASE STUDY FROM UNC CHARLOTTE...CASE STUDY FROM UNC CHARLOTTE Presented by: Vienna Morrill GAIN CONTROL berrydunn.com VIENNA MORRILL, MSA, CISA Manager BerryDunn Management and IT

GAIN CONTROL

We are always available for your questionsINTERESTED IN MORE?

berrydunn.com

[email protected]