isaca&! itsmfitgovernanceconference dublin,11 … · about vigitrust compliance as a service 1...

31
Third Party Assurance ISACA & itSMF IT Governance Conference Dublin, 11 th October 2013 Saturday 12 October 13 (c) VigiTrust 20032013 1 [email protected] www.vigitrust.com

Upload: votruc

Post on 22-Aug-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Third  Party  Assurance    

ISACA  &  itSMF  IT  Governance  Conference  Dublin,  11th  October    2013  

Saturday  12  October  13   (c)  VigiTrust  2003-­‐2013   1  

[email protected]    

www.vigitrust.com  

Page 2: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Today’s  PresentaCon  •  SeDng  the  Scene  •  Why  should  anyone  care  about  Third  Party  Assurance?  •  Focus  on  legal  &  industry  frameworks  requiring  third  party  

assurance  •  2013-­‐2015  Outlook  •  Q&A    

(c) VigiTrust 2003-2013

Page 3: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

About VigiTrust

Compliance as a Service

3 1 2 SECURITY TRAINING & eLEARNING Online training for management and staff

COMPLIANCE, READINESS & VALIDATION Comprehensive online programs to achieve and maintain compliance

SECURITY & GRC SERVICES Professional services to enable and support your compliance process

The 5 Pillars of Security Framework™ Physical Security; People Security; Data Security; IT Security; Crisis Management

Page 4: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

eSEC Portfolio US – Existing

•  HIPAA •  NERC-CIP 101 •  MA 201 •  Understanding Data Breach

Notification Requirements

US  

Existing eLearning Portfolio

eSEC Portfolio EMEA - Existing

•  Data Protection Fundamentals •  Credit Card Security •  Introduction to PCI DSS •  Banking & Fraud •  Green IT & Security •  ISO IT & SDLC •  Security During M&A Process

EMEA  

eSEC Portfolio Generic Training - Existing

•  Info Security 101 •  Mobility & Security •  Security of Social Networks •  Cloud Computing & Security 101 •  Physical Security for Good

Logical Security

GEN.   eSEC Portfolio Technical Training - Existing

•  Secure Coding for PCI DSS •  Introduction to Secure Printing •  Log Management & Security •  Wireless Security

TECH.  

Page 5: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Mathieu  Gorge    CEO  &  Founder,  VigiTrust  

Saturday  12  October  13   (c)  VigiTrust  2003-­‐2013  

European PCI DSS Roadshow

(Disclaimer: Outside Reviewer)

Page 6: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,
Page 7: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

DefiniFons  –  Third  Party  Assurance  in  2013  &  Beyond  •  Going  Back  to  Basics  

–  Third  ParFes  •  Suppliers  (any  type:  IT,  legal,  finance,  goods/services)  •  Partners  •  Internal    suppliers  or  group  partners  

–  Assurance  •  Is  the  code  secure?  •  Is  the  architecture  secure?  •  Is  the  data  that  the  app  is  transmiVng,  storing  or  processing  at  risk?  

–  Two  sides  of  the  same  coin  •  Your  organizaFon  is  another’s  third  party  •  Can  you  demonstrate  your  business  does  not  put  another  one  at  risk  –  security/compliance  

–  2013  •  Most  organizaFons  outsource  some  IT  •  Some  organizaFons  are  less  “tangible”  in  that  they  use  BPO  •  Advent  of  Cloud  CompuFng  

–  And  beyond  •  Because  threats  evolve  and  the  tradiFonal  business  ecosystem  keeps  involving  third  parFes  

–  Some  trusted  –  Some  parFally  trusted  –  Some  untrusted  but  necessary  to  do  business  

 

   

 

 

(c) VigiTrust 2003-2013

Page 8: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

DefiniFons  –  Third  Party  Assurance  from  an  AccounFng  PerspecFve  

•  DefiniFons  &  Key  Terms  –  “The  InternaConal  Standard  for  Assurance  Engagements  No.  3402  (ISAE  3402),  formerly  

SAS  70,  is  an  aYestaCon  standard  issued  by  the  InternaConal  AudiCng  and  Assurance  Standards  Board  (IAASB).  Its  aim  is  to  produce  a  formal  report  on  the  design,  implementaCon  and  operaCng  effecCveness  of  controls  within  a  service  organisaCon”.  

–  What  is  the  ISAE  3402?  ISAE:  •  “is  a  formal  report  on  the  design,  implementaEon  and  effecEveness  of  controls  

within  a  service  organisaCon,  usually  covering  a  period  of  six  months  or  longer  •  is  primarily  used  to  support  the  financial  audit  process  of  enEEes  that  use  external  

service  organisaEons  •  contains  an  independent  accountant’s  opinion  and  management  asserEon  on  the  

design,  implementaCon  and  effecCveness  of  controls  within  a  service  organisaCon  for  the  audit  period  

•  contains  a  descripCon  of  the  service  organisaEon’s  control  environment,  its  control  objecEves  and  the  key  controls  put  in  place  to  achieve  these  objecCves  

•  contains  tests  of  operaEng  effecEveness  performed  by  the  independent  accountant,  and  the  results  of  those  tests  (type  II)  

•  contains  control  consideraEons  that  should  be  employed  at  enEEes  that  use  the  service  organisaEon  

•  is  intended  for  use  by  the  service  organisaEon,  its  customers  and  the  independent  accountants  of  its  customers”  

 Source:    hap://www.pwc.be/en/systems-­‐process-­‐assurance/third-­‐party-­‐assurance-­‐sas70.jhtml    

   

 

 

(c) VigiTrust 2003-2013

Page 9: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

DefiniFons  –  Third  Party  Assurance  from    non  financial  perspecFves  

•  Business  Process  Outsourcing    •  Supply  chain  risk  management    •  Contract  compliance    •  Cloud  compuFng    •  DigiFzaFon  of  Business  Processes  •  Privacy  and  security    •  Regulatory  compliance  and  reporFng    •  Asset  &  IP  Risk  Management  •  Green  IT  

•  Suppliers  of  Key  3rd  Party  ApplicaFons?    •  ApplicaFon  Security  should  be  an  integral  part  of  3rd  Party  Assurance  

Strategy  

 

 

   

 

(c) VigiTrust 2003-2013

Page 10: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

 Quick  Focus  on  ApplicaFon  Security  for  good  3rd  Party  Assurance  -­‐  Aspect  Security  2013  Global  

ApplicaFon  Security  Risk  Report  •  98%  of  applicaCons  presented  at  least  one  applicaCon  security  risk,  

while  the  average  applicaCon  registered  22.4  risks  •  AuthenCcaCon  and  Session  Management  risks  affect  93%  of  

applicaCons  and  comprise  34%  of  applicaCon  vulnerabiliCes,  by  far  the  most  prevalent  applicaCon  security  risk  

•  Compared  to  automated  tools,  manual  code  review  and  penetraCon  tesCng  idenCfy  significantly  more  serious  authenCcaCon,  access  control,  and  encrypCon  risks  

•  Secure  coding  training  and  eLearning  cause  a  significant  improvement  in  prevalence  and  severity  of  the  risks  discovered  in  applicaCons  

•  ApplicaCon  security  risk  profiles  are  remarkably  similar  across  different  industry  sectors  

•  Yet,  applicaCons  are  rarely  part  of  the  3rd  Party  Assurance  process!    

   

 

 

(c) VigiTrust 2003-2013

Page 11: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,
Page 12: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Big  Data  

(c) VigiTrust 2003-2013

Page 13: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Understanding  Database  Risks  Cloud  Risk  for  3rd  Party  Assurance  

•  Technology  Risk  –  StaFng  the  Obvious  –  Virtual  Servers    –  Database  /  Storage  –  The  Internet  

•  Infrastructure  Risks  –  choosing  a  private  cloud  infrastructure  means  that    network  security  is  

effecCvely  under  your  control  –  Risk  is  “miCgated”  –  With  a  public  cloud  infrastructure,  the  operaConal  responsibility  for  

security  rests  with  the  provider,  legal  responsibility  is  with  you  –  ImplicaCon:  you  plan  to  process,  transmit  or  store  sensiCve  data,  you  

need  to  clearly  understand  your  service  providers  stance  on  the  following:  

•  Transparency  •  Privacy  •  Compliance  •  Trans-­‐border  informaCon  flow  

(c) VigiTrust 2003-2013

Page 14: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

•  Cloud   Providers   must   be   capable   of  demonstraFng  the  existence  of  effecFve  and  robust   security   controls,   assuring   that  customer   data   is   properly   secured   against  unauthorized  access,  change  and  destrucFon.  

•  The  key  quesCons  that  should  be  asked  when  choosing  a  service  provider  include:  

   

Understanding  Transparency  

•  How will my data be protected? •  Which (provider) employees will have access to customer information? •  How is customer information segregated? •  What controls are in place to detect and prevent security breaches?

•  Technical Controls •  Policies & Procedures •  User Awareness

•  Is the Cloud Provider helping or hindering with PII/DPA & industry compliance (e.g. PCI DSS)

Page 15: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Cloud  Storage  ConsideraCons  •  Storage  as  a  Service  =  Storage  in  the  Cloud  

–  Your  organizaCons  data  is  stored  in  the  Cloud  whether  you  are  aware  of  it  or  not  

•  Data  ClassificaFon  is  key  for  Cloud,  understanding  your  risk  surface  &  performing  assurance  audits  –  Do  you  have  a  data  classificaCon  policy  staCng  what  can  make  it  to  the  

Cloud  and  what  cannot?  –  Are  you  encrypCng  data  the  right  way  –  remember  PCI  DSS  

•  If  you  don’t  need  it  don’t  store  it  •  If  you  need  it  –  encrypt  it  according  to  Requirement  3.4  –  good  benchmark  for  

storage  technical  security  •  Consider  tokenizing  more  than  payment  data  

–  Ensure  data  is  tagged  so  you  can  retrieve  it  easily  •  DR  consideraCons  •  E-­‐Discovery  requests  

–  What  about  data  held  in  the  Cloud  –  do  you  know  which  is  in  the  Cloud  and  where?  Can  you  access  it?  

(c) VigiTrust 2003-2013

Page 16: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Focon  us  Payments  Industry  –  a  DefiniFon    Payment  security  entails  managing  and  securing  payment  data  across  an   organizaCon’s   full   order   lifecycle,   from   the   point   of   payment  acceptance,  through  fraud  management,  fulfilment,  customer  service,  funding  and  financial  reconciliaFon,  and  transacCon  record  storage.    

 The   presence   of   payment   data   at   any   of   these   points,   whether   on  organizaCon   systems,   networks   or   visible   to   staff,   exposes   the  organizaFon  to  risk.  The  presence  of  payment  data  ….  exposes  the  organizaFon  to  risk.    Therefore  you  need  to  fully  understand  your  own  ecosystem  and  payments  data  flow  

(c) VigiTrust 2003-2013

Page 17: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

PCI  DSS  Lifecycle  

(c) VigiTrust 2003-2013

Page 18: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Why  ApplicaCon  Security  MaYers  for  the  Payments  Industry  Lifecycle  of  a  Credit  Card  TransacCon  

 

Five  Brands   Banks   Payment  Service  Providers  

Merchants   Customers  

Credit Card Transactions

Page 19: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

PCI  DSS  Structure    •  Install & maintain a firewall configuration to protect data

•  Do NOT use vendor supplied defaults for passwords or other security parameter

1.  

12 R

equi

rem

ents

of P

CI D

SS

2.  

3.  

4.  

5.  

6.  

•  Protect stored data

•  Encrypt the transmission of cardholder data

•  Use & regularly update anti-virus software

•  Develop & maintain secure systems & applications

•  Restrict access to data by business need-to-know

•  Assign a unique ID to each person with computer access

•  Restrict physical access to cardholder data

•  Track & monitor ALL access to network resources & cardholder data

•  Regularly test security systems & processes

•  Maintain a policy that addresses information security

Build  &  Maintain  a  Secure  Network  

Protect  Cardholder  data  

Maintain  a  Vulnerability  Management  Programme  

Implement  strong  Access  Control  Measures  

Regularly  monitor  &  Test  

Networks  

Maintain  an  InformaFon  

Security  Policy  

Page 20: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Understanding  PCI  DSS  Controls  •  Available  through  

–  Risk  based  approach  •  Internal  or  12  Requirements  Approach  

–  PrioriCzed  approach  •  PCI  DSS  Controls  can  be  categorized  as  follows  

–  Technical  Controls  –  Policies  &  Procedures  –  User  Awareness  &  Training  

•  Controls  may  include  several  control  points  –  Mix  of  the  above  e.g  technical  control  +  policy  

•  Some  controls  are  inherently  requiring  recurring  tasks,  e.g.:  –  Quarterly  Scans  –  Log  Analysis  –  Yearly  training  

•  What  about  controls  relaFng  to  Third  Party  Assurance  –  3rd  Party  Assurance  idenCfied  as    one  of  the  Key  Change  Drivers  –  Requirement  12.8  –  Third  Party  Assurance    SIG  –  Logging  &  audiCng  controls  throughout  the  standard  

(c) VigiTrust 2003-2013

Page 21: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Required  DocumentaCon  •  Diagrams  and  Data  Flows  

–  Ecosystem  Diagrams  –  Data  Flow  Diagrams    –  Network  Diagrams  

•  Asset  Inventory    •  Acceptable  Usage  Policy  for  staff  •  Access  Control  Policy  •  Firewall  Rules  and  Business  JusCficaCon  for  Rules    •  AV,  AnC-­‐Spam  and  Intrusion  DetecCon-­‐PrevenCon  Policy    •  Hardening,  Log  and  Patch  Management  Policy    •  Back-­‐Up  and  Media  Storage  Policy    •  Security  Assessment,  ApplicaFon  Security  &  Vulnerability  Management  Policy  •  Incident  Response  Plan    •  Management  of  Third  ParFes  Policy    

(c) VigiTrust 2003-2013

Page 22: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Changes  to  Data  ProtecCon  in  the  EU  •  Not  a  direcCve  but  a  single  regulaCon  in  the  EU  

–  HarmonizaCon  at  European  level…but  with  challenges  •  Applies  to  companies  based  outside  in  the  EU  if  personal  data  is  handled  

abroad  by  companies  that  are  acCve  in  the  EU  and  offer  services  to  EU  ciCzens  

•  Right  to  be  forgoYen  •  Controllers  responsibiliCes  

–  Policies  &  procedures  –  Staff  Training  

•  Data  processing  impact  assessment    –  If  any  data  is  likely  to  present  risks  to  individuals  

•  Security  –  Both  processor  and  controllers  must  put  security  measures  in  place  

•  Data  Breach  NoCficaCon  –  Within  24  hours  of  noCcing  the  breach  

•  Data  Portability  (service  providers)  &  Data  Transfers  •  Data  ProtecCon  Officers  

Saturday  12  October  13   (c)  VigiTrust  2003-­‐2013   22  

Page 23: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

HIPAA  /    HITECH  

(c) VigiTrust 2003-2013

Page 24: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

ISO  2700  series  –  Risk  Assurance  &  Security  PerspecFves  

 •  Based  on  the  ISMS  •  4  Levels  of  documentaFon  work  

–  Policies  –  Procedures  –  Work  InstrucFons  –  Records  Documents  

•  Where  is  Risk  Assurance  MenFoned  &  How:  –  CommunicaFon  &  OperaFons  Management  (10)  

•  ProtecCon  Against  Malicious  &  Mobile  Code  •  Security  &  Network  Services  •  Audit  Logging  

–  Access  Control  (11)  •  ApplicaCon  &  InformaCon  Access  Control  

–  InformaFon  Systems  AcquisiFon,  Development  &  Maintenance  (12)  •  Cryptographic  controls  •  Security  In  development  &  support  

–  InformaFon  Security  Incident  Management  (13)  •  ReporCng  &  Management  of  Security  events,  weaknesses  &  incidents  

–  Compliance  (15)  •  Legal  Requirements  &  Audit  ConsideraCons  

(c) VigiTrust 2003-2013

Page 25: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Security  &  GRC  Process  

(c) VigiTrust 2003-2013

SOX   ISO  27000  series   EU  Data  ProtecFon   PCI  DSS   HIPAA   Others  

Regulatory, Legal & Corporate Governance Frameworks

Education, Security & Awareness

Self-Governed

Pre-Assessment

Security Blueprint

for Remediation

Work

Policies  &  Procedures  

Network  &  Hardware  Security  

Pen-­‐  TesFng  &  ApplicaFon  Security  

Specialized  Skills  Transfer  

Official Assessors &

Auditors

Step  1   Step  2   Step  3   Step  5  Step  4  

Page 26: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Understanding  Your  Ecosystem  

ACME  France  

EU  Accountants  For  ACME  

ACME  UK  

EU  Lawyers  for  ACME  

Partner  1  

ACME  EU  HQ  

ACME  LA  

ACME  NYC  

Internet (Including ISPs)

Key High Security Zone: CC Data Suppliers

Acme: Main Hubs

Partners requiring database access

Page 27: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

(c) VigiTrust 2003-2013

Page 28: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Chief Security Officer Project leader for all Security Related Matters

DATA  Sec  

PPL  Sec  

PHYSICAL SECURITY •  Access to

Building

•  Physical Assets

•  IT Hardware

•  Vehicle Fleet

PEOPLE SECURITY •  Permanent &

Contract Staff

•  Partners

•  3rd Party Employees

•  Visitors

•  Special Events Security

DATA SECURITY •  Trade Secrets

•  Employee Data

•  Database

•  Customer Data

5 Pillars of Security Framework™

PHYS.  Sec  

INFRA  Sec  

INFRASTRUCTURE SECURITY •  Networks

•  Remote Sites

•  Remote Users

•  Application Security

•  Website

•  Intranet

CRISIS  Mgt  

CRISIS MANAGEMENT •  Documentation

& Work Procedures

•  Emergency Response Plans

•  Business Continuity Plans

•  Disaster Recovery Plans

OperaFons  Manager,  Security  Staff   HR,  Security  Staff   HR,  IT  Team  &  

Manager   IT  Team  &  Manager   OperaFons  Manager,  IT  Team,  HR  

Best Practice Security Framework for Enterprise

Page 29: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Corporate  Culture  &  Risk  Management  –  The  overall  Picture  

Residual  Risk  Surface  which  needs  to  be  managed  by  your  OrganizaFon  

Risk  Management  &  Safeguards  

Corporate  Values  

Corporate  Ecosystem  

Risk Management Strategy for Internal and/or external Risk Management Teams

DPA, PCI DSS & ISO 27001 compliance

Page 30: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Best  PracFces  for  Third  Party  Assurance  

•  Own  your  Ecosystem  by:  –  Performing  an  asset  inventory,  network  &  applicaCon  architecture  review  –  Mapping  out  ecosystem  actors  &  data  flow  –  including  3rd  parFes!  

•  Data  Management    &  ClassificaFon  –  Ensure  you  have  up  to  date  data  flow  diagrams  –  Classify  all  data  that  comes  from  or  goes  to  3rd  parCes    –  Protect  client’s  personal  data  and  all  sensiCve  data  at  rest,  in  transit  and  in  use  

•  Use  Compliance  as  a  driver  for  3rd  party  assurance  –  Good  guidelines  –  basic  benchmark    –  Not  the  end  game  though  –  security  &  good  governance  is  the  goal  –  Make  it  business  as  usual  –  conCnuous  process  

•  Mathieu’s  Crystal  ball…3rd  Party  Assurance  is  here  to  stay!    

 

   

 

(c) VigiTrust 2003-2013

Page 31: ISACA&! itSMFITGovernanceConference Dublin,11 … · About VigiTrust Compliance as a Service 1 2 3 SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE,

Third  Party  Assurance    

ISACA  &  itSMF  IT  Governance  Conference  Dublin,  11th  October    2013  

Saturday  12  October  13   (c)  VigiTrust  2003-­‐2013   31  

[email protected]    

www.vigitrust.com