110 likes | 123 Views
Follow the journey of a new security manager in a decentralized hospital as they tackle the challenges of establishing a comprehensive security program. Learn about the importance of defining, controlling, and monitoring security measures to protect critical applications and services.
E N D
A Year Affair with Security: the Development of a Security Program and Manager Holt, LaurenceProceedings of the 3rd annual conference on Information security curriculum development, 130-135, 2006Presented by Tamera GoodmanMarch 8, 2010
Organization • Introduction • Initial State • Initial Assessment • Define • Control • Monitor • Conclusions
Introduction • New security manager of a global, decentralized hospital • Firewalls and good engineers • No policy • No infrastructure • No governance • No Strategy
Initial State • The initial challenges: • learn enough about the company to define what the business needed to be secure • to create a security program to fulfill this definition • to identify the key corporate IT and business leaders • Meet regulatory compliance deadlines
Control • Human Accounts • Service Accounts • Privileged Accounts • Console Access System • Protect Critical Applications And Services • Prevent critical applications or services from being tampered • Enforce Separation Of Duties • Identify and enforce differing access policies for development, QA and production support groups • Use Only Approved Protocols
Monitoring • “In God we trust, all others we monitor” • Monitoring is not just logging • Witman and Mattord (2006) say, “… the ultimate goal of information security is to achieve nothingness.” • In their 2006 Global Security Survey, Deloitte reports that viruses, worms, and spyware/malware were two of the top sources of external breaches • Despite difficulty, monitoring is vital
Conclusions • The author found that: • definition is the most critical task of a security program • much work already done by others that could be utilized but should not be accepted carte blanche just because it was stated to be good • It’s challenging because the business, threat and technology • environments are constantly changing
Conclusions, cont. • Thank you for your time • Questions and feedback are welcome