20180226 visn vpdsf steps 3 4 5 security risk management v1

59
1

Upload: others

Post on 25-Dec-2021

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

1

Page 2: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

2

Page 3: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

3

Page 4: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

4

Page 5: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

5

Page 6: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

RachelDixonwastheformerheadofdigitalidentityprojectsattheDigitalTransformationAgencyandisnowresponsibleforprivacyanddataprotectionintheofficeoftheVictorianInformationCommissioner

Rachelhashad“adiverseandimpressivecareerholdingseniorpositionsintheprivatesectorforAustralianandInternationaltechnologycompanies,wheresheledlargeteamsanddevelopedexpertiseintheareasofdata,privacy,cybersecurityandinformationsecurity”

WelcomeRachel

6

Page 7: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

7

Page 8: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Tospeaktoyouaboutconsideringinformationsecurityinriskmanagement,wehaveJonathonMasom fromtheVictorianManagedInsuranceAgency(VMIA)

WelcomeJonathon.

8

Page 9: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

9

Page 10: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

10

Page 11: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

11

Page 12: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

12

Page 13: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Theconceptofriskisrelatedtootherconceptswhichhaveaslightlydifferentemphasis.Anissue:Apresentproblemorconcerninfluencingorganisationalobjectives.Ariskcanbecomeanissue,butanissueisnotarisk!Ahazard:Anythingthathasthepotentialtoharmpeople,property.Ariskariseswhenitispossiblethatahazardwillactuallycauseharm.Anevent:Anoccurrenceorchangeofaparticularsetofcircumstances.Aneventcan:Beoneormoreoccurrences,andcanhaveseveralcausesConsistofsomethingnothappeningSometimesbereferredtoasan‘incident’or‘accident’.Withoutconsequencescanalsobereferredtoasa‘nearmiss’.

Anincidentis:Aneventorcircumstancewhichcouldhave,ordidleadto,unintendedand/orunnecessaryharm toapersonand/oracomplaint,lossordamage.

13

Page 14: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

14

Page 15: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

15

Page 16: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

KeyMessage

Riskmanagementisnota‘nicetohave’- agencieshavelegislatedobligationswithrespecttoriskmanagementandasanemployeeyouneedtobeawareofwhatthoseobligationsareandoperatewithinthem.

Agenciesareexpecttoattestintheirannualreportsthat:they have risk management processes in place consistent with the Standard (or its successor); these processes are effective in controlling risks to a satisfactory level; and a responsible body or Audit committee verifies that view.

AgencieshaveobligationswithrespecttoRiskManagementthatcomefromstandingdirection4.5.5.andsupportedbyVGRMF

Keypoints:

The Board or Accountable Officer:

Is ultimately responsible for the risk management framework.

Must ensure that it understands its responsibilities and has in place a mechanism to assure itself that it is meeting those.

May choose to delegate some responsibilities to a committee or Executive and senior management.

Delegation of responsibilities does not negate the Board’s or Accountable Officer’s responsibilities and accountabilities with respect to risk management.

• Aboardisultimatelyresponsibleforoversightoftheriskmanagementframework

UnderthePublicAdministrationAct2004(s.81(1)(b))aBoardofapublicentitygovernedbyDivision2ofPart5ofthePublicAdministrationActmustinformtheresponsibleMinisterandtherelevantDepartmentHeadof:

16

Page 17: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

17

Page 18: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Talk through the three VMIA’s model RM framework: key elements – Risk Governance, Resources & Capability and Process. “Process” will be dealt with in more detail later in the training.

Also highlight the link to an agency’s overall corporate governance and its corporate planning process.

The Risk Management Framework includes a set of components that provide the foundations and organisational arrangements for designing, implementing, monitoring, reviewing and continually improving risk management throughout the organisation.

A risk management framework is not one discrete policy or document, it comprises the totality of the structures, policies, strategies, procedures and resources within an organisation that support risk management. Each organisation is unique and must ensure that a risk management framework is implemented and appropriate to the activity, size and complexity of the organisation, aligns with the defined risk profile and meets legislative or government policy requirements.

Q.Whatdoyouknowaboutyourorganisation’sriskmanagementframework?

18

Page 19: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Agencies must adopt the approach outlined in this VGRMF and have in place a risk management framework to provide for consistent risk management practices across the public sector; which is aligned with the AS/NZS Standard or its successor.

A Risk Management Framework provides:

Systematic approach to risk identification & management.

Consistent risk assessment criteria.

Accurate and concise risk information, for decisions.

Cost effective and efficient risk treatment strategies.

Ensure risk exposure remains within acceptable level.

18

Page 20: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

19

Page 21: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

20

Page 22: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Refer participantstothetemplatetowardsthebackofthePG.

21

Page 23: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

22

Page 24: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

GroupActivity– Card“WriteaRisk”

Theaimofthisistogetthemtopracticeidentifyingafewrisksbeforewegetintoriskassessmentandevaluation

TherearevaryingwaystoidentifyariskandtheStandarddoesn’tprescribe1way.Howariskisdescribedwillinfluencehowitwillbeaddressedorunderstood.Theriskneedstoreflectwhatisusefulandmakessensetopeoplewhoarereadingit.Forexample,itisnogoodsaying‘OHS’isariskasitistoobroad.

Therearecategoriesofrisksthatanorganisationputstogethertohelpmakesenseofrisk.

23

Page 25: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

24

Page 26: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

25

Page 27: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

26

Page 28: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

27

Page 29: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

28

Page 30: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

29

Page 31: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

ThankyouJonathon

NowIampleasedtowelcome AnnaHarriswherewewillcoversteps3-5oftheVPDSF5stepactionplaninmoredetail

30

Page 32: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

TheVPDSFfivestepactionplanneatlytiesinwiththe existingriskmanagementprocessasJonathondiscussedtoassistyouinidentifyingyoursecurityrisks.Itisnodifferenttoyourcurrentriskmanagementprocess.

Soletsrevisesteps1and2brieflyandwheretheyfitin…

31

Page 33: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Steps1and2havethebeautyofassisting2 fold.

Firstyouhavealreadyundertakensteps1and2toidentifyALL theinformationhandledinyourorganisationandundertakenavaluationassessmentonthesewhichwillformpartofestablishingyouroverallriskcontextwhenyoulookattheriskmethodologyi.e.internaloperatingenvironment(organisationalcontext)alongwithotherinternalandexternalfactorsaffectingyourorganisationsuchasregulatoryandoperationalrequirements.

Second,thesetwostepsalsoplayapartintheriskidentificationstageoftheriskassessmentprocesswherebyyoutaketheinformationassetsthatyouhaveidentifiedinstep2asthemorecriticalinformationinyourorganisation.Thisisaprioritisationstepsoyoucanfocusonthemoreimportantassetsandundertaketheriskassessmentprocessontheseratherthanallyourassets.Wewilltouchuponthisalittlemorefurtherinthepresentation.

Formoreinformationregardingtheactual step1and2processrefertoourpublishedinformationsecuritymanagementcollectionandcheckoutourSeptemberVISNforumrecording(availableonourwebsite)

32

Page 34: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Thefocusofthissessionaresteps3,4and5ofthefivestep actionplanwhereyoutaketheinputfrombothsteps1and2aswelltheVPDSSselfassessmentprocessthatorganisationsareaskedtoundertakewhereyoumayhaveidentifiedsomegapsyouwishtoriskassessiftheycannotbeimplemented.

Thesethreestepsfocusonidentifyingandassessingyoursecurityrisks,makinggoodchoicesonwhichsecuritymeasurestoapplytoprotectyourinformationandmanagingtherisksacrosstheinformationlifecycle

33

Page 35: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Howdoyoucompletethis?Aswellasmakingsureyoufollowyourorganisationsexistingriskmethodology,wehavetriedtoassistyoubydevelopingtheassurancecollectionpublishedonourwebsitewhichcontainsalltheanswersandalsoincludesexamplesandsomeappendicessuchas- sampletemplatessuchastheriskassessmentandtreatmentplanwhichwewill

discussfurther,theVPDSSselfassessmentand- Summariesofthevariousassessmentsteps

Theinformationcontainedinthiscollectionwillassistyouincompletingsteps3– 5oftheVPDSF5stepactionplan

34

Page 36: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Sowhydoweneedtodothis?Nowthatyouknowwhatinformationyouhaveanditscorrespondingvaluetoyourorganisation,youcanidentifythesecurityriskstoyourmoreimportantassets(yourcrownjewels)soyoucanensureeffective,efficientandeconomicinvestmentinsecurity.

ThevalueofthisexercisetoyourorganisationwhichTonywilltouchuponinhispresentationincludes• providingcontextandmeaningoftheevent,causeandimpactforeachrisk for

ongoing managementandoversight• assistingindirectingoutcomesoftreatmentplanning• providingmeaningfulinformationforreporting• reducingoverorunderinvestmentinmeasures,and• aligningthe‘uncertainty’tothebusinessobjectives

Lastly, theotherplusisthatafterthisprocessyouwillhavecompletedsomeofyourobligationsunderthePrivacyandDataProtectionActincludingthesecurityriskprofileassessment,SRPAandthedetailedprotectivedatasecurityplan,PDSP

35

Page 37: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Tothatend,toassist withtheriskassessmentstage,Chapter1AppendixAoftheAssuranceCollectionhasasampleSRPAtemplatethatorganisationswhodonothaveariskregistercanadoptandthosewhodohavearegistercanusetocheckagainst.

FeelfreetocontinuetouseVMIA’srisktemplatesaswellifthesearealreadyusedwithinyourorganisation.Thisisjustanadditionalresource

36

Page 38: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

TheriskmanagementprocessoutlinedinChapter1oftheAssurancecollectionfollowsthesameriskmanagementprocessastheinternationalstandard31000thatJonathondiscussed.Wedidnotsetouttodevelopsomethingbespoketosecuritythateveryoneneededtolearnabout.Thesameriskprocessisfollowedtoidentifythesecurityriskstoyourinformationasotherrisksinyourorganisationsuchasfinancial,OHSrisksetc.

37

Page 39: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Soletsstartatthestart- riskidentificationwhichisoutlinedinsection10ofthecollection.Letsworkourwaydown

Nowthatyouhavecompletedsteps1and2toestablishyouroverallinformationriskcontext,itstimetoselectthecrownjewelsortheinformationwiththehighervalue(morecritical)informationassetstofocuson,andThepossibleeventsthatmayoccurtothese,Thepotentialcausesoftheseevents,Thepossibleimpactswhichhavealreadybeenidentifiedinstep2,soyoucankeepthatinyourbackpocketAndthesewillenableyoutoformulateyourriskstatement

Soletswalkthroughanexample…

38

Page 40: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Thebowtieapproachisonewaytoassistwithformulatingyourriskstatement.It’sagreatvisualisation tooltoidentifythepossibleriskscenariosforaparticularevent

Itstimetotelltheriskstory…

Whenyouarelookingatariskevent(inthecentreofyourbowtie)foryourmostcriticalinformationthatyouhaveidentified,itmaybesomethinglike- unauthorisedaccessleadingtocompromiseoftheinformation(whetherthat’sa

compromisetoeitheritsconfidentiality,integrityoravailabilitymaybetheft/modification/disclosure/destruction)

Intermsofcausestotheleftofthebowtie,youarelookingathowthiseventmayeventuatebeitnatural,accidentalordeliberate.TheInternationalStandardISO27005hasalistofthreatsinitsAnnex.Forexample,thisriskeventmayoccurdueto:- Adisgruntledemployee- Maliciousoutsider- Opportunisticcontractor- Anaturalweatheroccurrence

Theconsequencesontherighthandsidethankfullyhavealreadybeentakencareofforthisassetviayourbusinessimpactlevelvaluationassessment(Step2)soyouplug

39

Page 41: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

theoutputsoftheaffectedcategoriesthatgaverisetothehighervalueratinginhere.Forexamplethiseventmayresultin:• Personalinjury• Complianceissues• Financialloss

Bringthistogethertonowformulateyourriskstatement.Forexample,TheriskofunauthorisedaccessleadingtodisclosureofinformationCausedbyamaliciousoutsider(upsetabouttheorganisationsstanceonatopic)/oramaliciousinsiderupsetaboutbeingoverlookedforapromotionandexploitingasystem/otherpersonnelResultinginharmtoanindividualssafety/lossofpublicconfidenceandtrust/financialloss

Whatyoumayfindisthatyouridentifiedsecurityrisksarenotallthatdifferenttoyourneighbour,butwhatmaydifferisyourinternalriskcriteriatoratetherisks,yourorganisation’srisktolerance,thecurrentcontrolsyouhaveinyourenvironmentandthecontrolsyouplantoimplementtomitigate/reducetherisk.

39

Page 42: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Soyouhaveyourriskstatement,letsmovetoriskanalysisItstimetoratethelikelihoodofthisriskoccurringunderstandingthecurrentcontrolsyouhaveinplaceandthelevelofconsequencee.g.insignificantvsmajor.

Generally,thecontrolsyouhaveinplacewon’tnecessarilychangetheimpactleveliftheriskwastoeventuatebutwillaffectwhethertheriskactuallyoccursinthefirstinstancei.e.whatisthelikelihoodofthiseventhappeningwiththecurrentcontrols?e.g.rare,possible,almostcertain

Werecommendyouuseyourorganisationsenterpriseriskcriteria/matrixtocompletethissteptoarriveatyourcorrespondingriskrating.

Weoftengetthequestion,whatisthedifferencebetweenthebusinessimpactlevelratingsinstep2andtheconsequencesratingtableusedinrisk?TheBILslookspecificallyattheimpactrelatedtothecompromiseoftheconfidentiality,integrityandavailabilityCIAofinformationandarecloselyalignedwithotherBILtablesonpurposetoenableinformationsharingacrossjurisdictions.Consequencecriteriatakeintoconsiderationotherfactorsincludingtheorganisation’s tolerances.Werecommendthatbusinessimpactsaremappedtoyourorganisation’sriskconsequencecriteria.Whilstnotalwaysaneasymatch,thecategoriesidentifiedintheBILtablearecoveredmoreloosely/broadlyinriskcriteriasoamappingofsortsshouldbemadetoenabletheapplicationofyourenterprise

40

Page 43: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

riskframeworktoyourinformationsecurityrisks.

Thebusinessimpactlevelyoucameupwithinstep2whendoingyourvaluationassessmentforthisassetcanbeusedtomaptoyourconsequencecriteria.Section10.2.2intheCollectiondiscussesaligningthebusinessimpactlevelswithyourriskconsequencecriteriasoyoucanmakesuretherisksratingsforyourinformationassetsareproportionatewithyourotherrisksinyourorganisation’sriskframeworkandapplicationoftreatmentoptionsisconsistent.

40

Page 44: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

TheriskevaluationprocessisnodifferenttonormalriskmanagementandalsocoveredintheVMIApracticeguideandassurancecollectionsowewillquicklygooverthis…

10.3.1RisktreatmentoptionsThefourpotentialoptionsfortreatingeachriskarethesameasnormalriskmanagementofaccepttheriskasis,avoidorsharetherisk,orreducetheriskbyaddingadditionaltreatmentoptions

10.3.2RiskappetiteRiskappetiteistheamountandtypeofriskthatyourorganisationiswillingtotaketoachieveitsobjectives.Riskappetitewillvaryfromorganisationtoorganisation,anditinfluencesandguidesdecision-making.Riskappetitemayalsovarywithinyourorganisationdependingoncriticalityofinformation/servicesthatmaybeaffectedbytherisk.

10.3.3PrioritisationofrisktreatmentTodeterminewithwhaturgencyyoushouldaddressrisks,theymustfirstbeprioritised.Riskswiththehighestriskratingarenormallyattendedtofirst.Typically,additionalconsiderationsmayinclude:safety– whataretheimplicationsiftheriskisnotaddressed?cost– howmuchwillitcosttoreducetherisk(andwillthebenefitsoutweighthe

41

Page 45: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

expenditure)?reputation– whatisthelikelyeffectonreputationiftheriskisnottreated?legalobligations– istheorganisationlikelytobeunabletomeetitslegalobligationsiftheriskisleftinitscurrentstate?occurrence– whichrisksaremorelikelytooccur?whichyouwouldhaveidentifiedwithyourlikelihoodrating(tacklethe‘almostcertain’ onesfirst)

41

Page 46: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Lastly,youhavereachedrisktreatment whereyouidentifypossiblesecuritymeasures acrossthesecuritydomainsof- Information- Personnel- ICT- Physical

Theymay beadditionalequipment,strongerpersonnelscreening,specificcontractclauses,governancearrangements,policiesandprocedures,training…

TheVPDSSelementsmayalsoassistheretoidentifywhatmeasurestoconsiderandtheyarenotalwaysITcontrols!

Andthen,onceyouhaveselectedyoursecuritymeasurestomitigatetheriskfromoccurring,re-assessthelikelihoodandconsequencetogettheresidualriskforacceptancebymanagement

42

Page 47: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Nowthatyouhavealistofsecuritymeasurestoimplement fromtheriskassessmenttominimisetheriskstoyourinformationtoamanageablelevelforyourorganisation,extractthislistofsecuritymeasuresandpopulateyourdetailedprotectivedatasecurityplan(PDSP)whichisintheAssuranceCollectionidentifyingdetailssuchasthe- implementationplan- Implementationowner- TyingitbacktocorrespondingVPDSSelementtohelpyouwithyourreporting- AnyprojectsponsorsifitsnotaBAUactivity- Budget- Status- Duedate

YoushouldalsoaddthegapsofelementsnotimplementedthatwereidentifiedinyourVPDSSself-assessmenttothistreatmentplan(ifnotalreadylisted)sotheyareintheonedocument.

ThiswillensureyouhaveanapprovedsecurityprogramforthenextperiodtofocusyoursecurityinvestmentandyoualsofulfilyourdetailedPDSPobligations.

43

Page 48: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Aspartofthe lifecycleandthefinalstepinthe5stepactionplan,isthereviewstage.

Rememberthisisnotasetandforgetexerciseandtheserisksshouldbemanagedwithregularreviewsacrosstheinformationlifecycle

Triggersforthisreviewmaybe:• Changeofbusinesscontexte.g.machineryofgovernment• Additional/removalofinformationasset• Regularriskreviewcycle• Incidentwheretheriskhaseventuated

Iftheserisks arefedintoyourenterpriseriskregisterthiswillbeincludedaspartofthisexercise.

Thefirsttimethe5stepactionplanisdone,itwillbequiteabigtaskbutoncethehardyardshavebeendonehopefullyitwillgeteasiereachtimeitisundertakenandwitheachreview.

44

Page 49: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

AndnowtohearfromaVPSagency’sexperiencewiththefivestepactionplan,wearepleasedtowelcomeTonySmithfromEastGippsland Water.ThankyouTony

45

Page 50: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

ThankyouTony andbeforewefinishupandtakequestions,Laurencia willprovideanupdateontheupcoming2018reporting obligations

46

Page 51: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

AfterhearingfeedbackfromexecutivesacrosstheVPS,ourofficehaspublishedahigh-levelProtectiveDataSecurityPlan(PDSP)withbuiltinattestationfororganisationstousetoreporttousinAugustthisyear.

Thisisessentiallyanexecutivesummaryofthedetailedtemplatesprovidedinourassurancecollection.Thiswillmakeiteasierforyourexecutivetosignoff.

47

Page 52: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Andhereisonewepreparedearlier…Svenhaswrittentoagenciestoadvise ofthenewreportingtemplatethatwillneedtobesubmittedtoourofficeinAugust2018.

48

Page 53: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Aspartoftheupdatedreportingtemplates,wehavealsoprovidedoptionsfororganisationreportingtoourofficesuchassingleormultiplereporting.

Thereportingoptionsintemplatearejustthat‘OPTIONS’!TheoptionsaredesignedtoreflecttheuniqueoperatingarrangementsthatexistacrossVictoriangovernment.Thisincludesgovernancestructuresthatoftenexistbetweenlargerleadagenciesandsmallerorganisationsthatfallwithintheleadagency’sportfolioofresponsibilitiesandtheprovisionofsharedresources(includinginformationtechnologyandcorporatefunctions).Italsoprovidesanopportunityforcollaborationacrossagenciesorbodiesthatperformasimilarfunction.

Singleorganisationmodel – AnorganisationsubmitsahighlevelPDSPandprovidesanattestationonitsownbehalfonly.Multipleorganisationmodel– AnorganisationsubmitsaconsolidatedhighlevelPDSPandprovidesanattestationonitsownbehalf,andforandonbehalfofoneormoreadditionalpublicsectoragenciesorbodies.

ThemultipleorganisationmodelmaybeusedinaportfoliosettingwhereagenciesorbodiesfallwithintheportfolioofresponsibilitiesofaDepartmentorwhereanumberoforganisationsofasimilarformorfunctionchoosetoconsolidatetheirefforts. Whilethisapproachwillassistyouinmeetingyourreportingobligations,your

49

Page 54: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

publicsectorbodyHeadisstillaccountablefortheprotectionofitsinformationassets.Accountabilitycannotbetransferredoroutsourced.

49

Page 55: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Beforeweopenthefloortoquestionsfromtheaudienceandthosethathavecomeinviaslido,theseareahandfulofquestionswecommonlyreceiveinthedataprotectionbranch

50

Page 56: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

DoIneedtocompletethetemplatesinthecollection?ThePDSPandVPDSFself-assessmenttemplatesintheassurancecollectionwillactuallyhelpyoutocompletethenewreportingtemplates.Thinkofthemasthedetailtoenableyoutowriteyourexecutivesummaryforyourpublicsectorbodyheadandrelevantcommitteestogetahighlevelunderstandingofyoursecuritypostureandtheplanstoimprovethis.

WhathappensifIdon’t?Withoutcompletingthesemoredetaileddocuments,itwillbedifficulttowritethesummaryfortheexecutivetoattestasthesewillprovideyouwithreasons/explanations/justificationforwhyandhowthesecuritystatuswasderived.Thesedocumentswillalsoberequestedbyourofficeintheeventweconductoneofourassuranceactivitiesundertheassurancemodele.g.walkthrough,reviews.

DoIneedtobecompliantby2018?Westillgetorganisationscallingusaskingiftheyneedtobecompliantwiththestandardsbymidthisyear?Tobecompliantwiththelegislation,yourorganisationneedstosubmitthehighlevelPDSPandattestationtoouroffice– thatisthecompliancepart.Intermsofwhetheryouneedtohaveall18standardsfullyimplementedbyAugust2018,thesimpleanswerisNO,andhopefullytheexecutivesummaryreportthatissubmittedtoourofficere-iteratesthatthisisjustaplanofyoursecurityactivitiesforthenexttwoyearstoimproveinformationsecurityinyour

51

Page 57: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

organisation.

WhataretheVPDSSelements?Aretheymandatory?WeintroducedtheelementsintotheVPDSStoassistorganisationswiththebaselinemeasurestheyshouldconsiderwhenimplementingtheStandards.Thesearenotadditionalmeasures,alltheyareisaconsolidatedextractfromeachofthereferencelibrarieslistedundereachstandard.Thishelpsorganisationstonothavetotrawlthroughalltheliteraturetodeterminethekeyactionstomeettheintentofeachstandard.Inawaytheyaremandatory– theonesthatyoudeterminetobeapplicabletoyourorganisationwillbetheonesweexpecttoseeoperatinginyourenvironmentifyoureportedfullcompliancetoouroffice

Whatisaninformationsecuritylead?Asmanyofyoumaybeaware,inthesecondhalfof2017,ourofficesoughtnominationsforaninformationsecurityleadfromeachorganisationtoenableustohaveapointofcontacttoliaiseoninformationsecuritymattersincludinginformingthemofnewmaterialweproduce,upcomingeventssuchastheVISNandanychangestotheframework.This‘lead’shouldnotstopothersfromcontactingus.Wewillcontinuetoansweranysecurityenquirieswereceive.Ifyourorganisationdoesnotwantanyoneelseotherthantheleadtocontactus,thisisaninternalgovernanceissueforyourorganisationtoworkout.Ifyourinformationsecurityleadwouldlikevisibilityofthetypeofquestionsthatcomefromotherswithinyourorganisation,wecanincludetheleadinourreturncorrespondence.Wedoencourageorganisationstokeepusinformedofanychangestoinformationsecurityleadssowecanensureyourorganisationisgettingthelatestinformationfromus.

51

Page 58: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

Andtobookintoarisktrainingsession,contactVMIA

52

Page 59: 20180226 VISN VPDSF Steps 3 4 5 Security Risk Management V1

53