Top Banner
Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016
42

Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Mar 18, 2018

Download

Documents

vunhan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Cybersecurity:

Considerations for

Internal Audit

Gina Gondron

Senior Manager

Frazier & Deeter

Geek Week

August 10, 2016

Page 2: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Agenda

• Key Risks

• Incorporating Internal Audit

• Resources

• Questions

2

Page 3: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

San Francisco ISACA Conference

Atlanta 404.253.7500 I Nashville 615.259.7600 www.frazierdeeter.com 3

Page 4: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Key Risks

4

Page 5: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Key Risks

• Board and Management:

– CIO, CAE, organizational leaders agree: Cyberthreats not only and IT problem, but fully

fledged business risk

– Top 10 risk Separate from business interruption; loss of

reputation and brand value; theft fraud and corruption

% of IT focus increasing

5

Page 6: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Key Risks

• External

– Stolen credentials

– Remote access

• Internal

– Employees

– Business partners

6

Page 7: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

And in this corner…

Atlanta 404.253.7500 I Nashville 615.259.7600 www.frazierdeeter.com 7

Page 8: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Key Risks

• Nature of attack:

– Denial of service attacks (DoS)

– Data security breaches

• Focus of attack:

– Credit card data (e.g. retail)

– Exploration data (e.g. oil and gas)

– Intellectual property (e.g. technology, strategic information)

8

Page 9: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Key Risks

• Threats

– Rapidly evolving

– Increasingly sophisticated

– Methods continue to improve

9

Page 10: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Cost of Cyber Crime

10

Source: 2015 Ponemon Institute Cost of Cyber Crime Study

Page 11: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

11

Page 12: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

Atlanta 404.253.7500 I Nashville 615.259.7600 www.frazierdeeter.com 12

Page 13: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

Persistent threat

Exposures

Security posture

Audit procedures

Assisting management

Resource application

13

Page 14: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

Drive change

Be engaged at the strategic level:

– Understand board’s approach to security

– Better understand the value of business-

critical data

– Being involved with new IT implementations

14

Page 15: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

Key Elements:

– Leadership and governance

– Technical and operational controls

– Training and awareness

– Information risk management

– Response planning

– Crisis management

15

Page 16: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

Auditing defense mechanisms:

– Internal education/communication

– Secure firewalls

– Up-to-date antivirus software

– Open communication to ISPs

– Effective network monitoring

– Rapid response plans

– Patch management

16

Page 17: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Patch Management

17

Source: Verizon 2015 Data Breach Investigations Report

Page 18: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

Auditing defense mechanisms:

– Password management

– Data categorization, segregation, access storage, and retention process

– Suppliers’ cybersecurity practices; service agreements

– Cloud services

– Data security controls

– Corporate insurance coverage

18

Page 19: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

IT Audit Resources:

– Perform business and IT impact

analysis and risk assessment

– Cyber Risk assessments

External input on threats facing industry

Current attack methods

Cyber “assurance”

White-hat hacking

19

Page 20: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

IT Audit Resources:

– People, process and technology controls

– Incident response program

– Help optimize controls to prevent or

detect cyber issues

– Ongoing monitoring of changing cyberrisk

– Working with systems administrators

20

Page 21: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

Atlanta 404.253.7500 I Nashville 615.259.7600 www.frazierdeeter.com 21

Page 22: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

Internal Audit Resources:

– Drive discussion around risk and mitigation strategy

– Independently assess and prioritize cyberrisks

against other critical enterprise risks

– Assess effectiveness of preparation

– Identify and monitor issues and risk related to

emerging technology deployments

22

Page 23: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

Supporting the Audit Committee:

– Five Principles:

1. Understanding and approach to cybersecurity

2. Legal implications

3. Access to expertise

4. Staffing and budget

5. Risk avoidance

23

Page 24: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

Focus on: – Specific types of attacks they face

– Weaknesses inherent in business practices, culture, IT systems

– Educating AC/Executive Management: Business risk

Risk to data

Critical assets

Nature of network traffic

– Prevention, Detection and Response

24

Page 25: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

Questions to ask: 1. Funding for people, processes, technology?

2. Critical Systems Identified?

3. Connections to other systems

4. Who relies on data?

25

Page 26: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Incorporating Internal Audit

Questions to ask: 4. Who has access?

5. Audit logs maintained/reviewed?

6. Cyber response: 1. Systems prioritized

2. Excercizes documented?

3. Support contracts in place?

7. Does staff receive training?

26

Page 27: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Resources

27

Page 28: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Where are the Resources?

• FDIC – 60 IT Auditors for 4,000 financial

institutions

• OCC – 100 IT Auditors for 1,500 institutions

• NCUA – 50 IT Auditors for 6,200 credit unions

• Federal Reserve – 85 IT Auditors for the

5,500 institutions it monitors

“Too many threats and too few

professionals.”

www.frazierdeeter.com 28

Page 29: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Where are the Resources?

www.frazierdeeter.com 29

Page 30: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Performing Risk Assessments

Atlanta 404.253.7500 I Nashville 615.259.7600 www.frazierdeeter.com 30

IT Security Architecture

Threat & Vulnerability Management

Privacy & Data

Protection

Identity & Access

Management

IT Security Management

Awareness & Education

Risk

Assessment

Areas

• Identify high

risk areas

• Incorporate into

audit plan

Page 31: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Resources

• U.S. National Institue of Standards and Technology (NIST) – Framework for Improving Critical Infrastructure

Cybersecurity

– Consistent and effective evaluation of current security: Processes

Procedures

Technologies

– Links to other security standards and approaches

31

Page 32: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

32

Source: NIST Framework for Improving Critical Infrastructure Cybersecurity http://www.nist.gov/cyberframework/#

Page 33: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

33

Source: NIST Framework for Improving Critical Infrastructure Cybersecurity http://www.nist.gov/cyberframework/#

Page 34: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Resources

Cybercrime

Audit/Assurance Program

• Aligned with the NIST

National Initiative for

Cybersecurity Education

34

http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Cybercrime-Audit-Assurance-Program.aspx

Page 35: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

35

Page 36: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

36

Source: ISACA IT Assurance FrameworkTM (ITAFTM)

Page 37: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Resources

Cybersecurity Fundamentals

Certificate

• Knowledge-based

certificate offered by ISACA

Implementing NIST

Cybersecurity Framework

Using COBIT 5

• Focused on the CSF, goals,

implementation steps and

application

37

Page 38: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

ISACA Certifications

Atlanta 404.253.7500 I Nashville 615.259.7600 www.frazierdeeter.com

38

Page 39: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

39

Page 40: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Nymity Framework

Atlanta 404.253.7500 I Nashville 615.259.7600 www.frazierdeeter.com 40

Comprehensive listing of over 130 privacy

management activities

Structured in 13 privacy management

processes

Jurisdiction and industry neutral

Page 41: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Internal Audit Focus

Evaluating security risk and threats

Data at risk

Secure infrastructure

Monitoring capability

Rapid identification, response,

containment and recovery

41

Page 42: Cybersecurity: Considerations for Internal Audit Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda •Key Risks •Incorporating

Questions?