Top Banner
ISACA TRUST IN, AND VALUE FROM, INFORMATION SYSTEMS ISACA.ORG ©2015 ISACA. All rights reserved.
23

ISACA - Insurance Institute of India

Nov 24, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ISACA - Insurance Institute of India

ISACATRUST IN, AND VALUE FROM, INFORMATION SYSTEMSISACA.ORG

©2015 ISACA. All rights reserved.

Page 2: ISACA - Insurance Institute of India

Formed in 1969 as an audit organisation, but hasgrown to cover all aspects of IT governance, security,

risk, audit and cybersecurity

Page 3: ISACA - Insurance Institute of India

ISACA FACTS

• Founded in 1969 as the EDP AuditorsAssociation

• More than 115,000 members in over 180countries

• More than 200 chapters worldwide

Business Framework forGovernance and Managementof Enterprise Information Technology

Page 4: ISACA - Insurance Institute of India

SECURING SENSITIVE PERSONAL DATA OR INFORMATION UNDERINDIA’S IT ACT USING COBIT - 5

Chapter 1. What Is Personal Information?Chapter 2. Indian Sensitive Personal Data or Information

(SPDI) Protection RegulationsChapter 3. How COBIT 5 Can Be Used to Secure SPDIChapter 4. Meeting Stakeholders’ Needs for Securing SPDIChapter 5. COBIT 5 Enablers for Securing SPDI

You can download it from www.isaca.org/topic-india

Page 5: ISACA - Insurance Institute of India

Objective of the publication

Securing SPDI is now mandated by India’s IT(Amendment) Act, 2008. This publication helps providean approach to achieve this objective using the COBIT 5framework.

Objective of the publication

Securing SPDI is now mandated by India’s IT(Amendment) Act, 2008. This publication helps providean approach to achieve this objective using the COBIT 5framework.

Page 6: ISACA - Insurance Institute of India

On January 29, 2015, Anthem, Inc. (Anthem) learned of a cyberattack to our IT system. The cyberattackerstried to get private information about current and former Anthem members. We believe it happened over thecourse of several weeks beginning in early December 2014.

What did the cyberattackers access?Accessed information may have included: Names Dates of birth Social Security numbers Health care ID numbers Home addresses Email addresses Work information like income dataAnthem doesn't believe these kinds of information were targeted or accessed: Credit card or banking information Medical information like claims, test results or diagnostic codes

Hackers have stolen information on tens of millions of Anthem Inc. customers, in a massivedata breach that ranks among the largest in corporate history

On January 29, 2015, Anthem, Inc. (Anthem) learned of a cyberattack to our IT system. The cyberattackerstried to get private information about current and former Anthem members. We believe it happened over thecourse of several weeks beginning in early December 2014.

What did the cyberattackers access?Accessed information may have included: Names Dates of birth Social Security numbers Health care ID numbers Home addresses Email addresses Work information like income dataAnthem doesn't believe these kinds of information were targeted or accessed: Credit card or banking information Medical information like claims, test results or diagnostic codes

Page 7: ISACA - Insurance Institute of India

LESSON TO LEARN

• The question to ask yourself is –When will this happen to me ?(and not - Will this happen to me?) Am I ready

• Prepare yourself well

• Answer all the questions given in the checklist

• Make sure you have all the (correct) answers

• The question to ask yourself is –When will this happen to me ?(and not - Will this happen to me?) Am I ready

• Prepare yourself well

• Answer all the questions given in the checklist

• Make sure you have all the (correct) answers

Page 8: ISACA - Insurance Institute of India
Page 9: ISACA - Insurance Institute of India
Page 10: ISACA - Insurance Institute of India
Page 11: ISACA - Insurance Institute of India
Page 12: ISACA - Insurance Institute of India
Page 13: ISACA - Insurance Institute of India
Page 14: ISACA - Insurance Institute of India
Page 15: ISACA - Insurance Institute of India
Page 16: ISACA - Insurance Institute of India
Page 17: ISACA - Insurance Institute of India
Page 18: ISACA - Insurance Institute of India
Page 19: ISACA - Insurance Institute of India
Page 20: ISACA - Insurance Institute of India
Page 21: ISACA - Insurance Institute of India
Page 22: ISACA - Insurance Institute of India

You may use COBIT 5 for Information Securityto integrate the information security practiceswithin a comprehensive business frameworkto govern and manage enterprise IT

You may use COBIT 5 for Information Securityto integrate the information security practiceswithin a comprehensive business frameworkto govern and manage enterprise IT

Page 23: ISACA - Insurance Institute of India

Thank you!Avinash W. Kadam

[email protected]