SlideShare a Scribd company logo
1 of 49
Avoiding Audit Fatigue: Achieving Compliance In A Multi-Compliance  World In Nine Steps Gene Kim, CISA, TOCICO JonahCTO and Founder(Twitter: @RealGeneKim) Gartner 2010
Where Did The High Performers Come From?
Agenda The problems of compliance du jour and the audit blame cycle How did the high performing IT organizations make their “good to great” transformations? Nine practical steps overcome audit fatigue What does integration of security controls into daily operation feel like? Additional resources Authors Gene Kim, Founder/CTO, Tripwire, Inc. Jennifer Bayuk, Cybersecurity Program Director, Stevens Institute of Technology
“Boss, We Are Ready For The Upcoming Audits…”
“OMG. OMG. The Auditors Are Coming When?!?”
“IT Operations Not Quite As Ready As They Thought…”
“Infosec Must Do Heroics, Generating Reports And Presentations From Scratch…”
“Despite Heroics, The Business Still Fails The Audit…”
“InfosecAs Professional Apologist…’”
Problems: Accountability Infosec often discovers too late that business and IT management were not as prepared for the audits as was represented Business, IT and infosec must perform heroics to generate proof of compliance, often requiring new documents and presentations from scratch in response to auditor questions Business may fail an audit test, requiring remediation work, audit retests, fines, loss of auditor confidence in the infosecprogram, as well as loss of personal trust in the infosec manager A security breach may occur, and the business must now explain how it occurred despite passing the audit
Problem: Organizational Information security is often organized and designed to minimally interfere with business and IT operations, but creates barriers to meeting compliance goals Information security is held accountable, but control effectiveness relies upon other business and IT management to be adequately prepared
Problems: The Real Business Cost Scheduled value-adding work and projects are delayed because of all the urgent and unplanned audit prep work Business continues to implement controls as a part of a one-time audit preparation project to achieve compliance, with little thought on how to maintain compliance over time  Next time requires just as much effort, instead of integrating controls into daily business and IT operational processes The business starts treating audit prep as a legitimate value-adding project, even charging time against it Multiple regulatory and contractual requirements result in IT controls being tested numerous times by numerous parties, requiring management to perform work multiple times
Information Security and Compliance Risks Information security practitioners are always one change away from a security breach Front page news Regulatory fines Brand damage High profile security failures are increasing external pressures for security and compliance Sarbanes-Oxley (SOX) Act of 2002, the Gramm-Leach-Bliley Act, Health Insurance Portability and Accountability Act (HIPAA), emerging privacy laws, and the Payment Card Industry Data Security Standard (PCI DSS)
Going from Good to Great
Desired Outcome: Create A Higher Performing, More Nimble and More Secure IT Organization 10,000 1000 Best in Class Ops and Security 100 10 1 0 20 40 60 80 100 120 140 Operations Metrics Benchmarks:Best in Class: Server/sysadmin ratios ,[object Object]
Lowest amount of unplanned work
Highest change success rate
Best posture of compliance
Lowest cost of complianceSize of Operation # Servers Efficiency of Operation Server/sysadmin ratio Source: IT Process Institute (2001)
Higher Performing IT Organizations Are More Stable, Nimble, Compliant And Secure  ,[object Object]
Fewest number of repeat audit findings
One-third amount of audit preparation effort
High performers find and fix security breaches faster
5 times more likely to detect breaches by automated control
5 times less likely to have breaches result in a loss event
When high performers implement changes…
14 times morechanges
One-half the change failure rate
One-quarter the first fix failure rate
10x fasterMTTR for Sev 1 outages
When high performers manage IT resources…
One-third the amount of unplanned work
8 times moreprojects and IT services
6 times moreapplicationsSource: IT Process Institute, May 2008
Visible Ops:  Playbook of High Performers The IT Process Institute has been studying high-performing organizations since 1999 What is common to all the high performers? What is different between them and average and low performers? How did they become great? Answers have been codified in the Visible Ops Methodology
Over Ten Years, We Benchmarked 1500+ IT Orgs Source: EMA (2009)  Source: IT Process Institute (2008)
2007: Three Controls Predict 60% Of Performance To what extent does an organization define, monitor and enforce the following? Standardized configuration strategy Process discipline Controlled access to production systems Source: IT Process Institute, May 2008
Nine Practical Steps To Overcome Audit Fatigue And The Blame Cycle
The Nine Steps To Avoid Audit Fatigue Step 1: Align with tone at the top Step 2: Create a set of merged infosec and compliance/business goals Step 3: Define ideal information security goal indicators Step 4: Gain an end-to-end understanding of the information flow Step 5: Agree upon control ownership, roles and responsibilities Step 6: Define the control tests so business process control owners will agree with the results Step 7: Schedule and conduct regular control tests Step 8: Organize metrics and remediation reports Step 9: Detect and respond to significant changes to the control environment
Step 1: Align With Tone At The Top Ensure that compliance activity is clearly managed from the top down.
Step 2: Merge Information Security Into The Compliance/ Business Goals Document IT governance goals and the risks to achieving those goals Confirm that information security and compliance helps achieve those goals. For instance: A manufacturing company must comply with a regulatory requirement that certain chemical toxins are never released into the atmosphere in amounts over 10 particles per second.  The manufacturing control system has been designed to ensure that this toxin is released at a rate of only 1 particle per second.
Step 2: Merge Information Security Into The Compliance/ Business Goals What is the business objective? Ensure smooth operation of the manufacturing process, in accordance to the business plan and all associated laws and regulations. What are the information security and compliance risks? The manufacturing control system could fail and release more than the allowed amount of the chemical toxin into the atmosphere. The measurement system may not detect this release.  Also, the manufacturing control measurement data could be altered or lost, which would prevent management from validating emissions output compliance. What is my information security goal to address this risk? We must maintain integrity over the particle release measurement process and the measurement data.
Step 2: Merge Information Security Into The Compliance/ Business Goals What control will we implement to meet this goal? An access and measurement testing control process will protect the toxin release measurement software against tampering.  The control will alert operations when changes to access are detected and when abnormal variations in the toxin measurements occur.  The alert response will include automated and manual procedures that verify that the algorithm installed in the production system is the same as the one that underwent rigorous pre-production system testing. What does plant management (the business process owner) need to do to support this goal? The control process would require the business process owner to configure the production system to minimize the access any given individual needs to change the algorithm and the corresponding data.  The control process would also require the business process owner to minimize the job functions that require access to the algorithms and the measurement data.
Step 3: Define Ideal Information Security Measures Develop theoretical ideal indicators that demonstrate that information security goals are being met. Examples # of access roles not validated by management % of accounts not matching management-defined roles % of configurations not pre-approved by management % of changes not approved by management % of systems with centralized logging
Step 4: Gain End-to-End Understanding Do an end-to-end business process walk-through to understand and document: Where does sensitive information enter, transit, get stored, and exit the organization? What are the risks to organizational goals and information flow? Where is reliance placed on technology to prevent and detect control failures?
Step 4: Gain End-to-End Understanding A merchant has a business process that supports a customer loyalty program. The program includes issuing branded credit cards.  The consumer credit information flow starts with a customer filling out an online application form, which is… Sent to the credit calculation application, is then… Sent to a sales application, and… Ends up in an application that runs on the desktop of every customer service representative.  What is the business goal? To ensure that customers approved for the credit card services are capable of meeting their obligations, so that any credit extended to the customer is likely to be repaid.
Step 4: Gain End-to-End Understanding What are the business, information security and compliance risks? Customer information is inaccurate Customer  information is inadvertently disclosed, violating regulatory requirements Through what applications does the information flow? The online application form is delivered through a third-party vendor,  The credit calculation is done on cloud computing resources The sales application is run internally by IT operations The customer service application is run by a combination of internally developed server software and desktop software on the customer service desktops.
Step 5: Agree Upon Control Ownership, Roles And Responsibilities Clearly define roles and responsibilities for audit compliance activities at the process owner level.
Step 6: Define The Control Tests So Control Owners Will Agree With The Results Make sure that evidence that demonstrates compliance goals have been met can be generated in an automated manner, upon demand. This will mirror the accountability spreadsheet that the auditors will likely construct This is what enables information security to not be left holding the bag when IT operations is disorganized or unprepared.

More Related Content

What's hot

Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesSharing Slides Training
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsEd Tobias
 
SDLC Control
SDLC ControlSDLC Control
SDLC Controlbenji00
 
Continous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRCContinous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRCGraeme Hein
 
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...iFour Consultancy
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and ControlAsad Raza
 
Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseNetwrix Corporation
 
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...iFour Consultancy
 
Why so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailWhy so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailRita Barry
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
Security at velocity dc cap one
Security at velocity dc cap oneSecurity at velocity dc cap one
Security at velocity dc cap oneChef
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureNetwrix Corporation
 
Information system control and audit
Information system control and auditInformation system control and audit
Information system control and auditAstri Stiawaty
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004Donald E. Hester
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performanceAbhishek Sood
 

What's hot (20)

Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
SDLC Control
SDLC ControlSDLC Control
SDLC Control
 
Data Protection Governance IT
Data Protection Governance ITData Protection Governance IT
Data Protection Governance IT
 
Continous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRCContinous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRC
 
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and Control
 
Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the Enterprise
 
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
 
Why so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailWhy so many SIEM Implmentations Fail
Why so many SIEM Implmentations Fail
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Security at velocity dc cap one
Security at velocity dc cap oneSecurity at velocity dc cap one
Security at velocity dc cap one
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT Infrastructure
 
Information system control and audit
Information system control and auditInformation system control and audit
Information system control and audit
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004
 
Role management
Role managementRole management
Role management
 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor Infosec
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 

Viewers also liked

The Truth About Social Responsibility
The Truth About Social ResponsibilityThe Truth About Social Responsibility
The Truth About Social ResponsibilityQIMA
 
Tugas Transmisi Daya Listrik
Tugas Transmisi Daya ListrikTugas Transmisi Daya Listrik
Tugas Transmisi Daya ListrikAdy Purnomo
 
Kherson Steering Group
Kherson Steering GroupKherson Steering Group
Kherson Steering GroupEuclidNetwork
 
Winnipeg ISACA Security is Dead, Rugged DevOps
Winnipeg ISACA Security is Dead, Rugged DevOpsWinnipeg ISACA Security is Dead, Rugged DevOps
Winnipeg ISACA Security is Dead, Rugged DevOpsGene Kim
 
Introducing Euclid Network2
Introducing Euclid Network2Introducing Euclid Network2
Introducing Euclid Network2EuclidNetwork
 
Proactol Afiliate Presentation
Proactol Afiliate PresentationProactol Afiliate Presentation
Proactol Afiliate PresentationMoreNiche
 
Afstudeeronderzoek Annemiek Van Den Bosch
Afstudeeronderzoek Annemiek Van Den BoschAfstudeeronderzoek Annemiek Van Den Bosch
Afstudeeronderzoek Annemiek Van Den BoschAnnemiekvdBosch
 
Centius training 081410
Centius training 081410Centius training 081410
Centius training 081410mhammami00
 
SEO Ranking Factors
SEO Ranking FactorsSEO Ranking Factors
SEO Ranking FactorsMoreNiche
 
Cisco Live 2010
Cisco Live 2010Cisco Live 2010
Cisco Live 2010MicroTech
 
TicketForEvent для спортивных мероприятий
TicketForEvent для спортивных мероприятийTicketForEvent для спортивных мероприятий
TicketForEvent для спортивных мероприятийViktor Kharchevskyi
 
4. removing risk from affiliate marketing
4. removing risk from affiliate marketing4. removing risk from affiliate marketing
4. removing risk from affiliate marketingMoreNiche
 
Fore! (-teen below)
Fore! (-teen below) Fore! (-teen below)
Fore! (-teen below) rmschmidt9
 

Viewers also liked (18)

The Truth About Social Responsibility
The Truth About Social ResponsibilityThe Truth About Social Responsibility
The Truth About Social Responsibility
 
HR Processes - Internal Audit
HR Processes - Internal AuditHR Processes - Internal Audit
HR Processes - Internal Audit
 
Tugas Transmisi Daya Listrik
Tugas Transmisi Daya ListrikTugas Transmisi Daya Listrik
Tugas Transmisi Daya Listrik
 
Kherson Steering Group
Kherson Steering GroupKherson Steering Group
Kherson Steering Group
 
Avsorchards
AvsorchardsAvsorchards
Avsorchards
 
Winnipeg ISACA Security is Dead, Rugged DevOps
Winnipeg ISACA Security is Dead, Rugged DevOpsWinnipeg ISACA Security is Dead, Rugged DevOps
Winnipeg ISACA Security is Dead, Rugged DevOps
 
Introducing Euclid Network2
Introducing Euclid Network2Introducing Euclid Network2
Introducing Euclid Network2
 
Lifehacking in het onderwijs
Lifehacking in het onderwijsLifehacking in het onderwijs
Lifehacking in het onderwijs
 
ABA Environmental Technologies
ABA Environmental TechnologiesABA Environmental Technologies
ABA Environmental Technologies
 
Proactol Afiliate Presentation
Proactol Afiliate PresentationProactol Afiliate Presentation
Proactol Afiliate Presentation
 
Afstudeeronderzoek Annemiek Van Den Bosch
Afstudeeronderzoek Annemiek Van Den BoschAfstudeeronderzoek Annemiek Van Den Bosch
Afstudeeronderzoek Annemiek Van Den Bosch
 
Centius training 081410
Centius training 081410Centius training 081410
Centius training 081410
 
ABA Business Location Austria
ABA Business Location AustriaABA Business Location Austria
ABA Business Location Austria
 
SEO Ranking Factors
SEO Ranking FactorsSEO Ranking Factors
SEO Ranking Factors
 
Cisco Live 2010
Cisco Live 2010Cisco Live 2010
Cisco Live 2010
 
TicketForEvent для спортивных мероприятий
TicketForEvent для спортивных мероприятийTicketForEvent для спортивных мероприятий
TicketForEvent для спортивных мероприятий
 
4. removing risk from affiliate marketing
4. removing risk from affiliate marketing4. removing risk from affiliate marketing
4. removing risk from affiliate marketing
 
Fore! (-teen below)
Fore! (-teen below) Fore! (-teen below)
Fore! (-teen below)
 

Similar to 2010 06 gartner avoiding audit fatigue in nine steps 1d

2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"Gene Kim
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 
Building Information System
Building Information SystemBuilding Information System
Building Information SystemRabia Jabeen
 
Chap001
Chap001Chap001
Chap001rpvgb
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.pptKhalilIdhman
 
Introduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfIntroduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfSALES97
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinAnton Chuvakin
 
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWFREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWinfosec train
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityDreamforce
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelinesamburyj3c9
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iiiAshish Desai
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...GrapesTech Solutions
 

Similar to 2010 06 gartner avoiding audit fatigue in nine steps 1d (20)

2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
A Guide To IT Compliance Assessment And Management
A Guide To IT Compliance Assessment And ManagementA Guide To IT Compliance Assessment And Management
A Guide To IT Compliance Assessment And Management
 
2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Building Information System
Building Information SystemBuilding Information System
Building Information System
 
Chap001
Chap001Chap001
Chap001
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.ppt
 
Introduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfIntroduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdf
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
 
CISA (1).pdf
CISA (1).pdfCISA (1).pdf
CISA (1).pdf
 
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWFREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and Security
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 

More from Gene Kim

Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Gene Kim
 
The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)Gene Kim
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience ReportGene Kim
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...Gene Kim
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)Gene Kim
 
2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was ReleasedGene Kim
 
Leading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedLeading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedGene Kim
 
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesKeeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesGene Kim
 
2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity ConferenceGene Kim
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?Gene Kim
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!Gene Kim
 
How Can We Better Sell DevOps?
How Can We Better Sell DevOps?How Can We Better Sell DevOps?
How Can We Better Sell DevOps?Gene Kim
 
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsWhy Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsGene Kim
 
Kevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementKevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementGene Kim
 
SecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOSecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOGene Kim
 
2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns DistilledGene Kim
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKimGene Kim
 
United2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksUnited2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksGene Kim
 
Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Gene Kim
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...Gene Kim
 

More from Gene Kim (20)

Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
 
The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)
 
2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released
 
Leading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedLeading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons Learned
 
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesKeeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
 
2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
 
How Can We Better Sell DevOps?
How Can We Better Sell DevOps?How Can We Better Sell DevOps?
How Can We Better Sell DevOps?
 
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsWhy Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
 
Kevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementKevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process Improvement
 
SecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOSecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFO
 
2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKim
 
United2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksUnited2012 Rugged DevOps Rocks
United2012 Rugged DevOps Rocks
 
Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...
 

Recently uploaded

Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000dlhescort
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 

Recently uploaded (20)

Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 

2010 06 gartner avoiding audit fatigue in nine steps 1d

  • 1. Avoiding Audit Fatigue: Achieving Compliance In A Multi-Compliance World In Nine Steps Gene Kim, CISA, TOCICO JonahCTO and Founder(Twitter: @RealGeneKim) Gartner 2010
  • 2. Where Did The High Performers Come From?
  • 3. Agenda The problems of compliance du jour and the audit blame cycle How did the high performing IT organizations make their “good to great” transformations? Nine practical steps overcome audit fatigue What does integration of security controls into daily operation feel like? Additional resources Authors Gene Kim, Founder/CTO, Tripwire, Inc. Jennifer Bayuk, Cybersecurity Program Director, Stevens Institute of Technology
  • 4. “Boss, We Are Ready For The Upcoming Audits…”
  • 5. “OMG. OMG. The Auditors Are Coming When?!?”
  • 6. “IT Operations Not Quite As Ready As They Thought…”
  • 7. “Infosec Must Do Heroics, Generating Reports And Presentations From Scratch…”
  • 8. “Despite Heroics, The Business Still Fails The Audit…”
  • 10. Problems: Accountability Infosec often discovers too late that business and IT management were not as prepared for the audits as was represented Business, IT and infosec must perform heroics to generate proof of compliance, often requiring new documents and presentations from scratch in response to auditor questions Business may fail an audit test, requiring remediation work, audit retests, fines, loss of auditor confidence in the infosecprogram, as well as loss of personal trust in the infosec manager A security breach may occur, and the business must now explain how it occurred despite passing the audit
  • 11. Problem: Organizational Information security is often organized and designed to minimally interfere with business and IT operations, but creates barriers to meeting compliance goals Information security is held accountable, but control effectiveness relies upon other business and IT management to be adequately prepared
  • 12. Problems: The Real Business Cost Scheduled value-adding work and projects are delayed because of all the urgent and unplanned audit prep work Business continues to implement controls as a part of a one-time audit preparation project to achieve compliance, with little thought on how to maintain compliance over time Next time requires just as much effort, instead of integrating controls into daily business and IT operational processes The business starts treating audit prep as a legitimate value-adding project, even charging time against it Multiple regulatory and contractual requirements result in IT controls being tested numerous times by numerous parties, requiring management to perform work multiple times
  • 13. Information Security and Compliance Risks Information security practitioners are always one change away from a security breach Front page news Regulatory fines Brand damage High profile security failures are increasing external pressures for security and compliance Sarbanes-Oxley (SOX) Act of 2002, the Gramm-Leach-Bliley Act, Health Insurance Portability and Accountability Act (HIPAA), emerging privacy laws, and the Payment Card Industry Data Security Standard (PCI DSS)
  • 14. Going from Good to Great
  • 15.
  • 16. Lowest amount of unplanned work
  • 18. Best posture of compliance
  • 19. Lowest cost of complianceSize of Operation # Servers Efficiency of Operation Server/sysadmin ratio Source: IT Process Institute (2001)
  • 20.
  • 21. Fewest number of repeat audit findings
  • 22. One-third amount of audit preparation effort
  • 23. High performers find and fix security breaches faster
  • 24. 5 times more likely to detect breaches by automated control
  • 25. 5 times less likely to have breaches result in a loss event
  • 26. When high performers implement changes…
  • 28. One-half the change failure rate
  • 29. One-quarter the first fix failure rate
  • 30. 10x fasterMTTR for Sev 1 outages
  • 31. When high performers manage IT resources…
  • 32. One-third the amount of unplanned work
  • 33. 8 times moreprojects and IT services
  • 34. 6 times moreapplicationsSource: IT Process Institute, May 2008
  • 35. Visible Ops: Playbook of High Performers The IT Process Institute has been studying high-performing organizations since 1999 What is common to all the high performers? What is different between them and average and low performers? How did they become great? Answers have been codified in the Visible Ops Methodology
  • 36. Over Ten Years, We Benchmarked 1500+ IT Orgs Source: EMA (2009) Source: IT Process Institute (2008)
  • 37. 2007: Three Controls Predict 60% Of Performance To what extent does an organization define, monitor and enforce the following? Standardized configuration strategy Process discipline Controlled access to production systems Source: IT Process Institute, May 2008
  • 38. Nine Practical Steps To Overcome Audit Fatigue And The Blame Cycle
  • 39. The Nine Steps To Avoid Audit Fatigue Step 1: Align with tone at the top Step 2: Create a set of merged infosec and compliance/business goals Step 3: Define ideal information security goal indicators Step 4: Gain an end-to-end understanding of the information flow Step 5: Agree upon control ownership, roles and responsibilities Step 6: Define the control tests so business process control owners will agree with the results Step 7: Schedule and conduct regular control tests Step 8: Organize metrics and remediation reports Step 9: Detect and respond to significant changes to the control environment
  • 40. Step 1: Align With Tone At The Top Ensure that compliance activity is clearly managed from the top down.
  • 41. Step 2: Merge Information Security Into The Compliance/ Business Goals Document IT governance goals and the risks to achieving those goals Confirm that information security and compliance helps achieve those goals. For instance: A manufacturing company must comply with a regulatory requirement that certain chemical toxins are never released into the atmosphere in amounts over 10 particles per second. The manufacturing control system has been designed to ensure that this toxin is released at a rate of only 1 particle per second.
  • 42. Step 2: Merge Information Security Into The Compliance/ Business Goals What is the business objective? Ensure smooth operation of the manufacturing process, in accordance to the business plan and all associated laws and regulations. What are the information security and compliance risks? The manufacturing control system could fail and release more than the allowed amount of the chemical toxin into the atmosphere. The measurement system may not detect this release. Also, the manufacturing control measurement data could be altered or lost, which would prevent management from validating emissions output compliance. What is my information security goal to address this risk? We must maintain integrity over the particle release measurement process and the measurement data.
  • 43. Step 2: Merge Information Security Into The Compliance/ Business Goals What control will we implement to meet this goal? An access and measurement testing control process will protect the toxin release measurement software against tampering. The control will alert operations when changes to access are detected and when abnormal variations in the toxin measurements occur. The alert response will include automated and manual procedures that verify that the algorithm installed in the production system is the same as the one that underwent rigorous pre-production system testing. What does plant management (the business process owner) need to do to support this goal? The control process would require the business process owner to configure the production system to minimize the access any given individual needs to change the algorithm and the corresponding data. The control process would also require the business process owner to minimize the job functions that require access to the algorithms and the measurement data.
  • 44. Step 3: Define Ideal Information Security Measures Develop theoretical ideal indicators that demonstrate that information security goals are being met. Examples # of access roles not validated by management % of accounts not matching management-defined roles % of configurations not pre-approved by management % of changes not approved by management % of systems with centralized logging
  • 45. Step 4: Gain End-to-End Understanding Do an end-to-end business process walk-through to understand and document: Where does sensitive information enter, transit, get stored, and exit the organization? What are the risks to organizational goals and information flow? Where is reliance placed on technology to prevent and detect control failures?
  • 46. Step 4: Gain End-to-End Understanding A merchant has a business process that supports a customer loyalty program. The program includes issuing branded credit cards. The consumer credit information flow starts with a customer filling out an online application form, which is… Sent to the credit calculation application, is then… Sent to a sales application, and… Ends up in an application that runs on the desktop of every customer service representative. What is the business goal? To ensure that customers approved for the credit card services are capable of meeting their obligations, so that any credit extended to the customer is likely to be repaid.
  • 47. Step 4: Gain End-to-End Understanding What are the business, information security and compliance risks? Customer information is inaccurate Customer information is inadvertently disclosed, violating regulatory requirements Through what applications does the information flow? The online application form is delivered through a third-party vendor, The credit calculation is done on cloud computing resources The sales application is run internally by IT operations The customer service application is run by a combination of internally developed server software and desktop software on the customer service desktops.
  • 48. Step 5: Agree Upon Control Ownership, Roles And Responsibilities Clearly define roles and responsibilities for audit compliance activities at the process owner level.
  • 49. Step 6: Define The Control Tests So Control Owners Will Agree With The Results Make sure that evidence that demonstrates compliance goals have been met can be generated in an automated manner, upon demand. This will mirror the accountability spreadsheet that the auditors will likely construct This is what enables information security to not be left holding the bag when IT operations is disorganized or unprepared.
  • 50. Step 7: Schedule And Conduct Regular Control Tests Conduct tests of controls effectiveness frequently enough be able to rely on their effectiveness regardless of variances in audit scope and timing. Ensure that sample size is safely larger than the auditor’s You will find unprepared IT control owners long before the audits “Hope is not a strategy. Trust is not a control.”
  • 51. Step 8: Organize Metrics And Remediation Reports Track the completion of required remediation work, ideally to be completed well in advance of the audit. By compliance objective By business process By control owner This will look like a PMO status report
  • 52. Step 9: Detect And Respond To Significant Changes To The Control Environment Have the situational awareness to know when the information flow or control environment has significantly changed, requiring these steps to be redone For example, when an application is changed to allow consumer data to be downloaded to desktops instead of being viewed through pre-defined application reports).
  • 53. What Does Integration Of Security Controls Into Daily Operations Look Like?
  • 54. Find What’s Most Important First
  • 55. Quickly Find What Is Different…
  • 56. Before Something Bad Happens…
  • 60. Based On Objective Evidence…
  • 63. Show Value To The Business…
  • 64. Be Recognized For Contribution…
  • 65. And Do More With Less…
  • 66.
  • 67. Fewest number of repeat audit findings
  • 68. One-third amount of audit preparation effort
  • 69. High performers find and fix security breaches faster
  • 70. 5 times more likely to detect breaches by automated control
  • 71. 5 times less likely to have breaches result in a loss event
  • 72. When high performers implement changes…
  • 74. One-half the change failure rate
  • 75. One-quarter the first fix failure rate
  • 76. 10x fasterMTTR for Sev 1 outages
  • 77. When high performers manage IT resources…
  • 78. One-third the amount of unplanned work
  • 79. 8 times moreprojects and IT services
  • 80. 6 times moreapplicationsSource: IT Process Institute, May 2008
  • 81. It’s The Way… Automate Compliance Protect Sensitive Data EliminateOutages TAKE CONTROL. Tripwire VIA VIA TM TM Tripwire
  • 82. Tripwire VIA™IT Security & Compliance Automation Suite Tripwire VIATM VISIBILITY  INTELLIGENCE  AUTOMATION File Integrity Monitoring SecurityEvent Manager Compliance Policy Manager Log Manager Tripwire Enterprise Tripwire Log Center Configuration Remediation
  • 83.

Editor's Notes

  1. There are many ways to react to this: like, fear, horror, trying to become invisible… All understandable, given the circumstances…