@ISACA Volume 19: 15 September 2010 

 
@ISACA Relevant, Timely News

Nominations Are Open!

Nominations for the ISACA® Board of Directors for the 2011-2012 term are now open. Visit the Volunteering page of the ISACA web site for information about serving on the board, the attributes for office (both international president and vice president) and the nomination form.

Members may submit nominations for themselves or for others (or both). All nominations will be acknowledged and all candidates will be required to complete a candidate profile form that serves to confirm the candidate’s willingness to serve if selected and provides the Nominating Committee information on which to evaluate the candidate. Information on candidates will be gathered in other ways as well, including review of public web sites (e.g., Google, Facebook, LinkedIn) and interviews with the candidates.

Nominations for the Board of Directors close on 7 January 2011.

Top


10 Tips to Managing Privacy
By Victor Chapela

Managing privacy is managing trust. The following are important to keep in mind when working toward managing privacy:

  1. To correctly manage privacy, you need to recognize each person as the owner of his/her personal data. Therefore, you need to communicate to and ask permission from each individual data owner before using his/her data.
  2. Each person should be able to determine and limit the storage, processing and usage of data in which he/she is personally identifiable.
  3. Different countries have different approaches to enforcing privacy. But, in most cases, sensitive information is defined as that which may be used for discrimination. Examples of this are racial or ethnic origin; health records; religious, philosophical or moral beliefs; political affiliation; and sexual preferences.
  4. Intimacy data, such as the examples just mentioned, are, in general, well regulated. However, identity data are not as closely guarded by regulation and may have similar or even greater risk for companies and individuals alike. Identity data include government-issued identification numbers, logins and passwords, and credit and debit card numbers.
  5. Identity data are highly valued and actively sought by organized crime to commit fraud. This type of data should be classified based on the threat level (i.e., the value of the data for criminals or competition) and not based on the internal value of the information (which could be, in some cases, almost zero).
  6. By managing data privacy correctly, information security requirements may also be solved. Both security and privacy can be better handled by classifying and managing data based on risk levels.
  7. Classification should take into account two very different aspects: a privacy impact analysis (compliance with applicable laws and regulations) and a data threat analysis (determining risk levels based on the data’s external value).
  8. For each risk classification level, the full data life cycle must be analyzed from reception or generation of the data through the destruction process. A privacy policy and standards for each data risk level’s life cycle must be defined based on the analysis.
  9. Legal, organizational and technical controls must be considered for each classification level and then implemented based on information assets and groups.
  10. Privacy is not only about compliance. Through privacy, you guarantee each person’s rights and, by doing so, you increase your stakeholder’s trust.

Victor Chapela is founder and chief executive officer of Sm4rt Security Services. He is coauthoring a book on the evolution of risk and is a frequent speaker at conferences around the world.

Top


Support Cyber Security Awareness Month

Held each October since 2001, National Cyber Security Awareness Month (NCSAM) is an annual US public awareness campaign that encourages knowledgeable IT professionals to reach out to their communities and teach them how to be safe and secure online. This event, made possible through the collaboration of the US Department of Homeland Security (DHS), the National Cyber Security Alliance (NCSA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), chooses the month of October to shed a brighter light on what home users, schools, businesses and governments need to do to better protect their computers, children and data from the hazards of online activities. As an official endorser of this program, ISACA® is urging its US-based members to support this effort within their own communities. Below are a few examples of what can be done to support NCSAM:

  • Volunteer to teach basic cybersecurity practices in your community (e.g., at local schools, PTA meetings, scouting organizations, rotary clubs or other community forums).
  • Write an article about safe online practices for your local newspaper, community web site or company newsletter.
  • Show your support for National Cyber Security Awareness Month by displaying NCSAM banners on your personal web site in October. Encourage your employer to do the same.
  • Download free security white papers from ISACA and share them with your employer and colleagues.

Visit StaySafeOnline.org for more information regarding the program, suggested support activities and support materials. Note that in addition to providing a valuable service to your community, those holding any ISACA certification can earn valuable continuing professional education (CPE) hours1 by giving presentations and publishing articles that promote safe online practices.

1 To earn CPE, certification holders should ensure that they have third-party verification (by chapter leadership or the organization that hosted the presentation) that the presentation was conducted.

Top


AICPA/CICA Releases Exposure of Privacy Maturity Model for Comment

The Joint Privacy Task Force of the American Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accountants (CICA) has released an exposure of the newly developed Privacy Maturity Model (PMM) and is inviting comments on the model. The PMM, based on Generally Accepted Privacy Principles (GAPP), outlines the expectations on each of the six levels of maturity in the Capability Maturity Model to the criteria in GAPP. Comments from ISACA® members are encouraged and welcome. To be considered, all comments must be submitted by 1 October 2010.

Visit the AICPA web site for a complimentary PDF version of the privacy model and instructions on how to comment.

Top


CRISC Domains, COBIT Processes and ISACA Certifications Established Worldwide

The government and regulatory agencies (GRA) subcommittees (ISACA® has one for each of its five regions worldwide) have provided the following updates on relevant regulations worldwide:

  • The Allahabad Bank, a leading public-sector bank in Kolkata, India, issued a request for proposal (RFP) for an IT audit firm to conduct a comprehensive information systems audit of its IT infrastructure and to make recommendations. Two of ISACA’s globally recognized certifications—Certified Information Systems Auditor™ (CISA®) and Certified in the Governance of Enterprise IT® (CGEIT®)—were specified as eligibility criteria for bidders. It was also required that at least one of the two lead auditors be CISA-certified.
  • In Costa Rica, the Superintendencia General de Entidades Financieras (SUGEF), the country’s financial regulator, required that COBIT’s 34 processes be implemented within the local financial institutions and that all evaluations be done by a CISA.
  • In Costa Rica, the ISACA chapter has been working with the Technical Secretariat for Digital Government on an agreement to support it in strategic planning for its portfolio initiatives, to support the implementation of IT governance among participant institutions and to identify the need for training in ISACA tools and frameworks.
  • The Indian Navy, a branch of the armed forces of India, issued a tender offer for vulnerability assessment and penetration testing. Bidders must have a pool of professionals with international accreditation, including CISA and CGEIT.
  • The State of West Virginia Office of Information Security and Controls (USA) is using the five Certified in Risk and Information Systems Control™ (CRISC™) domains and task statements to develop a checklist for use in risk assessments for Health Insurance Portability and Accountability Act (HIPAA) compliance. The task statements will be mapped to National Institute of Standards and Technology (NIST) standards. This checklist will be used by the West Virginia state government and its business associates who are handling protected health information (PHI) collected by the state.

Top


Virtual Seminar and Tradeshow Will Address Enterprise Risk

The speakers at ISACA’s upcoming Virtual Seminar and Tradeshow, “Managing IT Enterprise Risk,” will take a practical approach toward risk by examining three perspectives. First, they will look at the enterprise to determine how best to manage security risks within and, perhaps more important, outside the enterprise. Next, they will consider how to assess risk and the unique problems inherent with the human factor. Finally, they will discuss the strategic issues associated with risk and the balance between meeting business goals and minimizing potential loss and unintended consequences.

Join us Tuesday, 19 October 2010, for this online, all-day event, to participate in live educational sessions presented by knowledgeable presenters, to ask questions and have conversations with speakers and sponsors, and to connect one-on-one with other ISACA® members and staff.

Between educational sessions, you will be free to visit exhibitor booths and interact with sponsors and ISACA staff in the exhibit hall. The networking lounge, in which ISACA members can connect and discuss the event topic, will be open throughout the event. A resource center, complete with additional information and materials including white papers and ISACA® Journal articles, will also be available.

Visit the Virtual Seminar & Tradeshows page of the ISACA web site to learn more about and to register for the event.

Top


Book Review:  Outsourcing IT:  A Governance Guide
Reviewed by Vishnu Kanhere, Ph.D., CISA, CISM, AICWA, CFE, FCA

Outsourcing IT:  A Governance Guide, by Rupert Kendrick, is useful as a reference or how-to book. IT is an enabler, a medium of interaction, and provides the tools and technology for business, industry, and governance. Modern business and industry is highly technology intensive and IT-dependent. Given this situation, IT departments in all organizations are under increasing pressure to meet work requirements, deadlines and demands of the various stakeholders—shareholders, directors, owners, business associates, government, customers, end users and the public at large.

Increasing competition, cost pressures, technology changes, customer requirements, legislative changes and growing risks mean that businesses have to operate within thin margins, work under intense time and resource constraints, and deliver quality and value at all times. In such a situation, IT services can be outsourced only if these sources and service providers are agile, give the required quality, assure safety and integrity, and are competitive with regard to costs.

There is a growing trend of outsourcing IT, whether as part of business process outsourcing, near-shoring or far-shoring. Outsourcing IT provides a board-level view of the criteria and governing principles in an IT outsourcing environment. It also provides an executive-level road map and guidance on useful strategies, processes and procedures for implementation of outsourcing IT. The book offers insight into the governance structure and provides methodologies, tools and techniques for this type of outsourcing.

Outsourcing IT is useful, primarily for organizations’ boards, key managerial personnel and IT department staff. It provides a good understanding of governance issues in outsourcing IT for anyone interested or engaged in using computers, ranging from IT professionals and auditors to common employees and end users. Although this book focuses on the private sector, it is not industry-specific and addresses all areas of business and industry.

The author refers to relevant legislation that supports the text. While lacking tables and illustrations, the book does provide strong resources and references.

Outsourcing IT:  A Governance Guide is available from the ISACA Bookstore. For information, see the ISACA Bookstore Supplement in the latest issue of the ISACA Journal, visit the ISACA Bookstore or e-mail bookstore@isaca.org.

Vishnu Kanhere, Ph.D., CISA, CISM, AICWA, CFE, FCA, is an expert in software valuation, IS security and IS audit.

Top

Read More Articles in Our Archives