Risk and Security LLC

Risk Assessments, Training and More

This content shows Simple View

May 2008

Climate Change & Compliance

It’s a risky world now.  Mostly fueled by twenty-four hour media transmission so that Annapolis was on CNN a few weeks ago, when a dead construction worker dangled on a crane for over an hour.  And since then — we have watched the earthquake in China, the cyclone in Myanmar, the crane collapse in NYC, and much more. 

That being said — IT management worries less about natural disasters and more about their web site being hacked, phishing attacks, associates bringing viruses in from their home offices, and the regulators visiting them.   Regulators are often more feared than a cyclone or a tornado, because of the expense and havoc they can trigger.    As we continue to work with regulators in both finance and healthcare, you can understand why they continue to stress the risk assessment as the foundation of the IT security programs.

The risk assessment by itself does not magical and instant protection against security intrusions, but it does something more important — it provides a metric to measure against.  You can call it the cornerstone of a security program because it measures against an existing standard and see how your IT infrastructure stacks up.   Although different standards exist, such as FFIEC, SB 1386, FACT, GLBA, BSA, ISO 27001, HIPAA, PCI and many more — they have common components that look at how employees do their jobs, and how they use the security controls they have available to them.

I met Peter Drucker at Claremont University when he was about 88 years old (he died in 2005 at the age of 96), and he was the “father of modern management”.   He told me that security assessment should be integrated into the fabric of management because managers need numbers — and “if you can’t measure it, you can’t manage it”.  So that’s what the risk assessment provides — it provides a metric so the organization can start to measure its performance in these key areas. 

It’s just a plus that the risk assessments incorporate compliance assessments by using the measurement against a standard as the basis for the assessment.  This shows you where you are today, where you are going, and (sometimes) how fast, and how expensive it is going to be to get there.  

 

Caroline R. Hamilton is the Founder of RiskWatch, Inc., the original top-rated risk assessment software.  Hamilton served on the NIST Model-Builder’s Workshop on Risk Management from 1988-1995 and on the National Security Agency’s Network Rating Workshop.  In addition, she was a member of the U.S. Department of Defense’s Defensive Information Warfare Risk Management Model and has worked on a variety of risk assessment and risk management groups, including the ASIS Information Technology Security Council and the IBM Data Governance Council, created by Steven Adler.  Hamilton also received the Maritime Security Council’s Distinguished Service Award and has written for a variety of books and magazines including the CSI Alert, the Computer Security Journal, the ISSA Newsletter, The HIPAA Compliance Handbook, Defense News, Security & Design, Cargo Security and many other publications.  Based in Annapolis, Maryland, Hamilton is a graduate of the University of California.
Add to Technorati Favorites



Finishing my Pandemic Flu Preparations

I have heard so much about Pandemic Flu so I decided to set up my own pandemic flu plan for my home.  I have everything I need — including food, medicine, dog food, trash bags, extra water.  My sister-in-law just moved to southern California and her friends told her to get ready for the next earthquake — and she followed my pandemic flu personal checklist.  Now’s she’s also ready for anything.  The nice thing about being prepared for one potential disaster means you can be ready for all of them — earthquakes, power outages, hurricanes, OR pandemic flu.  We are now including the pandemic flu planning assessments in all our RiskWatch products.   But let me know if you’d like to review one of my checklists for your personal continuity plans.

 

Caroline R. Hamilton is the Founder of RiskWatch, Inc., the original top-rated risk assessment software.  Hamilton served on the NIST Model-Builder’s Workshop on Risk Management from 1988-1995 and on the National Security Agency’s Network Rating Workshop.  In addition, she was a member of the U.S. Department of Defense’s Defensive Information Warfare Risk Management Model and has worked on a variety of risk assessment and risk management groups, including the ASIS Information Technology Security Council and the IBM Data Governance Council, created by Steven Adler.  Hamilton also received the Maritime Security Council’s Distinguished Service Award and has written for a variety of books and magazines including the CSI Alert, the Computer Security Journal, the ISSA Newsletter, The HIPAA Compliance Handbook, Defense News, Security & Design, Cargo Security and many other publications.  Based in Annapolis, Maryland, Hamilton is a graduate of the University of California.

Add to Technorati Favorites



RiskWatch, Inc.

How We Assess Risk & Compliance

Most institutions are now required to conduct formal risk assessments of their IT and online security systems to ensure compliance with regulations such as: FFIEC, NERC, GLBA, BSA, NCUA, ISO 17799, ISO 27001 and many others. RiskWatch software allows the user to evaluate their risks and produces reports and graphs specifically detailing compliance within these regulations, or showing where controls are needed.

Assessment of organizations’ compliance with these risk requirements can be met in up to 80% less time with the use of RiskWatch software and online services:
• An evaluation of threats vs. vulnerabilities for the client
• Simplified data collection with easy-to-use, web-based compliance surveys
• In-depth, graphic reports that detail the recommended controls to mitigate risk including both Return on Investment and Loss Impact Analysis.

Have YOU Completed YOUR Risk Assessment?

Add to Technorati Favorites




top