Title:
1Limiting electronic fraud through an Information
Security Management System (ISMS) An
Introduction to ISO 27001"Presented to the
ICGFM Annual ConferenceMay 2006James St.
ClairSenior ManagerGrant Thornton LLPGlobal
Public Sector
2Disclaimer
- The views expressed do not necessarily reflect
the views of Grant Thornton LLP
3Areas of Discussion
- Global trends in Electronic Finance (E-Finance)
- Risks to E-Finance
- Establishing a policy framework
- Overview of Information Security Management
- Questions?
4Presentation Objectives
- Familiarize the audience with the pervasiveness
of E-Finance - Discuss how E-Finance is vulnerable
- Outline steps to implement a framework to limit
risk - Discuss the specifics of an Information Security
Management System
5The Growth of Electronic Finance
6Electronic Finance is now the world standard
- E-Finance consists of four primary categories
- Electronic Funds Transfer (EFT)
- Electronic Benefits Transfers (EBT)
- Electronic Data Interchange (EDI)
- Electronic Trade Confirmations (ETC)
- Additionally, the communications channels used
for E-Finance have grown - Home PCs
- E-Banking
- Phones and PDAs
7Growth of E-Finance has been tremendous
- E-Finance accounts for over 2 trillion a day
- Percentage of banking online has risen from 5 to
50 in 5 years - Number of connect countries and individuals has
exploded globally - Internet availability in developing countries
- 90 penetration of mobile phone markets
- Wireless applications for daily business
- Proliferation of e-credit mechanisms
8The Risks to Electronic Finance
9Risks to E-Finance have also grown explosively
- Sheer number of global internet users have
created a "wild west" for conducting business - "Open" nature of the Internet now its biggest
flaw - Tremendous growth in the technology to create
financial havoc - Data and records theft that used to take days can
be reduced to minutes - Lack of appreciation in how accessible data can
really be - What is your risk?
10Primary types of threats
- Electronic Fraud
- Identity theft
- Access manipulation
- Security Breaches
- Hacking
- Viruses and "spy-ware"
11Legal and Policy framework for Information
Security
12Policy and Law are the first step to limiting
risk
- Legal framework
- Countries and organizations have been active in
developing the legal framework needed to
prosecute electronic crime - OECD
- UN
- OAS
- Most importantly, efforts are made to enforce the
laws once created
13Policy and Law are the first step to limiting
risk (cont'd)
- Policy requirements
- Oorganizations must have an adequate policy
framework to enforce good security - Policies are clearly understood and enforced and
based on applicable law - What should an information security policy
framework look like?
14ISO 27001 The framework for an Information
Security Management System (ISMS)
15ISO/IEC 270012005 - Specification
- Specifies requirements for establishing,
implementing, and documenting Information
Security Management Systems (ISMS) - Specifies requirements for security controls to
be implemented according to the needs of
individual organizations - Consists of 11 control sections, 39 control
objectives, and 133 controls - Is aligned with ISO/IEC 177992005
Source BSI America
16Development of ISO/IEC 270001 "family" of
standards
Source BSI America
17Key considerations for ISO/IEC 270012005
- Integrates IT security policy and procedures with
existing organization practices - Implements a means for continuous compliance and
improvement - Reinforces IT security as part of good corporate
governance - Built on internationally accepted standards
- Implementation of OECD principles for privacy
and security
18Harmonization example
Image courtesy of BSI America
19Growing Acceptance
Source http//www.xisec.com/
20Registration of ISMS
Organizations are registered (or certificated) by
a Registration Body in accordance with the
requirements of a scheme such as exists for ISO
9001, ISO 14001, or ISO/IEC 27001 Registration
Bodies (and in some instances auditors) are
accredited by a recognized body (e.g., UKAS,
IRCA, ANAB) to conduct assessment and
certification to a recognized scheme
21Government Benefits of an ISMS
- Helps build a positive image for government
agencies, as well as a reinforce a country's
political and financial status in the world
market - Provides satisfaction and confidence that
citizens information security requirements are
being met and privacy is being protected - Reduces liability and risk due to implemented or
enforced policies and procedures (due diligence) - Gain improvement of process efficiency and the
management of security costs
22What steps are necessary to implement an ISMS?
- An organizational investment
- Requires "buy-in" from all members of the
organization - Must be implemented with existing Risk management
efforts - Make sure you understand legal issues as well as
technical
23Questions to ask of your ISMS
- Has your scope been defined?
- Who should be involved in developing and
maintaining our ISMS? - Cannot be assigned like another IT project
- Do IT Security plans exist for all agencies, and
are they tested in any format? - Has proper resources been allocated?
24Questions?Thank You!
James A.St.Clair, CISM Senior Manager Global
Public Sector Grant Thornton LLP T 703.637.3078
F 703.837.4455 C 703.727.6332 E
Jim.StClair_at_gt.com