Security and Risk considerations for outsourced IT Services EA InfoSec Conference,14/08/2013, version 1.0

Similar documents
Outsourcing Guidelines. for Financial Institutions DRAFT (FOR CONSULTATION)

Responding to Healthcare Industry Regulations Date: May 9, 2013

Managing Risks and Security in Outsourced Environment

IT Managed Services Provider

Banking Regulation and Policy Department Bangladesh Bank Head Office Dhaka

Off Shoring Audit Implications

Software as a Service Agreements

Third Party Trust Manage your outsourcing arrangements

HIPAA Privacy & Security

Report of the Auditor General to the Nova Scotia House of Assembly. December Independence Integrity Impact

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

Getting the Most out of Business Process Outsourcing and Offshoring Initiatives with Desktop Virtualization WHITE PAPER

Office of Inspector General Student Data

Outsourcing. a practical guide on how to create successful outsourcing solutions

Emergency Management Element. CMS Rule for. HRSA Form 10 HRSA PIN Joint Commission NIMS OSHA Best Practices. Emergency

HIPAA 201: Student Self-Learning Module & Test

Outsourcing Lessons: A case study of Electronic Data Systems and GMAC Mortgage

ASX CLEAR OPERATING RULES Guidance Note 9

ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 9

REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust. Signed Administrative Approval On File

Vacancy Announcement

HOW TO PROTECT YOUR ORGANIZATION WITH SANCTION SCREENING WEBINAR QUESTION AND ANSWER SESSION. Q: Is it necessary to search SAM and LEIE or only LEIE?

PRIVACY IMPACT ASSESSMENT (PIA) For the

1. Lead Times. 2. Duration and Effective Date

Business Continuity Plan

ICT and Disaster Risk Reduction Division ESCAP

STRATEGIC FUNDING EFFECTIVE OUTSOURCING. Outsource to free up your time and save money

MEANINGFUL USE & RISK ASSESSMENT

Table 1: Types of Emergencies Potentially Affecting Urgent Care Centers o Chemical Emergency

Chapter 9 Legal Aspects of Health Information Management

Alumni Foundation Database

St. Jude Children s Research Hospital. Code of Conduct

Chapter 23 Saskatoon Regional Health Authority 1.0 MAIN POINTS 2.0 INTRODUCTION 3.0 AUDIT CONCLUSIONS, SCOPE AND FINDINGS

Madison Area Technical College Foundation and Alumni Office Policy on the Privacy of Alumni Data

NORWICH UNIVERSITY TELECOMMUTING POLICY Reviewed and approved on April 30, 2012 OBJECTIVE

SECNAVINST A DON CIO 20 December Subj: DEPARTMENT OF THE NAVY INFORMATION ASSURANCE (IA) POLICY

Request for Qualifications: Information Technology Services

RMC CODE OF PROFESSIONAL CONDUCT

Dun & Bradstreet Partner Code of Conduct

The Offshoring of Commercial Contract Management

Deal or No Deal: Managing Vendor Relations & HMIS Contracting

Vacancy Announcement

Emergency Medical Services Division Policies Procedures Protocols

Answers to questions submitted regarding RFQQ F-1935 December 13, 2017 Special Education Technology Center Website and Database Redesign

Outsourcing the IT Function

BLINN COLLEGE ADMINISTRATIVE REGULATIONS MANUAL

OWENS VALLEY CAREER DEVELOPMENT CENTER

Stetson University College of Law Crisis Communications Plan

Risk Advisory Services

Notice of Privacy Practices

Building a Successful Telemedicine Program

C O O P. Exhibit A CONTINUITY OF OPERATIONS PLAN (COOP)

Department of Defense DIRECTIVE. SUBJECT: Information Assurance Training, Certification, and Workforce Management

BUSINESS CONTINUITY PLANNING

2009 AT&T Business Continuity Study SOUTHERN CALIFORNIA Results

Making the Most of Your ACC Resources September 13, Association of Corporate Counsel

Opportunities for Brazil in The North American Market. Bob Hartmann. 3 March 2010

Business Risk Planning

Statement of Guidance: Outsourcing Regulated Entities

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT

Outsourcing Risk Management. UniCredit Group Experience

ENTERPRISE INCOME VERIFICATION (EIV) SECURITY POLICY

RUTGERS BIOMEDICAL AND HEALTH SCIENCES CODE OF CON DU CT

Memorial Hermann Information Exchange. MHiE POLICIES & PROCEDURES MANUAL

Courts Service ICT Strategy Statement

Recruitment Agencies. A guide for newcomers to British Columbia

PRIVACY IMPACT ASSESSMENT (PIA) For the

Payment: We are permitted to use and disclose your health information to receive payment for our services. For example, we may:

Department of Defense INSTRUCTION

Teleworking and access to ECHA IT systems

Framework for Risk Management in Outsourcing Arrangements by. Financial Institutions

ABM Industries Incorporated

Minutes Board of Trustees

PRIVACY IMPACT ASSESSMENT (PIA) For the. Veterinary Services Systems Management (VSSM) Defense Health Agency (DHA)

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information

FOUR TIPS: THE INVISIBLE IMPACT OF CREDENTIALING

Information Privacy and Security

City of Coquitlam. Request for Expressions of Interest RFEI No Workforce Scheduling Software

Safeguarding Healthcare Information. By:

Fiscal Sponsorship Up Close: Understanding the Benefits and Pitfalls

Florida Center for Cybersecurity Collaborative Seed Award Program

Parental Consent For Minors to Receive Services

Compliance Code of Business Conduct and Ethics Page 1 of 10

PLEASE REVIEW THE FOLLOWING PAGES IN THIS DOCUMENT FOR DETAILS AND APPLICABLE QUALIFICATIONS REGARDING THE REFERENCED POSITIONS.

Report No. D May 14, Selected Controls for Information Assurance at the Defense Threat Reduction Agency

A successful telecommuting arrangement must work for both the department and the employee.

Meaningful Use Achieving Core Objective #14 Montana HIMMS 2012 Spring Convention

Pharmaceutical company sales and marketing operations. Global Outsourcing for Pharmaceutical Sales and Marketing: More Innovation for Less Cost

Protecting Patient Privacy It s Everyone s Responsibility

Tornado Tabletop Exercise Template

PMA Business Continuity Plan

Report of the Information & Privacy Commissioner/Ontario. Review of Cancer Care Ontario:

PRIVACY IMPACT ASSESSMENT (PIA) For the. Department of Defense Consolidated Cancer Registry (CCR) System. Defense Health Agency (DHA)

13 ANALYSIS OF OUTSOURCING AND

Managing outsourcing projects. Prof. Dr. Daning Hu Department of Informatics University of Zurich

Article: The Information Systems Outsourcing Bandwagon Author: Mary C. Lacity, Rudy Hirschheim

Appendix. Final Version of the Electronic Health Record (EHR) Survey Questionnaire

Legal Administrative Assistants / Paralegals. An employment guide for newcomers to British Columbia

Telemedicine Credentialing and Privileging

BIRAC-Wellcome Trust Joint Call in Translational Medicine

Transcription:

Security and Risk considerations for outsourced IT Services EA InfoSec Conference,14/08/2013, version 1.0

Overview What is IT Outsourcing Why companies outsource IT Security and risk considerations Ensuring Information Security when Outsourcing Conclusion

What is Outsourcing? IT outsourcing involves sub-contracting all or part of information technology functions to independent, third-party companies or individuals, instead of keeping those functions in-house. off -shoring home-shoring blended-shoring

E.g s of outsourced IT functions Application support Service desk / Support desk Datacenter services Backup and restore Incident management Anti virus / patch management IT security Printing MS Active Directory support Database / ERP support, etc

Why companies outsource IT Reduce operating costs Business focus Resources unavailable in-house Service improvement Reduce risk

Why companies outsource IT The Reasons for out sourcing Reduce operating costs Benefit from lower labour costs in countries like India. (Follow the sun). Processes outsourced to these locations are done at much lower rates and at the same quality levels as in the donor location.eliminate the costs associated with hiring, training and retaining an employee, etc Business focus Focus on your core competencies. Redirect your organization s internal resources toward mission-critical activities.

Why companies outsource IT The Reasons for out sourcing Resources not available in-house Get access to world-class capabilities and infrastructure. Have processes delivered by dedicated teams that have operational expertise in the outsourced process. Their experience in the field translates into greater operational efficiencies. Service Improvement Can easily migrate to new technology with minimal downtime. Productivity and quality will be enhanced.

Why companies outsource IT The Reasons for out sourcing Reduce risk Protect your business from natural disaster. Get access to a service provider with adequate disaster recovery mechanisms. Reduce the risk of implementing a costly wrong decision.

Security & Risk Issues Strategic Risk Threat to information confidentiality Compliance Risk Logical Security Administrative risks Hidden costs

Security & Risk Issues Strategic Risk Risk to the reputation of the business. Eg failure to resume operations for a financial institution could have serious repercussions Not clearly defining the goals and objectives before starting to outsource Threat to information confidentiality No control over company intellectual property Compliance Risk Failure to abide by the customer s contractual requirements resulting in penalties, e.g transboarder flow of data, etc

Security & Risk Issues Logical & physical Security Unauthorized access to sensitive information, eg 3 rd, 4 th, 5 th party Datacenters unauthorized access to business assets Administrative risks Lack of or improper document control, eg. Runbooks used by service desk, use of outdated security policies, etc Poor / lack of a change management system Hidden costs Pay for any services out of scope

Security & Risk Issues Business Continuity Continuity of services in case of a disaster - Service provider may not have an adequate BC plan Loss of internet connectivity Remote support relies on a reliable internet connectivity.

Ensuring Information Security when Outsourcing Having a good security policy Individuals dealing with sensitive information should sign confidentiality agreements. Selecting the right outsourcing vendor A sound privacy and intellectual property policy Protecting your data Providing Education on handling data The rule of least privilege

What the contract should include Scope of Service 1. The contract should clearly describe the rights and responsibilities of the parties to the contract. Considerations should include: Clear scope of the contracted activities Clear Service Level Agreements (SLA s) Exit Clause A penalty clause in the event of an incident Right to audit clause Security and confidentiality agreements

THANK YOU!