34
(c) 2007 Charles G. Gray 1 IT Risk Management, Planning and Mitigation TCOM 5253/MSIS 4253 Implementing Controls 15 November 2007 Charles G. Gray

(c) 2007 Charles G. Gray1 IT Risk Management, Planning and Mitigation TCOM 5253/MSIS 4253 Implementing Controls 15 November 2007 Charles G. Gray

Embed Size (px)

Citation preview

(c) 2007 Charles G. Gray 1

IT Risk Management, Planning and Mitigation

TCOM 5253/MSIS 4253

Implementing Controls15 November 2007

Charles G. Gray

(c) 2007 Charles G. Gray 2

Seven Stages of a Project

• Uncritical acceptance

• Wild enthusiasm

• Dejected disillusionment

• Total confusion

• Search for the guilty

• Punishment of the innocent

• Promotion of non-participantsAnonymous

(c) 2007 Charles G. Gray 3

No - - Seriously• Many (if not all) project management tools

will apply to implementing IT risk controls

• Must take a “holistic” approach to projects– Have to consider:

• The entire IT system• The entire business unit• The entire organization

– Seek to avoid the “law of unintended consequences”

(c) 2007 Charles G. Gray 4

The IT Project Dilemma

• Only 34% of IT projects are truly successful

• 95% of IT projects are over budget (Aberdeen Consulting)

• 50% of IT projects fail to meet objectives (Gartner Group)

• “Project Portfolio Management” (PPM) did/does not solve the problem

(c) 2007 Charles G. Gray 5

Why Projects Fail

• Lack of alignment between IT projects and business objectives

• Improperly estimated IT projects– Dollars are easier than heads

• Lack of standardization of project processes

• Poor visibility into project performance

• Poor (or no) change management process

(c) 2007 Charles G. Gray 6

“Old” PPM is No Solution• Vendors develop feature-bloated products

– 70% of features are never used– Employees hate to use

• See no value added to their daily responsibilities

• Added costs are passed through to the customer

• Implementation of complex features drives up the cost

• Result – Millions of $$$ worth of software sitting on the shelf doing nothing

(c) 2007 Charles G. Gray 7

A “New Breed” of PPM

• Must be easy to use – Incents the customer to continue to subscribe

• Low start-up costs – customer can bail out at any time

• Simple recurring fee – no hidden costs

• New features provided automatically upon log-in– No extensive (painful) upgrades

(c) 2007 Charles G. Gray 8

“On Demand PPM” ® (Innotas)

• Up and running in days/weeks• Built with both “C-level” executives and

workers in mind– Rapid adoption due to ease of use

• Reasonably priced – scales well• Built-in “best practices”• Multi-featured

– Request management, project management, resource management, financial/time management

(c) 2007 Charles G. Gray 9

Project Definition

• A series of well-defined tasks

• Performed in a prescribed sequence

• Assigned to specific individuals

• Definite start and completion dates

(c) 2007 Charles G. Gray 10

A Successful Project

(c) 2007 Charles G. Gray 11

Barriers to Project Management• Poor communication

– Team doesn’t know what has already been done, or exactly what is to be done

• Disagreements

• Failure to comply with standards

• Personality conflicts

• Poor management

• Poorly defined project goals– Scope creep

(c) 2007 Charles G. Gray 12

Threats to a Successful Project• Ad hoc requirements management

• Ambiguous and imprecise communications

• Overwhelming complexity

• Undetected inconsistencies in requirements

• Insufficient testing

• Subjective assessment of project status

• Failure to properly assess risks

• Uncontrolled change propagation

(c) 2007 Charles G. Gray 13

Project Management• One project manager in charge

– Well defined responsibilities– Adequate resources

• Competent people• Money• Facilities/equipment

• Defined reporting structure

• Documented change management process– Seek to avoid “scope creep”

(c) 2007 Charles G. Gray 14

Change Management Process

• Every change formally identified– Communicated– Documented– Reviewed– Approved– Implemented

• Without it, delivering the project within “time, cost, and quality” objectives may be compromised

(c) 2007 Charles G. Gray 15

Change Management• Must have a well defined process, including

a change control manager and committee

• Request must include (in writing):– Detailed proposal description– Justification including CBA (what is the benefit?)– Impact of not implementing the change– Alternatives to be considered– Additional resource requirements

• Obtain signatures of all concerned

(c) 2007 Charles G. Gray 16

Getting Started• Agree on the purpose of the project• Define the objectives• Finalize the scope (prevent “creep”)• Identify activities• Assign resources• Create time and cost estimates• Make honest assumptions about “what if”• Propose alternative scenarios and build

contingency plans

(c) 2007 Charles G. Gray 17

How a Project Gets Done• Roles are “who”

– Behavior and responsibilities of a person or team - not the person themselves

• Artifacts are “what”– Outcome of activities – documents, etc.

• Workflow is “when”– Sequence of activities to be completed

• Activity is “how”– The actual tasks a worker performs

(c) 2007 Charles G. Gray 18

Task Sequencing• Finish-to-start

– Dependent task can’t start until its predecessor is finished

• Start-to-start– Dependent task can’t start until its predecessor has

started

• Finish-to-finish– Dependent task can’t be finished until its predecessor

is finished

• Start-to-finish– Dependent task can’t finish until its predecessor has

started

(c) 2007 Charles G. Gray 19

PERT Chart Example (CPM)

(c) 2007 Charles G. Gray 20

PERT Chart Example (CPM)

1

2

3

4

5

8

7

6

10

9 11

Create Schedule

Buy hardware

Installation

Programming Test code Test system

Write Procedure

System

Conversion

Training

User testing

Dummy

Activity

(c) 2007 Charles G. Gray 21

Microsoft Project Software• Tasks

– Summary– Subtasks– Recurring tasks– Milestones

• Links

• Constraints– Flexible or inflexible

• Costs

(c) 2007 Charles G. Gray 22

Gantt Chart Example

(c) 2007 Charles G. Gray 23

Gantt Chart Example

Click to View Full Size                                                                          

(c) 2007 Charles G. Gray 24

Project Controls• Senior management commitment is vital

• Documented project plan

• Project meetings – regularly scheduled– Agenda – Attendance – Commitment

• Project reports – structured – Oral at meetings– Written for “the record”

(c) 2007 Charles G. Gray 25

Commitment• Unambiguous executive commitment

– Clearly establish priorities– Staff members authorized to implement the

controls within the project framework

• Managers recognize (accept) high priority– Resource allocation (time, money, equipment)

• Staff allowed to reprioritize existing work as needed– Record and document progress and report to

RM Team and Security Steering Committee

(c) 2007 Charles G. Gray 26

Participants

• Mitigation owners– IT Architecture– IT Engineering– IT Operations

• Assisted by– Risk management team– Information security– Finance and accounting

(c) 2007 Charles G. Gray 27

Responsibilities

• IT Engineering– Determine HOW to implement controls

• IT Architecture– How to integrate control solutions with existing

systems

• IT Operations– Actually implements control solutions

• Finance and accounting– Ensure that spending stays within budget

(c) 2007 Charles G. Gray 28

Use Subject Matter Experts

• RM Team should assign an SME technologist to each identified risk

• Single point of contact

• Reduces risk of inconsistent messages from the RM Team

• Provides a “clean” engagement model throughout the process

(c) 2007 Charles G. Gray 29

“Defense in Depth” Concept

Courtesy of Microsoft ™

(c) 2007 Charles G. Gray 30

Physical Security Controls• Adequate locks

– Physical or electronic keys (e.g., RFID) • limit the number of “master keys”• Implement controls for issue and retrieval

• Perimeter fences – laser augmentation• Surveillance cameras/recorders• Prohibit “tailgating” of employees• Security badges – biometric systems• Strict controls for vendors, visitors, and

contractors

(c) 2007 Charles G. Gray 31

Network Defenses

• Well-designed architecture facilitates defense– Proper network design– Wireless network security– IPSec (IP security measures)– Admit only trusted computers to critical

network resources

(c) 2007 Charles G. Gray 32

Host Defenses• Strike balance between degree of

hardening and ease of use– Increased security usually means systems are

more difficult to use

• Disable certain services• Remove specific user rights

– Compartmentalization

• Update operating systems• Antivirus software• Distributed firewalls

(c) 2007 Charles G. Gray 33

Application Defenses• Applications exist in the context of the

overall system– Must consider the entire environment

• Adequate testing prior to putting into production– Seriously try to “break it” in test

• Run with the least amount of privilege, with the minimum exposure possible

(c) 2007 Charles G. Gray 34

Data Defenses

• Data is usually an organization’s most valuable resource

• Often stored locally– Particularly vulnerable to attack

• Encrypting File Service– Certificates based on ITU Recommendation

X.509 (SSL)

• Frequent backups