Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn...

13
Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn George Mason University Robert Nakles and Josh Schiefer IT Security Office George Mason University

Transcript of Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn...

Page 1: Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn George Mason University Robert Nakles and Josh Schiefer.

Departmental Risk Assessment Coordinators (DRAC)

Program

CUVA ConferenceMay 23, 2012

Mason InnGeorge Mason University

Robert Nakles and Josh SchieferIT Security Office

George Mason University

Page 2: Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn George Mason University Robert Nakles and Josh Schiefer.

Presentation Overview

• Purpose of the DRAC Program– State Requirements– University Response

• Review of DRAC Program– Key Components– The Role of the DRAC– The RA Process– Program Management– Current Status– Lessons Learned and Future Plans

Page 3: Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn George Mason University Robert Nakles and Josh Schiefer.

State Requirements

• Information Security Standard SEC501-06– 2.6 Risk Assessment

• For sensitive IT system, not less than every 3 years

– 4.2 IT System Security Plan• Documents security controls• Based on results of the risk assessment

• IT Risk Management Guideline SEC506-01– 6.2 Risk Assessment Process

• At least, once every 3 years, unless “substantial change”

Page 4: Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn George Mason University Robert Nakles and Josh Schiefer.

University Response

• In distributed environment, discover sensitive systems

• Centrally managed systems and departments– How is access controlled– How is data managed– Business processes that impact sensitive systems

• Involve knowledgeable staff within departments

Page 5: Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn George Mason University Robert Nakles and Josh Schiefer.

DRAC Program

• Purpose: to provide university departments with the framework and resources necessary to complete a required risk assessment for information technology (IT) security within their individual environments.

• Each department will appoint one or more Departmental Risk Assessment Coordinator or DRAC to conduct the IT risk assessment and develop an appropriate security plan.

– Helps each department come to terms with what risk they have

Page 6: Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn George Mason University Robert Nakles and Josh Schiefer.

The Role of the DRAC

• A successful Departmental Risk Assessment Coordinator (DRAC) is someone who knows the business processes of his or her unit, department or office and has been authorized by the department head to act on his or her behalf.

• The DRAC facilitates the completion of a risk assessment and security plan in a 3 year period of time.

Page 7: Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn George Mason University Robert Nakles and Josh Schiefer.

Profile of a DRAC

• Who is a DRAC?– Appointed by dean or vice president– Examples of DRACS

Page 8: Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn George Mason University Robert Nakles and Josh Schiefer.

The Risk Assessment

• The risk assessment questionnaire consists of a Business Impact Analysis and a series of security questions based upon industry “best practices,” university policies and applicable federal regulations.

• The security plan is a documented response to the risks identified during the completion of the questionnaire.

Page 9: Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn George Mason University Robert Nakles and Josh Schiefer.

Program Management

• The Information Technology Security Office provides resources and procedures for each DRAC so they can complete the risk assessment accurately and develop a practical security plan.

• Cohort based: Each DRAC is placed into a cohort based on risk level and/or similar business function. Meet quarterly.

• myMason: projects updates, exchange documents, scheduling, e-mail communications, etc.

Page 10: Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn George Mason University Robert Nakles and Josh Schiefer.

Current Status

• 2 Cohorts working now– Cohort A: administrative units • Active since April 2010

– Cohort B: academic space • Active since August 2010

Page 11: Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn George Mason University Robert Nakles and Josh Schiefer.

Lessons Learned

• Getting the right DRAC not always easy• Academic space presents different challenges

than the administrative. Research space even more difficult to hands around.

• Turnover• Managing Expectations• Resource intensive

Page 12: Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn George Mason University Robert Nakles and Josh Schiefer.

Next Steps

• Add additional Cohorts• Refine process• Overhaul Questionnaire• Utilize MyMason Portal more– Paper less

Page 13: Departmental Risk Assessment Coordinators (DRAC) Program CUVA Conference May 23, 2012 Mason Inn George Mason University Robert Nakles and Josh Schiefer.

Questions?• Contact information– Josh Schiefer• (703) 993-9893• Email: [email protected]

– Bob Nakles• (703) 993-2975• Email: [email protected]

• DRAC Web site– security.gmu.edu