Download as pdf or txt
Download as pdf or txt
You are on page 1of 68

Train. Test. Protect.

Prove you have the critical skills to defend your organization against
cyber threats with the only comprehensive, true-performance cyber
certification—ISACA®’s CSX® Cybersecurity Practitioner.*

Build your technical cybersecurity skills from anywhere


online, on demand in CSX’s unique live, dynamic
network environment. The virtual environment’s
real-time feedback allows practitioners to
immediately identify areas in which they
need more focus.

www.isaca.org/OnlineLearning-jv4

*ISACA’s CSX® Cybersecurity Practitioner (CSX-P) certification was named 2016 Top Professional Certification program by the SC Magazine Awards.

ISACA®, the Cybersecurity Nexus™ (CSX) mark, and ISACA’s Cybersecurity Nexus™ (CSX) products, certifications, and services are not affiliated with CSX Corporation
or its subsidiaries, including CSX Transportation, Inc.
Keep Learning
Get the training (and CPEs) you want, anywhere you
want it, with ISACA®’s online training solutions. Choose
from training options for individuals and groups.

www.isaca.org/OnlineLearning-jv4
The ISACA® Journal
seeks to enhance
the proficiency and
competitive advantage
of its international
readership by providing
3 32 managerial and
Information Security Matters: Privacy by Privacy Risk Management
Implementation and Execution technical guidance from
Andrea Tang, CIPP/E, ISO 27001 LA
Steven J. Ross, CISA, AFBCI, CISSP, MBCP experienced global
43 authors. The Journal’s
6 Case Study: Building an Enterprise
IS Audit Basics: Enhancing the IT Audit Security Program
noncommercial,
noncommercial,
Report Using COBIT 2019 Katie Teitler peer-reviewed articles
peer-reviewed articles
Ian Cooke, CISA, CRISC, CGEIT, COBIT 5 focus on topics
topicscritical
critical to
Assessor and Implementer, CFE, CIPM, 49
to professionals
professionals involved in
involved
CIPP/E, CIPT, FIP, CPTE, DipFM, ITIL Cybersecurity Incident Response
Foundation, Six Sigma Green Belt Fabian Garzón, CISM, CRISC, GCIH, and IT IT
in audit, riskgovernance,
audit, management,
Gustavo Garzón, CISM, CRISC, PMP governance,
security andsecurity,
assurance.
11 privacy and assurance.
The Bleeding Edge: Nothing but Blue Skies
Dustin Brewer, CISM, CSX-P, CDPSE, CCSP, CEH PLUS
55
14 Helpsource Q&A
The Network Sunil Bakshi, CISA, CRISC, CISM, CGEIT,
Tracey Dedrick CDPSE, ABCI, AMIIB, BS 25999LI, CEH, CISSP,
ISO 27001 LA, MCA, PMP
16
Innovation Governance: Governance for 57
Better Innovation Crossword Puzzle
K. Brian Kelley, CISA, CSPO, MCSE, Security+ Myles Mellor

58
FEATURES CPE Quiz
19 59
Digital Governance Standards, Guidelines, Tools and Techniques Read more from these
Read more from these
Guy Pearce, CGEIT, and Tony Gaffney, ICD.D Journal authors...
(Disponible également en français) S1-S4 Journal authors...
ISACA Bookstore Supplement Journal authors are
Journal authors are
28 now blogging at
now blogging at
Connecting Good Governance With Key Risk www.isaca.org/blog.
www.isaca.org/journal/
Kevin M. Alvero, CISA, CFE Visit the ISACA Now
blog. Visit the ISACA
(Disponible également en français) blog to gain practical
Journal blog, Practically
knowledge from
Speaking, to gain
colleagues and to
practical knowledge

Online-Exclusive
participate in the growing
from colleagues and to

Features
ISACA® community.
participate in the growing
ISACA® community.

Do not miss out on the Journal’s online-exclusive content. With new content weekly through feature articles
Do not
and miss
blogs, out
the on theisJournal’s
Journal more thanonline-exclusive content. With
a static print publication. new
Use content
your uniqueweekly
memberthrough
login feature articles
credentials to
and blogs,
access thearticles
these Journalatiswww.isaca.org/journal.
more than a static print publication. Use your unique member login credentials to
access these articles at www.isaca.org/journal.
1700 E. Golf Road,
Online Features
Online
The Features
following is a sample of the upcoming features planned for July and August. Suite 400
The following is a sample of the upcoming features planned for _______________ and _________________. 1700 E. Golf Road,
Schaumburg, IL 60173, USA
Building a Privacy Culture Deploying a Data Security Potential Blind Spots for Suite 400
Muhammad Asif Qureshi, CISA, Defense Executives Embarking on a Telephone
Schaumburg, IL 60173, USA
CIA, CISSP, PMP Jason Jiao, Ph.D., CPA Digital Transformation Program +1.847.660.5505
Chris Ngiba and Mayank Naik, Telephone
Fax: +1.847.253.1755
CISA, CRISC +1.847.660.5505
www.isaca.org
Fax: +1.847.253.1755
www.isaca.org
Discuss topics in the ISACA® Online Forums: https://engage.isaca.org/onlineforums
Follow ISACA on Twitter: http://twitter.com/isacanews; Hashtag: #ISACA
Follow ISACA on LinkedIn: www.linkedin.com/company/isaca
Like ISACA on Facebook: www.facebook.com/ISACAGlobal
INFORMATION
SECURITY MATTERS

Privacy by Implementation and


Execution
When I was in graduate school, I read a lot of I directed some disdain at the inscrutable prose in
scholarly journals. (None of them were as lively nor the “Privacy by Design” section of GDPR8 and stated
as useful as the journal you are now reading.) One that it was clearly written by a committee. Mr.
of the features I loved best was a rousing argument Cooke rises to the defense of laws written by
between academics about matters of miniscule multiple representatives. My objection is not to
interest to the general public. The articles, letters, writing groups, as such, but to the type of
counterarticles and counterletters were full of high incomprehensible verbiage that they often produce.
dudgeon, ad hominem attacks and general I am not the first to note that a camel is a horse put
rapscalliousness. together by a committee. On this issue, alas, I
believe Mr. Cooke and I fated to disagree.
A few issues back in the ISACA® Journal, I published
two articles about data privacy.1, 2 They expressed Most importantly, Mr. Cooke examines whether
my skepticism that current privacy laws, especially cyberattacks that resulted in privacy breaches are
the EU General Data Protection Regulation (GDPR), caused by a failure of design. Here our difference of
would accomplish their stated aims, with particular opinion is foundational and worth exploring in
focus on the concept of “privacy by design.” Not for further depth.
the first time, I staked out a contrarian position in
hopes of stirring up some controversy. Cyberattacks, Privacy and Risk
Assessment
And controversy I got. In a subsequent issue of this
Journal, Mr. Ian Cooke begged to differ.3 (You can I mentioned several such attacks in one of my
meet Mr. Cooke a few pages hence, as he, too, is a articles, one of which was the massive breach at
columnist here.) I want to point out first that Mr. Equifax.9 I do find it shocking that a company that is
Cooke is in very low dudgeon, is respectful
throughout his reply and is in no sense a
rapscallion.4 I will offer my ripostes in the
same spirit.

Replying to Comments
I had said that “data privacy laws should be focused
on cases of actual harm.”5 Mr. Cooke points out that
Facebook is accused of causing genuine harm by
“restricting who can view housing-related ads based
on their ‘race, colour, national origin, religion,’”6
which are sensitive personal data under GDPR. We
are in complete agreement, and that sort of misuse
of personally identifiable information (PII) is the
theme of my second article about organizations
that design un-privacy7 into their systems. I believe
and I have stated that we will achieve greater data
Steven J. Ross, CISA, AFBCI, CISSP, MBCP
Is executive principal of Risk Masters International LLC. Ross has been
privacy across society if we focus attention on writing one of the Journal’s most popular columns since 1998. He can be
breaches that hurt people and not on violations of reached at stross@riskmastersintl.com.
process and protocol.

ISACA JOURNAL VOL 4 3



but not implemented well. And even then, complete
NO MATTER HOW WELL AN implementation of security is impossible. No matter
ORGANIZATION’S SYSTEMS ARE DESIGNED how well an organization’s systems are designed
and implemented, they run on operating systems
AND IMPLEMENTED, THEY RUN ON and other infrastructure in which flaws are identified
OPERATING SYSTEMS AND OTHER daily. If there were to be a zero-day attack, how


could any organization be faulted for failing to
INFRASTRUCTURE IN WHICH FLAWS ARE anticipate and prevent it?
IDENTIFIED DAILY.
Even if perfect implementation were possible,
perfect execution cannot be, because execution
in the PII business could be so lax. But were their relies on fallible human beings. Security systems
systems poorly designed in terms of protecting the that undergird privacy will never be foolproof
information in their trust? According to press because the world contains too many fools. Yes, an
reports, a good case could be made, inasmuch as organization could design systems that anticipate
Equifax had experienced several successful dumb people doing dumb things, but too many
cyberattacks in the previous year.10 breaches are due to the failings of otherwise smart
people. And that is not to mention the unscrupulous
But without getting into the particulars of this case, and avaricious among us. Errors will occur and
about which I have no personal knowledge, let us ask personal information will be disclosed because of
the broader question: Are successful cyberattacks failures of trust as well as deficiencies of security.
indicative of poor privacy and security design? Based
on my experience, I think not. No organization that I Time Pressure
have dealt with sets out to have inadequate security.
The fact that their security proves to be deficient is As I wrote in the Un-Privacy article, it is the
often based on a shortfall in risk assessment. exigencies of the market that lead to poor privacy
over personal information. There is tremendous
It is well understood that organizations should pressure to get software to the market as quickly as
evaluate the risk to their information resources and possible. As it is, too much software is delivered
apply suitable controls consistent with their that does not do what it is supposed to do; it is
understanding of the potential for those resources to probably too much to ask that it not do what it is not
be misused. But sadly, there may be a gap between supposed to do, that is, disclose PII.
the assessment and the reality. Assessments are
extrapolations of known facts into potential It is not only commercial software that makes privacy
outcomes. To the extent that imprecision leads to by design difficult to implement and execute. Agile
error, these organizations find themselves exposed. development, so popular these days, creates
challenges in complying with GDPR and other privacy
Banks know that their information is valuable and at requirements. In my opinion, Agile undervalues
risk. So does the military. Yet banks have been documentation, which makes it difficult for auditors
severely attacked11 and so have military systems.12 and privacy specialists to determine whether
Surely no one thinks that organizations such as these and how privacy has been designed into a system.13
are incapable of designing security—and by extension While I am not saying that Agile is the enemy of
privacy—into their systems. Someone was simply privacy, I do believe that it is one more factor that
able to exploit a shortcoming that a risk assessment mitigates against implementing adequate privacy in
did not and could not identify in advance. system development.

Implementation and Execution So, Mr. Cooke, we both agree that privacy by design
is an admirable objective. Everybody ought to do it,
Ah, I can hear Mr. Cooke asking me, but how did but then everyone also ought to live in virtue and
those weaknesses get there? And I would answer, abhor sin. I am in favor of both privacy and virtue,
should he ask, that security was designed properly but I remain dubious about their achievement.

4 ISACA JOURNAL VOL 4


Ian Cooke Responds 8 Intersoft Consulting, Art. 25 GDPR, Data
Protection by Design and by Default, European
I would like to thank Mr. Ross for his thoughtful Enjoying
Union, 2016, https://gdpr-info.eu/art-25-gdpr/
and respectful column. However, if privacy and, 9 Siegel Bernard, T.; T. Hsu; N. Perlroth; R. Lieber;
this article?
indeed, virtue are admirable objectives, are they “Equifax Says Cyberattack May Have Affected
not something to which we should aspire?   143 Million in the U.S.,” The New York Times,
• Read Implementing
We should at least try. And we can only do this 7 September 2017, https://www.nytimes.com/
the General Data
by design. 2017/09/07/business/equifax-cyberattack.
Protection Regulation.
html?searchResultPosition=8
www.isaca.org/
Endnotes 10 Ibid.
implementing-the-
11 Cowley, S.; N. Perlroth; “Capital One Breach
gdpr
1 Ross, S. J.; “Why Do We Need Data Privacy • Learn more about,
Laws?” ISACA® Journal, vol. 5, 2019, Shows a Bank Hacker Needs Just One Gap to
Wreak Havoc,” The New York Times, 30 July
discuss and
https://www.isaca.org/archives collaborate on
2 Ross, S. J.; “Un-Privacy by Design,” ISACA 2019, https://www.nytimes.com/2019/07/30/
business/bank-hacks-capital-one.html
information and
Journal, vol. 6, 2019, https://www.isaca.org/ cybersecurity in
archives 12 Baron, K.; “Attacks on DOD Networks Soar as
Telework Inflicts ‘Unprecedented’ Loads,”
ISACA’s Online
3 Cooke, I.; “In Defense of Privacy by Design,” Forums. https://
ISACA Journal, vol. 3, 2020, Defense One, 16 March, 2020, https://www.
defenseone.com/threats/2020/03/attacks-
engage.isaca.org/
https://www.isaca.org/archives onlineforums
4 Each of us submits our articles four months dod-networks-spike-telework-brings-
before they are published, so this conversation unprecedented-loads/163812/
is occurring in slow motion, although Mr. Cooke 13 Foomany, F. H.; M. Miri; N. Mohammed; “A
and I did speak in March 2020. Tagging Approach to PIAs in Agile Software
5 Op cit Ross, 2019, “Why Do We Need Data Development,” International Association of
Privacy Laws?” Privacy Professionals (IAPP), 13 December
6 Op cit Cooke 2017, https://iapp.org/news/a/a-tagging-
7 This is a neologism if ever there was one, but it approach-to-pias-in-agile-software-development/
suits the purpose. If it is not a proper English
word, it ought to be. It’s my word and I’m
sticking with it.

Build and Prove Your Risk and Cyber


Audit Expertise Virtually, Anywhere
Be more in-demand with greater understanding of cyber-related risk and the know-how
to excel in preparing for and performing cybersecurity audits. Grow and a rm your
expertise with ISACA®’s accessible-anywhere Cybersecurity Audit Certi昀cate Program
training and testing.

www.isaca.org/ca-jv4

ISACA JOURNAL VOL 4 5


IS AUDIT
BASICS

Enhancing the IT Audit Report


Using COBIT 2019
Earlier this year, I authored a column on the have a primary strategy and, at most, one
“Components of an IT Audit Report.”1 These secondary strategy.3
components need to provide assurance, inform
auditees and others of management and control These strategies are realized by the achievements
issues, recommend corrective action, and represent of enterprise goals (figure 2).
the quality of the audit and the credibility of the
audit organization. How the audit report is In turn, alignment goals (figure 3) emphasize the
organized and written can significantly impact alignment of all IT efforts with business objectives.4
these objectives.2 A logical follow-up question to The alignment goals, in turn, drive the governance
this column would, therefore, be what would the and management objectives (COBIT® processes)
actual contents of these components look like? (figure 4).
Particularly, what would the “Findings, Conclusions
and Recommendations” and the “Executive Findings, Conclusions and
Summary” components look like? Recommendations
Setting the (COBIT 2019) Scene In my previous column,5 I shared a figure on the five
attributes of an audit finding (figure 5). I am now
Before discussing these components further, it is proposing that these attributes can be derived from
worth recapping some COBIT® 2019 concepts, as the components of the goals cascade (figure 6).
these will be referenced later.
The following is a sample internal audit finding
Enterprises can have different strategies, which can applying the method while also referencing another
be expressed as one or more of the archetypes useful resource for audit reports, the ISACA® Glossary.6
shown in figure 1. Organizations typically
Sample Internal Audit Finding:
Disaster Recovery
Ian Cooke, CISA, CRISC, CGEIT, COBIT 5 Assessor and
Implementer, CFE, CIPM, CIPP/E, CIPT, FIP, CPTE, DipFM, ITIL A disaster recovery plan (DRP) refers to the set of
Foundation, Six Sigma Green Belt  human, physical, technical and procedural
Is the group IT audit manager with An Post (the Irish Post Office based in resources to recover, within a defined time and cost,
Dublin, Ireland) and has over 30 years of experience in all aspects of an activity interrupted by an emergency or disaster.7
information systems. Cooke has served on several ISACA® committees,
was a topic leader for the Audit and Assurance discussions in the ISACA Our audit disclosed that the company would be
Online Forums, and is a member of ISACA’s CGEIT® Exam Item
unable to recover its sales order processing (SOP)
Development Working Group. Cooke has supported the update of the CISA®
system in line with business requirements
Review Manual and was a subject matter expert for the development of
both ISACA’s CISA® and CRISC™ Online Review Course. He is the recipient of (figure 3 AG05) should the primary processing
the 2017 John W. Lainhart IV Common Body of Knowledge Award for facility be rendered inoperable. Although
contributions to the development and enhancement of ISACA publications replication is in place between the primary and
and certification training modules and the 2020 Michael Cangemi Best secondary facilities, recovery strategies for
Book/Author Award. He welcomes comments or suggestions for articles different disaster scenarios have not been
via email (Ian_J_Cooke@hotmail.com), Twitter (@COOKEI), LinkedIn developed and documented in a DRP. Further, no
(www.linkedin.com/in/ian-cooke-80700510/), or on the Audit and Assurance disaster recovery tests have been performed. The
Online Forum (engage.isaca.org/home). Opinions expressed are his own
IT-related risk is, therefore, not being adequately
and do not necessarily represent the views of An Post.
managed (figure 3 AG02) (figure 5 Condition).

6 ISACA JOURNAL VOL 4


Figure 1—Enterprise Strategy Design Factor
Strategy Archetype Explanation
Growth/acquisition The enterprise has a focus on growing (revenues).
Innovation/differentiation The enterprise has a focus on offering different and/or innovative products and services
to their clients.
Cost leadership The enterprise has a focus on short-term cost minimization.
Client service/stability The enterprise has a focus on providing stable and client-oriented service.
Source: ISACA®, COBIT® 2019 Introduction and Methodology, USA, 2018

Figure 2—Enterprise Goals


Reference Enterprise Goal
EG01 Portfolio of competitive products and services
EG02 Managed business risk
EG03 Compliance with external laws and regulations
EG04 Quality of financial information
EG05 Customer-oriented service culture
EG06 Business-service continuity and availability
EG07 Quality of management information
EG08 Optimization of internal business process functionality
EG09 Optimization of business process costs
EG10 Staff skills, motivation and productivity
EG11 Compliance with internal policies
EG12 Managed digital transformation programs
EG13 Product and business innovation
Source: Modified from ISACA, COBIT® 2019 Introduction and Methodology, USA, 2018

Figure 3—Alignment Goals


Reference Alignment Goal
AG01 I&T compliance and support for business compliance with external laws and regulations
AG02 Managed I&T-related risk
AG03 Realized benefits from I&T-enabled investments and services portfolio
AG04 Quality of technology-related financial information
AG05 Delivery of I&T services in line with business requirements
AG06 Agility to turn business requirements into operational solutions
AG07 Security of information, processing infrastructure and applications, and privacy
AG08 Enabling and supporting business processes by integrating applications and technology
AG09 Delivery of programs on time, on budget, and meeting requirements and quality standards
AG10 Quality of I&T management information
AG11 I&T compliance with internal policies
AG12 Competent and motivated staff with mutual understanding of technology and business
AG13 Knowledge, expertise and initiatives for business innovation
Source: Modified from ISACA, COBIT® 2019 Introduction and Methodology, USA, 2018

ISACA JOURNAL VOL 4 7


Figure 4—COBIT Goals Cascade
Enjoying
this article? Stakeholder
Drivers and
• Read COBIT® Needs
2019 Framework:
Introduction and
Methodology. Enterprise
www.isaca.org/ Cascade to Goals
resources/cobit
• Learn more
about, discuss Alignment
and collaborate Goals
on audit and
Cascade to

assurance
ISACA’s Online Governance
Forums. and
Management
https://engage. Cascade to
Objectives
isaca.org/online
forums
Source: ISACA, COBIT® 2019 Introduction and Methodology, USA, 2018

Figure 5—Five Attributes of an Audit Finding


Attribute Description Identifies
Condition Findings The auditor findings. It is a statement of the problem or
deficiency. This may be in terms such as control weaknesses,
operational problems, or noncompliance with management or
legal requirements.
Criteria Requirements and baseline Statement of requirements and identification of the baseline that
was used for comparison against the auditor findings, based on
the audit evidence.
Cause Reason for the condition While the explanation of the cause may require the identification of
the responsible party, it is suggested that, unless required by audit
policy, the report should identify the organizational business unit
or person’s title and not the individual’s name. The same should be
applied to the identification of the person representing the relevant
point of accountability.
Effect Impact of the condition The answer to the question “so what?” It explains the adverse
impact to the operational or control objective. By articulating
impact and risk, the element of effect is very important in helping
to persuade auditee management to take corrective action.
Recommendation Suggested corrective action While the corrective action should eliminate the problem or
deficiency noted in the condition, the corrective action should be
directed toward addressing the cause.
Source: ISACA, IS Audit Reporting, USA, 2015

Figure 6—Attribute to Goals Cascade Mapping


Attribute Description Relationship to Goals Cascade
Condition Finding Failure to achieve alignment goal
Criteria Requirements and baseline Governance and Management Objectives (COBIT or others)
Cause Reason for the condition Why we failed to achieve the alignment goal
Effect Impact of the condition Failure to achieve enterprise goal
Recommendation Suggested corrective action Governance and Management Objectives (COBIT or others)

8 ISACA JOURNAL VOL 4


Depending on the nature and extent of loss of the
primary processing capabilities, the company
would not be in a position to ensure business
service continuity and availability (figure 2 EG06)
for the application affecting the customer-
oriented service (figure 2 EG05) and the quality
of management information (figure 2 EG07).
This would likely result in an adverse financial
impact affecting the enterprise’s growth strategy
(archetype) (figure 5 Effect or Impact).

The company needs to implement a DRP for the


SOP system in line with the business continuity
response. This should document all procedures
necessary for the enterprise to continue critical
activities in the event of an incident (COBIT Deliver,
Service and Support [DSS] DSS04.03). Further, this The report's executive summary should then be
should be tested on a regular basis against
based upon the effect or impact while also
predetermined outcomes (COBIT DSS04.04)
summarizing the recommendations.
(figure 5 Criteria).

While management acknowledged that disaster Some Points to Note


recovery was important, responsibility to ensure
Although already comprehensive, there is no reason
that the SOP system was maintained in line with
why an enterprise should not add to the archetypes,
business requirements (figure 3 AG05) had not
been assigned. We also found that the risk enterprise goals or the alignment goals if they give
management process did not formally consider greater direction or clarity to the organization.
the loss of IT capabilities (figure 3 AG02) Further, even if an enterprise does not use COBIT,
(figure 5 Cause). the goals cascade can still be implemented as each
of the management practices map to other related
Sample Recommendations guidance, for example, the US National Institute of
Standards and Technology (NIST) Special
We recommend that the company should: Publication (SP) 800-538 Information Security
• Identify key stakeholders and roles and Management Systems Requirements, International
responsibilities for defining and developing Organization for Standardization(ISO)/International
the DRP Electrotechnical Commission (IEC) ISO/IEC
27001:20139 and the Center for Internet Security
• Develop and maintain operational DRPs that (CIS) Critical Security Controls.10
contain the procedures to be followed to
enable continued operation of the SOP system
Conclusion
• Define objectives for exercising and testing the
Internal auditing is an independent, objective
plan to verify completeness of the DRP in
assurance and consulting activity designed to add
meeting business risk. This should include
value and improve an organization’s operations.11
input from risk management
There is no better way for internal audit to
• On a regular basis, review the plans to consider demonstrate and for senior management to see this
the impact of new or major changes to the value than by directly linking audit report findings to
organization, business processes, outsourcing the enterprise’s strategy. Further, the alignment
arrangements, technologies, infrastructure, and/or enterprise goals can be captured and
operating systems and SOP system measured as part of the audit follow-up process.12

• Ensure that management and staff are


adequately trained to effectively execute Endnotes
disaster recovery tasks and activities 1 Cooke, I.; “The Components of the IT Audit
Report,” ISACA® Journal, vol. 1, 2020,
(All based on COBIT DSS04.) https://www.isaca.org/archives

ISACA JOURNAL VOL 4 9


2 ISACA®, IS Audit Reporting, USA, 2015, 9 International Organization for Standardization
www.isaca.org/Knowledge-Center/Research/ (ISO) Information technology—Security
Documents/IS-Auditing-Tools-and-Tech_res_ techniques—Information security management
Eng_0215.pdf systems—Requirements, Switzerland,
3 ISACA, COBIT® 2019: Introduction and https://www.iso.org/obp/ui/#iso:std:
Methodology, USA, 2018, https://www.isaca.org/ iso-iec:27001:ed-2:v1:en
resources/cobit 10 Center for Internet Security Controls,
4 Ibid. https://www.cisecurity.org/controls/
5 Op cit Cooke 11 The Institute of Internal Auditing, About Internal
6 ISACA Glossary, https://www.isaca.org/ Auditing, https://global.theiia.org/about/
resources/glossary about-internal-auditing/Pages/About-Internal-
7 Ibid., “Disaster Recovery Plan” Auditing.aspx
8 National Institute of Standards and Technology 12 Cooke, I.; “Enhancing the Audit Follow-Up
(NIST) Special Publication (SP) 800-53 Revision Process Using COBIT 5,” ISACA Journal,
4, Security and Privacy Controls for Federal vol. 6, 2016, https://www.isaca.org/archives
Information Systems and Organizations, USA,
2013, https://nvlpubs.nist.gov/nistpubs/
SpecialPublications/NIST.SP.800-53r4.pdf

Train and Certify—


Then Apply Two Globally Adopted
Frameworks to Create Flexible
Cybersecurity Governance
Validate your knowledge of how to integrate
cybersecurity standards and enterprise governance
of information and technology (EGIT) to secure
your organization, and your future. Study and
certify from anywhere.

Learn more about the Implementing the NIST


Cybersecurity Framework Using COBIT 2019
certi昀cate program.

www.isaca.org/COBITNIST-jv4

10 ISACA JOURNAL VOL 4


THE
BLEEDING
EDGE

Nothing but Blue Skies


Virtualizing Humanity

I have been a remote worker for approximately five It can be argued that the cloud is not an emerging
years. The transition was not an easy one. However, technology. Some argue that it has been here all
in the past two years I have come to a very “Zen” along or at least since the conception of ARPANET
place in my work-from-home routine…or lack in the 1960s,1 while others say that “true” cloud
thereof. Yes, it took me three years to acclimate to computing was first introduced in 2006 by Google’s
the change in work pace, peer socialization and, of chief executive officer (CEO) at the time, Eric
course, the technology that enables it. Most of the Schmidt. The cloud as we know it today is an
difficulty in acclimation was due to a psychological immense collection of interconnected systems with
shift on my part. The need to push my square- hundreds of petabytes of data being stored,
shaped idea of what a job was into the round hole processed and transferred. We have also seen
of remote work tested my mental flexibility. But this massive adoption of this technology within the last
is an understandable lack of fluidity. I have had a decade. Nearly 90 percent of enterprises have
job, at least on a part-time basis, since I was 14 already adopted cloud technologies in some form
years old and, once I started my full-time career, the according to Flexera’s 2019 State of Cloud
40-hour minimum, 9-to-5, Monday-through-Friday Computing.2 However, the capabilities and
ideology was firmly ingrained in my psyche.
Change takes time—unless you do not have the
luxury of time.

With the recent global pandemic, many


organizations and their employees were faced with
the difficult task of transitioning to remote work,
where possible, and I have to say I am incredibly
impressed with the speed and agility with which this
has happened as far as the technology goes.
Seemingly overnight, meetings were shifted to
digital video conferencing platforms, collaborative
cloud platforms were being truly utilized, and, for
some, productivity did not skip a beat and perhaps
even increased. The truly amazing thing is that this
was not just a quick shift in our collective way of
work but also our way of personal life and
socialization. Perhaps you have been to at least one
social event hosted on Zoom. So, let’s look at one of Dustin Brewer, CISM, CSX-P, CDPSE, CCSP, CEH
the technologies that allowed this change to Is ISACA’s principal futurist, a role in which he explores and produces
happen so quickly. To find the answer, all you have content for the ISACA® community on the utilization benefits and possible
threats to current infrastructure posed by emerging technologies. He has
to do is look to the skies.
17 years of experience in the IT field, beginning with networks,
programming and hardware specialization. He excelled in cybersecurity
No Computer Is an Island Unto Itself while serving in the US military and, later, as an independent contractor and
lead developer for defense contract agencies, he specialized in computer
If you looked up and saw a cloud, you found the
networking security, penetration testing, and training for various US
answer. Also, how great that you are outside Department of Defense (DoD) and commercial entities. Brewer can be
reading the ISACA® Journal. Enjoy! reached at futures@isaca.org.

ISACA JOURNAL VOL 4 11



this technology is such a big player in our day-to-day
ONE OF THE MORE CHALLENGING lives, we still have issues with security, management
and governance of the cloud.
ASPECTS CAN BE THAT A LOT OF THE


SECURITY RESPONSIBILITIES FALL ON THE Wrangling a Cloud
END USERS. One of my favorite quotes about the cloud is, “There
is no cloud, it’s just someone else’s computer.”
While I know this is not 100 percent accurate, it
technologies that host the cloud are in a constant does help my mind wrap around the immensity and
state of discovery and implementation and, in that complexity of cloud computing and makes the task
sense, I would postulate that the cloud will remain an of securing and governing such systems a little less
emerging technology until it is replaced or is rolled daunting. Following this train of thought, let’s look at
into the next “big thing.” Also, considering this what “someone else’s computer” looks like.
technology was/is a big player in saving a great
number of jobs and providing computing power and Numerous sources proclaim that Linux makes up
data infrastructure to researchers investigating the majority of the cloud (up to 90 percent). For
possible drugs and vaccines for COVID-19 treatment some reason, this skill set still eludes some IT and
and prevention, it deserves a second look. cybersecurity professionals. Possibly because a
large number of enterprises utilized Microsoft
The pre-existing elasticity and capabilities of cloud products. But Microsoft is changing its once
collaboration tools offered the perfect virtual negative tone on Linux and even embracing it with
environment to meet the sudden growth in need for Windows Subsystem for Linux and utilizing Android
remote productivity. Google initially reported a 60 for its upcoming smartphone. Microsoft also
percent increase in use of its Meet platform at the admits that almost half of its Azure instances are
start of the COVID-19 pandemic.3 In March, running Linux distributions.6 Depending on your
Microsoft saw a 775 percent increase in use of its cloud service type (i.e., Software as a Service
Teams meetings solution in Italy after the Italian [SaaS], Platform as a Service [PaaS], Infrastructure
government’s social distancing and shelter in place as a Service [IaaS]), you may not need to worry
guidelines were established.4 These are staggering about security and governance at this granular level,
numbers, and it is perhaps even more impressive but understanding the underlying operating system
that the service providers were able to handle that (OS) can still be key to understanding mitigation
kind of influx. Other service providers, such as and compliance. As an added bonus, it can also aid
Amazon Web Services (AWS), have not published in understanding some IoT security issues.
usage statistics as of the date of this writing. You
do not have to be a futurist to predict that this trend On a higher level, we can turn to frameworks.
will continue for the foreseeable future as more Current cloud-specific guidance can be found via
organizations discover the benefits of remote work. the US National Institute for Standards and
Technology (NIST) Special Publication (SP) SP 500
The cloud has been an enabler for other emerging series as well as International Organization for
technologies as well. The Internet of Things (IoT) and Standardization (ISO) ISO 27017, but guidance is
artificial intelligence (AI) utilize cloud services on the not limited to cloud-specific documents. Recently,
back end. Serverless functionality is an up-and- I collaborated on specific guidance for governing
coming player in a plethora of applications. Even and securing remote working already present in
some blockchain implementations utilize the cloud. If COBIT® 2019, which can be applied to certain
you read my column in the ISACA Journal vol. 3, aspects of cloud usage.7 The NIST Cybersecurity
2020,5 you would know that I have a particular Framework (CSF)8 is also a good place to start with
passion for the interoperability of emerging tech for any information technology system. However,
which the cloud is a paramount player. And, although

12 ISACA JOURNAL VOL 4


frameworks are just a set of guidelines and best Endnotes
practices. It is up to the professional to be flexible
with her or his use of these tools and the 1 Regalado, A.; “Who Coined ‘Cloud Computing’?” Enjoying
enterprise’s specific use cases, especially when it MIT Technology Review, 31 October 2011, this article?
comes to emerging technologies. https://www.technologyreview.com/2011/10/
31/257406/who-coined-cloud-computing/ • Read Continuous
One of the more challenging aspects can be that a 2 Flexera, “Cloud Computing Trends: 2019 State Oversight in the
lot of the security responsibilities fall on the end of the Cloud Survey,” 27 February 2019, Cloud.
users. Education and culture play a large role in https://www.flexera.com/blog/cloud/2019/02/ www.isaca.org/
security incident prevention and continual cloud-computing-trends-2019-state-of-the- continuous-
compliance for cloud implementations. This is cloud-survey/ oversight
where we, as professionals in the IT field, can really 3 Kurian, T.; “How Google Cloud Is Helping During • Learn more
step up and lead by example. Most of our cloud COVID-19,” Inside Google Cloud, 31 March about, discuss
services are available from anywhere and that is, 2020, https://cloud.google.com/blog/topics/ and collaborate
basically, the point. We tend to let our guards down inside-google-cloud/how-google-cloud-is- on emerging
in the comfort of our own homes, however, it should helping-during-covid-19 technology in
be emphasized that while accessing enterprise 4 Microsoft Azure, Update #2 on Microsoft Cloud ISACA’s Online
services, the same precautions used in the office Services Continuity, 28 March 2020, Forums.
should be taken anywhere. https://azure.microsoft.com/en-us/blog/ https://engage.
update-2-on-microsoft-cloud-services-continuity/ isaca.org/online
5 Brewer, D.; “The Patter of Emerging forums
Out of the Clouds
Technologies,” ISACA® Journal, vol. 3, 2020,
While the cloud and its enabling technologies have https://www.isaca.org/archives
played a major role in business continuity during 6 Vaughan-Nichols, S. J.; “Microsoft Developer
this global crisis, there have been some pitfalls. Reveals Linux Is Now More Used on Azure
Security and privacy continue to be an issue and, in Than Windows Server,” ZDNet, 1 July 2019,
some cases, so does stability. As professionals https://www.zdnet.com/article/microsoft-
mostly concerned about security, privacy and developer-reveals-linux-is-now-more-used-on-
stability, these can seem like big problems, and they azure-than-windows-server/
can be, depending on the severity and breadth. But 7 Villanueva, L.; D. Brewer; “Managing Remote
if we can take a step back and look holistically at Work Environments With COBIT 2019,” COBIT
the evolution of the cloud, it is hard not to be Focus, 30 March 2020, https://www.isaca.org/
impressed with the virtual world that we have built. resources/news-and-trends/newsletters/
It provided and is still providing a haven where we cobit-focus/2020/managing-remote-work-
can continue to work (and play) even in some of the environments-with-cobit-2019
worst circumstances. The cloud allows us to 8 National Institute for Standards and
continue to engage, socialize and produce, keeping Technology, Cybersecurity Framework, USA,
our spirits up and demonstrating that, even in the 2014, https://www.nist.gov/cyberframework
darkest of times, there may yet be blue skies ahead.

ISACA JOURNAL VOL 4 13


THE NETWORK

Responding to a Changing
Business Landscape
Q: As ISACA’s incoming decisions. We receive a these experiences are
chair of the Board of lot of data from the relevant to this
Directors, how do you see chapters, but truthfully, organization.
ISACA® growing and the majority of the
adapting to the constantly membership does not
Q: What do you see as
changing marketplace and engage in the chapter
the biggest risk factors
needs of its constituents model, so we are losing
being addressed by
over the next year? input from a great
ISACA constituents?
number of our
constituency. This
A: That is a good question.
means we have to find A: As a board member
Since I joined the board, we
ways to access the full listening at chapters’
have been focused on
membership for data. events, I can tell you that
putting ISACA in the best
Further, we need data I worry about the
position to continue to be a
from the people we wish seeming inability of the
leader in its space. We have
to engage with, such as membership to
been laying the groundwork
the younger generations. communicate effectively
that will enable us to react
Once we have the data, to the people above
more quickly to a constantly
we will figure out how we them about the needs
changing marketplace. We
can “win” in the and risk within the
have added a number of
marketplace and deliver organization. A large part
people to the board who
value to the organization. of what ISACA does is
have significant business
provide the technical
experience and experience
skills members need to
Tracey Dedrick in strategy; we have a new Q: What in your past
progress in their careers,
Is a C-suite executive experienced in risk, compliance, management team with experience has best
and most of our
treasury and investor relations. She was executive deep experience in learning prepared you for this
members are in middle
vice president (EVP) and head of enterprise risk and development; we are position on the ISACA
management for Santander Holdings US, where she management. They are
investing in our Board?
was responsible for enterprise risk, operational risk in areas that are critical
infrastructure in the form of
and market risk for the Americas. Prior to this role, to the organization but
new technology; we are
she was EVP, chief risk officer and a member of the A: I have C-suite are not revenue
conducting new training
executive team for Hudson City Bancorp, where she experience in taking producing, and they do
built regulatory compliant risk, compliance and internally and adopting an
organizations that are not have a seat at the
information security functions. Prior to that, Dedrick agile work environment.
operating suboptimally table with management.
spent nine years at MetLife, where she successively Next, we will be focusing on
and fixing them based As a result, they do not
built the capital markets function for the newly acquiring the data we need
upon a lifetime of feel that they get the
demutualized company as assistant treasurer; to determine where and
reinvented the investor relations function, helping to experience in strategy, time, attention and
what our membership and
double the share prices as head of investor relations; risk and compliance, resources they need to
the marketplace want and
and installed a market-consistent economic capital finance, capital markets, ensure the safety and
need. We have all talked
model as head of market risk, leading to the eventual investor relations, security of the
about how we can engage
disposition of the annuity business. Additionally, regulatory management, enterprise. I hear this
Dedrick serves on the boards of the Royal younger people in our
and crisis management. lament a lot. We all know
Shakespeare Company of America and the Royal Oak organization, gain more
My experience ranges information security can
Foundation. She previously served on the conference diversity and expand our
from working in Fortune be highly technical and
committee of the US State of New Jersey Women’s global footprint, but we have
50 companies to small the devil is in the details.
Banking Association and on the board of Children’s never had solid data from
Aid and Family Services. private institutions. All of Those at the top are not
which to make good

14 ISACA JOURNAL VOL 4


generally technology
experts, so it is often a
and the Internet of
Things (IoT). Executives
education degrees and
certifications that fulfill a
1 What is the biggest risk challenge
being faced in 2020? How should it
be addressed?
matter of finding a way need to stay on top of technical market gap but I think it is safe to say COVID-19 and the impact on
to communicate in a the changing business do not require the full the economy and business models.

2
manner in which landscape and the risk broad education required
executive leadership can scenarios that are at institutions of higher What are your three goals for 2020?
understand and absorb. created as a result of learning, and making • Continue to improve governance and
Communicating that rapidly changing those affordable. I would accountability at the board and management levels
effectively is equally landscape. To do that, also like to see greater of ISACA
• Acquire the data we need to make solid, data-driven
as important as what they need to equip efforts to retool the skills
decisions regarding ISACA’s strategy on growing
you know. themselves with the of people who have lost relevant products, content and membership
ability to ask the right their jobs midcareer in • Continue to invest in and execute on ISACA’s
questions, whatever that an affordable and technology infrastructure
Q: You have extensive

3
entails. Two examples effective way.
experience in executive
are: not being afraid to What industry-related sources (blogs,
leadership. How do you
say “I do not understand, newsfeeds, etc.) do you read on a
see the role of Q: What has been your
explain it to me,” and regular basis?
executives changing to biggest workplace or I tend to read broader and more strategy-related
hiring the best people
meet the challenges of career challenge and content such as McKinsey, Arnold & Porter, EY and
you can who are experts
information security? how did you face it? just about anything fellow Board member Greg
in areas in which you Touhill recommends.
are not.
A: Carrying on a theme
that Brennan Baybeck
Q: What do you think are
A: There have been many
“biggest challenges” I 4 What is on your desk right now?
My taxes, board books of three institutions, a photo
put forward as incoming have had to face over the
the most effective ways of my parents, and a photo of Winston Churchill
Board Chair last year, years, each one seeming standing in the rubble of England’s Parliament
to address the skills,
having good information to be the “biggest” at the building after it was bombed during World War II.
gender and diversity
security is now table time it occurred. I would

5
gaps in the technology
stakes. Enough chief
space?
say that when you get to How has social media impacted
executive officers my age, there is little you you professionally?
(CEOs) have lost their have not faced, and it is I am not sure that it has. I have tended to avoid social
jobs and shareholder A: Ensure that women a matter of staying media, generally speaking. The one exception is
LinkedIn, but I can hardly call myself an active user.
value has been and other diverse focused and not letting

6
destroyed over candidates have role the problem overwhelm.
information security models at all levels My mantras are: 1. Keep
What is your favorite benefit of your
issues for executives to across the organization. perspective. The
ISACA membership?
The real benefit for me has been being on the Board
get the message. Organizations are good challenge may seem with such wonderful people who all care so much and
Executives are paid to at having diversity up to overwhelming at the work so hard to push this great organization forward.
identify, understand and a point but, as the outset, but “This, too, will
weigh risk and make
good choices that lead
to
pyramid narrows, diverse
candidates become very
scarce. I was surprised
pass”; 2. Get as much
information together as
soon as you can about
7 What is your number-one piece of
advice for IT risk professionals?
Since most of the membership is midcareer, I would
shareholder/stakeholder to learn how much it the issue; 3. Prioritize say listen to your organization’s earnings call. Find out
what is important to management and the investor
value creation. Today, meant to other women in and attack the issue in a
community and, if you do not understand what/why,
this often means the organization that I thoughtful and organized find someone to explain it to you. Then couch your
making significant had gotten this or that manner, and it will needs in terms of those objectives, and you may find it
changes in the business promotion. It gave them eventually lead to the easier to get time, attention and resources.
through digital hope that it was actually changes; 4. Galvanize
transformation, the use
of blockchain, robotic
possible for them as
well.
the troops and make the
goal clear so everyone is 8 What do you do when you are not
at work?
Spoil a nice walk by playing golf; do things for my
process automation aligned; and 5. Celebrate parents, whom I am still lucky to have; stare at my
(RPA), artificial all wins. garden and think about what I will have to move in
Another way to address
intelligence (AI), big data the fall; make order out of chaos by cooking; and
these gaps is to create entertain friends who do not mind my experimenting
on them. And read. I am a voracious reader.

ISACA JOURNAL VOL 4 15


INNOVATION
GOVERNANCE

Governance for Better Innovation


Leadership expert and former US Navy SEAL Jocko The key point for anything related to innovation is to
Willink wrote the following, “And most important, help the organization better compete. Therefore,
discipline will put you on the path to FREEDOM.”1 innovation does not want to set the organization
What does this have to do with innovation? back long term. That defeats the purpose of the
Everything, as it turns out. Discipline, by Willink’s innovation effort. As a result, innovation should
definition, is regularly doing the things you are embrace governance throughout the process. This
supposed to be doing. From a military preparedness ensures that what comes out of the innovation
level, being disciplined gives you a better chance for efforts is useful to the organization and not costly
survival and helps you deal with unexpected instead. If we were to just stop there, we have a
situations. It means you exercise when you can, you good enough reason to include governance as part
ensure your gear is ready to go, and you study up of innovation. However, there is more that
and know what you are supposed to be doing when governance provides for us.
you are supposed to be doing it. By being
disciplined, you free yourself to think, to seize new Governance: An Organization’s Safety Net
opportunities, to confront the critical. That is what
we are doing in innovation. The reason we have controls and governance is to
protect the organization. We are trying to reduce the
risk of a bad process or person. Over time,
governance evolves. As technology, people and
processes change, so, too, does the governance. It
must be adapted to fit the changing conditions. If
proper review and revision occur, governance helps
protect the organization.

On the other hand, when governance is not properly


kept up with, the organization is put at risk. It may
even be greater risk than no governance at all. A
tangible analogy here comes from the world of
sports. Imagine a piece of gear, such as a helmet,
with the requisite rules and standards that define
what minimum specifications the gear must meet.
In order to make things easier, some professional
sports organizations will even mandate a list of
approved models.

Now, imagine the case where an old model is still


K. Brian Kelley, CISA, CSPO, MCSE, Security+ approved even though the right testing will show it
Is an author and columnist focusing primarily on Microsoft SQL Server and
does not meet what is needed in today’s game.
Windows security. He currently serves as a data architect and an
Even worse, the minimum specifications have not
independent infrastructure/security architect concentrating on Active
Directory, SQL Server and Windows Server. He has served in a myriad of been updated. As a result, one helmet on the list of
other positions including senior database administrator, data warehouse approved gear meets the current standards but
architect, web developer, incident response team lead and project manager. does not properly address the current risk to the
Kelley has spoken at 24 Hours of PASS, IT/Dev Connections, player. It is likely players wearing such gear will
SQLConnections, the TechnoSecurity and Forensics Investigation suffer injuries that could have been prevented had
Conference, the IT GRC Forum, SyntaxCon, and at various SQL Saturdays, the standards and the list of approved helmet
Code Camps, and user groups. models been properly updated. It might even be

16 ISACA JOURNAL VOL 4


possible to argue that by not limiting the models of core message shines through. Everything that could
helmets, teams and players would have chosen distract from that core message must be cut.
Enjoying
better gear. In this case, we have an example where
an outdated set of governance controls could The nature of governance is that it should tell us
this article?
potentially result in greater risk. what is off limits. It tells us what is not core. If there
is an area of the market we are not supposed to get
• Read Rethinking
The reason I make a point about outdated into or that is so tightly controlled with regard to
Data Governance
governance is that governance itself is not what particular processes and even specific systems, we
and Data
impairs innovation. Rather, it is outdated know those are areas not to waste time with on the
Management.
governance that gets in the way of innovation. innovation side, as there are likely to be bigger
www.isaca.org/
However, outdated governance is not just a problem payoffs elsewhere. Therefore, governance helps
rethinking-data-
for innovation. Rather, it is a risk to the overall define our focus, which increases the likelihood that
governance
organization. Therefore, it should be addressed in the innovation efforts will pay off.
• Learn more
that context.
about, discuss


and collaborate
Governance: Innovation for Other Areas on audit and
HAVING PROPER, of the Organization assurance in
What I have found in years of experience in IT and ISACA’s Online
UPDATED GOVERNANCE audit/security is that oftentimes we define a control Forums.
MEANS WE CAN FOCUS and, as long as it keeps on working for us, we do https://engage.


not spend time/effort trying to improve it. This is isaca.org/online
MORE ON THE INNOVATION logical, as we would rather spend our resources on forums
EFFORT ITSELF. moving the needle forward. Only when there is pain
around a control do we tend to revisit it.

Governance: The Freedom to Hyper Focus The great thing about innovation is we are often
By having proper governance, we know what the building new things or implementing things in a new
rules are in critical areas with respect to the way. In that effort, we get the opportunity to revisit
operating environment. We do not have to think controls. Perhaps a way we are building something
about what the rules should be as we are working in the innovation is applicable to an existing control.
on something to move the organization forward. For instance, we want to better parse web server log
The time we do not have to spend thinking about traffic to spot problems before an outage results. In
what the rules should be frees us up to be able to the effort to build this better web server log parser,
innovate. This is the core message behind Willink’s we also build something that might be applicable to
quote that “discipline equals freedom.” Having controls around web server monitoring for the
proper, updated governance means we can focus organization.
more on the innovation effort itself.
We could also realize something we build to meet
Often, when writing an article or preparing a talk, it governance requirements is applicable somewhere
is not unusual to have too much material. Writers else. For instance, if I need to build a better rights
and speakers must spend time trying to pare down tracking system for a particular application that is
the material to meet the requirements of the work. considered critical, in the process of building that
The general rule is the shorter the article or talk, the system I may reveal information that could be used
more time will have to be spent to do the cutting. to improve employee on-boarding processes, which
The reason to do the cutting is to ensure that the can be tossed over to innovation to flesh out.

ISACA JOURNAL VOL 4 17



Governance: The Value of Intent
NOT ONLY CAN
There is an old maxim in chess, “Better to have a
bad plan than no plan at all.” The meaning behind GOVERNANCE TELL US
the maxim is that it is better to have an WHERE WE SHOULD NOT
understanding of what you are trying to accomplish
than be totally lost and just pushing pieces to WASTE OUR TIME, IT CAN


complete moves. The difference is intent. TELL US WHERE WE SHOULD
Governance, when we understand the intent, gives BE SPENDING TIME.
us business value. It tells us what most needs
protecting. It reveals to us where the weak points what should be avoided. Knowing what to cut out of
are located. It lets us know on what we could be the picture helps tremendously. Second, efforts
working. That is valuable information to an from innovation can assist governance, but
innovation effort. governance efforts themselves can lead to insights
on expanding technology and processes outside of
Not only can governance tell us where we should the realm of meeting a control to bring more
not waste our time, it can tell us where we should efficiency elsewhere. Finally, by taking the time to
be spending time. If we are looking to maximize the understand the governance, the whys behind the
return on investment (ROI) of an innovation effort, controls, we can often better understand what is
that is exactly what we need. truly important to the organization and where there
are gaps that need filling. That gives us a better idea
Embracing Governance of where innovation can be put to use.

Not only can governance keep us from making huge


missteps that cost the organization, but it can help Endnotes
innovation efforts. The first thing governance can 1 Willink, J.; Discipline Equals Freedom Field
do is pare down what we can focus on by telling us Manual, St. Martin’s Press, USA, 2017

Prepare for Certi昀cation


Exam Success at Home

Set yourself up for success with ISACA®’s o cial,


expert-designed solutions to provide the most
comprehensive and up-to-date prep available—online.

www.isaca.org/credentialing-jv4

18 ISACA JOURNAL VOL 4


FEATURE

Digital Governance
Closing the Digital Strategy Execution Gap
challenged in this, given that it begins with the end
Disponible également en français user crafting the stories, which are then
www.isaca.org/currentissue implemented and deployed either traditionally or in
a DevOps paradigm.
Never before has there been such an intense focus
on digital as during the COVID-19 pandemic. This A key question is whether reactive IT is sufficient
has been especially true for the business continuity for an organization to sustain its competitiveness
management (BCM) efforts needed to provide and whether strategically proactive IT is becoming a
work-from-home functionality to support social necessity in the interests of organizational
distancing. Organizations that struggled to action sustainability. This key question was introduced in
their business continuity plans (BCP) will, in effect, IT-business alignment work and the Strategic
have experienced a digital execution gap (i.e., the Alignment Model (SAM) of 1990.3 It remains
difference between the aspirations and the reality of foundational literature for any governance
effecting business continuity). professional, providing a qualified means to frame
IT oversight regarding the governance
In the same way that a digital gap is experienced in professional’s fiduciary duties on the board.
BCP, there is also an enterprise digital strategy
execution gap (which incorporates BCP). The The first reason for SAM’s continued relevance is in
following details how governance ensures that the the original article’s title, “Strategic Alignment: A
enterprise digital strategy execution gap is as Model for Organizational Transformation via
narrow as it can be, ultimately supporting Technology.” An evolution of the article was
organizational sustainability. published in 1999, where the article’s title had
become even more interesting: “Strategic
Reinforced by the waterfall model of software Alignment: Leveraging Information Technology for
development,1 IT has typically been a reactive Transforming Organizations.”4
enabler of business. The waterfall model begins
with business giving IT their requirements, which IT Both titles seem appropriate for today’s digital
then develops, tests and, ultimately, deploys into transformation texts because digital transformation
production—all in response to the business is instrumental in organizational transformation,
requirements. The Agile methodology2 can also be impacting the organization’s operating and

Guy Pearce, CGEIT


Has served on governance boards in banking, financial services and a not-for-profit, and as chief executive officer (CEO) of a
financial services organization. He has taken an active role in digital transformation since 1999, experiences which led him to
create a digital transformation course for the University of Toronto School of Continuing Studies (Ontario, Canada) in 2019.
Consulting in digital transformation and governance, Pearce readily shares more than a decade of experience in data governance
and IT governance as an author in numerous publications and as a speaker at conferences. He received the 2019 ISACA®
Michael Cangemi Best Author award for contributions to IT governance, and he serves as chief digital transformation officer at
Convergence.Tech.

Tony Gaffney, ICD.D


Is a CEO with extensive corporate director experience. He has led and governed enterprises, from small to large (US$3B), through
the development and implementation of strategies enabled by technology and digital. His CEO experience includes organizations
in the financial, technology, telecommunications, professional and managed services sectors. As a corporate director, Gaffney
has served on strategy (chair), technology (chair), human resource (chair), CEO search (chair), special (chair), risk, audit and
conduct committees. He is a graduate of the Rotman Corporate Directors program and serves on the advisory board of
Convergence.Tech.

ISACA JOURNAL VOL 4 19


business models and, ultimately, the customer by detailing not only what needs to be done—
experience.5 From another perspective, digital strategic IT alignment—but also outlining how this
transformation in any industry integrates may be achieved across four perspectives. Even
technology, value creation, structure and financials.6 more interesting recently, is how the effectiveness
of IT-business alignment can be measured.8
Integrating both the operating model, the business
model and the customer experience on the one The SAM perspectives sustain the relevance of SAM
hand with the contexts of technology, value today. For example, the technology exploitation
creation, structure and financials on the other, a perspective is explicit about technology’s role in
table such as figure 1 can be created, and it shaping business strategy, an instrumental step in
highlights technology’s transformational role. today’s digital transformation efforts. Furthermore,
Another reason for SAM’s sustained relevance is its hints of the drivers of the digital strategy execution
four perspectives on IT planning:7 gap are found in the next three perspectives, with a
mismatch between strategy and IT execution driven
1. Technology exploitation—IT’s influence on
by, for example, flaws in the interaction between
business strategy, a concept at the heart of
business and IT, or if the IT interpretation of the
today’s digital transformation paradigm
business strategy is flawed. All of these continue to
2. Technology leverage—The more traditional comprise many of today’s governance challenges.
understanding of IT’s role, which is how IT
supports and enables the business strategy Figure 2 illustrates how the newer contexts of
digital transformation can still be articulated in
3. Strategy implementation—Implementing
terms of combinations of the original four domains
business strategy enabled by the interaction
of the SAM. Given SAM’s sustained relevance, it is
between business and IT infrastructure
little wonder that it is still useful in articulating
and processes
strategic alignment for digital transformation
4. Technology implementation—Interpreting the IT almost in defiance of its age.
strategy via the requirements for IT
infrastructure and processes The Strategy Execution Gap
In particular, what differentiates SAM from some of The strategy execution gap is the difference between
the later technology and IT research organizations’ the objectives articulated in an organization’s
proposals is the clarity on how to achieve alignment corporate strategy (the sum of business, IT, human

Figure 1—Organizational Scope of Digital Transformation


The Enterprise Scope of Digital Transformations
Digital Transformation A. Operating Model B. Business Model C. Customer Experience
1. Use of technology Implied in the technology Reactive or proactive Reactive or proactive
Key Constructs in Digital Transformation

component of the business enablement customer experience


operating model enablement
2. Changes in value Technology-driven cost Technology-driven revenue Technology-driven
creation reduction, and better generation, and better incremental customer
risk control risk control attraction and retention,
and better risk control
3. Structural changes Implied in the people, Introduced by new Technology-driven
process, technology, data digital business models extended or expanded
and IT governance aspects and the technological markets
of the operating model enhancement of existing
business models
4. Financials Lower capital and Increased revenue from Increased sustainability
operating costs, and lower existing sources and from and relevance through
risk (which also translates new revenue streams increased customer
to lower cost) retention and heightened
customer attraction

20 ISACA JOURNAL VOL 4


resources [HR] and operations strategies) and the These findings have major implications for
results achieved from the execution of that strategy governance. If the staff lacks strategic understanding
(figure 3). The gap could therefore originate in many in their roles, it is little wonder that the strategy
different places within the organizational strategy execution gap is a concern. Some of the capability
(e.g., between any combination of the four SAM gap could be an outcome of poor alignment between
domains shown in figure 2). IT and business and, thus, the poor allocation of
organizational resources with respect to the
The strategy execution gap is an enduring problem,9 organization’s strategy. Capability building, therefore,
with two-thirds of senior executives thinking that includes ensuring alignment between IT capabilities
their organizations lack the right capabilities to and corporate strategy execution.
execute their strategies,10 resulting in gaps between
expectations and outcomes. This implies that the Particularly challenging is that both IT and business
cause of the gap is in the “Business Strategy alignment have a context in the complex
Implementation” and/or “IT Strategy environment within which the organization
Implementation” SAM domains. operates. In addition, factors such as technological
evolution and changes in regulation, customer
The gap is such that organizations realize less than preferences, macroeconomy, and competition13 all
two-thirds of the financial performance their corporate impact organizational strategy and, thus, the nature
strategy proposes and reflect that only 7 percent of of the required IT alignment.
staff members understand the expectations of them
in executing the strategy.11 Furthermore, two-thirds of The Digital Strategy Execution Gap
chief executive officers (CEOs) admit that they lack
the capabilities required to create value, and 80 Two characteristics of strategic management are
percent of executives admit that their strategy is not highlighted in SAM. These are strategic fit or the
well understood in their organization.12 This version relationship between the external environment in
implies that the cause of the gap could be in any or all which the organization competes, and the
four SAM domains shown in figure 2. organization’s internal capabilities and functional
integration or the relationship between business

Figure 2—The 30-Year-Old SAM Domains Overlaid With Modern Digital Transformation Domains

Overall financials (and other measures of business success)

Business Strategy IT Strategy


Use of Technology
Value Creation
Changes in

Business Model + Operating


Customer Experience Model (A)

Structural Changes

Business Strategy IT Strategy


Implementation Implementation

ISACA JOURNAL VOL 4 21


Figure 3—Strategy Execution Gap Is the Difference Between Desired Strategic
Outcomes and Actual Strategic Outcomes

Strategic
Outcomes Strategy
execution
n ce gap
orma
ic Perf
at e g
re d S tr
Desi rman
ce
o
ic Perf
rateg
al St
Actu

Current State Performance

Today Strategic
Time Planning
Horizon

and IT capabilities. Thus, the IT strategy should be being missed. The survey responses from 1,591
articulated both in terms of an external and internal senior business leaders in the United Kingdom and
domain,14 with a digital strategy being an element of the United States termed the extent of the gap “a
the IT strategy. In this context, two key areas exist digital strategy execution crisis.”16
where an execution gap can occur:
Of those organizations that do implement digital
1. Difficulties in translating the implications of the
strategies, only 38 percent of them being able to
external environment on an organization’s
determine the outcomes of their digital
competitiveness
transformation initiatives17 is a failure, not only to
2. Difficulties in the relationship between shareholders—an unknown return on investment
technology enablers and business execution (ROI) for the time, effort and money expended—but
also to customers who will subsequently be
While point one previously is an enterprise attracted to competitors where the digital
governance challenge, point two highlights the area investments produce a rich, seamless and
within which the digital strategy gap arises. The integrated customer experience. This speaks to the
greater the difficulties in aligning IT with business, value and value propositions and financial
the greater the extent of unmet expectations and outcomes of figure 1, again demonstrating poor
the greater the digital strategy gap. alignment between the SAM domains these engage
with shown in figure 2.
The digital strategy execution gap is serious, with
only 10 percent of enterprises from a sample of 340 Governance’s Role in Narrowing the
large global enterprise senior executives having a Digital Strategy Execution Gap
plan to deploy their digital strategies,15 something
akin to the finance gap in corporate strategy These issues should be better governed to reduce
execution mentioned earlier. the severity and impact of the digital strategy
execution gap. To minimize the strategy execution
Given that a digital strategy is an element of an gap, governance professionals can:
enterprise strategy and that digital transformation is • Ensure enterprise strategy efficacy, followed by
key to organizational resilience, sustainability and IT (and digital) strategy efficacy, the latter of
relevance, if only 10 percent is being executed, it is which may itself feed the enterprise strategy in a
no surprise that less than two-thirds of the financial proactive paradigm. Possibly an implied
objectives expressed in the enterprise strategy are

22 ISACA JOURNAL VOL 4


assumption of SAM, there is no point aligning
poorly articulated strategies (SAM’s Business
and IT strategy domains).
• Ensure an effective technology horizon scan to help
determine the best enablers of corporate strategy
objectives. A balance exists between considering
proven technologies and new technologies that
often offer little more than promises. Indeed, many
challenges associated with the governance of
innovation and innovative technologies exist.18
Selecting an inappropriate technology for the
organization guarantees that part of a strategy will
not be executed, thus facilitating a strategy gap
(SAM’s IT Strategy domain).
• Note that IT may sometimes be in a stronger
Boardroom Observations and
than expected position to propose new digital
business models and, therefore, create new Commentary
revenue streams. The overall governance Because many root causes underly both strategy
challenge is to ensure consistency between and digital strategy gaps, digital transformation
analog and digital business models and manage presents great opportunity. However, many do not
the incremental risk of the digital innovation realize the anticipated benefits and, for some, a
(SAM’s IT Strategy and Business Strategy). failed transformation challenges their very
• Distinguish between business as usual (BAU) sustainability. Although digital transformation
operations and innovations that increase the governance best practices are at low maturity,
organization’s relevance and sustainability, which emerging boardroom practices, when applied
is an important construct in digital transformation smartly, can improve certainty of outcomes.
that will need appropriate oversight to ensure Consider the four categories of practice highlighted
architectural fit and a valid allocation of resources, in figure 4.
at least if the need to demonstrate ROI is required.
This falls into an emerging field of governance Talent and Expertise
called innovation governance. Having the courage to recognize what is not known
and ask for help may be an old adage, but it is fully
• Ensure that organizational structures, applicable to digital strategy development and
governance (i.e., roles, responsibilities, execution. Boards and management teams need to
accountabilities) and processes are realigned look in the mirror and critically assess whether they
and monitored. Seventy-six percent of 80 senior have the required talent and expertise to develop a
executives from 20 countries and 25 industries digital strategy and to execute the transformation.
cited employee interaction as a major constraint
to strategy execution: “Executives know the Because boards can be ill-prepared for digital
barriers to long-term success are a lack of transformation oversight,22 board skills need to be
interaction and collaboration.”19 Furthermore, assessed and refreshed as needed. Steps to ensure
culture (behavior) has been recognized as one of competent execution include board education,
the most significant critical success factors for advisors’ engagement and, if appropriate, the
successful IT implementation,20 with one-third of appointment of directors with the required
2,135 global executives polled citing culture as expertise, all toward ensuring the competent
the top barrier to digital transformation.21 execution of the directors’ fiduciary responsibilities.
However, absent of a catalytic event, these take
time to effectuate change.

ISACA JOURNAL VOL 4 23


Regulators are also increasingly critical of this level of business strategy that is enabled by digital technology
board accountability. For example, in Canada, the because these can only be developed through the
Office of the Superintendent of Financial Institutions fusion of great business and digital minds that fully
(OSFI) Corporate Governance Guideline (CGG) understand digital capabilities and use cases to fully
requires the board to approve and oversee the: envision the strategic possibilities for the creation of
new and innovative customer experiences, products,
• Appointment, performance review and
revenue streams and efficiencies.
compensation of the CEO and other key
members of senior management
Therefore, engaging proactive IT as equal partners
• Mandate resources and budgets for the in the strategy development and refresh processes
oversight functions23 is imperative. Doing so strengthens an
organization’s ability to envision how markets
Indeed, board members are required annually to evolve, shape the industry, and the manner in which
attest to their compliance under this guideline, it can lead and achieve its performance aspirations.
ensuring that adequate and sufficient resources However, a 2020 survey of 302 global c-suite
exist to execute the business plan and reduce the executives in large organizations shows that IT
strategy and digital strategy gaps. develops an equal partnership with business only
one-quarter of the time.24
Strategy Development
As highlighted earlier, IT’s proactive role in strategy Specifically, an emerging board practice not only
development is a rapidly developing paradigm. It is demands transparency in the enabling digital
also a prerequisite in the development of any leading strategy but also targets customer experience

Figure 4—Board Focus for Narrowing the Digital Strategy Execution Gap

Strategy
Development

Board Focus Business


Talent Case and
and Areas for
Digital Resource
Expertise Allocation
Governance

Execution

24 ISACA JOURNAL VOL 4


outcomes, the enabling business model, operating In terms of the right CEO and management team,
model, supporting talent and workforce plans, digital transformation quite often requires different
which endorses SAM’s sustained relevance and the leadership skills, both during the transformation and
modern digital transformation domains articulated operation of the business afterward. Boards have a
in figure 2. duty to understand the new skills required and
ensure that the right CEO and leadership team are in
Business Case and Resource Allocation place to execute this digital transformation. The
Enlightened boards are beginning to value digital right CEO is not merely a permission giver,
transformation business cases that fully identify the figurehead or an endorser; the right CEO is both the
opportunities and associated risk scale in a chief digital ambassador and arbiter of the digital
transformation execution plan that manages executive vision, ensuring that the executive team remains
sponsorship, outcomes, performance metrics, project committed to achieving the digital vision,29 thereby
ownership and resource requirements. driving the elimination of the digital strategy gap.


Done well, this addresses the previously mentioned
fact that two-thirds of CEOs and executives admit DIGITAL
that they lack the capabilities to create value and TRANSFORMATION QUITE
execute their strategies.25, 26
OFTEN REQUIRES
Execution DIFFERENT LEADERSHIP
To achieve target outcomes, boards include
strategy and digital transformation reports that SKILLS, BOTH DURING THE
provide a keen lens on transformation oversight and TRANSFORMATION AND


execution, focusing on progress against key
metrics, risk, opportunities and interventions to OPERATION OF THE
course correct where necessary at the quarterly BUSINESS AFTERWARD.
board meetings.

“Transition risk management” is also gaining Culture, too, needs to evolve as an important
acceptance as a risk management framework that element of digital transformation. Examples include
includes oversight of digital transformation risk, ensuring that leadership teams are instilling agility
with the goal of achieving greater levels of certainty and the mentality that it is “OK to make mistakes,
in the achievement of target outcomes. Transition but learn from them and fail fast.” While every
risk defines the point where something defined as a organization will face technological challenges in
risk begins to materialize.27 The top five transition their digital transformation journey, “transforming
risk factors include:28 an organization’s culture is more challenging.”30

1. Schedule delays
Compared to Waterfall, Agile is a methodology
2. Service costs better suited to achieving the desired agility
because it deals with uncertain and unpredictable
3. High-demand skill sets
environments and helps ensure prioritization of the
4. Service quality degradation right (sub)projects.31 However, accommodating
Agile and agility in a large organization steeped in a
5. Managing service provider effectiveness
Waterfall culture is challenging.
Moreover, boards also focus on ensuring that the
Given the recruitment cost, talent war and poor
right CEO and leadership team are in place, culture
employee engagement cost, the latter is high on many
is evolving the way it needs to and employees are
leaders’ agenda.32 Successful digital transformation
engaged in the strategy execution.

ISACA JOURNAL VOL 4 25


includes empowered employees who have the set is the evolution of governance demonstrated
autonomy and tools they need to do their job not only in theory, but also by means of the
Enjoying successfully, leading to greater customer supporting enterprise governance trends found in
this article? satisfaction,33 the ultimate outcome of digital today’s boardrooms.
transformation. To achieve this, boards are
• Learn more challenging management to ensure that through Endnotes
about, discuss effective and continuous communications, each
and collaborate employee understands how the change impacts them, 1 Hughey, D.; “Comparing Traditional Systems
on risk their roles going forward and ways they personally can Analysis and Design With Agile Methodologies,”
management in contribute to the transformation and, eventually, University of Missouri—St. Louis (USA), 2009,
ISACA’s Online enterprise performance in the new paradigm. http://www.umsl.edu/~hugheyd/is6840/
Forums. waterfall.html
https://engage. Done effectively, these strategies mitigate the 2 Agile Alliance, “What Is Agile?”
isaca.org/online previously mentioned facts that 80 percent of https://www.agilealliance.org/agile101/
forums executives admit that their strategy is not 3 Henderson, J.; N. Venkatraman; “Strategic
understood in their organizations,34 only 7 percent Alignment: A Model for Organizational
of staff understand the expectations of them in Transformation Via Technology,” Center for
executing the strategy, and organizations realize Information Systems Research, MIT Sloan
less than two-thirds of the financial performance School of Management, Cambridge,
their corporate strategy proposes.35 Massachusetts, USA, November 1990,
https://dspace.mit.edu/bitstream/handle/1721.1/
These board trends are increasingly helping to 49184/strategicalignme90hend.pdf?sequence=1
better align IT with business to narrow the digital 4 Henderson, J.; N. Venkatraman; “Strategic
strategy gap. Alignment: Leveraging Information Technology
for Transforming Organizations,” IBM Systems
Journal, vol. 38, iss. 2 and 3, 1999,
Conclusion
https://pdfs.semanticscholar.org/e840/
The 30-year-old SAM continues to have the power to 2b65103442e2517982e5e3eb330f72886731.pdf
create an IT and overall digital transformation strategy 5 Pearce, G.; “Enhancing the Board’s Readiness
that proactively contributes to an organization’s digital for Digital Transformation Governance,” ISACA®
future. The issue of a digital future has never been as Journal, vol. 5, 2019, https://www.isaca.org/
important for so many businesses as it is today, if it is archives
not already too late for them. 6 Matt, C.; T. Hess; A. Benlian; “Digital
Transformation Strategies,” Business
For those organizations that have implemented a Information Systems Engineering, vol. 57, iss. 5,
digital strategy, many will have experienced a digital 2015, https://aisel.aisnet.org/cgi/
strategy gap, part of an enterprise strategy gap that viewcontent.cgi?article=1351&context=bise
ultimately results in a financial expectations gap for 7 Op cit Henderson and Venkatraman 1990
the organization. As an example, one part of a 8 De Haes, S.; W. Van Grembergen; Enterprise
digital strategy under a particularly harsh spotlight Governance of Information Technology,
under the coronavirus pandemic is BCP. It is now 2nd Edition, Springer, USA, 2015, https://www.
strongly in focus for organizations that, for example, amazon.com/Enterprise-Governance-
found that their BCPs are not quite up to the task of Information-Technology-Professionals/dp/
a mass work-from-home requirement, in some 3319145460
cases resulting in financial losses for organizations 9 Wiita, N.; O. Leonard; “How the Most Successful
due to lost business. Teams Bridge the Strategy-Execution Gap,”
Harvard Business Review, 23 November 2017,
Ultimately, SAM showed itself to be one part of an https://hbr.org/2017/11/how-the-most-successful-
important tool set that can help to narrow the digital teams-bridge-the-strategy-execution-gap
strategy execution gap. The other part of the tool

26 ISACA JOURNAL VOL 4


10 Leinwand, P.; C. Mainardi; A. Kleinter; “Five 20 Pearce, G.; “The Sheer Gravity of
Ways to Close the Strategy-to-Execution Gap,” Underestimating Culture as an IT
Harvard Business Review, 22 December 2015, Governance Risk,” ISACA Journal, vol. 3, 2019,
https://hbr.org/2015/12/5-ways-to-close-the- https://www.isaca.org/archives
strategy-to-execution-gap 21 Boulton, C.; “CIOs Take Different Paths to
11 De Flander, J.; “Strategy Execution—The Cultivating Culture,” CIO, 12 March 2020,
Definitive Guide to Boost Your Strategy https://www.cio.com/article/3530366/cios-take-
Implementation Skills,” 20 November 2019, different-paths-to-cultivating-culture.html
https://jeroen-de-flander.com/strategy-execution/ 22 Pearce, G.; “Digital Transformation? Boards Are
12 Leinwand, P.; C. Mainardi; Strategy That Works: Not Ready for It!” ISACA Journal, vol. 5, 2018,
How Winning Companies Close the Strategy-to- https://www.isaca.org/archives
Execution Gap, Harvard Business School 23 Government of Canada, “Corporate
Publishing, Strategy&, USA, 2016, Governance,” Office of the Superintendent of
https://www.strategyand.pwc.com/gx/en/ Financial Institutions, September 2018,
insights/books/strategy-that-works.html https://www.osfi-bsif.gc.ca/Eng/Docs/
13 Sull, N.; “Closing the Gap Between Strategy and CG_Guideline.pdf
Execution,” MIT Sloan Management Review, 24 Dignan, L.; “CIOs Juggling Digital
1 July 2007, https://sloanreview.mit.edu/article/ Transformation Pace, Bad Data, Cloud Lock-In
closing-the-gap-between-strategy-and-execution/ and Business Alignment,” ZDNet, 11 March
14 Op cit Henderson and Venkatraman 1999 2020, https://www.zdnet.com/article/cios-
15 Rogers, D.; A. Birje; “Closing the Digital-Strategy juggling-digital-transformation-pace-bad-data-
Execution Gap,” Straight-Talk, 19 September cloud-lock-in-and-business-alignment/
2018, https://straighttalk.hcltech.com/closing- 25 Op Cit Leinwand et al.
the-digital-strategy-execution-gap 26 Op Cit De Flander
16 Bosomworth, D.; “Alignment vs. Impact: Why 27 DeMarco, T.; T. Lister; “Risk Management Is
Businesses Must Get a Grip of Digital,” Smart Project Management for Adults,” informIT,
Insights, 2 July 2014, https://www.smart 10 September 2013, https://www.informit.com/
insights.com/manage-digital-transformation/ articles/article.aspx?p=2123314&seqNum=3
digital-transformation-strategy/mind-digital-gap/ 28 Wavestone US, “Top Five Transition Risks and
17 Rogers, D.; A. Birje; “Bringing Digital to Life: Six How to Mitigate Them,” 5 October 2015,
Ways to Bridge the Gap between Strategy and https://www.wavestone.us/insights/top-5-
Execution,” Straight Talk, 2017, HCL transition-risks-and-how-to-mitigate-them-2/
Technologies, https://www.hcltech.com/ 29 Rowles, D.; T. Brown; Building Digital Culture:
campaign/digital-strategy-to-execution?utm_ A Practical Guide to Successful Digital
source=magazine&utm_medium=CDO1&utm_ Transformation, Kogan Page Limited, USA,
term=7010B0000008lZm&utm_campaign=BM- 2017, p. 79–81
DA-DT_Report-112017 30 Op Cit Boulton
18 Pearce, G.; “Closing the Gap Between 31 Op Cit Rowles
Innovation Intent and Reality,” NACD 32 Mangelschots, H.; “Employee Engagement in
Directorship, September/October 2018, the Digital Age. What Does It Mean for HR?”
https://www.nacdonline.org/insights/magazine/ HR Trend Institute, 18 June 2018,
article.cfm?ItemNumber=61339 https://hrtrendinstitute.com/2018/06/18/
19 Reynolds, A.; D. Lewis; “Closing the Strategy- employee-engagement-in-the-digital-age-what-
Execution Gap Means Focusing on What does-it-mean-for-hr/
Employees Think, Not What They Do,” The 33 Rogers, M.; “Digital Transformation and
Conference Board, 1 November 2017, Employee Empowerment,” Hitachi Solutions,
https://www.conference-board.org/blog/ https://us.hitachi-solutions.com/blog/digital-
post.cfm?post=6567&blogid=1 transformation-employee-empowerment/
34 Op Cit Sull
35 Op Cit De Flander

ISACA JOURNAL VOL 4 27


FEATURE

Connecting Good Governance


With Key Risk
establishing policies and procedures, setting ethical
Disponible également en français boundaries, delegating authority, ensuring quality
www.isaca.org/currentissue and compliance, and meeting the needs and
interests of its various stakeholders.
During the COVID-19 pandemic, many enterprises
have stated that employee health and well-being are Sound corporate governance, of which sound IT
their primary concern. The events of 2020 have also governance is an integral part, can give boards and
led organizations to evaluate their preparedness for senior executives the power to ensure that their
and responses to another major risk factor that they enterprises are effectively managing the risk
considered the most pressing issue just a few conditions about which they are most concerned, in
months ago: corporate governance. addition to those that are largely unforeseen. The
numbers in the following headings reflect the
A recent report encompassing a survey of more ranking of each risk cited in the survey.
than 1,000 respondents examined the top risk
concerns currently on the minds of global boards of Regulatory Change and Scrutiny of
directors (BoDs) and executives. The risk factors
Operational Resilience, Products and
cited in this report cover a variety of topics: the
economic climate, technology, human resources
Services (Number 1)
(HR), operations, competition and more.1 During the COVID-19 crisis, organizations have been
disrupted by the immediate need to change the way
Despite their diversity, these risk factors share one they do business at even the most fundamental
thing in common: They all relate to corporate levels, and IT has played an integral role. With
governance. Corporate governance encompasses offices and storefronts closed and vast numbers of
the vision and mission of the enterprise and how employees suddenly transitioned to working from
the leadership seeks to accomplish that mission by home, the operational resilience of functions such
as cybersecurity, communications, transaction
processing, auditing and many others has been put
to the test. At the same time, organizations are
asking their IT teams to think outside the box to
leverage existing systems so they can continue to
operate. In such an environment, sound IT
governance is critical to accomplishing this outside-
the-box thinking without exposing the organization
to unacceptable levels of risk.

Although good governance is about much more


than compliance and quality control, these are
certainly fundamental aspects of it. A well-governed
enterprise seeks to comply with all relevant laws,
regulations and standards, and it has processes in
place for doing so, but risk related to regulatory
Kevin M. Alvero, CISA, CFE
Is senior vice president of internal audit, compliance and governance at Nielsen change is broader than a simple gap in compliance.
Company. He leads the internal quality audit program and industry compliance Some regulatory changes have the potential to
initiatives, spanning Nielsen’s global media products and services. impact the value proposition of the whole

28 ISACA JOURNAL VOL 4


enterprise, and in an enterprise with sound over substance.”3 Nevertheless, investment driven
governance, top leadership is scanning the horizon by ESG considerations remains high. According to a
for regulatory changes that could be disruptive at 2019 survey, 84 percent of investors agreed that
the strategic level, including IT-related requirements corporations and business leaders should commit
involving privacy and cybersecurity. to balancing the needs of multiple stakeholders
including shareholders, customers, employees,
Defining and ensuring the quality of products and suppliers and local communities.4
services also fall under the purview of governance.
The effective communication of expectations and a Investors, lenders and gatekeepers who control
healthy culture, along with consistent and access to markets are more likely to provide growth
repeatable business processes (all governance- opportunities to enterprises they trust, and good
related concerns), can help ensure that products governance is one way enterprises can earn that
and customer experiences meet quality standards trust. Those responsible for IT governance should
and support the enterprise’s mission, values and understand that the way an organization leverages
value proposition. technology has an impact on its perceived
trustworthiness. According to a 2020 survey,
Economic Conditions Impacting Growth trust in technology is down overall, and more than
(Number 2) 60 percent of respondents agreed with the
following statements:5
Changing economic conditions can affect, among
other things, enterprises’ access to three key • The pace of change in technology is too fast.
factors related to growth: • I worry technology will make it impossible to
1. Credit know if what people are seeing or hearing is real.

2. Investment funds Government does not understand emerging


3. Markets technologies enough to regulate them effectively.

Organizations may not be able to control the Succession Challenges and Ability to
volatility of the economy, but good governance— Attract and Retain Top Talent (Number 3)
particularly the demonstration of good
Where there is an absence of good governance,
governance—can improve an organization’s position
there is an increased likelihood of fraud, bribery,
with regard to these three key factors.
corruption, waste, abuse, and unfair or unethical
practices. Additionally, there may be a lack of clarity
In the late 1990s, organizations such as RepRisk
about the enterprise’s mission and values. These
and RobecoSAM began publishing environmental,
concerns contribute to unhappy employees, who, in
sustainability and governance (ESG) ratings and, in
turn, are harder to retain and less productive. In a
1999, the Dow Jones Sustainability Index became
well-governed environment, the opposite is true,
the first global index to track sustainability-driven
making good governance essential to reduce the
public enterprises based on RobecoSAM’s ESG
risk of being unable to hire the right people, keep
analysis. Today, most international and domestic
them or maximize their potential.
public (and many private) enterprises are being
evaluated based on their ESG performance by
Employees want to be well compensated, but they
various third-party providers of reports and ratings.2


also want to understand the purpose and
Not everyone fully accepts the utility of corporate
governance rating systems. For example, some
have expressed skepticism that any governance GOVERNMENT DOES NOT
score based on a single set of value judgments
about what constitutes good governance practices
UNDERSTAND EMERGING
is a reliable measure of an enterprise’s governance. TECHNOLOGIES ENOUGH


Indeed, the Society for Corporate Governance’s
stated position is that “Many governance practice
TO REGULATE THEM
prescriptions tend to elevate form and appearance EFFECTIVELY.

ISACA JOURNAL VOL 4 29


significance of their work (and the organization’s managed by the various business areas based on
mission) and the basis on which their success is their own needs results in efforts that are divergent,
Enjoying
evaluated. They also want fair access to redundant and/or contradictory.7 The board, senior
this article? opportunities for advancement, education and management and IT leadership have the power to
flexibility. For these reasons, sound governance ensure that people with the right skills and expertise
• Read 2019 Audit makes an organization more attractive to are tasked with implementing new technologies and
Benchmarking employees who want to do good, grow and drive the processes with the proper authority, support and
Study: Today’s success of their employer. funding to succeed.
Toughest
Challenges in IT
Audit: Tech
Adoption of Digital Technologies That Cyberthreats (Number 6) and Privacy and
Partnerships, May Require New Skills (Number 10) Identity Management and Information
Talent, It is imperative that business and IT leaders take a Security (Number 7)
Transformation. holistic view. When implementing new technologies, Information security was identified in two of the top
www.isaca.org/ consideration should be given to how these 10 places in the survey, reflecting enterprises’
it-audit- technologies will enhance employee effectiveness current reality. On the one hand, they must protect
benchmarking- and potential (and thereby job satisfaction), in the data and information in their possession from
survey addition to their inherent features and benefits. Top malicious parties who seek unauthorized access to
• Learn more about, management should also cultivate a culture in it for their own gain. On the other hand, consumers
discuss and which flexibility, comfort with change and are demanding greater control and transparency
collaborate on continuous learning are the norm, as this will help with regard to how enterprises use their data for
audit and current and future IT projects gain acceptance legitimate business purposes and the risk to which
assurance in and demonstrate a satisfactory return on this exposes consumers. Technology solutions are
ISACA’s Online investment (ROI). an integral part of managing data privacy and
Forums. security concerns, but most enterprises understand
https://engage. Ability to Compete With “Born Digital” that these are not solely technology issues. The key
isaca.org/online
forums
Enterprises (Number 4) and Resistance to to managing risk lies in sound governance over
Change (Number 5) both data and IT. Governance establishes the
enterprise’s mission and its commitment to its
One way governance is defined is “the act or stakeholders. It also establishes who is responsible
process of providing oversight or authoritative and accountable for data privacy and security, what
direction or control.”6 Any significant change within policies and procedures are in place to guide the
an enterprise almost always requires strong top- enterprise’s actions, and what types of controls and
down leadership. Without it, the most likely reporting mechanisms have been implemented to
outcome is that nothing will change (maintaining ensure quality, security and compliance.
the status quo), while everyone looks out for their
own responsibilities and no one takes responsibility Organizational Culture Does Not
for the well-being of the whole. Opportunities will be
Encourage Timely Identification and
missed, time and resources will be wasted, and
change efforts will ultimately fail. Again, when Escalation of Risk Issues (Number 8)
leadership fosters a culture of continuous learning IT can play a critical role in ensuring that risk factors
and comfort with change, it can avoid conflict with are identified and escalated in a timely manner. For
employee expectations. example, organizations can use artificial
intelligence (AI) to scan social media for potential
On the surface, concern about “born digital” reputational risk or to monitor supply chains for
competitors may seem to be driven by external potential disruptions and failure points. They can
pressure from newcomers entering the market, and leverage automation to perform continuous auditing
it is. But it has just as much to do with an processes, sampling large populations of data to
organization’s ability to manage its own digital detect irregularities and quickly escalating issues
transformations. A successful digital that require human intervention. These capabilities
transformation requires a strategic, coordinated are most powerful when deployed in a well-
effort. Permitting digital transformation to be governed environment to enhance human

30 ISACA JOURNAL VOL 4



stewardship. That is why it is critical that top
management foster a culture that supports the AS MORE AND MORE INTERACTION
timely reporting of risk issues. Regardless of the BETWEEN ORGANIZATIONS AND THEIR
systems put into place to detect risk, if the culture is
such that employees believe it is best to remain CUSTOMERS BECOMES TECHNOLOGY
silent and follow orders, then technology-enabled ENABLED, GREATER RESPONSIBILITY FOR
detection and escalation systems will be less
effective, and top leaders can be virtually certain THE END-TO-END CUSTOMER EXPERIENCE


they are receiving incomplete information with WILL FALL UNDER THE PURVIEW OF IT
regard to risk factors affecting the enterprise.
GOVERNANCE.
Customer Loyalty and Retention (Number 9)
It should be intuitive that commitment to customer 2 Huber, B. M.; M. Comstock; “ESG Reports and
loyalty drives profitability, and research provides Ratings: What They Are, Why They Matter,”
evidence that this is so.8 Nevertheless, incentive Harvard Law School Forum on Corporate
structures and a focus on short-term performance Governance, 27 July 2017, https://corpgov.law.
can sometimes motivate employees to make harvard.edu/2017/07/27/esg-reports-and-
decisions that destroy customer value and loyalty ratings-what-they-are-why-they-matter/
rather than build it up. If board members and senior 3 Society for Corporate Governance, “Statement
leaders want to mitigate risk related to customer on Governance,” https://www.societycorpgov.org/
loyalty and retention, they must empower their about76/statementongovernance34
employees to do whatever is needed to satisfy (or 4 Edelman, Edelman Trust Barometer Special
even delight) customers and reward them for doing Report: Investor Trust, USA, December 2019,
so. The organizations that do this best (the “loyalty https://www.edelman.com/sites/g/files/
leaders”) grow revenue roughly 2.5 times faster than aatuss191/files/2019-12/2019%20Edelman
their industry peers.9 As more and more interaction %20Trust%20Barometer%20Special
between organizations and their customers becomes %20Report%20-%20Investor%20Trust.pdf
technology-enabled, greater responsibility for the end- 5 Edelman, Edelman Trust Barometer: Global
to-end customer experience will fall under the purview Report, USA, 2020, https://cdn2.hubspot.net/
of IT governance. hubfs/440941/Trust%20Barometer%202020/
2020%20Edelman%20Trust%20Barometer
Conclusion %20Global%20Report.pdf?utm_campaign=
Global:%20Trust%20Barometer%202020&utm_
While striving to adapt to the continuously evolving
source=Website
landscape of top-level risk factors, leaders can
6 Committee of Sponsoring Organizations of the
understandably become focused on tactical
Treadway Commission (COSO), Improving
solutions and short-term objectives, which are
Organizational Performance and Governance,
necessary. But it is important to bear in mind that
USA, 10 February 2014, https://www.coso.org/
good corporate governance—and, as a microcosm,
Documents/2014-2-10-COSO-Thought-Paper.pdf
good IT governance—acts as the compass that
7 Capgemini Consulting, Governance: A Central
directs the enterprise’s perception of, and response
Component of Successful Digital Transformation,
to, risk—whatever that risk may be.
France, 2017, https://www.capgemini.com/
wp-content/uploads/2017/07/Governance__A_
Endnotes Central_Component_of_Successful_Digital_
1 Enterprise Risk Management Initiative Staff, Transformation.pdf
“Executive Perspectives on Top Risks for 2020,” 8 Markey, R.; “Are You Undervaluing Your
North Carolina State University, USA, 12 Customers?” Harvard Business Review,
December 2019, https://erm.ncsu.edu/library/ January–February 2020, https://hbr.org/
article/top-risks-report-2020-executive- 2020/01/the-loyalty-economy
perspectives 9 Ibid.

ISACA JOURNAL VOL 4 31


FEATURE

Privacy Risk Management


Concerns about privacy risk have triggered a What Is Privacy Risk?
number of new privacy protection regulations: The
US State of California Consumer Privacy Act (CCPA) Privacy risk is the likelihood that individuals will
went into effect on 1 January 2020, the Brazilian experience problems resulting from data
General Data Protection Law (LGPD) becomes processing, and the impact of these problems
effective in August 2020, China has completed the should they occur.2 Privacy risk includes but is not
first draft of a personal information protection law, limited to technical measures that lack appropriate
New Zealand’s privacy law is likely to take effect in safeguards, social media attacks, mobile malware,
mid-2020, and the EU General Data Protection third-party access, negligence resulting from
Regulation (GDPR) will be replaced as an applicable improper configuration, outdated security software,
law in the United Kingdom at the end of 2020.1 The social engineering and lack of encryption.
increasing trend of privacy legislation exacerbates
privacy risk, which is a trigger for privacy protection According to article 4 of GDPR, data processing is a
requirements and influences consumer trust and set of operations including but not limited to the
enterprise reputation. So, what is privacy risk? From collection, storage, adaptation or alteration,
what is privacy risk arising? disclosure by transmission, and dissemination of
data.3 ISACA® provides a data life cycle model that
can be taken into consideration when building a
data inventory (figure 1).4

Privacy risk can exist throughout the data life cycle,


so it is important to manage and govern data
properly. A number of privacy risk management
activities can be undertaken during the data life
cycle.5 Designing a privacy risk management
framework is the first step to ensure data validation
and data protection, to monitor and control data, and
to comply with all applicable laws and regulations.

Creating and Implementing a Privacy Risk


Management Framework
The globally recognized COBIT® 2019 framework can
serve as a foundation to ensure effective enterprise
Andrea Tang, CIPP/E, ISO 27001 LA governance of information and technology (EGIT).6 It
Works at a Big Four organization and has working experience in providing can help an enterprise govern data, implement
data security and privacy services to financial institutions. This year, she has internal and external security, and determine the
published a series of professional articles on the ISACA® WeChat official
components needed from other frameworks. It is a
account, which has won wide attention, recognition and support from the
ISACA China Technical Committee. Additionally, she has contributed to the useful tool for implementing a privacy risk
ISACA® Journal, and the “ISACA China Digital IT Risk Framework” project and management framework, particularly by focusing on
publication, which will be issued this year. As an active volunteer in the ISACA the four management domains (figure 2):
Beijing (China) Chapter, Tang was the winner of the outstanding young
1. Align, Plan and Organize (APO)
professional award in 2018-19. She has a passion for sharing the latest
privacy trends and technology with experts around the world. Additionally, she 2. Build, Acquire and Implement (BAI)
has organized several successful knowledge-sharing events in the ISACA
China community. 3. Deliver, Service and Support (DSS)
4. Monitor, Evaluate and Assess (MEA)

32 ISACA JOURNAL VOL 4


Figure 1—Data Life Cycle Mapping With Data Inventory Considerations

ARCHIVE/
PLAN/DESIGN BUILD/ACQUIRE STORE USE SHARE DESTROY

What is the Where will the What data are


Where are the What kind of How is the
context and data flow currently being
data moving information is information
purpose of the (from country retained, how
from and to? in the repository? being used?
repository? to country)? and where?

Are the data What are the


From which shared with
Who is the How much In which country scenarios that
country or third parties? Are
owner of the data are in or countries are would require
countries is the they controllers,
repository? the repository? the data stored? data retention
data accessed? joint controllers or destroy?
or processors?

Do the technical
Is the data Are there any Is the data
Are the data measures taken
dictionary design Is this a paper technical sharing obtained
applied to for data
compatible with or electronic safeguard with explicit
automated destruction
different repository? measures for consent from
decision making? guarantee they are
systems? data storage? data subjects? irrecoverable?

Is the data Are the data


dictionary design Are the data Is there
Are the data Is there any archived/destroyed
compliant with structured any legal
stored in the DPIA conducted in compliance with
laws and or basis provided
cloud? for data sharing? laws and
regulations? unstructured? for the data usage? regulations?

Figure 2—Mapping to COBIT®


Privacy Risk Management Framework COBIT® 2019
Stage 1: Establish privacy governance BAI01 Managed programs
BAI11 Managed projects
Stage 1-1: Define privacy governance goals APO01 Managed information and technology (I&T)
management framework
APO02 Managed strategy
APO03 Managed enterprise architecture
Stage 1-2: Establish enterprise privacy risk management APO04 Managed innovation
framework APO05 Managed portfolio
Stage 1-3: Realize the benefits of privacy risk management APO06 Managed budget and costs
APO07 Managed human resources
APO08 Managed relationships
Stage 2: Conduct privacy risk management activities APO12 Managed risk
Stage 2-1: Define privacy risk assessment framework
Stage 2-2: Conduct privacy risk assessments APO09 Managed service agreements
Stage 2-2-1: Vendor/third-party risk assessments APO10 Managed vendors
Stage 2-2-2: Data breach readiness assessments DSS02 Managed service requests and incidents
Stage 3: Implement risk response DSS03 Managed problems
Stage 3-1: Establish response procedures for privacy risk
Stage 3-2: Response to privacy risk DSS04 Managed continuity
Stage 3-3: Evaluate privacy risk response MEA01 Managed performance and conformance
monitoring
MEA02 Managed system of internal control
MEA03 Managed compliance with external requirements
MEA04 Managed assurance

ISACA JOURNAL VOL 4 33



Stage 1-2: Establish Enterprise Privacy Risk
SPECIFIC AND CLEAR COMMUNICATION Management Framework
ABOUT THE ENTERPRISE’S APPROACH IS An enterprise privacy risk management framework


consists of the following elements:
KEY TO OBTAINING SUPPORT FOR THE
• Purpose—Explain privacy governance goals
PRIVACY RISK MANAGEMENT PROGRAM. in detail.
• Scope—Define the personal data required to be
Stage 1: Establish Privacy Governance protected and the internal policies to be followed.
The US National Institute of Standards and
• Risk—Identify potential risk factors,
Technology’s (NIST) Privacy Framework is intended
vulnerabilities and threats related to data
to assist organizations in communicating and
processing activities.
organizing privacy risk and rationalizing privacy to
build or evaluate a privacy governance program. • Responsibilities—Set up a privacy committee
The NIST Privacy Framework defines privacy consisting of identified stakeholders, specify the
governance as govern/develop and implement the role of each department (e.g., which executives
organizational governance structure to enable an must approve funding for the privacy team),
ongoing understanding of the organization’s risk establish the role of the data protection officer,
management priorities that are informed by privacy support privacy initiatives such as training and
risk.7 In this stage, the enterprise could do the tasks awareness, and hold employees accountable for
outlined in figure 3. following all privacy policies and procedures.
• Processes—Establish privacy risk management
Stage 1-1: Define Privacy Governance Goals
processes.
The first step is for the enterprise to create a privacy
vision and mission statement. Stakeholders should
Stage 1-3: Realize the Benefits of Privacy Risk
take market expectations into consideration,
Management
establish an overall privacy risk management
A privacy risk management framework is intended to
strategy, define the scope of privacy governance by
help enterprises weigh the benefits of data
identifying applicable personal data protection laws
processing against the risk of doing so and determine
and regulations, structure a privacy team, and
which risk response measures should be adopted.
define a privacy risk tolerance level.
Stage 2: Conduct Privacy Risk Management
Specific and clear communication about the
Activities
enterprise’s approach is key to obtaining support for
NIST also states that a privacy risk management
the privacy risk management program. But it should
framework is intended to help enterprises weigh the
be noted that there is no one-size-fits-all strategy.
benefits of data processing against the risk of doing
The enterprise must consider its own
so and determine which risk response measures
circumstances and the business environment when
should be adopted.8 In this stage, enterprises could
adopting a privacy strategy.
conduct the tasks listed in figure 4.

Figure 3—Creating and Implementing a Privacy Risk Management


Framework—Stage 1: Establish Privacy Governance
Stage 1-1 Stage 1-2 Stage 1-3
Define privacy governance goals Establish enterprise privacy risk Realize the benefits of privacy
management framework risk management

34 ISACA JOURNAL VOL 4


Figure 4—Creating and Implementing a Privacy Risk Management
Framework—Stage 2: Conduct Privacy Risk Management Activities
Stage 2-1 Stage 2-2
Define Privacy Risk Assessment Framework Conduct Privacy Risk Assessments

Stage 2-1: Define Privacy Risk Assessment project, product or service.11 PIAs provide
Framework remediation measures to avoid or mitigate risk.
A privacy risk assessment determines whether an In addition to COBIT 2019, several others are
enterprise is in compliance with applicable laws and available to help enterprises address privacy risk:
regulations, industry standards, and internal policies
• NIST Privacy Framework—Version 1.0 of the
and procedures. Based on a survey by the
NIST Privacy Framework,12 released in January
International Association of Privacy Professionals
2020, is a tool to assess and mitigate privacy
(IAPP) and TrustArc,9 the vendor/third-party risk
risk, implement privacy engineering, and design
assessment is the most common type of
products and services to protect individuals’
assessment conducted (figures 5 and 6). Also
privacy by providing a set of activities and
common are data protection impact assessments
outcomes that enables enterprise stakeholders
(DPIAs), privacy impact assessments (PIAs) and
to discuss managing privacy risk (figure 7).
legitimate interest assessments (LIAs).
• International Organization for Standardization
A DPIA is designed to identify risk arising from the (ISO)/International Electrotechnical Commission
processing of personal data and to minimize this (IEC) standard ISO/IEC 27701—This first global
risk as much and as early as possible.10 DPIAs can privacy standard, released in August 2019,
help prioritize risk, allowing resources to be provides a risk-based framework for a privacy
concentrated on the domain with the highest risk risk management system.13 It helps enterprises
and the greatest potential damage in order to translate principles-based legal requirements
mitigate that risk. into technical privacy controls that can be
implemented in tandem with security controls
A PIA is an analysis of the risk factors associated (figure 8).
with processing personal information in relation to a

Figure 5—IAPP Survey: Privacy Risk Assessments


Which of the Following Types of Privacy Assessments Does Your Organization Conduct?
Overall US EU+UK Regulated Unregulated
Vendor/third-party risk assessments 63% 78% 52% 69% 69%
Data protection impact assessments 61% 53% 81% 60% 65%
Privacy impact assessments 53% 55% 45% 57% 49%
Legitimate interest assessments 34% 24% 53% 32% 41%
Data breach readiness assessments 30% 38% 26% 33% 30%
International data transfer assessments 30% 27% 37% 29% 35%
Alignment with ISO 27001 assessments 27% 26% 33% 25% 31%
Alignment with NIST assessments 15% 28% 5% 19% 15%
Privacy threshold assessments 15% 16% 15% 14% 17%
Do not know 6% 4% 3% 5% 3%
Other 4% 4% 2% 3% 5%

ISACA JOURNAL VOL 4 35


Figure 6—IAPP Survey: Privacy Risk Assessments (Pie Chart Analysis)
Privacy
threshold Do not Other
assessments know
Alignment with Vendor/third-party
NIST risk assessments
assessments
Alignment with
ISO 27001
assessments

International
data transfer
assessments

Data protection
impact
assessments
Data breach
readiness
assessments

Legitimate interest Privacy impact


assessments assessments

Source: Adapted from International Association of Privacy Professionals (IAPP) and TrustArc, Measuring Privacy Operations 2019: Cookies, Local vs.
Global Compliance, DSARs and More, USA, 2019

Figure 7—Mapping to NIST Privacy Framework


Privacy Risk Management Framework NIST Privacy Framework
Stage 1: Establish privacy governance Governance policies, processes and procedures (GV.PO-P)
Stage 1-1: Define privacy governance goals Governance policies, processes and procedures (GV.PO-P)
Stage 1-2: Establish enterprise privacy risk management Business environment (ID.BE-P)
framework
Stage 1-3: Realize the benefits of privacy risk management Business environment (ID.BE-P)

Data protection policies, processes and procedures


(PR.PO-P9)

Communication policies, processes and procedures


(CM.PO-P)
Stage 2: Conduct privacy risk management activities Risk management strategy (GV.RM-P)
Stage 2-1: Define privacy risk assessment framework Risk assessment (ID.RA-P)
Stage 2.2: Conduct privack risk assessments Data processing ecosystem risk management (ID.DE-P)
Stage 2-2-1: Vendor/third-party risk assessments
Stage 2-2-2: Data breach readiness assessments Data protection policies, processes and procedures
(PR.PO-P7, PR.PO-P8)
Stage 3: Implement risk response Data protection policies, processes and procedures
Stage 3-1: Establish response procedures for privacy risk (PR.PO-P10)
Stage 3-2: Response to privacy risk Data protection policies, processes and procedures
(PR.PO-P7)
Stage 3-3: Evaluate privacy risk response Monitoring and review (GV.MT-P)

36 ISACA JOURNAL VOL 4


Figure 8—Mapping to ISO/IEC 27701
Privacy Risk Management Framework ISO/IEC 27701
Stage 1: Establish privacy governance 5.4 Planning
6.3.1.5 Information security in project management
Stage 1-1: Define privacy governance goals 5.4 Planning
6.2 Information security policies
Stage 1-2: Establish enterprise privacy risk management 5.2 Context of the organization
framework 5.3 Leadership
Stage 1-3: Realize the benefits of privacy risk management 5.5.1 Resources
6.4 Human resource security
6.3.1 Internal organization
5.5.4 Communication
Stage 2: Conduct privacy risk management activities 5.4.1.2 Information security risk assessment (planning)
Stage 2-1: Define privacy risk assessment framework 5.4.1.3 Information security risk treatment (planning)
5.6.2 Information security risk assessment (operation)
5.6.3 Information security risk treatment (operation)
Stage 2-2: Conduct privacy risk assessments 6.12 Supplier relationships
Stage 2-2-1: Vendor/third-party risk assessments 8.2.1 Customer agreement (processors)
8.5.6 Disclosure of subcontractors used to process
personally identifiable information (PII) (processors)
8.5.7 Engagement of a subcontractor to process PII
8.5.8 Change of subcontractor to process PII
Stage 2-2-2: Data breach readiness assessments 6.13 Information security incident management
7.3.9 Handling requests (controllers)
Stage 3: Implement risk response 6.9.4 Logging and monitoring
Stage 3-1: Establish response procedures for privacy risk
Stage 3-2: Response to privacy risk 6.14 Information security aspects of business continuity
management
Stage 3-3: Evaluate privacy risk response 5.7 Performance evaluation
6.15 Compliance

• French Data Protection Authority—The Stage 2-2-1: Vendor/Third-Party Risk Assessments


Commission Nationale de l’informatique et des According to the IAPP survey, the most common
Libertés (CNIL) has proposed a methodology for type of risk assessment (performed by 63 percent
privacy risk management.14 By using a risk map of respondents, as shown in figures 5 and 6) is the
(figure 9), the severity of a breach and its vendor/third-party risk assessment.15 The greater
likelihood of occurrence can be determined. an enterprise’s dependence on third parties or
Severity is determined by the ease of nth parties, the more complex a third-party risk
identification and the potential prejudicial effects assessment must be. Enterprises should consider
of the breach’s impact. Likelihood is determined the following factors related to threat, vulnerability
by the vulnerabilities of the supporting assets and maturity:
and the capabilities of the risk sources.
• Determine whether the third party is aware of the
core requirements of data protection.
Stage 2-2: Conduct Privacy Risk Assessments
A privacy risk assessment is one of the critical • Check whether a DPIA has been conducted for
procedures in privacy risk management. The aim is the data processing operations performed by the
to assist enterprises in identifying the possible risk, third party; conduct a request for information
vulnerabilities and threats during the data life (RFI)/request for quotation (RFQ), an on-site
cycle. There are many types of privacy risk check, and regular audit and monitoring of the
assessments, which include vendor/third-party risk usage of software development kits (SDKs).
assessments and data breach readiness
assessments (figures 5 and 6).

ISACA JOURNAL VOL 4 37


Figure 9—CNIL Risk Map

Risk = Likelihood × Severity

Significant Maximum
Maximum Risk

Significant Risk
Severity
Limited

Negligible Limited Significant Maximum Limited Risk


Negligible

Negligible Risk Stage 2-2:

Likelihood

• Review whether the third party has certifications • Level of risk of a data breach:
such as ISO/IEC 27001, Payment Card Industry – Considering the nature, scope, context and
Data Security Standard (PCI DSS) or other processing purpose of an incident, evaluate
information security-related certifications. the risk associated with an independent
event. If it affects large-scale data subjects or
• Review data sources, data types, data location,
has a greater impact on specific individuals,
local regulatory requirements, data retention
the risk is high.
period, minimum safeguards and additional
processing purposes, such as subcontracts to • Likelihood and severity of a personal data breach:
fourth or fifth parties. – Type and nature of personal data involved,
particularly special categories of personal data
• Review potential data combinations and
– Circumstances of a personal data breach
additional uses that may impact the level of risk
– Whether appropriate technical safeguards
for individuals (e.g., artificial intelligence [AI],
have been applied (e.g., encryption,
machine learning [ML], cloud computing
pseudonymization)
technology) and whether the third-party
– Whether the data subject will be directly or
possesses relevant qualifications.
indirectly affected
• Disclose to customers any use of subcontractors – Possibility that pseudonymization can be
to process personally identifiable information (PII). restored or that confidentiality fails
– Possibility that personal data can be
• Cooperate only with third parties who can prove
maliciously used
their compliance and provide adequate safeguards.
– Possibility of substantial damage on a
• In the case of general written authorization, physical level
inform customers of any intended changes – Nonsubstantial damage to the data subject
concerning the addition or replacement of
subcontractors. Several entities provide methodologies for
data breach readiness assessments, including
Stage 2-2-2: Data Breach Readiness Assessments the following:
To prepare for a data breach, assess the following:

38 ISACA JOURNAL VOL 4


• European Union Agency for Cybersecurity • Access control
(ENISA)—ENISA’s methodology for assessing the
• Cryptography
severity of personal data breaches can be
applied to identify and mitigate risk.16 The criteria • Physical and environmental security
used to analyze the severity of the breach (SE)
• Operational security
are data processing context (DPC), ease of
identification (EI) and circumstances of the • Communication security
breach (CB), plus other factors that influence the
• Systems acquisition
overall scale of the breach: SE = DPC◊EI + CB
• Development and maintenance
• Spanish Data Protection Agency—The Agencia
Espanňola Protección Datos (AEPD) has • Third-party risk management (TPRM)
established a set of criteria to assess risk based
• Information security incident management
on the following factors: category or critical level;
nature, sensitivity and categories of personal • Information security aspects of business
data affected; legible/illegible data; volume of continuity management (BCM)
personal data; ease of identifying individuals;
severity of the consequences for individuals; Stage 3-2: Response to Privacy Risk
individuals with special characteristics; number After identifying privacy risk, enterprises should
of individuals affected; data controllers with take the appropriate action:
special characteristics (the entity itself); profile
• Mitigate risk—Adopt the appropriate technical or
of the user affected; number and classification of
administrative approaches in systems, products
the systems affected; impact; and legal and
or services to minimize risk until an acceptable
regulatory requirements.17
risk tolerance level is reached. Technical
approaches include obfuscation technology, data
Stage 3: Implement Risk Response
minimization technology, security technology
Implementing the privacy risk response is the last
and privacy engineering technology. New
stage of implementing a privacy risk management
technologies on the horizon include zero
framework. In this phase the enterprise shall
knowledge proofs, homomorphic encryption,
establish response procedures for privacy risk, take
secure multiparty computation, differential
appropriate responses to the identified privacy risk
privacy, edge computing and local processing,
and evaluate the privacy risk response. In this stage,
device-level machine learning, identity
the enterprise could do the tasks listed in figure 10.
management, small data, synthetic data sets,
and generative adversarial networks.18
Stage 3-1: Establish Response Procedures for
Privacy Risk • Transfer risk—Sign contracts with the other
After identifying privacy risk factors, enterprises enterprises involved.
should establish risk response procedures, taking
• Share risk—Implement privacy notice and
into consideration the following aspects:
consent mechanisms as a means of sharing risk
• Privacy policy with individuals.

• Information security architecture


Stage 3-3: Evaluate Privacy Risk Response
• Human resources (HR) controls Evaluation of the enterprise’s privacy risk response
should be ongoing to control, manage and report
• Asset management
risk related to privacy risk management practices.

Figure 10—Creating and Implementing a Privacy Risk Management


Framework—Stage 3: Implement Risk Response
Stage 3-1 Stage 3-2 Stage 3-3
Establish Response Procedures for Response to Privacy Risk Evaluate Privacy Risk Response
Privacy Risk

ISACA JOURNAL VOL 4 39


At the same time, the enterprise should designate a Example 1: Data Breach Risk Assessment Using the
specific person who is responsible for monitoring ENISA Methodology
the privacy risk response, based on the enterprise’s In this example, two types of HR-related data
privacy risk governance goal. Monitoring ensures breaches have occurred:
that implementation of the privacy plan is
• Case 1—A file available on a shared drive
consistent with the enterprise’s current privacy
containing more than 500 employees’ names
policies and standards. In addition, evaluation of the
and dates of birth is accessed by nonauthorized
privacy risk response ensures achievement of the
employees.
enterprise’s privacy purpose by detecting failures
early and obtaining feedback for improvement. • Case 2—An external contractor mails the
When enterprises evaluate their privacy risk monthly pay slips of eight employees to
response, they should consider three indicators: unauthorized recipients.

• Compliance—Can the enterprise ensure


By applying the ENISA model,19 the severity of the
necessary policies and controls are in place for
personal data breaches can be assessed.
compliance during the collection, use and
For the first case:
retention of personal data?
• DPC—The names and dates of birth are simple
• Regulation—Does the response meet the
data, so DPC = 1.
requirements of applicable laws and regulations,
which are constantly changing? • EI—Because both the full name and the date of
birth may be disclosed to others, there are two
• Environment—Is there a risk of physical harm,
identifiers that can single out the individual, so EI


programmatic concerns or insider threats?
= 1 (maximum).

ENTERPRISES SHOULD • CB—The circumstance is loss of confidentiality.


Nonauthorized employees can access the data,
CARRY OUT INCIDENT which means that the data can be disclosed to a
RESPONSE REVIEWS OR number of known recipients, so CB = +0.25.

POST-INCIDENT Therefore, SE = 1x1 + 0.25 = 1.25.


EVALUATIONS AFTER A


For the second case:
SECURITY INCIDENT
• DPC—The information on the pay slips is financial
OCCURS. data, in particular, the kind of data that comes from
a bank and concerns the account balances of
clients for the last month, so DPC = 3.
In particular, enterprises should carry out incident
response reviews or post-incident evaluations after • EI—The combination of information on the pay
a security incident occurs. This includes reviewing slips, such as full name and Social Security
configurations of personnel and resources and number, makes it easy to identify the individual,
evaluating control approaches such as time so EI = 1 (maximum).
and procedures.
• CB—Although the circumstance is the same as in
the first case, the personal data have been sent
Privacy Risk Management in Practice to unauthorized recipients, which increases the
Two real-life examples are provided here. The first impact of the breach because of the unknown
focuses on performing a qualitative risk assessment number of recipients, so CB = +0.5 (higher than
based on an existing methodology. The second deals in the first case).
with one of the hottest privacy issues—employee
tracking and monitoring—and how to implement Therefore, SE = 3x1 + 0.5 = 3.5.
privacy risk management in this scenario.
By conducting this type of qualitative assessment,
an enterprise can evaluate the severity of breaches,

40 ISACA JOURNAL VOL 4


which can help it prioritize its resources and activities to determine necessity, legitimacy,
influence privacy-related decision making. proportionality and transparency.
Enjoying
Example 2: Employee Tracking and Monitoring
• Necessity—Whether monitoring is necessary to this article?
the processing purpose and meets data
Few data controllers are likely to collect more
personal data about individuals than their
minimization requirements • Read Managing
employers. So employee tracking and monitoring • Legitimacy—Whether monitoring (e.g., large-
Third-Party Risk.
tools, such as those listed here, can impose a high scale video surveillance or the systematic
www.isaca.org/
privacy risk in the workplace: monitoring of public areas) meets legitimate
managing-third-
interests, such as protecting the IT infrastructure
party-risk
• Bring your own device (BYOD)—Employees are
of maintaining the safety of public areas
• Learn more
permitted to use their own personal devices (e.g., about, discuss
smartphones, tablets) for communicating in the • Proportionality—Whether monitoring is and collaborate
workplace. This results in a data protection risk proportionate to the issue the enterprise is on risk
because, outside the workplace, employees’ encountering (e.g., remote control, facial management in
mobile devices might be lost or misused; inside recognition and voice recording may not be ISACA’s Online
the workplace, the employer has access to necessary) Forums.
personal data from employees’ personal devices. https://engage.
• Transparency—Whether the existence and type
• Data loss prevention (DLP)—DLP tools inevitably of surveillance measures have been
isaca.org/online
involve processing the personal data of employees communicated to employees
forums
and other third parties because they operate on
networks and systems used by employees, such Stage 3: Implement Risk Response
as the email exchange server, which can contain
• Be clear about where the processed data are
personal information even if employees are not
stored and what measures must be taken to
allowed to use it for personal activities.
keep them secure.
• Closed-circuit television (CCTV)—CCTV is used
• Ensure that the transfer of data from employees’
to monitor the workplace for security purposes.
personal devices to the enterprise’s servers is
• Email monitoring—During an internal secure to avoid any interceptions.
investigation, the employer may review
• Consider how to manage personal data held on
employees’ emails.
personal devices once an employee leaves the
• Global Positioning System (GPS) tracking—GPS company or if a device is stolen or lost. Mobile
tracking devices may be installed in company cars. device management software can be used to
locate devices and remove data on demand.
Stage 1: Establish Privacy Governance
• Obtain prior authorization when required. For
Before deciding whether to apply these monitoring
instance, in most countries, enterprises installing
tools, the enterprise should judge whether their use
CCTV should obtain advance certification from
is based on data subject consent or legitimate
supervisory authorities, in accordance with
interests. At the same time, the enterprise should
local regulations.
establish appropriate policies (such as BYOD
policies) and clearly explain to employees the • After monitoring has been implemented, make the
purpose of collecting their personal data and the following determinations with regard to personal
enterprise’s responsibilities when doing so. For data: whether there is a legal basis for retaining
example, when deciding to apply DLP tools, the data; whether the data are stored safely; whether
enterprise should strengthen the protection of its IT the data retention period is defined; whether data
infrastructure and confidential business information subjects can exercise their rights, including the
through internal and external strategies. right to complain; whether the data will be
anonymously processed or destroyed.
Stage 2: Conduct Privacy Risk Management Activities
The enterprise should carry out a DPIA, LIA or
balancing test on the employee monitoring

ISACA JOURNAL VOL 4 41


Conclusions 8 Ibid.
9 International Association of Privacy
Privacy is not just a compliance issue anymore. It is Professionals, “Measuring Privacy Operations
about managing consumer trust and safeguarding 2019—Cookies, Local vs. Global Compliance,
personal data during the data life cycle. Creating DSARs and More,” https://iapp.org/media/pdf/
and implementing a privacy risk management resource_center/trustarc_survey_iapp.pdf
framework is the critical step an enterprise should 10 International Association of Privacy
take to build trust and protect data.


Professionals, “Privacy Program Management—
Tools for Managing Privacy Within Your
PRIVACY...IS ABOUT Organization,” https://iapp.org/store/books/
a191P0000035CgQQAU/
MANAGING CONSUMER 11 Ibid.
TRUST AND SAFEGUARDING 12 Op cit National Institute of Standards and


Technology
PERSONAL DATA DURING 13 International Organization for Standardization
THE DATA LIFE CYCLE. (ISO)/International Electrotechnical
Commission (IEC), ISO/IEC 27701 Security
techniques—Extension to ISO/IEC 27001 and
Endnotes ISO/IEC 27002 for privacy information
management—Requirements and guidelines,
1 International Association of Privacy 2019, https://www.iso.org/standard/71670.html
Professionals, “2020 Global Legislative 14 Commission Nationale de l’informatique et des
Predictions,” https://iapp.org/media/pdf/ Libertés (CNIL), “Methodology for Privacy Risk
resource_center/global_legislative_predictions_ Management: How to Implement the Data
2020.pdf Protection Act,” https://www.cnil.fr/sites/
2 RSA Conference 2020, “NIST Privacy default/files/typo/document/CNIL-Managing
Framework IRL: Use Cases From the Field,” PrivacyRisks-Methodology.pdf
https://published-prd.lanyonevents.com/ 15 Op cit International Association of Privacy
published/rsaus20/sessionsFiles/17967/2020_ Professionals, “Measuring Privacy Operations
USA20_PRV-W01_01_NIST%20Privacy 2019”
%20Framework%20IRL%20Use%20Cases 16 European Union Agency for Cybersecurity
%20from%20the%20Field.pdf (ENISA), “ENISA Recommendations for a
3 Intersoft Consulting, Art. 4: Definition, EU Methodology of the Assessment of Severity of
General Data Protection Regulation (GDPR), Personal Data Breaches,” November 2013,
Belgium, 2018, https://gdpr-info.eu/art-4-gdpr/ www.e-szbi.pl/files/Data-breach-severity-
4 ISACA®, COBIT® 5: Enabling Information, USA, methodology.pdf
2013, https://www.isaca.org/bookstore/ 17 Agencia Espanňola Protección Datos (AEPD),
cobit-5/cb5ei “Guide on Personal Data Breach Management
5 ISACA, Rethinking Data Governance and and Notification,” September 2019,
Management: A Practical Approach for https://www.aepd.es/sites/default/files/
Data-Driven Enterprise, USA, 2020, 2019-09/Guide-on-personal-data-breach.pdf
https://www.isaca.org/bookstore/ 18 Polonetsky, J.; E. Renieris; Privacy 2020:
bookstore-wht_papers-digital/whprdg 10 Privacy Risk and 10 Privacy Enhancing
6 ISACA, COBIT® 2019, USA, 2018, Technologies to Watch in the Next Decade,
https://www.isaca.org/resources/cobit Future of Privacy Forum, USA, January 2020,
7 National Institute of Standards and Technology https://fpf.org/wp-content/uploads/2020/01/
(NIST), NIST Privacy Framework Core Version FPF_Privacy2020_WhitePaper.pdf
1.0, USA, 16 January 2020, https://www.nist.gov/ 19 Op cit ENISA
privacy-framework

42 ISACA JOURNAL VOL 4


CASE
STUDY

Building an Enterprise
Security Program
Mercury NZ, a US$2 billion renewable energy innovations and general security operations to uplift
generation and retail company, has the most NZ security capability maturity across the organization.
Stock Exchange shareholders of any New Zealand
company, serving more than 373,000 residential, The Mercury NZ executive team realized that the
commercial, industrial and spot customers across establishment of an effective enterprise security
New Zealand. The company employs 775 full-time management function was fundamental to the
employees (FTEs) plus an additional approximately business’s ability to maintain the trust and confidence
700 contractors. Founded in 1999, Mercury NZ has of its stakeholders—both internal and external.
grown organically over the last 21 years and has
transitioned over time to adopt increased use of The Solution
connected technologies. As an energy producer and
retailer, Mercury NZ manages operational By June 2018, Gabriel T. Akindeju, a seasoned
technology (OT) and information technology (IT) security industry professional, joined the employ of
infrastructures and networks. Mercury NZ as its first enterprise security manager.1
Akindeju’s charge was to annex, leverage and
As the business has evolved and new connected reorient various security activities within the
technologies have been deployed, structured business and build a strategic program that would
security at Mercury NZ, as with many growing enhance protection of the organization’s
organizations, was introduced post- infrastructure and data and instill a security culture.
operationalization of many systems, delivering This had to be accomplished despite the challenges
services to both internal and external customers
and other stakeholders.

The Challenge
Mercury NZ is an innovative technology-driven
business. The business realized that to be able to
take full advantage of technology, it must optimize
technology-related business risk and, in 2018,
began the journey to mature its security
management capabilities.

Like many similar organizations, security activities


were decentralized and dotted across the
organization and lacked formal rigor and formal
capability maturity assurance processes.
Anecdotally, capability maturity was relatively low,
and the business was not optimizing the value of
security controls through new business technology
solutions. New technologies were often
Katie Teitler
Is a senior analyst at TAG Cyber, where she collaborates with security
implemented at pace but without the necessary
product companies on market messaging, positioning and strategy. In
formal security rigor. Therefore, Mercury NZ took previous roles, she has managed, written and published content for two
the initiative to centralize security management and research firms, a cybersecurity events company and a security software
formalize security rigor around its technology vendor. Teitler is a co-author of Zero Trust Security for Dummies.

ISACA JOURNAL VOL 4 43


of a highly distributed workforce (corporate office Akindeju learned that Mercury’s employees were
workers, field workers and contractors), two distinct friendly and willing to help. This was a positive
business units (generation and retail), separate attribute for company culture and workplace
technology environments and limited history of satisfaction, but as a security practitioner, Akindeju
security awareness. knew that these inclinations also created a
vulnerability, namely, social engineering.
Akindeju instantly realized that building a security Considering that social engineering (phishing and
and risk program that would suit the company’s stolen credentials, in particular) is often the initial
needs required more than a single-person effort. vector in a cyberattack, Akindeju decided that the
For the program to achieve success, he would need first official security activity would be to scope the
to engage company leadership and enlist extent of the problem.
organizationwide champions.
Akindeju hired external consultants to conduct
Listen, Learn, Educate, Recommend penetration tests focused specifically on socially
engineering Mercury’s employees. Immediately
On his first day at Mercury NZ, Akindeju reached out following, when the exercise was fresh in people’s
to colleagues to schedule coffee sessions and minds, Akindeju presented the findings to
informal meetings. Understanding that executives’ executives and used the findings to demonstrate
time is valuable, Akindeju stuck to a strict policy of what had happened and explain why and how (in a
scheduling no more than 15–30 minutes with each real-life situation) particular employee behaviors put
individual, and the agenda for each meeting was not the business at increased risk for a cyber incident.
security—it was to meet people, introduce himself, “It was important,” Akindeju said, “to bring home the
and listen to business leaders’ goals and objectives message that the social engineering threat is real,
for their area of responsibility. that it is not something we only see on TV or
movies; it is something that can happen here, and it
“Understanding what is important to people, how can negatively impact our business.”
they work, how their teams work, what their
priorities are—these are factors that need to be built After he had fully explained the business risk,
into a security and risk program. Technology had Akindeju worked with the company’s People and
already been brought in to enable the business—to Performance (i.e., human resources [HR]) team and
make things work better, to be more efficient—so recommended new policies and practices the
security could not stand in the way of that progress. organization could use to reduce the likelihood of a
I knew I needed to enable productivity but do so in a successful social engineering attack. Some of the
secure way and in a way that would instill recommendations included:
confidence,” Akindeju said.
• Implementation of a staff identification (ID) and
Though the purist security-centric approach to some physical access policy
of Mercury’s technology concerns might have been to • A security awareness training program to include
make major adjustments right away, Akindeju theater-style presentations, video skits, guidance
decided that forming relationships and recruiting on how to comply with the policy and
business partners would serve the company—and his instructions for what to do if noncompliance was
eventual team—better in the long term. He observed
understood that the business’s primary
responsibilities were to customers and other • New systems access processes to enforce
stakeholders and that any security deliverables must technical system controls
support the company’s purpose “to inspire New
Zealanders to enjoy energy in more wonderful ways.”2 By establishing a direct link between action and risk,
Akindeju was able to gain support and approval for
his program and affect a positive security outcome
for the security program.

44 ISACA JOURNAL VOL 4


Simplicity and Clarity to improve internal and external operations, but they
had never received effective training on how to
His next action item was to develop a more robust include security or compliance in their processes.
security and risk management plan that he could Thus, Akindeju began speaking with architects
present to Mercury’s leadership team. While the about how to properly design security and avoid
concept of “robust” implies “exhaustive,” Akindeju compliance issues. He again relied on COBIT, ISO
committed himself to creating a one-page plan that 27001-2/5 and ISA/IEC 62443 to map risk,
was easy for nonsecurity people to understand. “If demonstrate gaps and explain the consequences of
there is one thing I have learned over the course of risky decisions to his colleagues, and he provided
my career,” he said, “it is that if you make things too actionable recommendations they could employ
complex, people will not be able to follow. If they going forward (figure 1).
cannot follow, they will not buy in to your ideas.”
Because his responsibility was to gain support for a Education became Akindeju’s tool for influence and
new program, he needed to be clear, concise and he found Mercury employees willing to learn. He
straightforward. focused on the value of technology to the
organization—something that was already
To ensure simplicity for a complex problem, Akindeju established when he joined the company—and
drew on established industry frameworks including explained how a malware infection, for instance,
COBIT®, the International Organization for could render tools, systems and data unavailable.
Standardization (ISO)/International Electrotechnical Without access to or availability of those assets,
Commission (IEC) standard ISO/IEC 27001-2/5 and those tools’ and systems’ value would be
the International Society for Automation (ISA) significantly diminished and could negate the
standard ISA/IEC 62443 to map the current state and “Energy Freedom” mission of the company. As a
the potential path to the desired target state. Once he mission-driven organization, the message of
could see the company’s security posture laid out on deprecated value resonated.
paper, it was easier to identify areas of greatest
concern. For instance, Akindeju observed that the rate
Recruit, Train, Execute
of change in the technology environment at Mercury
was high, but solutions were not always formally An integral part of Akindeju’s plan was the tried and
assessed for security. Also, although anecdotal true method of identifying and recruiting security
practices suggested some controls were put in place, champions from different functional units within the
they were not optimized for value. company. As a new security practice, he knew he
needed support. He focused on finding individuals
Fortunately, Akindeju also recognized that this was who influenced the way their departments
a learned behavior, not malicious or stubborn functioned. These did not have to be people with
behavior. Employees wanted to deliver technology management titles, but they had to be leaders

Figure 1—Actionable Security Recommendations


Problem Response
Lack of formal consideration for Prioritize and deploy immediate remediation for known vulnerabilities
security during design
Lack of formal consideration for Deploy “secure by design” concepts
security through delivery
Improve solutions delivery processes through:
• Map technology risk management and security controls objectives to
ISO 27001-2/5, ISA/IEC 62443 and COBIT frameworks
• Introduce risk-based exemption management processes
Improve technology operations processes to include security considerations to.
• Inject security into “Project-BAU” transition
• Leverage COBIT capability measures for day-to-day operations cadence
Introduce formal security governance

ISACA JOURNAL VOL 4 45


among peers. Because he did not want security to became an extended security team of sorts that
be perceived as a hammer, Akindeju decided to ask helped push the security message throughout the
Enjoying employees for nominations for his task force, the organization (figure 2). This team helped ensure
this article? Security Chapter. In parallel, he wrote his own that security was part of the conversation for new
private list of individuals he thought might make technology and process deployments across the
• Learn more good champions; not so coincidentally, the entire business.
about, discuss nominations and Akindeju’s list overlapped.
and collaborate As Akindeju did not yet have a fully-fledged security
on information Though the goal of the exercise was to identify team, his workload increased significantly. He
and cybersecurity potential champions, Akindeju had grander plans. developed and presented a business case for an
in ISACA’s Online With the support of upper management, he elastic co-sourcing arrangement that would allow
Forums. organized three days of security fundamentals him to hire external security consultants who could
https://engage. training for all technology employees and provided help drive secure-by-design principles, review new
isaca.org/online an extra two days for the individuals nominated by and existing deployments, handle exemptions
forums peers. The latter group, totaling 25 employees from based on risk, identify and remediate security gaps
marketing, IT, service management and more, sat (when possible) with existing tools, and ensure that
for a certification exam, received certificates and delivery processes met the principles of the security

Figure 2—Recruiting, Training and Execution Plan

Recruit Identify key Solicit Security


individuals nominations champions

Train Upper management Develop and Security fundamentals


support organize training certificate

Three days for


all employees

25 security
Five days for champions earned
security champions certificate

Execute Security champions


Security champions ensure that security
push security is part of
message conversations for
organizationwide. new technology
deployments.

46 ISACA JOURNAL VOL 4



organization. Further, Akindeju plugged into existing
technology governance functions and also AWARENESS DROVE SECURE EXECUTION,
established enterprise-level technology risk and WHICH, IN TURN, RESULTED IN IMPROVED


security governance over technology procurement
to avoid shadow IT and insecure implementation, CONFIDENTIALITY, INTEGRITY AND
and for healthy discussions on return on investment AVAILABILITY OF SYSTEMS AND DATA.
(ROI) on security investments.

The Benefits SOC model and monitoring platform that is jointly


maintained by his internal team and an external
Once Akindeju established and started executing on
security co-sourcing partner.
his two-part plan, the organization was better
positioned to identify security gaps in processes
In a short period of time, Akindeju was able to
and system controls. Employees grew increasingly
institute an end-to-end security culture. His success
aware of the importance of security in their ability to
was based on his willingness to learn the business,
deliver on-time, valuable services and products,
to learn from colleagues and to educate teammates
both internally and externally. Awareness drove
who would eventually help him with his mission.
secure execution, which, in turn, resulted in
Akindeju was able to leverage the innovative,
improved confidentiality, integrity and availability of
technology-driven culture already in place to help
systems and data.
the company become a more secure and compliant
technology-forward innovator (figure 3).
By recruiting security champions who were already
recognized leaders and influencers within the
Akindeju is using the COBIT maturity benchmark to
company, Akindeju created a support system that
work through governance and reporting to ensure
collectively spread the message of the importance
that his team can objectively measure progress
of security.
against goals. When he started his journey at
Mercury, Akindeju says the company did not have a
The Results formalized security maturity assessment
While not leading with a “security first” message framework in place. This has now changed and,
was more time-consuming, the approach adopted working with an external firm, Mercury has set an
by Akindeju meant that he was better suited to put overall maturity level 4 as its target operating state
security in context of the organization’s needs and, and is well on its way to achieving that objective.
as a result, was able to gain support and buy-in for (figure 4).
the security and risk management programs. This
backing from the top smoothed a transition to a Akindeju notes marked improvement in service
security-aware culture. management, perimeter security, overall
engagement and operations. These positive results
More tangibly, as Akindeju’s workload increased, the have been presented to executives and the board,
elastic co-sourcing arrangement with external experts which is helping him clinch funding commitments
allowed him to demonstrate the need for full-time that allow the security and risk team to, in
security staff. After a period of time, he submitted a Akindeju’s words, “be more proactive and introduce
request for internal headcount; he now has a team of better processes to identify vulnerabilities, prioritize
four permanent FTEs and up to six contractors. Using remediation, and become more strategic in meeting
a capability map he developed, he is planning to hire the security needs of the business.”
three additional FTEs. Recently, Akindeju deployed a

ISACA JOURNAL VOL 4 47


Figure 3—A Before and After Security View of Mercury NZ
Before After Introducing a Formal Program
Eager adoption of new technology Security by design
No evident formal security consideration in Security through delivery
implementation and delivery
Lack of evident formal technology risk management Implementation of security frameworks including
processes COBIT and ISO 27001-2/5, ISO 27002, ISO 27005,
and ISA/IEC 62443
Lack of ability to remediate security vulnerabilities Security control mapping
No formal security practice/function Seven full-time security staff; elastic co-sourcing agreement
with additional external experts
Low security awareness among employees Formalized security training for all employees
Established security champions program
Formalized security governance
Ongoing capabilities assessments

Figure 4—Improvement in Mercury NZ Security Maturity Model

4.5
COBIT Maturity
4.0 4 Quantitative The enterprise is
data driven, with quantitative
3.5 performance improvement.

3.0

2.5

2.0

1.5

1.0 0 Incomplete Work may or may not be completed toward achieving


the purpose of governance and management objectives in the focus area.
0.5

0 2018 2019 2020 2021 2022

Author’s Note Endnotes


Akindeju noted that he could not have achieved any 1 Technology risk management was
success without the unflinching support of brought into Akindeju’s remit in 2019 to
Mercury’s senior leadership team. He acknowledges drive enterprisewide technology risk
Tim Aynsley, head of information and management activities.
communications technology (ICT), Kevin Angland, 2 Mercury, Investor Centre, https://www.mercury.
general manager retail and digital, Graeme Hill, co.nz/investors
infrastructure asset manager, and others.

48 ISACA JOURNAL VOL 4


FEATURE

Cybersecurity Incident Response


Tabletop Exercises Using the Lego Serious Play Method

It is foolish to wait until an enterprise is in the midst to prevent failures and overcome challenges has
of a data breach to test its cybersecurity incident been recognized. Cybersecurity professionals need
response plan (CSIRP). How likely is it that the to acknowledge these shortcomings and explore
enterprise will know that a cyberattack is underway new mechanisms to manage them. The LSP
and be able to react appropriately? Are the method has proved to be one mechanism that
enterprise’s current policies and procedures enriches and improves cybersecurity incident
sufficient to effectively detect, respond to and response TTEs and reduces the risk of failure.
mitigate sophisticated cybersecurity incidents?
The Value of Tabletop Exercises
The use of tabletop exercises (TTEs) can help
answer these and other questions. TTEs are A TTE presents a realistic cybersecurity incident
designed to prepare for real cybersecurity incidents. scenario to which an enterprise must respond.
By conducting TTEs, an incident response team Participants in the exercise describe how they
increases its confidence in the validity of the would react during the incident, what tools they
enterprise’s CSIRP and the team’s ability to would use and what procedures they would follow.
execute it.1 At the end of the exercise, the enterprise can
determine where its incident response plans and
The Lego Serious Play (LSP) method can support, policies are working well, where there is room for
improve and strengthen the design, execution and improvement, and how it can refine its CSIRP
outcomes of the TTEs an enterprise uses to assess
the capabilities, effectiveness and maturity of its
CSIRP. TTEs help determine whether the current
CSIRP is able to detect, respond to and mitigate
incidents in a timely and successful manner. They
can also ascertain whether the right people are in
place, whether they are aware of and committed to
their duties during a real cybersecurity incident, and
whether they can execute the procedures correctly.

Although TTEs are based on recommended


methodologies, such as the US National Institute of
Standards and Technology (NIST) Special
Publication (SP) 800-84,2 the need to improve TTEs

Fabian Garzón, CISM, CRISC, GCIH


Has two decades of experience in the IT and information security consultancy services working in various roles including product
management, IT security operations engineer, cybersecurity incident management, Payment Card Industry Data Security Standard
(PCI DSS) implementation, cyberrisk management and, now, chief technology officer at Hackergame, Colombia. He can be reached
at fabian@hackergame.com or www.linkedin.com/in/r-fabian-gg/.

Gustavo Garzón, CISM, CRISC, PMP


Has more than 15 years of experience in technology and digital security areas as a consultant and team leader implementing
information technology projects in Latin America and now is the founder and chief executive officer at Hackergame. He was a
member of the development team for A Practical Guide to the Payment Card Industry Data Security Standard (PCI DSS). He can be
reached at gustavo@hackergame.com or www.linkedin.com/in/gustavogarzonr.

ISACA JOURNAL VOL 4 49



• Improve coordination between internal and
INCREASINGLY, CLIENTS, INSURERS, external teams, enterprises and entities.
AUDITORS AND REGULATORS REQUIRE • Increase awareness and understanding of
EVIDENCE OF PREPAREDNESS, AND THE hazards and the potential impact of hazards.


RESULTS OF A TTE CAN SATISFY THESE • Assess the capabilities of existing resources and
identify needed resources.
REQUIREMENTS.
moving forward. Increasingly, clients, insurers,
Methodology for Planning and
auditors and regulators require evidence of Performing Tabletop Exercises
preparedness, and the results of a TTE can satisfy TTEs must follow some widely accepted
these requirements. methodology or guide. NIST SP 800-84, for
example, focuses on TTEs and functional
A variety of standards, regulations and guides exercises.10 It can help enterprises design, develop,
related to cybersecurity incident response conduct and evaluate testing, training and exercise
recommends the testing of CSIRPs. Figure 1 events in an effort to assist personnel in preparing
provides a sampling of standards from NIST,3, 4 the for adverse situations involving IT.
Payment Card Industry Security Standards Council
(PCI SSC),5 the SANS Institute,6 the International TTEs are discussion-based exercises. Personnel
Organization for Standardization (ISO)/International meet in a classroom setting or in breakout groups to
Electrotechnical Commission (IEC)7 and ISACA®.8 discuss their roles during an emergency and their
responses to a particular crisis situation. A facilitator
The US Department of Homeland Security’s Ready presents a scenario and asks the participants
Campaign,9 designed to educate and empower questions related to the scenario, which initiates a
US citizens to prepare for, respond to and mitigate discussion of roles, responsibilities, coordination and
emergencies, summarizes the benefits and decision making. Figure 2 outlines the NIST SP 800-
outcomes of exercises to test response plans. They 84 methodology for conducting a TTE.
include the following:
• Identify planning and procedural deficiencies. Failures and Challenges of Tabletop
• Clarify roles and responsibilities.
Exercises
TTEs are not exempt from weaknesses and
• Obtain participant feedback and
discouraging results.11 Disengaged staff, low
recommendations for program improvement.
attendance, inattention during the exercise and
• Measure improvement compared to other failures have been identified. They include
performance objectives. the following:

Figure 1—Cybersecurity Incident Response Guidelines


Standard Requirement/Recommendation
NIST SP 800-53 Requires US federal agencies to conduct exercises or tests for their incident
response capabilities at least annually
NIST SP 800-61 Requires that the incident response policy, plan and procedures be tested to
validate their accuracy and usefulness
PCI Data Security Standard (DSS) 3.2 Requires the implementation of an incident response plan, including a review
and test of the plan at least annually
SANS Institute Recommends drills at regular intervals to ensure that all individuals on the
incident response team can perform their duties during an incident
ISO/IEC 27035 Recommends periodic tests of the information security incident management
scheme
ISACA® Recommends comprehensive exercises that involve all key factors:
communications, coordination, resource availability and response

50 ISACA JOURNAL VOL 4


Figure 2—NIST SP 800-84 TTE Methodology • Distractions—If TTE participants divide their
attention between their electronic devices and
Design—Phase 1 the exercise—multitasking—neither activity gets
Establish teams and the benefit of the brain’s full resources, and
scope the TTE event.
participants are likely to miss important details
of the cybersecurity scenario.12

Evaluation—Phase 4 Development—Phase 2 This list of failures and challenges is not all-


Document lessons Develop all documentation inclusive, but these shortcomings have been
learned from the necessary for the conduct
event. of the TTE event. highlighted because LSP addresses them directly.

Game-Based Learning and Gamification


Conduct—Phase 3

Conduct the
Because many of the failures of TTEs are related to
TTE event. interest, interaction, engagement and participation,
creative solutions are needed, and this is where
game-based learning and gamification can help.
• Lack of clear and achievable objectives—Do not An example of game-based learning applied to
overcomplicate the objectives of the TTE, and TTEs is Backdoors & Breaches, an incident
make sure they are achievable. response card game that is simple in concept,
easy to play and fun.13
• Irrelevance—The value of a TTE is the
opportunity to discuss individual interests Gamification is the craft of deriving fun and engaging
(related to areas or roles) and to explore new and elements found typically in games and thoughtfully
unforeseen issues. applying them to real-world or productive activities.
• Tedium—TTEs are a means to expand the scope Game mechanics such as points, challenges,
of an enterprise’s human, process and leaderboards, rules and incentives make game-play
technology assets. For some individuals, the enjoyable. Gamification applies these mechanics to
prospect of a TTE meeting may not be exciting, motivate the audience to achieve higher and more
so it is important to make the exercises meaningful levels of engagement.14
interesting.
Many enterprises have experimented with
• Boring scenarios—The TTE scenario should gamification to improve end-user awareness. The
ensure that all the participants are engaged. results have been remarkable.15 Games have the
Maintaining their interest in the conversation ability to disarm people, negating their natural
throughout the session can be difficult, but it can aversion to meetings because games make them fun,
be accomplished by including issues that are and most games are associated with the chance to
specific to the participants’ areas of responsibility. win. Although using games to increase people’s
• Lack of visual appeal—Pictures, short videos, engagement with work may seem counterintuitive,
manipulated images, simulated news and social game playing appears to be paying off in the areas of
media messages can create realism and keep cybersecurity awareness, incident response exercises
participants engaged. Failure to present a and cybersecurity skills development.
visually stimulating experience will result in less
interaction and more disengagement. Lego Serious Play Method
• Exercises that are too challenging or not In the search for innovative and proven methods of
challenging enough—Achieving the right balance game-based learning that can be used without any
can be difficult. If scenarios go too far, restrictions in the development and execution of TTEs
participants may be overwhelmed by the various and can mitigate the failures described previously,
problems presented to them. This can lead to a LSP is an obvious choice. In simple terms, LSP is a
reduction in active participation during the TTE. systematic method that enables people to use Lego
The same is true for a scenario that is too easy bricks to solve problems, explore ideas and achieve
to handle and does not test the team. objectives.16 Lego bricks are combined with animals,

ISACA JOURNAL VOL 4 51



traditional failures of TTEs were reduced. The
LSP...IS A CREATIVE APPROACH TO following are some of the positive outcomes:
ENHANCING INNOVATION AND IMPROVING • Everyone involved in the TTE has an interest or


BUSINESS PERFORMANCE, WITH THE FOCUS stake in the agenda.

ON UNLEASHING PLAY. • Everyone commits to and honors decisions


reached after the TTE.

miniature figures and an extensive selection of special


• Team understanding is increased, and team
frustration is decreased.
elements such as wheels, tires, windows, trees, sticks,
globes, spiral tubes, ladders and fences. Figure 3 • Participants do not consider the exercises a
shows models built with Lego pieces during an waste of time.
LSP exercise.
• All participants share a common understanding
and frame of reference (CSIRP in place).
If participants’ hands are occupied with Lego pieces,
one failure of TTEs—distraction—is already • Conversations flow without the fear of treading
diminished. But LSP is much more than building on personal feelings.
models. It is a creative approach to enhancing
innovation and improving business performance, with
• Cybersecurity incident response can be complex
and multifaceted. TTEs using LSP help participants
the focus on unleashing play. Based on the merging
grasp the bigger picture, find connections, and
of play with organizational development, systems
explore options and potential solutions.
thinking and strategy development, LSP can lead to
improved meetings, faster innovation processes, • Participants acquire the skills to communicate
team growth and better communication.17 more effectively when a cybersecurity incident
happens and approach their work with increased
The purpose of LSP is to change “lean backward confidence and commitment.
meetings” to “lean forward meetings,”18 where the
result is more participation, more insights, more
• There is a level playing field for discussion.
engagement, and, ultimately, more commitment • Excuses and lack of initiative are less common
and faster implementation. In several TTEs after the TTE.
executed with LSP in Latin America in 2019, the

Figure 3—Lego Models

52 ISACA JOURNAL VOL 4


What are the practical applications of the LSP cross-functional relationships within the enterprise
method? Many case studies have been (e.g., legal, IT, human resources, public relations) and
documented.19 Effective team building; shared decreases the resistance to performing cross-
vision, values and behaviors; and the development functional TTEs. Modifying Lego models is analogous
of workshops are some of the practical examples. to manipulating elements in a system, network or
Depending on the challenge (the incident scenario process in a simulated incident scenario. The
in the TTE), the LSP method has seven application participants explore “what if” questions (injecting new
techniques (figure 4), all of which are built on four elements into cybersecurity scenarios) and how
core phases (figure 5).20 these elements can impact the results of their
response. By observing connections among Lego
Figure 4—Applications Techniques of LSP model systems and by playing “what if,” participants
Applications Techniques are able to identify the underlying truths that will
guide them through real cybersecurity incidents in
Building individual models
the future.
Building shared models
Creating a landscape Conclusion
Making connections
A number of efforts can advance an enterprise’s
Building a system CSIRP, including the development of TTEs that are
Playing emergence and decisions fun, engaging and interactive. Lego Serious Play can
Extracting simple guiding principles be an important tool in a cybersecurity incident
response TTE.
Figure 5—Basic Phases of LSP
When planning a TTE, remember that people tend to
Basic Phases be more engaged when the subject matter is
1. Facilitator poses the questions pertinent, fun, appealing and challenging. It is
2. Individuals build a model important to test the CSIRP and the incident response
team as often as possible with different scenarios,
3. Individuals share their stories
different exercises and different mechanisms.
4. Questions and reflections

Enterprises are strongly encouraged to adapt LSP is not just for incident response TTEs. Once
scenarios to use in their own incident response cybersecurity professionals understand and have
exercises. For TTEs executed with LSP, sample practiced and tested the LSP method, they can use
scenarios can be found in the Center for Internet it for other types of workshops, including security
Security (CIS) guide21 or appendix A of NIST SP 800- awareness, skill building, team building,
61.22 If an enterprise wants to simulate incidents cybersecurity program goal setting, cybersecurity
using cloud-based services, Amazon Web Services behavior modification and cultural activities within
(AWS) provides sample scenarios.23 the community, enterprise, workplace and home.

During TTEs applying the LSP method in Colombia’s Endnotes


financial enterprises, it was observed that 1 Markey, S.; “Testing Your Computer Security
participants with shared Lego models demonstrated Incident Response Plan,” ISACA® Journal, vol. 2,
a team understanding of a cyberattack, its impact and 2012, www.isaca.org/Journal/archives
the step-by-step incident response.24, 25 They had a 2 National Institute of Standards and Technology
shared vision of the response strategy and how to (NIST), “Guide to Test, Training, and Exercise
mitigate the simulated cybersecurity incident. Programs for IT Plans and Capabilities,”
Participants can make physical connections between Special Publication (SP) 800-84, USA, 2006,
various Lego models to demonstrate how they are https://csrc.nist.gov/publications/detail/
related; this helps them solve problems involving sp/800-84/final

ISACA JOURNAL VOL 4 53


Journal vol 4_2020_offline.qxp_Layout 1 6/29/20 11:37 AM Page 54

3 National Institute of Standards and Technology, 14 Chou, Y.; Actionable Gamification—Beyond


Enjoying “Security and Privacy Controls for Federal Points, Badges, and Leaderboard, Octalysis
Information Systems and Organizations,” Media, USA, 2017
this article? SP 800-53, rev. 4, USA, 2013, https://nvd. 15 Bedell, C.; “Play On: How Gamification Can
nist.gov/800-53 Improve Employee Cybersecurity Compliance,”
• Learn more 4 National Institute of Standards and Technology, Infosecurity Professional Magazine,
about, discuss “Computer Security Incident Handling Guide,” July/August 2019
and collaborate SP 800-61, rev. 2, USA, 2012, 16 Blair, S.; M. Rillo; “Serious Work: How to
on information https://nvlpubs.nist.gov/nistpubs/Special Facilitate Meetings and Workshops Using the
and cybersecurity Publications/NIST.SP.800-61r2.pdf Lego Serious Play Method,” 2016,
in ISACA’s Online 5 Payment Card Industry Security Standards https://b-ok.cc/book/3403461/887f78
Forums. Council (PCI SSC), Payment Card Industry Data 17 Kristiansen, P.; R. Rasmussen; Building a Better
https://engage. Security Standard (PCI DSS) 3.2.1, 2018, Business Using the Lego® Serious Play® Method,
isaca.org/online www.pcisecuritystandards.org/document_library Wiley, USA, 2014
forums 6 SANS Institute, “Incident Handler’s Handbook,” 18 Association of Master Trainers, “The Lego®
2012, www.sans.org/reading-room/whitepapers/ Serious Play® Method,” Serious Play, 2019,
incident/paper/33901 seriousplay.training/lego-serious-play/
7 International Organization for Standardization 19 Op cit Blair, Rillo
(ISO)/International Electrotechnical 20 Rillo, M.; “History: Copyright of Lego Serious
Commission (IEC), ISO/IEC 27035-2:2016, Play Methodology Process Elements,” Serious
“Security Techniques—Information Security Play Pro, 3 August 2018, seriousplaypro.com/
Incident Management—Part 2,” Switzerland, 2018/08/03/copyright-of-application-techniques-
2016, https://www.iso.org/standard/62071.html and-4-core-steps-of-the-lego-serious-play-process
8 ISACA®, Responding to Targeted Cyberattacks, 21 Center for Internet Security (CIS), “Six Tabletop
USA, 2013 Exercises Prepare Cybersecurity Team,” 2018,
9 US Department of Homeland Security, Ready www.cisecurity.org/white-papers/six-tabletop-
Campaign, 21 January 2016, www.ready.gov/ exercises-prepare-cybersecurity-team/
business/testing/exercises 22 Op cit NIST, 2012
10 Op cit NIST, 2006 23 Amazon Web Services (AWS), “AWS Security
11 Murray, M.; R. Lelewski; “Common Tabletop Incident Response Guide,” 2019,
Exercise Failures,” 31st Annual FIRST https://d1.awsstatic.com/whitepapers/
Conference, 2019, www.first.org/conference/ aws_security_incident_response.pdf
2019/program#pTop-Common-Tabletop- 24 HackerGame, “Taller de ciberseguridad con
Exercise-Failures Lego® Serious Play®—Cómo afrontar una Crisis
12 Etailinsights, “Why Multitasking Doesn’t Digital en tu empresa,” YouTube, 15 August
Actually Increase Productivity,” 2014, 2019, www.youtube.com/watch?v=ikQR0lLU9YY
https://blog.etailinsights.com/ 25 HackerGame, “Taller de ciberseguridad con
multitasking-productivity Lego® Serious Play®—Cómo hacer que tus
13 Porup, J. M.; “Backdoors and Breaches: inversiones sean seguras,” YouTube, 15 August
Incident Response Card Game Makes 2019, www.youtube.com/watch?v=zHsRln_kH6k
Tabletop Exercises Fun,” CSO Online, 2020,
www.csoonline.com/article/3509467/
backdoors-and-breaches-incident-response-
card-game-makes-tabletop-exercises-fun.html

54 ISACA JOURNAL VOL 4


HELP
SOURCE
Q&A

Q With the proliferation of cloud computing


services available, our organization is
• Improved operations—Organizations can reduce
the need to handle hardware or software
considering moving IT-related services to cloud- installation or maintenance.
based services. What are the benefits and risk
• Improved business continuity planning
associated with using cloud services? What steps
(BCP)/disaster recovery (DR) infrastructure—
should we follow when selecting a cloud service
Organizations can leverage the process to
provider (CSP)?
create more robust disaster recovery and
business continuity features and services,

A In the early days of cloud computing, a cloud


symbol was used to represent computers
placed on networks out of the boundary of •
if properly managed.
Higher efficiency—Organizations may be able to
organization. This is likely the origin of the term optimize their IT infrastructure and gain quick
“cloud computing” for the services available through access to the computing services required.
the Internet. Based on the type of services offered,
there are different types of cloud services available, While acknowledging the benefits of CSPs, like
and organizations should consider which model is any other technology innovation, cloud services
most suitable for their business. also have associated risk. The Cloud Security
Alliance (CSA) has identified the top threats for
Primarily, cloud computing is an outsourcing cloud services:1
service model and has become popular due to
1. Data breaches
multiple benefits organizations can derive from
using cloud-based services. Those benefits include: 2. Misconfiguration and inadequate change control

• Scalability—CSPs offer scalable computing 3. Lack of cloud security architecture and strategy
environments and often include pay-as-you-use
4. Insufficient identity, credential, access and
models, which help organizations handle
key management
increased volumes of data processing without
investing in nonproductive computing capacity 5. Account hijacking
and without impacting performance.
6. Insider threat
• Affordability—Organizations need not invest in
costly infrastructure and incur costs for
maintaining that infrastructure. CSPs offer the
required computing capability on a subscription
model and help save on capital expenditures,
particularly for small- and medium-sized
organizations.
• Lower capital costs—Organizations can provide
unique services using large-scale computing
resources from CSPs, and then nimbly add or
remove IT capacity to meet peak and fluctuating
service demands while only paying for actual
capacity used.
• Lower IT operating costs—Organizations can
rent added server space for a few hours at a time
rather than maintain proprietary servers without
Sunil Bakshi, CISA, CRISC, CISM, CGEIT, CDPSE, ABCI, AMIIB,
worrying about upgrading their resources
BS 25999LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
Has worked in IT, IT governance, IS audit, information security and IT risk
whenever a new application version is available. management. He has 40 years of experience in various positions in
They also have the flexibility to host their virtual IT different industries. Currently, he is a freelance consultant in India.
infrastructure in locations offering the lowest cost.

ISACA JOURNAL VOL 4 55


Journal vol 4_2020_offline.qxp_Layout 1 6/29/20 11:38 AM Page 56

7. Insecure interfaces and application getting assurance via periodic audits may be a
programming interfaces (APIs) challenging task for the organization.
8. Weak control plane
How to Proceed?
9. Meta-structure and appli-structure failures
Organizations that wish to subscribe to CSPs by
10. Limited cloud usage visibility third party need to consider the following:
11. Cloud services are also prone to attacks • Outsourcing decisions are strategic and, as such,
must be included in the overall outsourcing strategy.
These threats may result in any of the following
negative consequences for organizations using • An organization-level service provider management
cloud services: framework and policy need to be in place.

• Loss or theft of IP—Some of an organization’s • A central vendor management steering


most valuable data, IP, may be lost or stolen. committee can help in addressing risk.

• Noncompliance and regulatory actions— • Selecting a CSP must be done carefully since it
Organizations need to comply with laws and may not be easy to switch the vendor in the future.
regulatory controls, for example the US Health • Each service provider has unique risk factors,
Insurance Portability and Accountability Act which means it is prudent to study the practices
(HIPAA) for private health information, the US followed by each service provider.
Family Educational Rights and Privacy Act (FERPA)
for confidential student records, and some • Organizations that wish to use cloud services
countries prohibit storing and processing resident need to have clearly defined functional and
information out of geographical boundaries. security requirements.
Organizations must be aware of the location of • The contract with a CSP must include a “right to
their data, who can access it and what is the level audit” clause, and the organization must have a
of protection. Although CSPs are responsible, mechanism to execute periodic audits of
organizations are accountable for compliance. vendors. Most CSPs may not agree to audits by
• Loss of control over end user actions—End users the organization’s auditor but may agree to a
need to access data in the cloud and, with bring shared audit report. The organization must insist
your own device (BYOD) and mobile workforces, on SOC reports using the SSAE 18 standard by
many organizations risk losing control over the approved auditors.
actions of authorized end users. • Define and monitor service level agreements.
• Malware infections that unleash a targeted
attack—Cloud services can be subject to targeted Cloud computing is here to stay. Organizations need
attacks resulting in data breaches. Successful to manage the risk associated with hosting sensitive
attacks diminish trust and can negatively impact data offsite, which will strengthen confidence with the
the reputation of an organization. service provider and allow the organization to reap
the benefits of using a cloud platform.
• Contractual breaches with customers or
business partners—Contracts between Endnotes
organizations and CSPs should control the data
flow, processing and dissemination to authorized 1 Cloud Security Alliance, “Top Threats to Cloud
users. Since it is another vendor relationship, Computing: The Egregious 11,” 6 August 2019,
contracts with CSPs must be carefully drafted https://cloudsecurityalliance.org/artifacts/top-
and agreed on in all cases. threats-to-cloud-computing-egregious-eleven/
2 Cloud Security Alliance, Security Guidance v4.0,
• Reduced level of security—Information security https://cloudsecurityalliance.org/research/
in the cloud may not be required by the guidance/
organization policy. Although the CSA has
defined security guidelines,2 monitoring and

56 ISACA JOURNAL VOL 4


CROSSWORD
PUZZLE

By Myles Mellor
www.themecrosswords.com

ACROSS 1 2 3 4 5 6 7 8

1 Consumer credit reporting agency subject to a


major security breach in 2017
5 Procedures to protect electronic data from 9 10
unauthorized access or use
11
9 Protocol for file transfer, abbr.
10 Duties and responsibilities 12 13 14 15 16
11 With no exceptions
17 18
12 Permit
13 It may serve as a model 19 20 21 22 23 24

15 Are situated 25 26 27
17 Center, abbr.
28 29 30 31
18 Speculate about a future result
19 Arena shout
20 Where many inspections are done, 2 words
32 33 34 35 36 37
22 Accountant
25 Large tree 38 39 40

27 It may be poured on troubled waters 41 42


28 Noted "Talks"
29 Radio band
31 ___ plan, proposed strategy 43 44 45

32 Reveal
36 Gifted foresight 8 Kind of analysis
38 Net alternative 14 Setback
40 Web inventor, first name 16 ISACA's concern
41 Conclusion regarding the purpose of the 18 Zone
cyberattack on 1 Across
21 Kind of support
42 Type of software that advocates adaptive
22 One of the five attributes of an audit finding
planning and continual improvement
23 Transcendental number
43 Figure out
24 COBIT 2019 audit report component, _____ goals
44 Ordered reference standard
26 Lessen the seriousness or extent of a crime or
45 Web
disastrous event
30 .001 inch
DOWN 32 Early operating system
1 Secretly steal data 33 Push
2 Not protected by a fix for a security flaw 34 A, in Acapulco
3 Guaranteed against failure 35 Objectives
4 Programming language 37 Maintain, as some tools
5 Fort Knox bar 38 C-suite members
6 Physical fitness 39 Trial phase
7 Range or extent, of an IT audit, e.g.
Answers on page 58

ISACA JOURNAL VOL 4 57


CPE QUIZ
Take the
#191 quiz online.
https://bit.ly/2UBLKkp
Based on volume 2, 2020—Data Overload
Value—1 Hour of CISA/CRISC/CISM/CGEIT Continuing Professional Education (CPE) Credit

TRUE/FALSE
ALVERO AND MCCARTHY ARTICLE
11. The CCPA’s requirements around third-party notification
1. One of the categories of common automation project pitfalls is
exactly mirror the requirements of HIPAA.
authentication of bots, which results from a lack of control
ensuring bot functionality and issue resolution. 12. Organizations should create a new privacy statement,
which would include a comprehensive list of the third parties
2. Although robotic process automation (RPA) is traditionally
to whom the organization sells personal information, to
considered an approach to handling repetitive, routine tasks—
comply with CCPA requirements that are over and above
often categorized as “low value”—internal audit’s role should be
HIPAA requirements.
to ensure that the organization does not invest in automating
tasks that are truly ineffective or of low value. SHARMA AND MUKHOPADHYAY ARTICLE
3. A survey of information workers revealed that one quarter of those 13. Assessing and mitigating the risk of a distributed denial-of-
employees believe their jobs could be replaced by automation. service (DDoS) attack in the gaming industry involves
computing the risk of not detecting a DDoS attack and the
PEARCE AND KETCHEN ARTICLE severity of such an attack, creating a risk and severity heat
4. Now more than ever, humans are desirable data subjects, map of undetected attacks, then considering options for
whether or not they know they are serving in that capacity—a reduction and transfer of risk.
situation the EU General Data Protection Regulation (GDPR)
14. The approach described in the article groups types of DDoS
addresses through its informed consent requirements.
attacks into five categories and suggests steps to produce
5. Four ethical principles should inform the standards of classification accuracy to at least 80 percent.
organizations that sell or leverage data: respect for autonomy,
15. Suggested risk mitigation strategies include adding stringent
beneficence, nonmaleficence and protection.
firewalls and intrusion detection systems (IDSs), diverting
6. Among the top-rated medical applications (apps) for Android, excess or illegitimate traffic to backup servers or content
46 percent shared user health data with third-party delivery networks (CDNs), and transferring residual risk to
organizations, and entities from 79 organizations used or cyberinsurance policies.
consumed the data in some way.
SEEDAT ARTICLE
QURESHI ARTICLE 16. One of the lessons learned from the software-defined
7. Auditors can use the Emerging Technology Analysis Canvas networking in a wide area network (SD-WAN) project
(ETAC), which focuses on four conditions—opportunity/trigger, described in the article is the need for a project charter that
impact, feasibility and future—to identify and assess the risk of includes, at the least, project objectives and deliverables, in-
emerging technologies. scope items, exclusions, assumptions, high-level timelines,
8. Artificial intelligence (AI) uses complex algorithms to propose and responsible parties.
decisions based on a pattern or learned over time. Because 17. Past project experience indicates that project teams should
those algorithms are invisible, auditors must focus on factors ensure that the latest stable and compatible version of the
such as the logical flow of processes, unintended bias and operating system (OS) is implemented. It is not necessary to
review/approval of algorithm output. update patches before adding apps or configuring services to
9. ISACA’s blockchain-oriented audit program focuses on six the system.
categories: pre-implementation, governance, development, 18. Although it will be necessary when the system goes live, it is
security, census and privacy. not critical to mask sensitive data and restrict/protect access
GOMEZ AND HINEY ARTICLE to sensitive data during the testing phase.
10. Nonmedical information attached to a medical file and 1 2 3 4 5 6 7 8

medical information used for marketing purposes may fall in


E Q U I F A X I N F O S E C
Answers: Crossword by X N O M N E C O

the gap between the US Health Insurance Portability and Myles Mellor.
9 10
F T P O B L I G A T I O N S

See page 57 for the puzzle.


11

Accountability Act (HIPAA) and the US State of California


I A L L O T P T
12 13 14 15 16
L E T P I L O T L I E
Consumer Privacy Act (CCPA) requirements. 19
T
17
C T
20
R O
21
18
B E T
22 23 24
R A H O N S I T E C P A
25 26 27
A E O S E L M O I L
Please confirm with other designation-granting professional bodies for 28
T E D
29
F
30
M
31
A C T I O N I
their CPE qualification acceptance criteria. Quizzes may be submitted E I H T D G
for grading only by current Journal subscribers. Take the quiz online
32 33 34 35 36 37
D I V U L G E V I S I O N

at www.isaca.org/cpequiz, where it is graded automatically. You will be


38 39 40
C O M N O B G T I M

responsible for submitting your credit hours at year-end for CPE


41 42
E S P I O N A G E A G I L E

credits. A passing score of 75 percent will earn one hour of CISA, 43


O E
44
L T T
45
O N

CRISC, CISM or CGEIT CPE credit. S O L V E S C A L E N E T

58 ISACA JOURNAL VOL 4


STANDARDS, GUIDELINES,
TOOLS AND TECHNIQUES

ISACA Member and Certification Holder Compliance IS Audit and Assurance Guidelines
The guidelines are designed to directly support the standards and help
The specialized nature of information systems (IS) audit and assurance practitioners achieve alignment with the standards. They follow the same
and the skills necessary to perform such engagements require standards categorization as the standards (also divided into three categories):
that apply specifically to IS audit and assurance. The development and
dissemination of the IS audit and assurance standards are a cornerstone
• General guidelines (2000 series)
of the ISACA® professional contribution to the audit community. • Performance guidelines (2200 series)
IS audit and assurance standards define mandatory requirements for • Reporting guidelines (2400 series)
IS auditing. They report and inform:
General
• IS audit and assurance professionals of the minimum level of 2001 Audit Charter
acceptable performance required to meet the professional 2002 Organizational Independence
responsibilities set out in the ISACA Code of Professional Ethics 2003 Professional Independence
2004 Reasonable Expectation
• Management and other interested parties of the profession’s 2005 Due Professional Care
expectations concerning the work of practitioners 2006 Proficiency
2007 Assertions
• Holders of the Certified Information Systems Auditor® (CISA®) 2008 Criteria
designation of requirements. Failure to comply with these standards
may result in an investigation into the CISA holder’s conduct by the
ISACA Board of Directors or appropriate committee and, ultimately, in Performance
disciplinary action. 2201 Engagement Planning
2202 Risk Assessment in Planning
2203 Performance and Supervision
ITAFTM, 3rd Edition (www.isaca.org/itaf) provides a framework for 2204 Materiality
multiple levels of guidance: 2205 Evidence
2206 Using the Work of Other Experts
IS Audit and Assurance Standards 2207 Irregularity and Illegal Acts
2208 Sampling
The standards are divided into three categories:
Reporting
• General standards (1000 series)—Are the guiding principles under 2401 Reporting
which the IS assurance profession operates. They apply to the 2402 Follow-Up Activities
conduct of all assignments and deal with the IS audit and assurance
professional’s ethics, independence, objectivity and due care as well IS Audit and Assurance Tools and Techniques
as knowledge, competency and skill. These documents provide additional guidance for IS audit and assurance
• Performance standards (1200 series)—Deal with the conduct of the professionals and consist, among other things, of white papers, IS
assignment, such as planning and supervision, scoping, risk and audit/assurance programs, reference books and the COBIT® 5 family of
materiality, resource mobilization, supervision and assignment products. Tools and techniques are listed under www.isaca.org/itaf.
management, audit and assurance evidence, and the exercising of
professional judgment and due care. An online glossary of terms used in ITAF is provided at www.isaca.org/glossary.

• Reporting standards (1400 series)—Address the types of reports,


means of communication and the information communicated. Prior to issuing any new standard or guideline, an exposure draft is
issued internationally for general public comment.

Please note that the guidelines are effective 1 September 2014. Comments may also be submitted to the attention of the Director,
Content Strategy, via email (standards@isaca.org); fax (+1.847.253.1755)
General or postal mail (ISACA International Headquarters, 1700 E. Golf Road,
1001 Audit Charter Suite 400, Schaumburg, IL 60173, USA).
1002 Organizational Independence
1003 Professional Independence Links to current and exposed ISACA Standards, Guidelines, and Tools
1004 Reasonable Expectation and Techniques are posted at www.isaca.org/standards.
1005 Due Professional Care
1006 Proficiency Disclaimer: ISACA has designed this guidance as the minimum
1007 Assertions level of acceptable performance required to meet the professional
1008 Criteria responsibilities set out in the ISACA Code of Professional Ethics.
ISACA makes no claim that use of these products will assure a
Performance successful outcome. The guidance should not be considered
1201 Engagement Planning inclusive of any proper procedures and tests or exclusive of other
1202 Risk Assessment in Planning procedures and tests that are reasonably directed to obtaining the
1203 Performance and Supervision same results. In determining the propriety of any specific procedure
1204 Materiality or test, the control professionals should apply their own professional
1205 Evidence judgment to the specific control circumstances presented by the
1206 Using the Work of Other Experts particular systems or IS environment.
1207 Irregularity and Illegal Acts

Reporting
1401 Reporting
1402 Follow-Up Activities
ISACA JOURNAL VOL 4 59
ISACA® Journal, formerly
Information Systems Control ADVERTISERS/
Journal, is published by the
Information Systems Audit WEBSITES
and Control Association®
(ISACA®), a nonprofit
organization created for the
public in 1969. Membership
in the association, a voluntary

leaders and
supporters
organization serving
IT governance professionals,
entitles one to receive an
annual subscription to the
ISACA Journal.

Opinions expressed in the


ISACA Journal represent the
views of the authors and
advertisers. They may differ
from policies and official Tanja Grivicic Satyajit Turumella, CISA
statements of ISACA and/or
Editor
Manish Gupta, Ph.D., CISA, CRISC, Sadir Vanderloot Sr., CISA, CISM, CCNA,
the IT Governance Institute Jennifer Hajigeorgiou CISM, CISSP CCSA, NCSA
and their committees, and publication@isaca.org Jeffrey Hare, CISA, CPA, CIA Rajat Ravinder Varuni, CEH, DOP, DVA,
from opinions endorsed by
Sherry G. Holland GPEN, SAA, SAP, SCS, SOA
authors, employers or the Managing Editor Jocelyn Howard, CISA, CISMP, CISSP Juan Gantiva Vergara
editors of the Journal. ISACA
Journal does not attest to the Maurita Jasper Khawaja Faisal Javed, CISA, CRISC, CBCP, Varun Vohra, CISA, CISM
originality of authors’ content. ISMS LA Manoj Wadhwa, CISA, CISM, CISSP,
Assistant Editor Mohammed J. Khan, CISA, CRISC, CIPM ISO 27000, SABSA
© 2020 ISACA. All rights reserved. Safia Kazi Abbas Kudrati, CISA, CISM, CGEIT, COBIT 5 Kevin Wegryn, PMP, Security+, PfMP
Foundation, CBE, CCEH, CCISO, CCNA, Tashi Williamson
Instructors are permitted to Contributing Editors CCSK, CHFI, EDRP, ISO 27001 LA, Ellis Wong, CISA, CRISC, CFE, CISSP
photocopy isolated articles for ITIL Foundation, MCSE+, Microsoft
noncommercial classroom use Sunil Bakshi, CISA, CRISC, CISM, CGEIT, Certified Azure Fundamentals, ISACA Board of Directors
without fee. For other copying, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, PRINCE2, SABSA Foundation, (2020-2021)
reprint or republication, ISO 27001 LA, MCA, PMP TOGAF CEA
permission must be obtained Dustin Brewer, CSX-P, CCSP, CEH,CHFI Chair
Shruti Kulkarni, CISA, CRISC, CCSK, ITIL
in writing from the association. Ian Cooke, CISA, CRISC, CGEIT, COBIT Tracey Dedrick
Bhanu Kumar
Where necessary, permission Assessor and Implementer, CFE,  
Hiu Sing (Vincent) Lam, CISA, CPIT(BA),
is granted by the copyright CIPM, CIPP/E, CPTE, DipFM, FIP, ITIL Vice Chair
ITIL, PMP
owners for those registered Foundation, Six Sigma Green Belt Rolf von Roessing, CISA, CISM, CGEIT,
Edward A. Lane, CISA, CCP, PMP
with the Copyright Clearance K. Brian Kelly, CISA, CSPO, MCSE, CISSP, FBCI
Romulo Lomparte, CISA, CRISC, CISM,
Center (CCC) (www.copyright. Security+  
com), 27 Congress St., Salem, CGEIT, COBIT 5 Foundation, CRMA,
Vasant Raval, DBA, CISA Director
MA 01970, to photocopy IATCA, IRCA, ISO 27002, PMP
Steven J. Ross, CISA, CBCP, CISSP Gabriela Hernandez Cardoso
articles owned by ISACA, Larry Marks, CISA, CRISC, CGEIT
 
for a flat fee of US $2.50 per Luis Martinez
Advertising Director
article plus 25¢ per page. Tamer Marzouk, CISA, ABCP, CBAP
Pamela Nigro, CISA, CRISC, CGEIT, CRMA
Send payment to the CCC media@isaca.org Brian McSweeney
 
stating the ISSN (1944-1967), Irina Medvinskaya, CISM, CGEIT, FINRA,
Director
date, volume, and first and Media Relations Series 99
Maureen O’Connell
last page number of each Rubal Mehta
article. Copying for other than
news@isaca.org  
David Earl Mills, CISA, CRISC, CGEIT, MCSE
personal use or internal Director
Reviewers David Moffatt, CISA, PCI-P
reference, or of articles or Gerrard Schmid, ICD.D
Donald Morgan, CISA
columns not owned by the Matt Altman, CISA, CRISC, CISM, CGEIT  
Eswar Muthukrishnan, CISA, ITIL Manager,
association without express Sanjiv Agarwala, CISA, CISM, CGEIT, CISSP, Director
Six Sigma
permission of the association ITIL, MBCI Gregory Touhill, CISM, CISSP, Brigadier
Jonathan Neel, CISA
or the copyright owner is Vikrant Arora, CISM, CISSP General United States Air Force (ret.)
Jacky Y. K. Ng, CISM, COBIT Assessor,
expressly prohibited.  
Sunil Bakshi, CISA, CRISC, CISM, CGEIT, AgilePM, CEng, CMgr, FCMI, ISO 9001
ABCI, AMIIB, BS 25999 LI, CEH, CISSP, Director
ISSN 1944-1967 and ISO/IEC 27001 LA, ITIL Expert,
ISO 27001 LA, MCA, PMP Asaf Weisberg, CISA, CRISC, CISM, CGEIT,
MHKIE, MIET, PRINCE2, RPE
Brian Barnier, CRISC, CGEIT CSX-P
Nnamdi Nwosu, CISA, CRISC, CISM, CGEIT,
Ronald Bas, CISSP  
PfMP, PMP
Pascal A. Bizarro, CISA Director
Ganiyu Babatunde Oladimeji, CISA,
Joyce Chua, CISA, CISM, PMP, ITILv3 Anna Yip
CRISC, CISM
Ashwin K. Chaudary, CISA, CRISC, CISM,  
Daniel Olaniran, CISA, CRISC, CISM, PMP
CGEIT Director and Chief Executive Officer
Anas Olateju Oyewole, CISA, CRISC, CISM,
Ken Doughty, CISA, CRISC, CBCP David Samuelson
CISSP, CSOE, ITIL
Subscription Rates: Nikesh L. Dubey, CISA, CRISC, CISM, CISSP  
Daniel Paula, CISA, CRISC, CISSP, PMP
Robert Findlay Director and ISACA Board Chair 2019-2020
Pak Lok Poon, Ph.D., CISA, CSQA, MIEEE
Jack Freund, Ph.D., CISA, CRISC, CISM, Brennan P. Baybeck, CISA, CRISC, CISM,
US: John Pouey, CISA, CRISC, CISM, CIA
one year (6 issues) $85 CIPP, CISSP, PMP CISSP
Parvathi Ramesh, CISA, CA
Sailesh Gadia, CISA  
Ron Roy, CISA, CRP
All international orders: Durgesh Gaitonde, CISM, CRISC, Director and ISACA Board Chair 2018-2019
Louisa Saunier, CISSP, PMP, Six Sigma
one year (6 issues) $100 COBIT 5 Foundation, CEng, CIPM Rob Clyde, CISM
Green Belt
Robin Generous, CISA, CPA  
Abdulmajid Suleman, CISA, CISM, CGEIT,
Remittance must be made Tushar Gokhale, CISA, CISM, CISSP, Director and ISACA Board Chair 2015-2017
COBIT Foundation, CISSP, ISO 27001
in US funds. ISO 27001 LA Chris K. Dimitriadis, Ph.D., CISA, CRISC,
LA, ITIL, MCSE, PMP
Miguel Angel Gonzalez, CISA, ISO 27032 CISM, ISO 20000 LA
Nancy Thompson, CISA, CISM, CGEIT, PMP
https://bit.ly/2NzLpM3 Lead Cybersecurity Manager, ITIL v3 Smita Totade, Ph.D., CISA, CRISC,
CISM, CGEIT

60 ISACA JOURNAL VOL 4


Grow Your Knowledge
Explore ISACA®’s expert-developed resources for wisdom,
guidance and real-world experiences to help you achieve
your goals in your organization.

IT governance is more important than ever in achieving


digital transformation and driving value. ISACA recently
updated the content outline for its Certified in the
Governance of Enterprise IT® (CGEIT®) certification
exam to reflect the needs of this evolving landscape.
Browse our new CGEIT certification publications
and other governance-related resources
in the pages ahead.

ISACA Resources
for guidance and professional development

S-1
F E AT U R E D R E S O U C E S
CGEIT Review Manual 8th Edition

CGEIT Print Product Code: CGM8ED | Member Price: $105 | Non-member Price: $135
eBook Product Code: EPUB_CGM8ED | Member price: $105 | Non-member price: $135
Review
Manual The CGEIT Review Manual 8th Edition is designed to help individuals prepare for
The Risk IT Framework Practitioners Guide, 2nd Edition

8nd Edition
the CGEIT exam and understand the responsibilities of those who implement or
manage governance of enterprise IT (GEIT) or have significant advisory or assurance
responsibilities in regards to GEIT. It is a detailed reference guide that has been
developed and reviewed by subject matter experts actively involved in GEIT worldwide.
The manual is organized to assist candidates in understanding essential concepts and
studying the following updated job practice areas:
• GOVERNANCE OF ENTERPRISE IT
• IT RESOURCES
• BENEFITS REALIZATION
• RISK OPTIMIZATION
The CGEIT Review Manual 8th Edition features an easy-to-use format. Each of the book’s
four chapters has been divided into two sections for focused study. Section one of each
chapter contains the definitions and objectives for each of the CGEIT® practice areas. It
also includes:
• Self-assessment questions and explanations of the answers
• Suggested resources for further study
Section two of each chapter consists of content and reference material that supports
the knowledge subdomains for each job practice area. The material enhances CGEIT
candidates’ knowledge and/or understanding when preparing for the CGEIT certification
exam. In addition, the CGEIT Review Manual 8th Edition includes definitions of terms
most commonly found on the exam.
The manual is excellent as a stand-alone document for individual study or as guide
or reference for study groups and chapters conducting local review courses, and it can
be used in conjunction with the:
• CGEIT Review Questions, Answers & Explanations Manual 5th Edition
• CGEIT Review Questions, Answers & Explanations Database –
12 Month Subscription

Order online at www.isaca.org/resources


S-2
CGEIT Questions Answers and Explanation Manual, 5th Edition
CGEIT Review Print Product Code: CGQ5ED | Member Price: $72 | Non-member Price: $96
Questions,
Answers & The CGEIT Review Questions, Answers & Explanations Manual, 5th Edition is designed to
Explanations familiarize candidates with the question types and topics featured in the CGEIT exam.
Manual
The Risk IT Framework Practitioners Guide, 2nd Edition

5nd Edition The manual consists of 300 practice items. These questions are not actual exam items
but are intended to provide CGEIT candidates with an understanding of the type and
structure of questions and content that has previously appeared on the exam. This
publication is ideal to use in conjunction with the CGEIT Review Manual 8th Edition.
To help candidates maximize—and customize—study efforts, questions are presented
in the following two ways:
• Sorted by job practice area—questions, answers and explanations are sorted
by the CGEIT job practice areas. This allows the CGEIT candidate to refer to
questions that focus on a particular area as well as to evaluate comprehension
of the topics covered within each practice area.
• Arranged as a sample 75-question exam—The 75 questions are arranged in
the same percentages as the current CGEIT job practice areas. Candidates
are urged to use this sample test to simulate an actual exam and to determine
their strengths and weaknesses in order to identify areas that require further
study. Answer sheets and an answer/reference key for the sample exam are also
included. All sample test questions have been cross-referenced to the questions
sorted by practice area, making it convenient for the user to refer back to the
explanations of the correct answers.

NEW CGEIT Review Questions, Answers & Explanations Database—


12 Month Online Subscription

eBook Product Code: EPUB_CSXG2 | Member Price: $60 | Non-member Price: $65
Web Download Product Code: WCSXG2 | Member price: $50 | Non-member price: $55

CGEIT® Review Questions, Answers & Explanations Database—12 Month Subscription


is a comprehensive 300-question pool of items that contains the questions from the
CGEIT® Review Questions, Answers & Explanations Manual, 5th Edition. The database is
available via the web, allowing CGEIT candidates to log in at home, at work or anywhere
they have Internet connectivity, and is MAC and Windows compatible.
Exam candidates can utilize an interactive planner to build a custom study plan, and
a personalized dashboard serves as the primary method to navigate studies and
track progress. Candidates will take sample exams with randomly selected questions
and view the results by job practice domain, allowing for concentrated study in
particular areas.
Additionally, questions generated during a study session are sorted based on previous
scoring history, allowing CGEIT candidates to identify their strengths and weaknesses
and focus their study efforts accordingly. Other features provide the ability to select
sample exams by specific job practice domain, view questions that were previously
answered incorrectly and vary the length of study sessions, giving candidates the ability
to customize their study approach to fit their needs

Order online at www.isaca.org/resources


S-3
COBIT 2019 Framework: Introduction and Methodology
FRAMEWORK Print Product Code: CB19FIM | Member Price: $60 | Non-member Price: $75
Web Download Product Code: WCB19FIM | Member price/Non-member price: FREE
Introduction and
Methodology
Over the years, best-practice frameworks have been developed and promoted to assist in
the process of understanding, designing and implementing enterprise governance of IT
(EGIT). COBIT® 2019 builds on and integrates more than 25 years of development in this
field, not only incorporating new insights from science, but also operationalizing these
insights as practice.
COBIT 2019 Framework: Introduction and Methodology updates COBIT principles while
laying out the structure of the overall framework.
• New concepts are introduced and terminology is explained—the COBIT Core
Model and its 40 governance and management objectives provide the platform
for establishing your governance program
• The performance management system is updated and allows the flexibility to
use maturity measurements as well as capability measurements
• Introductions to design factors and focus areas offer additional practical
guidance on flexible adoption of COBIT 2019, whether for specific projects or
full implementation
From its foundation in the IT audit community, COBIT has developed into a broader and
more comprehensive information and technology (I&T) governance and management
framework and continues to establish itself as a generally accepted framework for I&T
governance.
COBIT is a framework for the governance and management of enterprise information
and technology, aimed at the whole enterprise. Enterprise I&T means all the technology
and information processing the enterprise puts in place to achieve its goals, regardless
of where this happens in the enterprise.

COBIT 2019 Framework: Governance and Management Objectives


COBIT® 2019 FRAMEWORK: Governance and Management Objectives

FRAMEWORK
Print Product Code: CB19FGM | Member Price: $60 | Non-member Price: $75
Governance and Web Download Product Code: WCB19FGM | Member price/Non-member price: FREE
Management Objectives
COBIT is a framework for the governance and management of enterprise information
and technology, aimed at the whole enterprise. Enterprise I&T means all the technology
and information processing the enterprise puts in place to achieve its goals, regardless of
where this happens in the enterprise. In other words, enterprise I&T is not limited to the IT
department of an organization, but certainly includes it.

This publication, COBIT 2019 Framework: Governance and Management Objectives,


contains a detailed description of the COBIT Core Model and its 40 governance and
management objectives. A description of each objective, its purpose, and its connection
with enterprise and alignment goals along with sample metrics are provided. For each
objective, the process, practices, activities, and related guidance to other standards and
frameworks are also provided.

COBIT defines the components to build and sustain a governance system: processes,
organizational structures, policies and procedures, information flows, culture and
behaviors, skills, and infrastructure. This publication also includes detailed information
about each of the components relevant to each governance and management objective.
Please note: This COBIT 2019 framework publication also has another companion framework publication available as a
complimentary PDF download to both ISACA members and nonmembers.

Order online at www.isaca.org/resources


S-4
Let Everyone Know
You’re a Technical
Privacy Pro
Show the world you bring in-depth knowledge and
experience in privacy by design with ISACA®’s new
technical privacy certification, Certified Data Privacy
Solutions Engineer™ (CDPSE™).

Early adoption of the certification is open now.


Learn more: www.isaca.org/CDPSE-jv4
Join us in creating a
Healthy Digital World
that’s safe, secure and
accessible for ALL.
www.oneintech.org

You might also like