Monthly Archives: January 2016

Ssae 16 Examination Report Is Ready For Issuance Pending F&a Committee Approval

Tab 4: Results of Examination and Independence Report from the Service Organization Control Auditor
Lauren Edmonds, Manager
BrightLine CPAs & Associates, Inc.
2012 SSAE 16 Examination Highlights
SSAE 16 Examination Report is ready for issuance pending F&A Committee approval

The report will be issued with an unqualified opinion

No testing deviations or disclosures were identified
Discussion Topics
ERCOT 2012 SSAE 16 Overview

Auditor Independence
SSAE 16 Overview
Statement on Standards for Attestation Engagements (SSAE) No. 16 examinations, also referred to as SOC 1 examinations, are utilized to report on controls at service organizations that are relevant to user entities’ internal control over financial reporting.

The 2012 SSAE 16 examination examined the Settlement Operations for the period of October 1, 2011, to September 30, 2012

BrightLine worked with ERCOT process owners to modify control objectives and activities to align with current business processes

19 Control Objectives were within the scope of the 2012 audit

Audit testing was conducted in two phases -May 2012 and September 2012

Auditor Independence
Professional standards require that CPA firms maintain independence in fact and appearance from their clients. 

To meet this requirement, BrightLine has implemented the following policies and procedures:
Implementation of Quality Control Procedures
Education
Elimination of all consulting services
Prohibition of any direct or materially indirect financial interest in clients by employees or their close relatives
Annual independence verification

Ssae 16 Reports

Vendor Management

The risks of Vendor Management and Outsourcing are numerous and complicated

A large number of critical processes are outsourced that contain customer and employee non-public information, along with the financial institution’ s intellectual property in many cases

Upon outsourcing you have countless risks; reputation and brand risks, security breaches and regulatory compliance concerns.

All of above; costs the financial institution money from legal liability, business interruption and compliance fees to name a few!

Vendor Management

Also have the issue of vendor relationships are scattered throughout the business units at the bank

Legal risks associated to lack of visibility into the vendor practices even if you get everything you would like into the contract

Information security issues at most banks lack the resources to monitor large number of potential security risks associated in-house, at the vendor, and at their vendors!

Vendor Management

How to Improve?

Vendor Management

Common knowledge are the requirements of a program including Service Providers, Third Parties and Subcontractors

Risk Assessment

Due Diligence/Documentation

Contracts

Monitoring

Vendor Management

Let’ s discuss some of the pitfalls or dilemmas we run into within each category

Risk Assessment

Due Diligence/Documentation

Contracts

Monitoring

Risk Assessment

A preliminary review should be performed upon every vendor. The philosophy they have been a long term vendor they warrant no review is flawed.

A list of all vendors should be maintained and reviewed annually. Without a preliminary and annual you may miss:

If the long term vendor has NPI you have no way of knowing how that data is being retained, secured or disposed of without performing a risk assessment.

Without the risk assessment you may miss the fact your contract with this long term vendor is obsolete for GLBA, cybercrime and other compliance requirements.

You may miss identifying the vendor’ s technology is outdated and vulnerable to the weekly attacks we all see.

Risk Assessment

We all agree the risk assessment needs to be tempered for the relationship.

We typically recommend an initial review of each vendor looking at five categories.

NPI
Financial
Operational/Impact
Reputation
Compliance

Build your risk assessment based on your findings above.

Risk Assessment

A risk assessment should also be performed for any prospective vendor or changed relationship.

Business change (merger and acquisitions)

Product change

Controls are changed

Regulations are changed (even if your contract states they will remain in compliance)

Risk Assessment

The Business Owner (Contract) is responsible for the Vendor and the Risk Assessment process.

If there are multiple relationships/contracts, all employees should be involved because the risks may vary by service.

Assign one employee as the primary. They are responsible to pull the team together.

The vendor management of a vendor should not be delegated to an employee unfamiliar with the vendor and the related processes.

Risk Assessment

Define and document up front the responsibilities of:

Business Owner
Legal
Vendor Management facilitator
Information Security
IT
Audit
Risk Management
Compliance

Risk Assessment

Require these employees to sign off on the risk assessment. If they are required to sign you will see a great deal more time and concern from them!

A big complaint is the time this process takes due to the number of vendors and the involvement of so many departments. Look at the time and costs your financial institution undergoes when something happens! It is worth the time.

Security Breach and customer reputation risk, notification, insurance and legal liability
Poor product implementation and impact upon IT infrastructure, security and compliance re-working!

Centralize the contracts and identify the business processes for DD and BCP.

Risk Assessment NPI

When reviewing NPI during the risk assessment make sure to identify the level and volume of NPI but also who is providing the NPI to the vendor.

Financial Institution?
Consumer?

What is the consumer’ s perception of the relationship? Do they realize they are providing information to a third party or feel it may be a division of the bank?

NPI and Reputation risk
Call Centers & Mortgage & Investment Services

Risk Assessment Reputation

Recent example of ATM branding vendor.

The machine does not notify the customer that the machine is not owned or operated by the financial institution. So, what is the customer to think?

The bank does not have any control over who has access for cash replenishment or maintenance to the machines.

Typically, the security controls at the stores in which the machines reside is very limited.

Risk Assessment Reputation

Will the customer blame the store or the financial institution in the situation of a security breach?

Will the bank’ s insurance cover a security breach?

A review of the vendor contract identified some concerns for the financial institution.

SLA regarding maintenance and uptime was not tied to a measurement period and no penalties or credits were identified if SLA’ s were missed.

Indemnification provision was too narrow and did not include verbiage for if any claim was made against FI as a result of Vendor’ s performance under agreement. Also did not include a provision regarding cybercrime, loss of data.

Risk Assessment NPI

Confidentiality provision was too narrow and did not address GLBA/NPI compliance although BIN numbers are provided.

Confidentiality provision did not address the retention, destruction and/or return of confidential information upon the termination of the agreement.

Contract was missing a provision giving the ability to audit the vendor/ or have access to vendor’ s audit reports. (subcontractors) Also the ability to audit the site of the ATM machines.

Risk Assessment Government

Fannie Mae and Freddie Mac

FHFA’ s annual examination program assesses Fannie Mae’s and Freddie Mac’s¬†financial safety and soundness and overall risk management practices.

Fannie Mae’s and Freddie Mac’s¬†financial condition, earnings, liquidity, and efforts taken to mitigate losses in its single-family and multifamily portfolios.

Assess their response to continued stress in the mortgage markets and its effect on their risk profile, performance, and condition.

Risk Assessment Government

Reporting Framework 

Use a specific¬†framework¬†to summarize examination results and conclusions to¬†Fannie Mae’s and Freddie Mac’s¬†board of directors and Congress is known as GSEER, which stands for Governance, Solvency, Earnings, and Enterprise Risk (enterprise risk comprises credit, market, and operational risk management).

www.fhfa.gov/SupervisionRegulation/FannieMaeandFreddieMac.
 

Risk Assessment
Other Risk Questions to think of:

Identify All related vendors and subcontractors. You are responsible for the due diligence of all related parties.

This includes understanding the NPI and reputation risks associated with all vendors touching the NPI. More discussed under GLBA session.

What are their Security Breach notifications and Incident response plans for all parties involved? Involve IT in this discussion!

Review vendor and third party open source software usage and Patent infringement (contract)

Risk Assessment
Other Risk Questions to think of:

Does the financial institution need additional insurance coverage for the services?

Has a cost benefit analysis been performed?

Any lawsuits or legal proceedings involving the vendor, third parties or subcontractors?

Has the financial institution performed a reference review? (refer to sample risk assessment form)

Risk Assessment
Other remaining Risk Categories:

Transactional
Credit
Interest Rate
Liquidity
Out of Country

Due Diligence & Documentation

If you have collected it, you are responsible to review it.

Business Continuity/Disaster Recovery Plan –

Is it current and applicable to the bank’ s service?

Most Recent BC/DR Test Results –

Testing at least annual, applicable to the bank’ s service and are the banks involved in testing? Is there any involvement from an independent third party?

Due Diligence & Documentation

Internal Audits Reports for GLBA, BSA, Red Flag Compliance

Most Recent Audited Financials

SSAE 16 Reports

Information Security Policies and Procedures

Current and includes all areas of security documented in a SSAE16

Due Diligence & Documentation

Current GL and E&O Insurance Certificates
Cybercrime if applicable

Most Recent Penetration/Vulnerability Test Results
Performed at a minimum of annually (depends on the service).

PCI DSS Compliance Certification

Privacy Policies and Procedures
Current and in compliance with Bank’ s requirements

Due Diligence & Documentation
Recommendations for Documentation based on Risks:

NPI = High
SSAE16 or like Security Policy
Privacy Policy
PEN Test

If not in contract:
Red Flag, GLBA, BSA, PCI
Security breach notification and Incident response
NPI disposal, retention, return
Confidentiality
Insurance

Due Diligence & Documentation

Recommendations for Documentation based on Risks:

Financial = High

– Audited Financials

Operational/Impact = High

– BCP/DR

SSAE16 Reports

Reports should be used to evaluate the vendors internal controls.

Report should be within two year period

Report should include relevant products

Exceptions and Management Responses and User Control Considerations should be reviewed, noted and documented.

Exceptions should be audited to ensure vendor is correcting vulnerabilities and maintaining security controls.

SSAE16 SOC1
SOC 1SM¬†Report¬† -¬†Report on Controls at a Service Organization Relevant to User Entities’ Internal Control over Financial Reporting (SSAE 16)

These reports, prepared in accordance with¬†Statement on Standards for Attestation Engagements (SSAE) No. 16, Reporting on Controls at a Service Organization, are specifically intended to meet the needs of the of entities that use service organizations (user entities) and the CPAs that audit the user entities’ financial statements (user’ auditors), in evaluating the effect of the controls at the service organization on the user entities’ financial statements.

User auditors use these reports to plan and perform audits ¬†of the user entities’ financial statements. ¬†¬†There are two types of reports for these engagements:

SSAE16 SOC1
SOC 1 Report¬† -¬†Report on Controls at a Service Organization Relevant to User Entities’ Internal Control over Financial Reporting (SSAE 16)

Type 2¬†- ¬†report on the fairness of the presentation of management’ s description of the service organization’ s system and the suitability of the design and operating effectiveness of the controls to achieve the related control objectives included in the description throughout a specified period.

Type 1¬†-report on the fairness of the presentation of management’ s description of the service organization’ s system and the suitability of the design of the controls to achieve the related control objectives included in the description as of a specified date.
Use of these reports is restricted to the management of the service organization, user entities, and user auditors.

SSAE16 SOC2
Report on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy

These reports are intended to meet the needs of a broad range of users that need to understand internal control at a service organization as it relates to security, availability, processing integrity, confidentiality and privacy.

These reports are performed using the AICPA Guide:  Reporting on Controls at a Service Organizations Relevant to Security, Availability, Processing Integrity,  Confidentiality, or Privacy  and are intended for use by stakeholders (e.g., customers, regulators, business partners, suppliers, directors) of the service organization that have a thorough understanding of the service organization and its  internal controls.
 

SSAE16 SOC2
Report on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy

These reports can form an important part of stakeholders:
Oversight of the organization
Vendor management program
Internal corporate governance and risk management processes
Regulatory oversight

Similar to¬† SOC 1sm¬† engagement there are two types of report : Type 2, report on management’ s description of a service organization’ s system and the suitability of the design and operating effectiveness of controls; and Type 1, report on management’ s description of a service organization’ s system and the suitability of the design of controls.¬† These reports may be restricted in use.¬†¬†
 

SSAE16 SOC3
SOC 3SM¬†Report î Trust Services Report for Service Organizations

These reports are designed to meet the needs of users who need assurance about ¬†the controls at a service organization that affect ¬†the security, availability, and processing integrity of the systems used by a service organization to process users’ information ,and the ¬†confidentiality, or privacy of that information, but do not have the need for or the knowledge necessary to make effective use of a SOC 2 Report.

These reports are prepared using the AICPA/Canadian Institute of Chartered Accountants (CICA) Trust Services Principles, Criteria, and Illustrations for Security, Availability, Processing Integrity, Confidentiality, and Privacy.  Because they are general use reports, SOC 3 reports can be freely distributed or posted on a website as a SysTrust for Service Organizations seal. 
SSAE16 SOC1
SOC 3SM¬†Report î Trust Services Report for Service Organizations

For more information about the SysTrust for Service Organization seal program go to www.webtrust.org.

Unlike a SOC 1 report, which is only an auditor-to-auditor communication, SOC 2 Reports are generally restricted use report  (at the discretion of the auditor using the guidance in the standard) and  SOC 3 Report (in all cases) will enable the service organization to share a general use report that would be relevant to current and prospective customers or as a marketing tool to demonstrate that they have appropriate controls in place to mitigate risks related to security, privacy, etc. 

** American Institute of CPA’ s www. Aicpa.org

SSAE16 Determination
When determining which SOC to require for a vendor consider the following areas:

What level of Operational/Impact, NPI and Reputation Risk has been assessed?

What is the availability of the service? Is it in-house, private server, data center, public cloud?

Are there any restrictions for the service? Time of usage, employee and vendor access, etc.

SSAE16 Determination

What are the known security controls? Are they adequate in comparison to the NPI and Reputation Risk rating?

What are the potential confidentiality issues that could arise? Security breach, loss of data by vendor or employee, disgruntled employee, etc.

What is the customer usage level for the service?

What are the legal ramifications of loss or data or service interruption?

Red Flags

Be cautious if you run into any of the following during Risk Assessment or Documentation review:

Incomplete answers to your questions.

Confidential, we can’ t share?

We have to run it by legal and get back to you.

IS Policies are not based on any accepted security standard (ISO27001).

Red Flags

Be cautious if you run into any of the following during Risk Assessment or Documentation review:

No formal security awareness training program noted for employees and subcontractors.

Old documentation such as Privacy policy.

Difficulty providing the overall material.

Monitoring

Review all due diligence documentation. Question if reports are not being updated at a minimum of every two years

Review of Penetration Test results (more during IT session

Monitor vendors with NPI risk for any changes in volume, data changes
Encryption
New technology for sending files
Remote access
Employee terminations

Annual Reporting Five Components
Annual report of High risk vendors should include:

Vendor Overview

Vendor Risk Level Assessment

Operational Review

Legal/Regulatory Review

Conclusion

Annual Reporting 1. Vendor Overview
Service provided

Location of vendor corporation

If it is publicly traded or not

Experience in the financial industry

Number of other financial institutions using vendor

General reputation of the Vendor

Annual Reporting 2. Vendor Risk Level
Assessment should answer:

Strategic Risk and Reputation Risk

Vendor’ s product/services have what kind of direct impact on Strategic and Reputation risk?

Vendor’ s products/services impact the financial institution how in these areas?

Annual Reporting 2. Vendor Risk Level
Assessment should answer:

Operational Risk

Vendor’ s product/services have what kind of direct impact on Operational risk?

OR

Vendor’ s products/services do not directly impact the financial institution’ s operations.

Annual Reporting 2. Vendor Risk Level
Assessment should answer:

Transaction Risk

Vendor’ s product/services have what kind of direct impact on Transaction risk?

OR

Vendor’ s products/services do not interact with transaction processing.

Annual Reporting 2. Vendor Risk Level
Assessment should answer:

Credit Risk

Vendor’ s product/services have what kind of direct impact on Credit and Interest rate risk?

OR

Vendor’ s products/services do not interact with our lending area.

Annual Reporting 2. Vendor Risk Level
Assessment should answer:

Compliance Risk

Vendor’ s product/services have what kind of direct impact on Compliance risk?

Annual Reporting 2. Vendor Risk Level
Assessment should answer:

Liquidity Risk

Vendor’ s product/services have what kind of direct impact on Liquidity risk?

OR

Vendor’ s products/services do not impact our ability to fund obligations as they come due.

Identify other Risk Categories as applicable!

Annual Reporting 3. Operational Review

Identify Vendor’ s Financial strength noting:
Balance sheet
Debt
Income
And any other pertinent discussion

Annual Reporting 4. Operational Review
A review of the Information Security controls indicated that

Information Security Audits

Vendor’ s accounting firm provided a ___________ report
Report indicated that the internal controls were effective or ineffective.
Vendor provided a summary of its Information Security and Privacy Policies and procedures and they appear to be:
Current
Adequate

Annual Reporting 4. Operational Review

Privacy policy included:

Proper employee background checks are or are not conducted
Confidentiality provisions are / are not executed by employees, contractors and or subcontractors.
Appropriate for the level of NPI being shared with the vendor and the financial institution’ s compliance requirements.

Annual Reporting 3. Operational Review

Privacy policy included:

Proper employee background checks are or are not conducted
Confidentiality provisions are / are not executed by employees, contractors and or subcontractors.
Appropriate for the level of NPI being shared with the vendor and the financial institution’ s compliance requirements.

Annual Reporting 3. Operational Review

Business Continuity and Disaster Recovery Plan:

Vendor provided a summary of it’ s DR plan including the last test date and test results. According to the summary the plan provides for:

Action Plan
Back îup Facilities
Customer Response Center
Event Monitoring
Disaster Recovery Teams
IT Recovery Plan
Pandemic Plan

Annual Reporting 3. Operational Review

Identify the Vendor Service Quality for the year.

Review and note any discussion required for the contract.

Annual Reporting 4. Legal/Regulatory

Identify if the vendor has any litigation matters

Were any material lawsuits in their annual report

Identify if vendor is or is not subject to any significant regulatory actions.

If so, a copy of the most recent report of examination was reviewed and results were .

Step 5 – Conclusion

Contract Review
Legal counsel reviewed especially if NPI, compliance or Operational risk has been identified.

Ownership of data upon contract termination

NPI retention statement

NPI disposal statement

Security breach notification (within 24 hours) if NPI has potentially been compromised.

Contract Review

Warranty/statement of operating order/compliance for GLBA and other existing and new related state and federal regulations.

Service levels for maintenance and uptimes need to be tied to a measurement period and there should be corresponding penalties/credits if SLA’ s missed.

Audit reports and frequency to be provided documented

Contract includes legal jurisdiction as state of financial institution

Contract Review

A provision giving the financial institution the ability to audit vendor or have access to the vendor audit reports and on-site premises.

Cybercrime indemnification clause

Confidentiality provision should address GLBA/NPI compliance

Responsibilities of all parties including subcontractors

Contract Review
Ownership and Licensing:

Use of Institution’ s Data
Data mining
Marketing

Use of Processing Hardware

Use of Software
Virtualization
Operating System
Application
Updates

Contract Review
Business Continuity

Ensure a disaster recovery and business continuity plan exists and is included in the contract. (data centers, selective restores, mobile recovery units)

Ensure the vendor plan will allow the financial institution to meet their recovery time objectives for the service.

Document the roles and responsibilities of the vendor to provide the financial institution with test plans and results. Participate in the disaster recovery test whenever possible.

Contract Review
Cloud Computing

Review if Institution’ s data separated from others in the Cloud
Restrictions on use of data
Responses to security breaches
Use of security measures such as encryption
Access to Vulnerability and Penetration tests
Loss of confidentiality
Loss of integrity
Loss of availability
Contract Review
Cloud Computing

End of Contract

Access to data
Deletion of data
Application
Updates

Contract Review
Subcontractor

Must have visibility into subcontractors

Define services to be performed by contractors

What NPI will subcontractors have access to?

Contract Review
Subcontractor

How does primary vendor assess contractors

What is the approval process for change of subcontractors? Is the financial institution notified and given notice?

Policy on Foreign firms
Regulatory Sources and References

Guidance for Managing Third Party Relationships -FIL 44-2008, FIL 50-2001

Part 364-B GLBA FDIC Rules and Regulations

FFIEC Supplement to Authentication in an Internet Banking Environment -FIL-50-2011

FFIEC Retail Payment Systems Handbook (FIL-6-2010)

FFIEC Guidance on Risk Management of Remote Deposit Capture (FIL-4-2009)

THANK YOU
Kris Buckley, President
kmb@buckleytechgroup.com
www.buckleytechgroup.com
781.258.0618

Speakers

Speakers

“Securing cyberspace is one of the most important and urgent challenges of our time.”
~Senator Jay Rockefeller, Chairman of the Senate Commerce, Science and Transportation Committee
The Problem
Attacks are now systemic
Cyber Incidents can affect any strategic data of the company -customer data or commercial data
Directors and Officers have a fiduciary duty to protect assets

Carnegie Mellon -CyLab 2012 Report
Used Forbes Global 2000
Boards and senior management still not exercising proper governance

Carnegie Mellon -CyLab 2012 Report
Boards & management pay attention to enterprise risk management (92%)
Disconnect: Boards & management still do not make privacy and security and IT part of risk management

How Does It Happen?
What is the Nature of Risk?
Evaluating risk of loss from cyber incident
Direct costs
Third party liability
Fines and penalties
Reputational risk
Resnick v. AvMed and Anderson v. Hannaford Bros. circuit court authority
Limits types of state law claims
Limits types of damages
Permits some claims to be pursued

What is the Nature of Risk?
Class Actions/Consumer Litigation
State Law Breach of Contract Claims Resulting from Privacy Policy
Bank/Credit Card Company Breach of Contract (i.e. requirements to maintain PCI DSS compliance)
Governmental Authorities (AGs & FTC)
Chargebacks (Credit Card Data)
Public Relations Harm: State/Federal/International Law Notice Requirements

What Do The State Laws Require?
Notification Obligations
Notification to Customer
Notification to Consumer Reporting Agencies
Notification to Applicable Local or Statewide Media
Potential Exception: Adopt Company Notification Policy
Penalties/Fines
Duty to Properly Destroy

Optional: Provide Credit Monitoring Services to Breach Victims

What Do Federal Laws Require?
GLBA
HIPAA
FTC Act Section 5
The SEC
Letter to Chairman Schapiro
Responded in June ‘ 11
Guidance issued in October ò11

The SEC
SEC Guidance
Risk factors (See Appendix -available at www.jw.com)
Description of outsourced functions that have material cybersecurity risks;
Description of cyber incidents experienced by the registrant that are material, including a description of the costs and consequences; and
Description of relevant insurance coverage for cyber incidents.
MD&A
Cost
Business
If there has been an incident
Legal Proceedings
Financial Statements
Effect on Internal Controls (SOX)

What Should Corporate Boards Do?
CTO/Chief Security Officer -Direct Report (or Report to Audit or Risk Committees)
At least annual review of cybersecurity program by the board or a committee
Educate the board on Cybersecurity risks and reporting duties
Disclosure Committees
Risk Oversight¬† -“disclosure about the board’s involvement in the oversight of the risk management process should provide important information to investors about how a company perceives the role of its board and the relationship between the board and senior management in managing the material risks facing the company.”
What Should Corporate Boards Do?
Mitigate risk by insurance
Prior to the Breach -Hack Insurance/ Cybersecurity Insurance
After the Breach
CSIdentity
Debix
Experian Credit Bureau
FIDUCIARY DUTIES
Questions
Contact
Appendix Sample Risk Factor
Security breaches and other disruptions could compromise our information and expose us to liability, which would cause our business and reputation to suffer.

[In the ordinary course of our business, we/We] [collect and] store sensitive data, including intellectual property, our proprietary business information and that of our customers, [suppliers and business partners,] and personally identifiable information of our [customers and] employees, in our data centers and on our networks. The secure [processing,] maintenance [and transmission] of this information is critical to our operations [and business strategy]. Despite our security measures, our information technology and infrastructure may be vulnerable to attacks by hackers or breached due to employee error, malfeasance or other disruptions. Any such breach could compromise our networks and the information stored there could be accessed, publicly disclosed, lost or stolen. Any such access, disclosure or other loss of information could result in legal claims or proceedings, [liability under laws that protect the privacy of personal information,] [and regulatory penalties,] [disrupt our operations [and the services we provide to customers],] [and] damage our reputation, [and cause a loss of confidence in our products and services], which could adversely affect our [business/operating margins, revenues and competitive position].

Source: PLC Securities

Examples of Risk Factors
Google Inc. Annual Report on Form 10-K for the fiscal year ended December 31, 2011.
Citigroup Inc. Annual Report on Form 10-K for the fiscal year ended December 31, 2011.
Lockheed Martin Corporation Annual Report on Form 10-K for the fiscal year ended December 31, 2011.
EMC Corporation Annual Report on Form 10-K for the fiscal year ended December 31, 2011.
The Coca-Cola Company Annual Report on Form 10-K for the fiscal year ended December 31, 2011.
Electronic Arts Inc. Quarterly Report on Form 10-Q for the period ended December 31, 2011.
ATA Inc. Annual Report on Form 20-F for the fiscal year ended March 31, 2011.
CoreLogic, Inc. Annual Report on Form 10-K for the fiscal year ended December 31, 2011.
Alliance Data Systems Corporation Annual Report on Form 10-K for the fiscal year ended December 31, 2011.

Sample Risk Factor
[ADDITIONAL RISK FACTOR DISCLOSURE FOR COMPANIES THAT HAVE EXPERIENCED A SECURITY BREACH]

[In [DATE] [[our computer network/our website] suffered [cyber attacks/unauthorized intrusions] in which [customer data/proprietary business information] was accessed [and stolen]/[DESCRIBE SPECIFICS OF CYBER ATTACK OR OTHER BREACH]]. Following the[se] attack[s], we have taken [additional] steps designed to improve the security of our networks and computer systems. Despite these defensive measures, there can be no assurance that we have adequately protected our information or that we will not experience future violations.]

Source: PLC Securities

Examples of Risk Factors
Examples of description of previous attacks or breaches:
Sony Corporation Annual Report on Form 20-F for the fiscal year ended March 30, 2011.
The TJX Companies, Inc. Annual Report on Form 10-K for the fiscal year ended January 29, 2011.
The NASDAQ OMX Group, Inc. Annual Report on Form 10-K for the fiscal year ended December 31, 2011.
Examples of Risk Factors
Consider Describing Your Preventative Actions
Examples:
Microsoft Corporation’s Quarterly Report on Form 10-Q for the period ended December 31, 2011.
Adobe Systems Incorporated Annual Report on Form 10-K for the fiscal year ended December 2, 2011.

It Series- Cloud Computing Done Right

IT Series: Cloud Computing Done Right
Donald Hester
March 22, 2011

For audio call Toll Free 1-888-886-3951
and use PIN/code 202789

Housekeeping
Maximize your CCC Confer window.
Phone audio will be in presenter-only mode.
Ask questions and make comments using the chat window.
Adjusting Audio
If you’ re listening on your computer, adjust your volume using the speaker slider.
If you’ re listening over the phone, click on phone headset.
Do not listen on both computer and phone.

Saving Files & Open/close Captions
Save chat window with floppy disc icon
Open/close captioning window with CC icon
Emoticons and Polling

Raise hand and Emoticons
Polling options
IT Series: Cloud Computing Done Right
Donald Hester

Cloud Computing Risks and Rewards Cloudy with a chance of rain
Cloud Computing?
The Cloud
Buzz word
Overused clich?©
Ill defined
Many different definitions
Marketing term
All hype
The unknown path
Service provider
What is it?
Cloud Flavors
as-a-service
as-a-service
Potential Spending on Cloud Computing
Federal Cloud Computing Strategy
Benefits of Cloud Computing
Benefits of Cloud Computing
Federal Cloud Computing Benefits
Cost Benefit Analysis
Cost Benefit Analysis Example
Cost Benefit Analysis Example
Cloud Risks
Where’ s My Data?
The Bad Divorce
Trust but Verify
I thought you knew
I didn’ t think of that
Clarify
Consider
Expectations, Put it in Writing
Resources
Cloud Security Alliance
cloudsecurityalliance.org
ISACA: Cloud Computing Management Audit/Assurance Program, 2010
NIST Special Publication 800-145 (draft)
Federal Cloud Computing Strategy, February 2011
Above the Clouds managing Risk in the World of Cloud Computing by McDonald (978-1-84928-031-0)
Cloud Computing, Implementation, Management, and Security by Rittinghouse and Ransome (978-1-4398-0680-7)

Donald E. Hester
CISSP, CISA, CAP, MCT, MCITP, MCTS, MCSE Security, Security+, CTT+
Director, Maze & Associates
University of San Francisco / San Diego City College / Los Positas College
www.LearnSecurity.org | www.linkedin.com/in/donaldehester | www.facebook.com/LearnSec | www.twitter.com/sobca | DonaldH@MazeAssociates.com

Evaluation Survey Link
Help us improve our seminars by filing out a short online evaluation survey at:

www.surveymonkey.com/s/CloudComput
IT Series: Cloud Computing Done Right
Thanks for attending
For upcoming events and links to recently archived seminars, check the @ONE Web site at:
onefortraining.org/

References & Bibliography

Part II, Chapters 2.11-13, App. D ACS Style Guide, Chapter 14
References & Bibliography
Formats of Reference Sections and Citation of Reference in Text
Citing Reference in Text
[1] By superscript numbers, which appear outside the punctuation.
Oscillations in the Belousov-Zhabotinski reaction were reported previously.5

[2] By italic numbers in parentheses on the line of text an inside the punctuation.
Oscillations in the Belousov-Zhabotinski reaction were reported previously (5).

[3] By author name and year of publication in parentheses inside the punctuation.
The primary structure of this enzyme has also been determined (Finnigan et al., 2004).
Citation Style Depends on Journal
Type 1 Journals
Journal of the American Chemical Society, J. Am. Chem. Soc., 1
The Journal of Organic Chemistry, J. Org. Chem., 1
Crystal Growth & Design, Cryst. Growth Des., 1

Type 2 Journals
Biochemistry, Biochemistry, 2
Chemical Research in Toxicology, Chem. Res. Tox., 2

Type 3 Journals
Assessment and Evaluation in Higher Education, Assess. Eval. Higher Educ., 3
Citing One or More Author(s)
1 Author: The primary structure of this enzyme has also been determined (Finnigan, 2004).
2 Authors: The primary structure of this enzyme has also been determined (Finnigan and Bird, 2004).
3 or More Authors: The primary structure of this enzyme has also been determined (Finnigan et al., 2004).
Citing Author(s) in Text
1 Author: The primary structure of this enzyme has also been determined by Finnigan (2004).

2 Authors: The primary structure of this enzyme has also been determined by Finnigan and Bird (2004).

3 or More Authors: The primary structure of this enzyme has also been determined by Finnigan et al. (2004).
Citing References in Text
[1] By superscript numbers: Oscillations in the Belousov-Zhabotinski reaction were reported previously.5-7,11

[2] By italic numbers in parentheses on the line of text: Oscillations in the Belousov-Zhabotinski reaction were reported previously (5-7, 11).

[3] By author name and year of publication in parentheses: The primary structure of this enzyme has also been determined (Finnigan et al., 2004; Gerson et al., 2005).
Multiple Citation to Same Group
[1] By superscript numbers: No problem.
[2] By italic numbers in parentheses on the line of text: No problem.

[3] By author name and year of publication in parentheses: Add a, b, c to year.
The primary structure of this enzyme has also been determined Finnigan et al. (2004a; 2004b).
The primary structure of this enzyme has also been determined Finnigan and coworkers (2004a; 2004b).

Logical Placement of Citation
Aspirin has been synthesized from oil of wintergreen (5) and by carboxylation of sodium phenoxide (6).

Aspirin has been synthesized from oil of wintergreen and by carboxylation of sodium phenoxide (5, 6).

Type 1 Example
Type 1 Example
Type 2 Example
Type 3 Example
Type 3 Example
Formatting References
Journal Article
Journal Abbreviations from CASSI Chemical Abstract Service Source Index
CASSI online
CASSI Sample Record
Journal Abbreviations
Pagination Field
Books (without Editors)
Books (with Editors)
Web Sites

Articles
Communications
Reviews ; Review Articles

Mini-Reviews
Highlights
Essays
Perspectives

Book, Chapters by same Author(s)
Edited Book, Chapters by different Authors(s)

Stereotyped Format
Title
Abstract
Body
References

Chapters and Sections References End of Section vs. End of Document
Section #1

Formatting References
Formatting References
Formatting Reference Sections
Hanging References
Footnote / Endnote Separators
Footnote / Endnote Separators