- Andre Da Silva, Manager of Business Security, nbn Australia
- Darren Sitter, IT Security & Compliance Manager, Maverick Inc.
- Louis Lerman, IT Officer (Information Security), International Monetary Fund
- Wayne Chung, Manager – IT Governance, Eosensa
- One additional professional contributed information that assisted with the development of this blueprint.
- Many organizations need to adhere to various compliance obligations through the implementation of specific security controls.
- Regulatory compliance can have daunting requirements that are often extremely long and complex to understand for the average security manager.
- There is a need for proper identification and assessment of compliance obligations.
- Meeting compliance requirements will never be simple or short; focus on clarity.
- There’s no memory test when meeting compliance. It is okay if you end up with a huge list of requirements and actions to meet those requirements as long as you can understand them.
- Compliance isn’t about checking items off a list – it can be dynamic and your security controls have to be able to reflect that.
- If you bring your auditor a checklist of your compliance requirements today, you are going to have to go back to the drawing board. Meeting requirements needs full visibility into each control and how it is met.
Impact and Result
- Translate compliance requirements into actual actions you can carry out. Turn ambiguous and often open-ended statements into clear and understandable security initiatives.
- Save yourself the headache and time of deciding what you have to do to meet your compliance requirements by having an easy-to-understand method for meeting requirements.
- Document your controls in a simple format so you are prepared for the impending audit.
This guided implementation is a nine call advisory process.
Guided Implementation #1 - Assess current state
Call #1 - Define scope and boundaries.
Call #2 - Perform a current state assessment.
Call #3 - Review current state assessment.
Guided Implementation #2 - Perform a gap analysis
Call #1 - Determine desired future state of compliance.
Call #2 - Identify gaps and initiatives to bridge the gaps.
Call #3 - Group similar initiatives and align under the security framework.
Guided Implementation #3 - Build a roadmap
Call #1 - Prioritize initiatives and build an effort map.
Call #2 - Build the compliance roadmap.
Call #3 - Develop a review and metrics program.
Book Your Workshop
Onsite workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost onsite delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Module 1: Make the Case and Assess Your Compliance Current State
- Identify and document your regulatory compliance obligations.
- Make the case for a compliance management program.
- Gain executive buy-in to ensure that you have your compliance program championed.
- Review your current state for meeting HIPAA and SOX compliance.
Key Benefits Achieved
- Identification of the compliance obligations that the organization faces.
- Executive support for compliance management.
- Understanding of the current state of compliance in relation to HIPAA and/or SOX.
Identify and document regulatory compliance obligations.
- Completed Compliance Business Case
Gain an executive champion.
- Identified executive champion
Perform a current compliance state assessment.
- Determined current state of compliance
Module 2: Determine Your Target State and Perform a Gap Analysis
- Assess organizational friction to compliance.
- Determine desired future state of compliance.
- Identify gaps and initiatives to achieve regulatory compliance.
- Group similar initiatives and align them under the security framework.
Key Benefits Achieved
- Recognized any organizational barriers to compliance.
- Determined the target state of compliance.
- Identified the necessary gap initiatives.
- Grouped similar security projects that are closely aligned.
Assess organizational barriers to compliance.
- Identified organizational barriers
Identify gaps initiatives.
- Actionable initiatives to reach compliance
Module 3: Build a Compliance Roadmap
- Prioritize the implementation of the initiatives.
- Identify dependencies of the initiatives.
- Determine the phases of the initiatives.
- Create a review process and a metrics program.
Key Benefits Achieved
- Prioritized list of initiatives.
- Defined compliance roadmap for the gap initiatives.
- Realized ability to track and review the overall compliance program.
Prioritize the initiative implementation.
- Prioritized initiatives
Determine the phases of the initiatives.
- Roadmap of the initiatives
Develop a review process.
- Review process for compliance
After each Info-Tech experience, we ask our members to quantify the real time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this Blueprint, and what our clients have to say.