Sunteți pe pagina 1din 3

FEATURE

Is ISO 27001 worth it?


Cath Everett, freelance journalist

Even though the internationally recognised ISO 27001 information security


management system standard has been around in various guises for the past Catherine Everett

decade, uptake is not as widespread as might be expected.

According to the International Register Industry is that conformance is per- both financially and in terms of time to
of ISMS Certificates, out of a total of ceived to require huge amounts of time, undertake a compliance initiative. This is
6,942 organisations accredited world- effort and money. weighed against the potential economic
wide, the UK comes fourth in the rank- impact of not doing so in terms of
ings with only 454 under its belt, while Alignment rather than damage to reputation, fines or even the
the US languishes in eighth place with inability of the business to function fol-
a mere 96. The biggest advocate of ISO
accreditation lowing an information security incident.
27001 by far is Japan, accounting for Nonetheless, the numbers can be decep- Ideally, it should also include evidence
more than half of the total at 3,657, tive, Sivanesan argues. While only a small of more active benefits, such as enabling
trailed by India and China at 509 and number of UK organisations may have the company to reduce overheads or
495 respectively. gone down the full accreditation route, introduce new products and services.
As Mike Gillespie, director at informa- he estimates that 20-40% of large to While making satisfactory cost argu-
tion security consultancy Advent-IM, medium-sized businesses in the UK have ments is always going to be challenging
says: For the last 10 years, Ive been at least reached a level that he describes as in a difficult economic climate character-
saying that this will be a big year for ISO aligned or working towards it. ised by a number of priorities competing
27001, but its only really this year that for limited resources, decisions about
Ive started seeing significant adoption. It can be tricky simply to whether to act are likely to rest on the
convince budget holders risk appetite of the organisation as well
Conformance is perceived of the value/business and as whether it has suffered a serious secu-
to require huge amounts of operational benefits of such rity breach in the past. That can help to
time, effort and money a move or to push it high focus minds.
enough up the senior man-
So what is going on? And given an agement agenda to have it Who is doing what
apparent widespread respect for the taken seriously
standard, why have adoption levels
and why?
remained so low? Giri Sivanesan, senior The issue is that it can take anything The sectors that have been the most
manager for policy, risk and compliance from a few months to a few years to forthcoming in terms of compliance are
at risk management consultancy Pentura, become fully compliant, says Sivanesan. financial services, defence, energy and
attributes the poor showing in the US You have to have the proper policies, telecoms. But the retail industry has also
at least partially to a nationwide prefer- procedures and controls in place, but started to move since the Payment Card
ence for SAS 70 (Statement on Auditing to be audited, they have to be enforced Industrys Data Security Standard (PCI
Standards Number 70). This situation through the entire company and for DSS) became obligatory. This is because
stems from the fact that SAS 70 includes large organisations, that takes time. the gap between the two standards is
fewer formal security requirements than One repercussion of this scenario is that relatively small, and the need to focus
its more focused ISO cousin and enables it can be tricky simply to convince budget on protecting payment card data often
organisations to pick and choose the holders of the value/business and opera- raises awareness that other sensitive data
areas in which they wish to be audited. tional benefits of such a move or to push requires safeguarding too.
But another more general explanation it high enough up the senior management Although compliance has been man-
for the low uptake in most countries agenda to have it taken seriously. But dated for central but not local gov-
including the UK, where the standard cost-benefit analyses can help here. ernment departments in the UK for
was originally developed by the govern- Such activity involves working out some time, conformance is still patchy,
ments then Department of Trade and how much it would cost an organisation with alignment or lip-service being the

5
January 2011 Computer Fraud & Security
FEATURE

general order of the day. Interestingly esses for example, to avoid repeatedly Identifying gaps
though, such compulsion has had having to fill in detailed questionnaires,
spin-off effects on the private sector. each of which is worded slightly differ- As a result, information security pro-
While not all public authorities are fully ently, on what they are doing to comply fessionals tasked with implementing
compliant or accredited to ISO 27001 with the standards 133 controls. the standard should, in an ideal world,
and some arent even close central Advent-IMs Gillespie says: It was the report to the board, the corporate
government bodies in particular often same with quality management in the governance or quality management
include accreditation as a requirement in 1980s where telcos, utilities and the like function. However, if this is impossi-
their tenders these days. demanded compliance even though they ble, they should at the very least try to
werent compliant themselves. But a situ- ensure that information risk is added
It ensures that were water- ation like that snowballs and eventually to the corporate risk register, which
tight when dealing with a lot leads to more widespread adoption due today tends to include only business
of client data and our own to market forces. operational, financial and health and
its a reputational thing Although the need for conformance safety risks.
today will undoubtedly depend on each As Gillespie points out: While
Charles Hughes, partner and head of organisations business model and the 60-70% of the 133 controls in ISO
the IT practice at management consul- sectors that they operate in, for some 27001 are IT-oriented, which means that
tancy AT Kearney, which recently became it will definitely be worth it now, while they tend to be put in the hands of the
accredited, explains: ISO standards others are likely to find that they require IT director, you could actually be accred-
are becoming increasingly significant in it in the future. ited to the standard without having a
terms of scoring for public sector tenders. single computer in the business.
Compliance enhances your chances of Although most organisa- AT Kearneys Hughes agrees. The
winning and weve seen the requirement tions perceive information most useful element of the compliance
emerge more in some central govern- security to be an IT prob- programme, he found, was going under-
ment department tenders lately, although lem, it is a business govern- taking a thorough risk assessment as it
its not consistent across the board. It ance matter and, as such, helped the organisation identify gaps in
depends on the tendering authority. has to be dealt with via the its processes. It really helped us tighten
Although the firms compliance initia- management of processes, up there and ensure that things were
tive was only one element of a wider policies and people fully and consistently documented and
quality assurance programme, which also kept up to date. So its also about the
included work on other standards such For those organisations that do decide rigour that youve got to apply and the
as ISO 14000 for environmental man- compliance is of imminent value, how- thinking about what needs to change,
agement, it was deemed an important ever, one of the most important consid- he explains.
one given the amount of sensitive client erations is understanding information
data that it holds. risk. Despite the fact that too few com- We looked at what worked
For us it was important because it panies today have directors responsible or for the business in order to
ensures that were watertight when deal- accountable for this issue at board level, protect our own and our
ing with a lot of client data and our own and well-trained and experienced risk clients data as part of an
its a reputational thing, Hughes says. managers are notoriously hard to come overall quality improvement
by, establishing what the business risks are programme and we were
Market forces and working out how to mitigate them to certified first time around
an acceptable level and cost is crucial.
Public authorities are not the only ones Just as critical, however, is obtaining Another frequently misunderstood
to increasingly demand compliance. buy-in at board level, because without point, however, is that it is not neces-
Large private sector companies again, that high-level sponsorship, any initiative sary to adhere slavishly to the stand-
regardless of whether they are themselves will be doomed to failure. The big issue ard or, worse still, adopt a tick-box
compliant are likewise jumping on the here is that, although most organisations approach to implementing controls. As
bandwagon, or at least encouraging sup- perceive information security to be an IT long as there are good documented rea-
pliers and partners to consider taking problem, it is, in fact, a business govern- sons for justifying decisions made and
action. Sometimes this insistence is for no ance matter and, as such, has to be dealt actions taken, or not taken, based on
other reason than to bring some standard- with via the management of processes, the companys risk profile and appetite,
isation to bidding and procurement proc- policies and people. auditors will be happy.

6
Computer Fraud & Security January 2011
FEATURE

You can approach this at various And all in all, he believes that the and theirs is protected and managed
levels. Some people put in as little couple of months of concerted effort properly.
effort as possible, while others go in required to achieve accreditation was
About the author
so deeply that it becomes a mam- worth it. It was a valuable learning
moth effort, Hughes says. But we exercise and helped us to identify gaps Cath Everett is a freelance journalist
approached it very pragmatically. We so we feel now that our processes are who has been writing about business and
looked at what worked for the business more robust and resilient as a result technology issues since 1992. Her special
in order to protect our own and our of bringing in best practice, says areas of focus include information
clients data as part of an overall qual- Hughes. Its not that onerous and it security, HR/management and skills
ity improvement programme and we does provide a base standard, which issues, marketing andhigh-end
were certified first time around. assures our clients that our data software.

Towards near-real-time
detection of insider trading
behaviour through social
networks
Sumit Gupta, Liaquat Hossain, University of Sydney

The monitoring of capital frauds and malicious trading behaviours, and imple- of professionals.1 As a result, now its
menting changes to correct traders and firms behaviour, is increasingly seen as a not only corporate officers, directors and
priority in todays financial markets. Many governments and financial institutions managers who are considered as insiders
are investing capital and resources to maintain the integrity of their markets and but also professionals such as lawyers,
promote fair-trade practices. Of all the capital scams, insider trading is one of the investment bankers, printers, auditors
hardest to detect and therefore the most difficult to prove in a court of law. and so on who work within or alongside
the organisation. When these people
There has not been a great deal of empiri- and surveillance of such activity. First, its trade in company stock and other securi-
cal research conducted or published on important to explain the domain problem ties, this is deemed to be insider trad-
the detection of insider trading. The ie, insider trading. Second, well discuss ing. Although the term, in general use,
traders self-learning and self-adaptive the application and relevance of social means the same everywhere, the laws
capabilities make it almost impossible to networks, behavioural and co-ordination against insider trading vary from
detect such acts in time and to therefore theory for such detection. Last, we
undertake corrective actions to eliminate present and discuss our research model
the practice. Further, inconsistencies in in a single framework integrating social
the legal definition of the term insider networks, behavioural and co-ordination
trading between nations make it even theory in proposing STARS, leading to a
more difficult to apprehend the perpe- conclusion and discussion of our work.
trators. To address these challenges, we
propose an approach combining social Insider trading
network analysis, behavioural theory The term insider is used to refer to
and co-ordination theory in a single those who hold managerial positions
framework referred to as a Surveillance within organisations. However, recent Figure 1: Types of insider trading. These three
enforcement practices have broadened categories are mutually inclusive and thus an
Tracking and Anomaly Revelation System insider trading act covers all three categories.
(STARS) that would enable the detection the context by focusing on various types

7
January 2011 Computer Fraud & Security

S-ar putea să vă placă și