Main Page

From HORSE - Holistic Operational Readiness Security Evaluation.
Revision as of 02:50, 28 September 2014 by Mdpeters (talk | contribs) (→‎Our Sponsor)
Jump to navigation Jump to search

Welcome to the Holistic Operational Readiness Security Evaluation (HORSE) project Wiki.

We would like to invite the information security community to participate in this open community project. The intention is ultimately to raise the proficiency level of information security auditors, security practitioners, lawyers and legal practitioners, financial auditors, and anyone who verifies that controls exist over business systems. Our intention is that the HORSE project evolves into the most comprehensive, most beneficial, most accessible, and freely available information security guidance framework on the planet.

We have been a great resource since 2006!

Synopses

With existing and constantly emerging information security control requirements burdening the enterprise, how do we get our arms around this challenge while maintaining our sanity? The goal is to provide a clear compliance path for industry and legislative requirements. This body of work in the end should reach as large an audience as possible facilitating broader acceptance within the corporation. The old adage of “Work smarter, not harder” applies like it never has before. With the disparate demands of Sarbanes-Oxley, HIPAA, PCI, GLBA, FedRAMP, Cyber Essentials, Safe Harbor, FISMA, FIPS standards, NIST Special Publications, and many others, it is easy to understand why there is so much frustration and expense involved in compliance. There is no clear end to the challenges as information security practitioners we are faced with. There is however a relatively clear solution. Distill the unique control requirements out and consolidate the common ones into a unified framework. Information security concepts should not be proprietary. A unified community effort to improve the condition of information security benefits everyone. This includes every public or private organization no matter what the size, shape, or form they come in. By protecting information, you protect identities, profits, reputations, and the list goes on and on.

"One Stop Shopping"

The end result of this collaborative effort will be a comprehensive control framework that anyone might use to verify the status of operational security controls within the enterprise. This framework is being developed to encompass any legislative requirement or industry requirement with a common evaluation framework. The HORSE framework guides the organization through a single audit event in a sustainable fashion completing an audit in one pass, testing evidence in one pass, and constructing a sustainable process that ultimately raises the bar within the enterprise in a more organized efficient manner.

Our Sponsor

Founded in 2000, Lazarus Alliance is on the cutting edge of IT security, risk, privacy, governance, cyberspace law and compliance leadership, innovation and services provided to the global community. With significant contributions and innovations such as the IT Audit Machine, The Policy Machine, SafetyNET, the Holistic Operational Readiness Security Evaluation (HORSE Project), The Security Trifecta, Your Personal CXO and many other progressive initiatives, it’s no wonder that Lazarus Alliance has become a leading international name synonymous with leadership, quality, customer service and innovation.

Lazarus Alliance’s primary purpose is to help organizations attain, maintain, and demonstrate compliance, accountancy, and information security excellence – in any jurisdiction. Lazarus Alliance specializes in IT security, risk, privacy, governance, cyberspace law, public accounting, and compliance leadership solutions and is fully dedicated to global success in these disciplines.

With extensive specialization in PCI DSS, FedRAMP, HIPAA, SSAE 16, SOX, ISO 27000's, governance, policy development, IT audit, IT compliance, IT Risk Management and more, please visit Lazarus Alliance for more information.

Lazarus Alliance is a proud veteran owned business.

Getting Started

Once registered, the best place to start is through the Community portal link. Please take just a moment to include some information about yourself on your accounts personal page. Be sure to add and validate an email address under your "My Preferences" tab at the top. Enable the option to receive email from other HORSE Project Wiki members. It will remain private and it is the only way project members will be able to contact you.


Please request the ability to edit content from the system administrators. The HORSE project is open to the entire community. We only ask that contributed work be relevant and that the contributed work maintain the present format of this project.

Author Opportunities

Would you like to be the author or co-author of a book in the The Holistic Operational Readiness Security Evaluation: HORSE Project Series?

Volume 1, Governance Documentation and Information Technology Security Policies Demystified, is being prepared already for publication, but the HORSE Project has many other subjects to produce. IT Governance, IT Law, Privacy, Compliance, General IT Security, HORSE Framework and many other focus areas are available. Contact any HORSE Project administrator for more information.

Writing HORSE Project articles, focus topics, presentations, and publications is a great way to earn CPE credits towards professional certifications such as CISSP, CISA, CISM, CIPP, GIAC, and many other industry standards.

Companion Projects

I am pleased to announce the release of The Holistic Operational Readiness Security Evaluation: HORSE Project Series: Governance Documentation and Information Technology Security Policies Demystified out on bookshelves everywhere.


Holistic Operational Readiness Security Evaluation - HORSE Project Series Volume 1 is the professional companion book to the popular global resource, the HORSE Project Wiki, that provides a comprehensive examination of corporate information technology and security governance documents ranging from a corporate charter, policies and standards. This book provides a holistically approachable road map to design, ratification, implementation and maintenance of corporate security program policies. The guidance contained within has been the bedrock for corporate governance within some of the biggest organizations throughout the world.

Linkedin HORSE Project Group