HomeMy WebLinkAboutAgenda CC 11.13.2018 WorkshopNotice of M eeting of the
Governing B ody of the
City of Georgetown, Texas
November 13 , 20 18
The Ge orgetown City Council will meet on No vember 13, 2018 at 4:00 PM at Co uncil Chambers - 101
East 7th Street
The City o f Georgetown is committed to co mpliance with the Americans with Disabilities Act (ADA). If
you re quire assistance in participating at a public meeting due to a disability, as defined under the ADA,
reasonable assistance, adaptations, or ac c ommo datio ns will be provided upo n request. P lease contact
the City Se c retary's Office, at least three (3 ) days prio r to the scheduled meeting date, at (512) 930-
3652 o r City Hall at 113 East 8th Street fo r additional information; TTY use rs ro ute through Relay
Texas at 7 11.
Policy De ve lopme nt/Re vie w Workshop -
A Prese ntation and discussion on the 2030 Comprehensive Plan Update outreach effo rts -- Sofia
Nelso n, P lanning Director
B Prese ntation, review and discussio n of the Citywide Risk Assessme nt Re port -- Laurie Brewer,
Assistant City Manager
Exe cutive Se ssion
In compliance with the Open Meetings Ac t, Chapter 551, Government Co de , Verno n's Texas Codes,
Annotate d, the items listed below will be discussed in closed session and are subject to action in the
regular se ssio n.
C Se c . 55 1.0 71 : Consul tati on wi th Atto rney
Advic e from attorney about pending o r contemplated litigation and othe r matters on which the
attorney has a duty to advise the City Co uncil, including agenda items
Se c . 55 1.0 72 : Del i berati ons of Real P roperty
- Wastewater Easement, Berry Creek Country Club - Berry Creek Interceptor -- Travis Baird, Real
Estate Services Coordinator
- Sale of Pro perty at 101 E. 7th Street
Se c . 55 1.0 74 : Personnel Matter s
City Manager, City Attorney, City Se c retary and Municipal Judge: Consideration of the
appointment, employment, evaluatio n, reassignment, duties, discipline, o r dismissal
Se c . 55 1.8 6: Certai n Publ i c P o w er Uti l i ti es: Competi ti ve Matters
- Quarterly Financial FY18 Q4 Electric Updates - Chris Foster, Reso urc e Management and
Integration Manager
Se c . 55 1.0 87 : Del i berati on Regardi ng Eco nomi c Devel opment Ne go ti ati ons
- Do wntown Utility Upgrades
- Pro ject Legacy
Adjournme nt
Ce rtificate of Posting
Page 1 of 104
I, Shelley No wling, City S ecretary for the C ity of Geo rgeto wn, Texas , do hereby c ertify that
this Notic e o f Meeting was posted at City Hall, 113 E. 8th Street, a p lac e read ily acc es s ib le to
the general pub lic at all times , o n the _____ day of _________________, 2018, at
__________, and remained so p o s ted for at leas t 72 c o ntinuo us ho urs p receding the
s cheduled time of s aid meeting.
__________________________________
Shelley No wling, City S ecretary
Page 2 of 104
City of Georgetown, Texas
City Council Workshop
November 13, 2018
SUBJECT:
P resentation and discussio n on the 2030 Compre he nsive Plan Update outreach effo rts -- So fia Nelson, Planning Dire c to r
ITEM SUMMARY:
B ackground:
At the 8/28 Council workshop, City staff and Council discussed the Public Engagement Plan which was reviewed and
recommended by the Steering Co mmittee at their June and July meetings. Additio nal information on the 2030 Update
P ublic Engagement Plan c an be found online at https://2 03 0.georgetown.org/how-do-i-get-involved/public-engageme nt-
plan-2030-update/.
Purpose of the Workshop:
The purpose of this wo rksho p is to update the City Council o n the Comprehensive P lan Update outreach process, share
community fee dback and discuss the process for re vie wing the existing 2030 goals and po licies.
Staff will provide Council an overview of the 2 03 0 Update goal development pro c e ss, share and discuss themes eme rging
from public comme nt and discuss the next steps in the P ublic Engagement Plan, as ge ne rally outlined in the four (4) parts
below.
Part 1- Comprehensive Plan Update Recap
Elements of the Update
Review of Public Engagement Plan
Part 2- Summary o f public engagement and feedback received
Part 3 - Next steps - Goal and policy review
Part 4 – Directio n
Feedback Requeste d:
Staff is seeking the fo llowing feedback from City Co uncil:
• Are we meeting the Goals of the Public Engagement P lan?
• Do yo u understand with the themes eme rging fro m public input? Is the re anything missing?
• Do yo u suppo rt the process to revie w the goals and policies of the 203 0 Plan?
FINANCIAL IMPACT:
N/A
SUBMITTED BY:
Nat Waggoner, PMP, AICP
ATTACHMENT S:
Description
Exhib it 1 - 2030 P ublic Engagement Plan
Exhib it 2- Pres entation
Page 3 of 104
1
2030 PLAN UPDATE
Public Engagement Plan
The purpose of the Public Engagement Plan is to achieve
valuable public involvement and input during the 2030 Plan update. This public
engagement plan acts as a preliminary guideline on how to:
Engage the public and stakeholders,
Convey project information, and
Obtain input from the public, stakeholders, organizations and other interested
groups in Georgetown.
Goals of the Public Engagement Plan are to:
1. Provide participation opportunities where people are already gathered
2. Maximize existing networks (private and public domains)
3. Facilitate as much meaningful input as possible
4. Gain representative participation (every zip code, council district, demographic
group)
5. Remove/lower barriers to participation
6. Organize and demonstrate incorporation of feedback
Engagement Opportunities
The public will be given opportunities to provide input and feedback through various
methods including:
Public meetings
Citywide, one day engagement event (Fall 2018)
3 public meetings (Winter, Spring and Summer 2019)
16 steering committee meetings (First Thursday of the month at 6 pm)
Joint Planning & Zoning/City Council meetings
Planning & Zoning Commission meeting during the adoption process
City Council meeting during adoption process
Virtual participation
Dedicated Email - 2030@georgetown.org
Website – 2030.Georgetown.org
City Reporter- at least 2 articles (1 Fall, 1 Spring)
Social media – Use existing citywide platforms (Facebook, Twitter, NextDoor,
Instagram, survey questions, awareness of events
Page 4 of 104
2
2030 PLAN UPDATE
Public Engagement Plan
Meetings-to-go
Three types available (Host, Family, Students & Youth) for pickup or print off
the website
Staff presentations
City Board and Commission meetings
For and Non-Profit Organizations
Request/schedule Staff to speak at your organization meeting
Survey questions (once a month)
Rotating survey questions on the website or via MetroQuest
Idea boards
Maps or vision boards at library or rec center, refreshed by Phase of the Update
Outreach events
Music on the Square
Organization/club presentations on request
Chamber of Commerce Event (Development Alliance)
Retail centers
Downtown Breakfast Bites (Quarterly Update)
Georgetown Project
PTA meetings/GISD
Recreation center/Library events
Realtor outreach event in February
Senior Expo sponsored by the Commission on Aging
Local athletic activities
GISD flyer for parents
National Night Out
Page 5 of 104
3
2030 PLAN UPDATE
Public Engagement Plan
Engagement Strategies
The following strategies will be used to ensure the goals of the public engagement plan
are met.
Goals Supported Strategy
1, 3, 6 1. Provide convenient and innovative ways to document project
progress online.
a. Meeting agendas and presentations will be
available on the project website.
2, 4, 5 2. Leverage partners for broader audience communication.
a. Representative community stakeholders will be reached
throughout the process to leverage communication
through partner networks.
GISD
Georgetown Health Foundation
Chamber of Commerce/Leadership Georgetown
Ministerial Alliance
Georgetown Young Professionals
SEGCC
Boards/Commissions
Business Retention visits
Property managers association
6 3. Acknowledge feedback through visible incorporation of
public comments.
a. Staff will promptly respond to comments or concepts
suggested during development of the 2030 Plan update.
Online feedback will be collected and presented during the
relevant policy discussions for consideration by the
Steering Committee and joint meetings of the City Council
and the Planning & Zoning Commission.
3, 4, 5 4. Provide translation services for print materials, website and
presentations.
a. Identify groups in need of outreach in a language other
than English.
Page 6 of 104
2030 PLAN UPDATE
City Council Workshop | Public Engagement | November 13, 2018 Page 7 of 104
PRESENTATION TEAM
•Nat Waggoner, Planning Department
•Susan Watkins, Planning Department
•Jackson Daly, City Managers Office
Page 8 of 104
OUTREACH TEAM
Community Partners
•GISD-Melinda Brashear
•Georgetown Health Foundation -
Suzy Pukys
•Southwestern –Paul Secord
•Chamber –Jim Johnson, Wendy
Cash
•SEGCC –Norma Perales
•Georgetown Ministerial Alliance -
Reverend Harriett Jones
Staff Team
•Engaged Leader Series
•Communications Team
•Jackson Daly
•Keith Hutchison
•Beth Wade
•John Njagi
•IT
•Jess Henderson
•Austin Madison
•Rick Barnes
Page 9 of 104
MEETING PURPOSE
•Update the City Council on the Comprehensive Plan Update
outreach process.
•Share community feedback.
•Discuss the process for reviewing existing 2030 goals and
policies.
Page 10 of 104
FEEDBACK WE ARE SEEKING
•Are we meeting the Goals of the Public Engagement Plan?
•Do you understand with the themes emerging from public
input? Is there anything missing?
•Do you support the methodology to review the goals and
policies of the 2030 Plan?
Page 11 of 104
AGENDA
Part 1 -Comprehensive Plan Update Recap
•Elements of the Update
•Review of Public Engagement Plan
Part 2 -Summary of public engagement and feedback
received
Part 3 -Next steps -Goal and policy review
Part 4 -Direction
Page 12 of 104
PART 1
Comprehensive Plan Update Recap
Page 13 of 104
UPDATE PROCESS AND ELEMENTS
Technical
Advisory
Committee
Steering
Committee
Joint Sessions
P&Z/Council
General
Public
Alignment
Updated Demographics
Housing Element Update
Housing Toolkit
Gateway Development
Strategies
Williams Drive Subarea
Plan
Growth Scenarios
Future Land Use Map
Update
Public Engagement
Implementation Strategies
AdoptionPage 14 of 104
PUBLIC ENGAGEMENT PLANNING
•10/2017 workshop
•General discussion on importance of Council and public involvement
•2/2018 workshop
•Discussion on methods to involve Council and engage the public
including the Steering Committee and joint CC/P&Z meetings
•3/2018 workshop and legislative action
•Review of public engagement components of project scope
•Steering Committee appointment
•8/28 workshop
•Update on outreach activities to date
Page 15 of 104
ENGAGEMENT STRATEGIES
3.1.6.
4.2.5.
6.
4.3.5.Goal(s)
Supported
Goal(s)
Supported
Goal(s)
Supported
Goal(s)
Supported
Page 16 of 104
GOALS
Page 17 of 104
PART 2
Public Engagement Results
Page 18 of 104
PUBLIC INPUT OPPORTUNITIES
•Survey #1
•July-October
•Purpose
•Inform public of project
•Gather contact information
•On the Table Georgetown
•October 2
•Purpose
•Develop strategic partnerships
•Encourage civic dialogue about the future
Page 19 of 104
SURVEY #1
•1,455 responses
•Survey Kiosks
•Recreation Center
•Library
•GMC
•Book Mobile
•Music on Square
•Paper copies made available at
speaking engagements
Page 20 of 104
ON THE TABLE –CITYWIDE ENGAGEMENT DAY
•1,411 total participants
•357 City of Georgetown employees
•455 GISD students, faculty and staff
•62 Southwestern students
•Over 70 different groups
•840 unique comments
Page 21 of 104
SURVEY #1 RESPONDENTS
25%
33%
39%
3%78626
78626
78633
Other
Respondents by Zip Code
1%
3%
10%
13%
28%
88%
Hope to live
Used to live
Other
Out of City, but in WilCo
Work
Live
Connection to Georgetown
Page 22 of 104
REASONS PEOPLE MOVED TO GEORGETOWN
1st
Small Town
2nd
Sun City 3rd
Family 4th
Schools
5th
Proximity to Austin Page 23 of 104
LIKE MOST ABOUT LIVING IN GEORGETOWN
2%
3%
5%
6%
7%
8%
12%
18%
Schools
Family
Sun City
Friendly/Friendliness
Safety
Parks
Community
Downtown/Square
Small Town 24%
Page 24 of 104
PLACES MOST VISITED
3%
3%
4%
5%
6%
7%
10%
13%
16%
23%
24%
Palace Theater
Sun City
Home Depot
Trails
Lake
Rec Center
Gabriel Park
Square
Library
Grocery Stores
Restaurants
Wolf Ranch 29%
Page 25 of 104
WHAT SHOULD GEORGETOWN LOOK LIKE IN 2030?
1.Keep Small Town
2.Not Round Rock
3.Effective Public Transportation
4.Improve Williams Drive
5.Improve traffic flow
6.More service to Sun City
7.Increased green space
8.Not Cedar Park
9.More affordable housing
10.Control growth
Page 26 of 104
LOVE ABOUT GEORGETOWN
Family-Oriented/
Small Town
Recreation and
Open Space
Historic
Preservation
Urban
Design
Events/
Festivals
Page 27 of 104
CONCERNS ABOUT GEORGETOWN
Traffic Circulation/
Public Transit
Housing
Affordability
Citizen
Participation
Economic
Development
Health &
Human Services
Page 28 of 104
MISSING IN GEORGETOWN
Page 29 of 104
(7) INPUT THEMES
Maintain the family-oriented, small-town feel
Continue to encourage quality urban design
Enhance citizen participation and engagement
Focus on housing and affordability
.
Enhance economic development opportunities
Maintain and expand existing parks and recreation amenities
Improve and diversify the transportation networkPage 30 of 104
PROGRESS TO DATE
2 x Real Estate Discussions, 86 x participants
5 x Steering Committee meetings
5 x Technical Advisory meetings
14 x Board and Commission presentations
18 x outreach events, over 700 x participants
1,455 x online survey
1,411 x participants in On the Table GeorgetownPage 31 of 104
PART 3
Next Steps--2030 Update goal development process
Page 32 of 104
GOAL DEVELOPMENT PROCESS
•Survey #1
•On the Table
Ask broad
questions
•Impact Report
Develop themes
•Council workshop
•Steering Committee
•Joint Workshop #1
Confirm themes
•Survey #2
•Steering Committee
Establish goals
Page 33 of 104
PART 4
Council Direction
Page 34 of 104
FEEDBACK WE ARE SEEKING
•Are we meeting the Goals of the Public Engagement Plan?
•Do you understand with the themes emerging from public
input? Is there anything missing?
•Do you support the methodology to update the goals of the
2030 Plan?
Page 35 of 104
City of Georgetown, Texas
City Council Workshop
November 13, 2018
SUBJECT:
P resentation, review and discussion of the Citywide Risk Assessment Report -- Laurie Brewer, Assistant City Manager
ITEM SUMMARY:
During 2018, the City initiated a c itywide internal risk assessment. The City co ntracted with P lante Moran to perform the
assessment. The purpose was to perform a broad base d review of all risks, current mitigating activities, and to recommend
future mitigation activities. While City staff were generally aware o f several risks, it was impo rtant to do a
comprehensive review to check for gaps in awareness, and to document findings and set up a framework for continuo us
review and impro vement.
P lante Moran’s methodo lo gy co nsisted o f interviewing staff across the City, and looked at inherent risk, residual risk, and
risk velocity. The attached report includes summary and detail on the City’s risk universe, with Plante recommendatio ns
and management’s response. The study found a concentratio n of risks related to Information Technology, many o f which
were alre ady known and mitigating activitie s and resources in place. The City will move forward assigning risk owners and
reviewing action plans and resource during the annual budget process.
This item was pre sented to GGAF on October 3rd.
FINANCIAL IMPACT:
N/A
SUBMITTED BY:
Laurie Brewer, Assistant City Manager
ATTACHMENT S:
Description
Ris k As s es s ment Pres entatio n
Ris k As s es s ment Report
Page 36 of 104
2018 Internal Risk Assessment
Citywide Internal Risk
Assessment
Page 37 of 104
2018 Internal Risk Assessment
Background
Why the City initiated an Internal Risk Assessment
•40 different business units
•Multiple physical locations
•Limited staff resources
•Supports the City’s Fiscal & Budgetary Policy
•Gives City Manager, Directors & Finance responsibilities
•Provide guidance for those responsibilities
•Not requested by auditors, and is not an independent audit with testing
Goal of the Internal Risk Assessment
•Ensure risk mitigation and risk acceptance levels are appropriate
•Set up framework for continuous improvement over time
2018 RFP –Internal Risk Assessment
•Plante Moran selected
Page 38 of 104
2018 Internal Risk Assessment
Methodology
January 2018 –Executive Team set objectives and identified Risk Universe
•Plante Moran started with 90 risks used with all types of clients
•Executive Team narrowed City of Georgetown Risk Universe to 35 risks
•Executive Team assigned an owner to each risk for future mitigation
Feb 2018 –Departmental meetings with Plante Moran
•Plante Moran met with each department to assess the inherent and residual
risks of the risk universe in each key business department
•The primary means of collection of information was done through interviews
of City staff and not traditional accounting audit testing
•Plante Moran identified current methods departments use to mitigate these
risks
•Plante Moran recommends future mitigation strategies
May –September 2018 –Review of Findings, Management Response
•Follow up and validate initial findings with departments, consultant
•Review mitigation strategies, work plan and resources
•Preparation of final report Page 39 of 104
2018 Internal Risk Assessment
Key Definitions
Inherent Risk
•the perceived impact and likelihood associated with a process or activity
that exists simply from the perspective of its current environment BEFORE
consideration of mitigating activities such as insurance, internal controls or
other risk treatment strategies.
Residual Risk
•the level of impact and likelihood of an adverse event occurring to impede
the City, Department, and/or Processes from achieving success AFTER
identifying and testing of management’s mitigating activities and internal
control structure.
Velocity
•the speed assessment of how quickly a risk will impact the organization
•Fast
•Moderate
•Slow
Page 40 of 104
2018 Internal Risk Assessment
Inherent Risk Evaluation Criteria
Impact Criteria
Ranking 5 (high)4 3 2 1 (low)
Financial Impact:
Expense or Lost
Revenue >$150K $100K -150K $50K -$100K $25K -$50K <$25K
or Strategic Impact:
Strategy/ Mission/
Legislature
Failure to meet
key strategic
objective
Major impact
on strategic
objective
Moderate
impact on
strategy
Minor impact
on strategy
No impact on
strategy
or Operational Impact:
Reputation Extreme Severe Moderate Low None
Process / System
Shutdown > 7 Days 5 -7 days 3 -5 days 1 -3 days < 1 day
Compliance Impact:
Regulatory -State/
Local/ HIPAA/
Debt Covenants
Large-scale
material breach
of regulation
Material
breach but
cannot be
rectified
Material breach
which can be
readily rectified
Minimal
breach which
cannot be
rectified
Minimal
breach which
can be readily
rectified
Likelihood Criteria
Ranking 5 (high)4 3 2 1 (low)
Probability of an event occurring in a given year:
>20%15 -20%10 -15%5 -10%<5%
or Event Occurrence (on average):
Once a year or
more 1 in 3 years 1 in 5 years 1 in 7 years 1 in 10 years
Page 41 of 104
2018 Internal Risk Assessment
Weighted Residual Risks
by Key Business Department (KBD)
•The graph on following slide shows number of risks by department, and
coloring indicates weight based on risk ranking. Key business
departments are listed below.
Key Business Departments (KBD) Listing
1. (AIR) Airport 14. (GUS) Georgetown Electric / (NRG)
Energy Services
2. (ASV) Animal Services 15. (PLH) Planning/Housing
3. (ATT) City Attorney 16. (HUR) Human Resources
4. (COD) Code Enforcement 17. (BINS) Building Inspection Services
5. (COM) Communications 18. (ITS) Information Technology Services
6. (CRT) Municipal Court 19. (LIB) Library
7. (CUS) Customer Care / Conservation 20. (MGR) City Manager’s Office
8. (CVB) Convention & Visitor's Bureau 21. (PKR) Park & Rec
9. (ECO) Economic Development / Main
Street
22. (SEC) Secretary / Records
10. (ENG) GUS Systems Engineering / GIS 23. (SWR) Solid Waste & Recycling
11. (FIN) Finance, Purchasing & Payroll 24. (TSP) Transportation
12. (GFD) Georgetown Fire Department 25. (WSV) Water Services
13. (GPD) Georgetown Police Department
Page 42 of 104
2018 Internal Risk Assessment
Weighted Residual Risks
by Key Business Department (KBD)
Page 43 of 104
2018 Internal Risk Assessment
Residual Risk Rating Distribution
7 High Rated Residual Risks (of 33)
1.IT Cybersecurity Governance
2.Utility Market
3.IT Asset Management
4.IT Access Management
5.IT Contingency Plan
6.Legislation
7.Segregation of Duties
Page 44 of 104
2018 Internal Risk Assessment
Top 7 Findings/Response -IT
Risk 1 –Cybersecurity Governance
•City has ad hoc security programs
•City needs to formalize a comprehensive Information Security Program,
cybersecurity policy and procedure
•Current initiatives:
•IT Catalyst Strategic Plan
•Document policies
•Develop and deploy citywide cybersecurity training
•2 security audits
•Payment Card Industry audit
•Two factor authentication
•Hire Lead System Security Analyst position
Page 45 of 104
2018 Internal Risk Assessment
Top 7 Findings/Response -IT
Risk 3 –Data Classification
•City has inventoried hardware and applications
•City needs to inventory and classify data to create procedures and controls
•Current initiatives:
•Classification of HR and Finance data during ERP project
•Payment Card Industry compliance audit
•IT Catalyst Strategic Plan
•Document policies
•Future initiatives:
•Inventory and classify other types of data
Page 46 of 104
2018 Internal Risk Assessment
Top 7 Findings/Response -IT
Risk 4 –System Access Management
•Access to systems, assets and facilities is limited to appropriate personnel
•City needs formal access procedures put in place for each system
•Current initiatives:
•Two factor authentication
•Role based access plans for CIS and ERP systems
•IT Catalyst Strategic Plan
•Future initiatives:
•Enterprise application access control policy and annual audits
•Physical security audits with Facilities dept
Page 47 of 104
2018 Internal Risk Assessment
Top 7 Findings/Response -IT
Risk 5 –IT Contingency Plan
•City has a data back-up and disaster recovery plan
•City needs to develop Business Impact Analysis plans to guide recovery
•Current initiatives:
•Set up fail-over data center; conduct testing
•Future initiatives:
•Lead System Security Administrator to partner with Emergency
Management Coordinator on business continuity plans for City
departments
•Develop Business Impact Analysis plans
Page 48 of 104
2018 Internal Risk Assessment
Top 7 Findings/Response -Other
Risk 2 –Energy Market
•The City has inherent financial risk in hedging energy demand and
transmission congestion
•The City should enhance forecasting to improve accuracy, and develop a
alternative strategies to meet peak demand
•Current initiatives:
•Continue rate studies every 3 years
•Continue building contingency reserves
•Frequent financial monitoring and reporting to City Manager, GUS
Board and Council
•Exploring resource diversification options through Bloomberg grant
and other studies
Page 49 of 104
2018 Internal Risk Assessment
Top 7 Findings/Response -Other
Risk 6 –Legislation
•Existing and new state legislation adversely affects City’s financial, operating
or strategic autonomy and goals
•City needs to continue building relationships with local legislators and
monitoring state affairs
•Current initiatives:
•Government affairs advisory contract
•Council strategies and tactics on influencing State government
Risk 7 –Segregation of Duties
•Various financial duties and systems access are segregated within and
across departments
•City needs to evaluate duties and enhance controls in various locations and
systems
•Current initiatives:
•Review and update of segregations in CIS and ERP systems
•Add cameras to cash handling locations
•Emphasize segregation of duties during quarterly financial trainings
•Partner with IT on risks 1, 3, 4 and 5Page 50 of 104
2018 Internal Risk Assessment
Conclusions
•Rapid growth in community and organization applying pressure to resources
and systems
•Assessment was a partnership with industry experts and city
staff/management from all areas of the City
•Disparate information across organization documented in one place
•IT was reviewed in the most detail due to the reliance on systems for
provision of services
•Concentrated risks in IT
•Resources added in FY19 to mitigate risks
•Initiatives underway to mitigate high risks
•Medium and low risks are also being addressed
•Ongoing effort and long-term commitment to review risks
•Risk owners to create teams to work on action plans
•Review assessment and action plans during annual budget process
Page 51 of 104
Make the mark.
CITY OF GEORGETOWN, TEXAS
SEPTEMBER 25, 2018
Citywide Risk Assessment
Results & Next Steps
Page 52 of 104
September 25, 2018
Mr. David Morgan, City Manager
City of Georgetown
113 E. 8th Street
Georgetown, Texas 78627
Dear David,
We have performed the procedures as agreed upon in our consultation agreement dated November
7, 2017. Those procedures were applied solely to provide consulting services to assist City of
Georgetown, Texas (“City”) in developing a Citywide Risk Assessment (CRA) to understand the risk
environment and internal control structure of your functional areas and processes to identify key
risks and the internal controls over those risks.
The results of this report contain our assessment of the key risks to your organization, rankings of
current mitigation strategies, treatment plans to assist in the management of key risks, and emerging
best practices in government industry control environments.
We were not engaged to, and did not perform an examination, the objective of which would be the
expression of an opinion of City of Georgetown, Texas’s internal control environment. Accordingly,
we do not express such an opinion. We were not engaged to perform any specific internal control
testing procedures beyond inquiry of management and, therefore, we have not done so. Had we
performed additional procedures, other matters might have come to our attention that would have
been reported to you.
This report is solely for the information and use of the management of City of Georgetown, Texas
and is not intended to be, and should not be, used by anyone other than the specified party.
We would like to recognize and thank the staff of City of Georgetown, Texas for the cooperation and
courtesy extended to us throughout this process.
Sincerely,
Doug Farmer, CICA
Partner – Risk & Accounting Advisory Services
Plante Moran, PLLC
Page 53 of 104
TOC | Page
Table of Contents
Executive Summary 1
Project Scope and Approach 3
Risk Universe 4
Impact and Likelihood Criteria 5
Risk Assessment Results and Next Steps 7
Appendix A: Risk Treatment Action Plans 11
Appendix B: Information Technology Detail 40
Page 54 of 104
1 | Page
Executive Summary
Purpose and Introduction
In 2017, staff updated the City’s Fiscal and Budgetary Policies to enhance the existing internal audit
and risk program. The General Government and Finance Advisory Board and the Council added
ongoing funding to the Finance Administration budget to support this change. As a first step in
the program, the City procured a firm to perform a comprehensive risk assessment. The outcome
of the assessment will be used to prioritize the steps to continue enhancing the audit program and
mitigating risk.
Plante Moran performed a Citywide Risk Assessment (CRA) of the City of Georgetown, Texas
(“Georgetown”, “COG” or “City”) with the objective of helping the City achieve its strategic
priorities and advance management’s process to identify, classify and mitigate risks to the
organization. Our CRA services consisted of the following:
1. Interview key stakeholders to understand Georgetown’s viewpoint on risk management
2. Conduct interviews with key City Departments to assess inherent and residual risks of
the risk universe
3. Assess the strength of Georgetown’s mitigating activities and risk treatment factors
4. Assignment of risk owners and actions steps for remediation plans, if necessary
5. Preparation of reports to management and Council detailing the results of our work and
recommendations to manage risk and strengthen the control environment
High Level Themes Noted:
• The City is exposed to four high Information Technology
(IT) residual risks. We recognize the City is currently in
process of an ERP system upgrade and the status of
these conditions will change in the near future: IT
Cybersecurity, IT Asset Management: Data Classification,
IT Access Management and IT Contingency Plan. See
Appendix B for IT Risk Report.
• The City lacks a clear process for the assignment and
review of user access roles and responsibilities to achieve
segregation of duties in three key business departments.
We noted during discussions with Finance, Customer
Care and Parks and Recreation one person can control
more than two phases of a transaction exposing the City
to unauthorized transactions and fraud risk.
• The Georgetown Utility Service (GUS) electricity
is a vertically integrated monopoly which is
allowed in the State of Texas. The Texas
Legislature granted an exception called OPT
OUT of bundled services and this gets reviewed
at each legislative session every two years. If this
OPT OUT provision is rescinded, the City would
still have the wires/ transmission equipment and
would be the whole seller to the power
companies but there would be significant effort
and expense to the City to be OPT IN ready if
the legislature changes position and the resulting
transition would take about 2 years.
• Management indicated several potential costly Texas
legislative acts are due for review at future legislative
sessions.
• The City is challenged with documentation of
operating policies and procedures. Currently, 15
out of 25 (60%) departments we interviewed
have a lack of clearly written policies and
procedures available to all employees.
Page 55 of 104
2 | Page
Project Approach and Scope
Approach
We met with management to develop the following:
• Planning Meeting – This segment was dedicated to understanding the risks to key
individuals in the organization. We worked with management to outline the risks
impacting the City.
• Ranking Criteria – Based on our conversations with key individuals, we created impact
and likelihood criteria for grading / assessment of the risks.
• Risk Assessment Interviews - We held risk assessment interviews with key individuals
from key departments across the City to capture management’s view of inherent risks
and mitigating activities.
• Control Gaps & Observations – Using the information gained in the items above, we
noted observations, identified the top residual risks to the organization, and offered
recommendations for control and process improvements.
Scope
In context of this risk assessment, a “Key Business Department (KBD)” is defined as a vital
business process, function or activity on which the organization spends a significant amount of
financial or personnel resources to perform, or an activity over which they have primary
responsibility within the City. The following 25 departments are considered KPD’s and in scope
for this engagement:
Key Business Departments (KBD) Listing
1. (AIR) Airport 14. (GUS) Georgetown Electric / (NRG)
Energy Services
2. (ASV) Animal Services 15. (PLH) Planning/Housing
3. (ATT) City Attorney 16. (HUR) Human Resources
4. (COD) Code Enforcement 17. (BINS) Building Inspection Services
5. (COM) Communications 18. (ITS) Information Technology Services
6. (CRT) Municipal Court 19. (LIB) Library
7. (CUS) Customer Care / Conservation 20. (MGR) City Manager’s Office
8. (CVB) Convention & Visitor's Bureau 21. (PKR) Park & Rec
9. (ECO) Economic Development / Main
Street
22. (SEC) Secretary / Records
10. (ENG) GUS Systems Engineering / GIS 23. (SWR) Solid Waste & Recycling
11. (FIN) Finance, Purchasing & Payroll 24. (TSP) Transportation
12. (GFD) Georgetown Fire Department 25. (WSV) Water Services
13. (GPD) Georgetown Police Department
Plante Moran met with the department heads and key managers to discuss the risk universe,
assess the inherent risks and document the key internal controls and mitigation strategies for
each risk in the risk universe applicable to each department. Residual risk scores are calculated
based on inherent risk minus strength of mitigation activities.
Page 56 of 104
3 | Page
Risk Universe
A planning meeting was held with the City Manager and Assistant City Managers to co-develop a
risk universe using a standard governmental entity risk profile customized to the Georgetown
specifics for population, demographics, services offered, operations and complexity. The initial
universe started with approximately 90 risks and the list was distilled down to the top 33 risks
applicable to the City of Georgetown. We then met with each department individually to discuss
the impact and likelihood to their department. It is important to note that not all 33 risks are
applicable to every department. Only 14 out of 33 risks were determined to be citywide
impacting all departments. The illustration below is the risk universe utilized for this assessment:
City of Georgetown Risk Universe
1. Access to Talent 18. IT Security Awareness, Training and
Education
2. Billing for Citizen Services 19. IT Third Party Roles & Responsibilities
3. Budget and Planning 20. Leadership
4. Composition of Tax Base 21. Legislation
5. Disaster Recovery / Business Continuity 22. Physical Security
6. Emergency Notification System Failure 23. Police Failure
7. Fire Department Failure 24. Records Management
8. Freedom of Information Act (FOIA) 25. Regulatory Filings
9. Fraud 26. Segregation of Duties
10. Grant Obligations 27. State-Fed Regulations
11. Health & Safety 28. Succession Planning
12. IT Access Management 29. Talent Management
13. IT Asset Management: Data Classification 30. Tax
14. IT Contingency Plan 31. Utility Market
15. IT Critical Security Event Identification 32. Utility Outage
16. IT Cybersecurity Governance Model 33. Vendor Reliance
17. IT Incident Response Management
Note: the 14 bold risks were common citywide across all departments. The remaining risks were
assessed on a case-by-case scenario by department. Information Technology risks were evaluated
in three categories: 1) Centrally Managed, 2) Vendor Managed, and 3) Department Managed.
Impact and Likelihood Criteria
Key department personnel participated in the risk interviews to rank the risks to the organization
using an impact and likelihood criteria developed with senior management. The impact and
likelihood criteria table below is applied to each risk to assign the inherent risk. The inherent risk
rankings are then used as the starting point to calculate residual risks.
Impact Criteria
Ranking 5 (high) 4 3 2 1 (low)
Financial Impact:
Expense or Lost
Revenue >$150K $100K - 150K $50K - $100K $25K - $50K <$25K
or Strategic Impact:
Page 57 of 104
4 | Page
Strategy/
Mission/
Legislature
Failure to
meet key
strategic
objective
Major
impact on
strategic
objective
Moderate
impact on
strategy
Minor
impact on
strategy
No impact
on strategy
or Operational Impact:
Reputation Extreme Severe Moderate Low None
Process /
System
Shutdown
> 7 Days 5 - 7 days 3 - 5 days 1 - 3 days < 1 day
Compliance Impact:
Regulatory -
State/ Local/
HIPAA/ Debt
Covenants
Large-scale
material
breach of
regulation
Material
breach but
cannot be
rectified
Material
breach which
can be
readily
rectified
Minimal
breach
which
cannot be
rectified
Minimal
breach
which can
be readily
rectified
Likelihood Criteria
Ranking 5 (high) 4 3 2 1 (low)
Probability of an event occurring in a given year:
>20% 15 - 20% 10 - 15% 5 - 10% <5%
or Event Occurrence (on average):
Once a year or
more 1 in 3 years 1 in 5 years 1 in 7 years 1 in 10 years
Page 58 of 104
5 | Page
Risk Identification and Ratings
It is important to clarify the factors in determining the levels of risk as presented in the following
departmental risk assessment graphs. For comparability purposes, risk is evaluated by distinguishing
between types of risk and the following definitions are provided:
INHERENT RISK – the perceived impact and likelihood associated with a process or activity that exists
simply from the perspective of its current environment BEFORE consideration of mitigating activities
such as insurance, internal controls or other risk treatment strategies. This assumes no significant
actions taken by management to mitigate (address) those risks. For example, the City has inherent risks
associated with its citizen demographics, funding sources, population, economic slowdown, structure of
federal and state government, etc. This can then begin to be refined to the departments within the City
government.
RESIDUAL RISK – the level of impact and likelihood of an adverse event occurring to impede the City,
Department, and/or Processes from achieving success AFTER identifying and testing of management’s
mitigating activities and internal control structure.
The citywide risk assessment considered primarily inherent risks, with limited identification of control
risk as self-reported by management. We did not substantively test specific management controls in
detail and therefore, do not render an opinion on the effectiveness of design nor the efficiency in
implementation or existence. The ratings do not imply a judgment on how management is addressing
risk and thus is not a specific assessment of management performance nor concludes on ‘Residual
Risk’. Management will need to perform detail testing to determine: (1) if mitigation activities reported
by management are actually in place, and (2) if the mitigation activities are designed and operating
effectively.
VELOCITY – the speed assessment of how quickly a risk will impact the organization:
• Fast: These risks are becoming more relevant to Georgetown’s operations and can quickly
impact the organization. Risks with a moderate to high residual risk ranking and fast velocity
should be closely monitored as a risk event could occur quickly and without warning.
• Moderate: No known or pending events suggest either an increase or decrease in the composite
risk weighting. These risks will impact the organization at neither a fast nor a slow pace.
• Slow: These risks will impact the organization over time and might require a playbook that
extends over a longer period of time.
Risk Assessment Results and Next Steps
The following pages summarize the Risk Assessment Results from 3 different perspectives:
Page 59 of 104
6 | Page
Graph 1 - Net Risks by KBD 1:
(1) Net Risks by Key Business Departments: the total number of risks from the Risk Universe that apply
to each department. As noted earlier, 14 of the 33 risks have been identified as pervasive across all
departments and the others are assessed on a case-by-case scenario.
The net risk assessment by KBD revealed that Georgetown Fire Department, Information Technology
Service2, Finance, Georgetown Police Department and Parks & Recreation fall within the high risk
category based on Net Risks by Department.
1 Each department was assessed for the 33 risks outlined in the Risk Universe on p. 3. There are 14 risks
that are pervasive across the City and the remaining risks were assessed on a case-by-case scenario.
2 For the purposes of risk ranking, certain Information Technology risks with similar mitigation
activities and control objectives were combined for reporting purposes. The Risk Universe shows 8 IT
risks and the detail IT Risk Assessment report is included in Appendix B has 11 risks.
Page 60 of 104
7 | Page
Graph 2 – Weighted Residual Risks by KBD:
(2) Weighted Risks by Key Business Departments: the total number of risks weighted by rankings using
the following weighting formula: Red 17 or > (3 points), Yellow 8-16 (2 points), and Green <8 to 5 (1
point), <4 (0 points). Therefore, the higher risk rankings carry a higher weighted risk.
The Weighted Residual Risk by KBD reveals there are two (2) additional departments needing
consideration as the ratio of high risks to total brings the residual risk to a high for Customer Service
and Building Inspection Services, in addition to the KBD’s noted in Graph 1.
Evaluation of these various factors provides indicators on prioritizing the potential Future State Risk
Mitigation Activity recommendations outlined in Appendix A.
Page 61 of 104
8 | Page
Graph 3 – Citywide Composite Residual Risk Rankings
X = Fast Velocity | = Moderate Velocity
(3) City-wide Composite Residual Risk Rankings: the profile of consolidated highest ranking risks to the
City regardless of KBD. As noted earlier, certain risks may only apply to a limited number of KBD and
may be insignificant on a City-wide basis.
Page 62 of 104
9 | Page
Composite scores represent a cross-section view of risk without regard to KBD. The composite scores
above are an average of the risk rankings for only the departments where the risks are applicable. For
example, Billing for Citizen Services is a risk to the City but only applies to 13 out of 25 KBD’s. The
scores above are an average of those applicable departments excluding the departments that do not do
billing. Results from this graph illustrate the severity of risk regardless of the department which they
fall under.
Residual Risk Dispersion
The following graph depicts the dispersion of the risk events between high, medium, and low residual
risk (including the consideration of existing control or mitigation activities) categories. High indicates
that the residual risk score fell beyond Georgetown’s risk tolerance. These risks require the most
attention and strongest mitigation strategies. Medium indicates that the residual risk was within
tolerance. Low indicates that the risk fell well below Georgetown’s tolerance. It may be possible that
some of these risks are being over mitigated.
Next Steps
1. Strengthen and implement mitigating activities for each risk to bring the residual risk down
into tolerance (see Risk Treatment Action Plans in Appendix A).
2. Assign risk owners and control owners and determine what information needs to be reported
back to the City Manager on a periodic basis (i.e., quarterly).
3. Identify a risk management resource to manage the risk owners and communicate all necessary
information from the risk owners to the City Manager and City Council.
4. Risk Owners identify key risk indicators (KRI’s) for each risk.
5. Build execution playbooks for each risk treatment.
RANK RESIDUAL
RISK
COUNT
High > 16 7
Medium 8 – 16 14
Low < 8 12
Total 0 – 25 33
Page 63 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
10 | Page
Recommended Risk Treatment Action Plans
Page 64 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
11 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
1 IT Cybersecurity
Governance Model
A comprehensive
Information
Technology (IT)
cybersecurity policy
and procedures
document has not
been approved by
management and
communicated to
all employees and
relevant external
parties, outlining
responsibility and
oversight for
Information
Security (IS) and
policy
administration.
21.00 IT Director
1) The City has a documented IT Acceptable Use
Policy in place but it does not encompass an
overall Information Security Program (ISP)
containing the following elements:
Purpose/Scope, Roles and responsibilities
(including those related to regulatory
requirements), Enforcement, Information
Sharing, Data Classification, Information Risk
Management (IRM), Data Backup and
Retention, Data Destruction/ Retention Policy
2) Members of the IT department perform several
duties beyond their originally assigned tasks
and roles and responsibilities related to key
initiatives such as Risk & Incident Management,
Disaster Recovery & Business Continuity are
not clearly defined
3) The IT department has taken measures in
implementing security practices throughout the
IS environment; however organizational
cybersecurity risk management practices are
not formalized, and risk is managed in an ad
hoc/reactive manner; a citywide approach to
managing cybersecurity risk has not been
established
1) We recommend the City implement a
governance framework that allows for the proper
management of a successful ISP. An effective ISP
involves participation from senior management
to set the direction for proper information
security practices, adequate staffing and
compliance with policies
2) Further, we recommend the City adopt a
practice of performing a Cybersecurity risk
assessment periodically. The periodic approach
may take either of the following approaches: (A)
performing a full assessment every other year
due to intensive resources required to facilitate
such an exercise or, (B) a targeted approach
done annually including:
• revisiting this report findings and updating
controls where appropriate,
• re-assessing the City’s mitigation plan to
update progress and note any further
concerns, and/or,
• selecting a few high-priority control areas (e.g.
vendor management, or any business
objective/goal identified by executive
management) and re-assessing associated
threats related to those areas
The City is already taking several steps to
comprehensively manage and enhance security:
1) Implementing IT Catalyst Plan – 5 year Strategic
Plan
2) Developing documented policies to address
various IT areas
3) Developing Cybersecurity Training
4) Conducted 2 security audits
5) Budgeting Lead System Security Analyst in FY19
6) Conducting PCI (Payment Card Industry) study
7) Implementing two factor authentication
IT agrees that an Information Security Program
(ISP) needs to be created.
IT Immediate actions
(next 12 months)
1. IT Cybersecurity Risk Assessment by the US
Department of Homeland Security. 2. Determine
best practices, implement security policies, and
identify staffing/challenges to implement ISP. 3.
Identify staffing needs to appropriately manage IT
security challenges and ISP.
IT future planned actions
(12 - 36 months)
1. Continue Cybersecurity scanning on a yearly
basis. 2. Implement ISP. 3. Assign security roles
to existing staff and hire any security staff needed to
manage an Information Security Program
Page 65 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
12 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
2 Utility
Market
Exposure to
fluctuations in the
market price of
utilities.
18.75
Deputy
General
Manager –
Georgetown
Utilities
1) The City has no physical risk and low financial risk
from the power supply market.
2) ERCOT, the state run system operator, manages and
controls the physical matching of supply to demand
statewide, thus eliminating the City’s exposure to
physical supply risk.
3) As a Utility within ERCOT, the City takes delivery of
all power from ERCOT at the market rate, thus
exposing inherent financial risk.
4) The City mitigates the inherent financial risk through
hedging demand with offsetting, fixed-price power
purchase agreements (PPA’s) and hedging
transmission congestion charges through congestion
revenue rights (CRR’s) which are forward contracts
on congestion. Additional residual financial risk is
further mitigated through the industry standard
utility practice of passing the variance though to
customers as a power cost adjustment factor (PCA).
The City does currently use a form of the PCA pass-
through, however it is not the current practice to
adjust this on a monthly basis.
5) The City has a diversified portfolio of PCA’s with
both short and long terms. The two principle
agreements are a 20 year wind and a 25 year solar
contract. Together, these two contracts exceed the
City’s current needs and will accommodate growth.
6) The long duration power agreements at fixed price
provide long term rate stability through a long term
hedge.
7) A utility rate study is in progress, to update the most
recent study from 2012
8) Quarterly financial updates are presented to the GUS
Board and the City Council.
1) Continue to enhance the City’s forecasting tools
and techniques to increase granularity and
improve accuracy.
2) Continue development of a strategy to meet
future peak demand growth with distributed
generation and storage rather than remote
central generation to mitigate exposure to
transmission congestion.
The City will continue its efforts to mitigate
exposure to the utility market:
1) Implementing rate study recommendations
2) Will grow reserves for contingency and market
fluctuations to comply with Fiscal & Budgetary
Policy
3) Will perform rate study every 3 years
4) Providing quarterly reports to GUS board
5) and City Council.
Page 66 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
13 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
3
IT Asset
Management: Data
Classification
The data,
personnel, devices,
systems, and
facilities that enable
the organization to
achieve business
purposes are
identified and
managed consistent
with their relative
importance to
business objectives
and the
organization’s risk
strategy.
17.00 IT Director
1) The City has identified and catalogued its hardware
and software via a tool called Lansweeper. This
approach ties into an overall information flow
enforcement (NIST SP 800-53 Rev. 4 AC-4) which
ensures the confidentiality, integrity, and availability of
critical data when defined and enforced
2) In addition, the City also maintains a manual list of all
inventoried applications/ software
3) An information classification policy does not currently
exist
1) The City should consider classifying data within the
system based on its criticality and / or sensitivity (NIST
SP 800-53 Rev. 4 RA-2). Classification of data will also
help drive the above-mentioned information flow
enforcement and help define the City’s security
architecture
2) We recommend the classification of City data to define
an appropriate set of protection levels and
communication required for special handling
Classifications and associated protective controls
(including encryption for data at rest and data leak
prevention tools) should take into account department
needs for sharing or restricting information and the
associated business impacts if such data were
compromised. Successful data classification in an
organization requires a thorough understanding of
where the organization’s data assets reside and on what
applications/devices they are stored. Handling
procedures should include details regarding the secure
processing, storage, transmission, declassification, and
destruction of data.
The City is currently taking several steps to classify
and protect data:
1) Implementing IT Catalyst Plan – 5 year Strategic
Plan
2) Developing documented policies to address
various IT areas
3) Classification of HR and Finance data during
Enterprise Resource Planning project
4) Payment Card Industry compliance audit
IT sees value in creating a data classification policy
that outlines how the city classifies data for each
system.
IT Immediate actions
(next 12 months)
*Work with new ERP vendor to
develop classification framework for
financial, asset and employee
information.
Create a Data Classification policy.
IT future planned actions
(12 - 36 months)
Classify data in all systems city wide that IT is
responsible for administering.
Page 67 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
14 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
4 IT Access
Management
Access to assets
and associated
facilities is limited
to authorized users,
processes, or
devices, and to
authorized activities
and transactions.
17.00 IT Director
1) New employees and vendors are required to
sign off on the Acceptable Use policy
2) For financial system, Application Administrator
is assigned responsibility of setting permissions
for add/removal of users after approval from
system owners
3) Security administration duties are assigned to
various applications whereby all analysts have a
designated system/application they are assigned
to. Department directors are considered system
owners; the IT department facilitates
requests/approval of application owner for
security access. All IT employees are CJIS
certified
4) Application vendors must be CJIS certified and
CJIS certification is also required in vendor
agreements. It was noted that not all
applications have a formal process of
provisioning and de-provisioning
5) Every building is on its own VLAN and
segregated, DMZs also exist which is separated
by firewalls (in and out). SCADA systems are
also air gapped and do not interact with other
parts of the network
1) A role-based access scheme should be
established to ensure consistent application of
user access rights within the system. Users
should be assigned their base set of access
authorizations based on the concept of “Least
Privilege Necessary” to perform their role or job
function (as defined within their formal job
description). Additional access beyond the
previously established role-based access scheme
should be formally requested, reviewed for
conflicts and approved (NIST SP 800-53 Rev. 4
AC-2). Moreover, Management should consider
integrating access rights with data classification
efforts identified in Appendix B of this report
2) Ensure a process is in place to approve special
access requests and timely de-provision access
upon notification from HR
The City agrees with these recommendations and is
taking the following steps:
1) Implementing IT Catalyst Plan – 5 year Strategic
Plan
2) Implementing 2 factor authentication
3) Implementing consistent role based access to CIS
and ERP system functions through ERP conversion
project
IT agrees that additional process and policy is
needed to enhance IT access control.
IT feels ownership of physical security audits need
to be conducted by the department(s) that maintain
keys to buildings or the system controlling
automated keycard access.
IT Immediate actions
(next 12 months)
Implementation of Enterprise Application Access
Control policy. Leverage new Systems Admin Lead
to identify additional costs and resources to
implement auditing of these changes in the future.
IT future planned actions
(12 - 36 months)
Identify a way to audit Application Access on a
yearly bases. Implement yearly audits for
Application Access.
Page 68 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
15 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
5 IT Contingency
Plan
Loss or inability to
continue business
due to natural
disaster, system
capacity or
performance issues,
interruption in
communication,
loss or corruption
of data, or loss of
critical vendors or
staff members.
17.00 IT Director
1) The City has an extensive data backup strategy
is in place in order to ensure that critical data
for operations are available in the event of an
interruption or incident
2) The current data backup plan has redundancy
built into the datacenter environmental
controls
3) Recovery processes are in place to restore
systems/assets affected by cybersecurity
events. However, CoG is yet to formalize a
BCP/DRP
4) The City has prepared a five year IT Strategic
Plan which includes a plan for implementing
business continuity practices over the next 2-3
years
Plante Moran recommends the City conduct and
formalize:
(1) A Business Impact Analysis (BIA) which
identifies and analyzes mission-critical business
functions, and then quantifies the impact a loss
of those functions would have on the City, and
(2) An information system contingency plan to
mitigate the risk of critical system and service
unavailability. The contingency planning process
should occur after a formal Business Impact
Analysis (BIA) is conducted, in order to
correlate the system with the critical processes
and services provided, and based on that
information, characterize the consequences of a
disruption. Three steps are typically involved in
accomplishing the BIA:
• Determine mission/business processes and
recovery criticality
• Identify resource requirements
• Identify recovery priorities for system
resources
The City will continue with the efforts already
planned to mitigate this risk:
1) Planning and funding fail-over data center
2) Developing and testing protocol to fail-over data
center
IT feels this risk is related to the lack of a City Wide
Business Continuity plan.
IT fully takes responsibility for Disaster Recovery of
IT systems, a city wide BCP is needed to identify the
Business Impact Analysis and criticality of City wide
services to assist with proper implementation of
Disaster Recovery activities
IT Immediate actions
(next 12 months)
Identify how the city wants to address business
continuity city wide. Work with Emergency
Management to look for third party support to
develop a BCP.
Leverage new Lead System Admin to start planning
and identified resources needed to create a DR plan.
IT future planned actions
(12 - 36 months)
Develop consistent DR plan that can co-exist with
city BCP.
Page 69 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
16 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
6 Legislation
Governmental laws
change that impact
the organization by
financial, operating,
strategic or
compliance issues.
16.36
City
Manager’s
Office
1) The City Attorney’s office monitors legislative
sessions for the City as a whole, and
communicates the effects of legislation to
appropriate departments
2) The Electric Department utilizes a third party
engineering firm to monitor potential legislation
that could impact the Department
3) The City has an agreement with an outside
government affairs and advisory firm which
specializes in advising and assisting
municipalities in legislative activities
4) The Transportation Department has developed
a detail plan of response to the effects of the
City passing the 50,000 population threshold,
specifically related to the traffic signal
operation. After the 2020 census, the City will
be responsible for operating all traffic signals in
the City, which is double the number the City
currently operates. A large financial
commitment will be required to operate and
maintain all traffic signals in the City
1) Council and Management should review and
closely monitor the status of annexation plans
for the City. After the 2020 census, the City will
be limited in its ability to perform annexations
due to Williamson County’s population
surpassing 500,000 citizens
2) The City should work with legislators to clarify
the impact of harmful legislation including
revenue caps and limits on debt financing for
infrastructure during the City’s period of high
growth and should stress the removal of local
control restrictions that impact citizens ability to
impart changes in their local community
The City will continue its efforts to monitor state
actions and advocate for what is best for the
organization and community:
1) Implement Council strategies and tactics related
to influence with State government
2) Continue supporting TML efforts
3) Continue working with government affairs and
advisory firm
4) Continue to build relationships with other
governmental agencies
Page 70 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
17 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
7 Segregation of
Duties
The Organization
fails to adequately
segregate roles and
tasks between team
members.
16.43
Finance
Director
1) Each department communicates a personnel
change to HR and IT to add/remove/change a
staff member’s access
2) HR and payroll have segregated rolls for
processing employee payroll and benefit
information. Only Finance has access to process
changes within the payroll module
3) Segregation within the finance department is
maintained by separate individuals processing
payroll and accounts payable
4) Utilities customer cash receipts are handled
through Customer Care front facing staff. Cash
drawers are reconciled and closed on a daily
basis. Bank deposits are prepared by Customer
Care back office operations daily and are
couriered to the bank by Police Officers.
Revenue financial reporting is done by Finance
5) A police officer travels to the cash locations to
provide secure courier service on all bank
deposits
1) An annual review of user access for all staff
members within the City across all programs
managed by IT should be performed
2) Departments that have not had an internal
control review within the past five years should
evaluate the design and effectiveness of their
internal controls
1) Implementing new CIS and ERP systems which requires
thorough review of system segregation controls.
2) Cameras being evaluated for various cash areas
3) Emphasize and explain segregation of duties attributes
during training for new or revised financial policies and
procedures.
4) Parks & Recreation has segregated deposit duties
separate from cashiers.
5) Finance is reviewing the segregation of the vendor
database duties for the new ERP system.
IT feels this risk requires joint ownership with other
departments.
IT already has controls in place for user access to
computer resources and access to applications.
IT Immediate actions
(next 12 months)
Implementation of Enterprise Application Access Control
policy. Train IT employees on the new policy. Enforce
the new policy on new Enterprise systems as they roll out.
Leverage new Lead Admin to identify resources, and costs
associated with reviewing user access for all city computer
resources and applications.
IT future planned actions
(12 - 36 months)
Implement annual reviews/audits of user accounts with
access to computers and enterprise applications.
8 Access to
Talent
Organization lacks
sufficient staffing
levels to carry out
its routine
operations.
11.75
HR Director
1) The growth of the City has resulted in a large
talent pool for many positions within the City,
with some job openings attracting over 300
applicants. Overall, the City gets sufficient
applicants for general open positions
2) The City is in the process of performing an
assessment of retirement eligibility for key
personnel
3) Departments within the City utilize third party
contractors to fill non-key positions on a
temporary basis
1) The City should evaluate positions with
required specialized certifications and
determine whether entry level staff members
can obtain certifications after hire
2) For specialized positions, including, but not
limited to, building inspectors, paving foremen,
and traffic engineers, the City should conduct
an assessment of staffing levels with a 3-year
outlook
3) The Fire Department should develop a plan to
acquire the necessary EMS personnel talent
1) HR and Fire are continuously developing a
recruitment strategy for future station staffing
2) The City currently recruits many positions such
as 911 dispatcher and Electric Linemen Apprentices
in the manner described in mitigating
recommendation #1 and continues to review
options as new vacancies arise.
3) The City works continuously to keep pay and
benefits market competitive and HR staff is
currently working on enhanced recruitment
branding techniques to continue to bring in
excellent talent.
Page 71 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
18 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
9
Emergency
Notification
System Failure
(ENSF)
The City's
Emergency
Notification System
fails to alert citizens
in the event of an
emergency.
13.81
Emergency
Management
Coordinator
1) There is a city-wide emergency notification
system consisting of tornado sirens and
reverse 911 (Code Red) which are tested on a
regular basis. The outdoor warning system is
place to notify citizens to take shelter and is
not intended to be heard in doors
2) The City recently added a position dedicated
to Emergency Planning
3) Incident Action Plans are developed for large
scale community events, such as the Red
Poppy Festival
1) The City should communicate Incident Action
Plans for large scale events to all parties involved
with the event, including the Convention and
Visitors Bureau (CVB)
2) Management should inform all departments of
the operating procedures related to the ENSF
3) The EMC should develop basic and advanced
emergency management training for key
stakeholders in the City (Division Managers) and
conduct table top and/or practical training
exercises that replicate local level emergencies
The City agrees with these mitigating activities
and will prioritize them in the EMC’s work plan
Page 72 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
19 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
10 Fraud
Customer, third
party, or internal
fraud occurs
resulting in a
significant
misappropriation of
assets and/ or
incorrect financial
reporting, or
corruption/
kickback schemes.
13.75
Controller
1) The Finance Department performs a review of a
small number of P-Cards to verify the legitimacy of
the purchases
2) Fixed assets over $5,000 in value are tracked in the
ERP fixed asset module
3) Currently no fraud prevention program is
communicated to all employees with training to
identify and prevent fraud.
4) The Finance team indicated internal controls can be
strengthened around:
• Communication, billing and collection from -
Planning and Housing and GUS Engineering on
construction/ development contracts with
developers and as they have limited visibility on
project status, progress, completion and
timelines of payment due dates. Cannot get My
Permit Now to reconcile to Accounting
• Processing and internal controls around Grant
Administration regarding collections and
subsequent compliance reporting
• Credit Card (P-Cards) payment procedures are
inconsistently applied across City operations
5) The City lacks internal monitoring controls and audit
logs around Master File Maintenance on IT databases
(employee, customer, vendor, etc.)
6) Segregation of duties reduces the chance of fraud
7) The City has a personnel policy related to fraud
8) A fraud hotline is advertised to the City staff, so that
staff can report fraud anonymously. The reports are
collected by an outside firm, who sends information
to representatives in Human Resources, Finance, and
the CMO for investigation. The CMO follows up on
any investigations
9) Purchasing cards have strict limits to ensure the risk
of misuse by a single employee is limited to an
average of $1,000.
1) The Finance Department should perform more
robust reviews of P-Card purchases and
consider utilizing software to perform regular
audits of P-Cards
2) The Finance Department should perform
annual reviews of P-Card users to evaluate
whether the all users actually need P-Cards
3) The City should implement a more extensive
asset tracking program, utilizing fixed asset tags
on assets valued over $1,000 with consideration
of periodic asset audits
4) Vendor Ship-To addresses should be limited to
a “drop down” list consisting only of City
facilities
5) The City should consider developing a fraud
awareness and prevention training program
with active participants across all City
departments
6) All changes to IT databases deemed to be
material should be tracked on an Audit File Log
and reviewed by someone without access to the
databases
1) Asset tracking and vendor shipping will
improve as part of the ERP project.
2) The City has already implemented and
conducted training on grant tracking and
reporting.
3) Staff are currently developing a citywide
fraud awareness and reporting training.
Page 73 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
20 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
11 Health &
Safety
Exposure to
potentially
significant workers'
compensation
liabilities due to the
inability to
maintain
compliance with
applicable health
and safety laws and
regulations.
13.04
HR Director
1) All Public Works and Utility departments have
a robust safety program consisting of monthly
safety training, daily safety summaries, semi-
monthly safety meetings, and detailed safety
policies. Public Works departments also
provide sufficient safety equipment to all
relevant staff members
2) The Fire and Police Departments have a robust
line of safety gear, training, fitness assessments,
inspections, and safety policies
3) All safety incidents are communicated to
Human Resources for review and to work as a
liaison between the department and the
employee
4) The Airport requires all non-airport employees
to be escorted by a staff member with
knowledge of Air Traffic Control
communication
5) Parks and Recreation requires safety
maintenance with swimming pools to ensure
chemicals are in balance
Overall, the City has robust health and safety
procedures and should consider adding the
following:
1) The Library should develop clear
policies and procedures on a course of
action when a customer, employee, or
volunteer is injured at the facility.
2) The City should review the lifeguard policy
for pool facility rentals. The City currently
does not provide a lifeguard for pool
rentals by the Georgetown Independent
School District and does not require GISD
to provide their own lifeguard.
3) Consider adding an Active Shooter
response plan
1)HR and Library will work together to develop
consistent injury procedure
2) The City has met with GISD swim coaches to
brainstorm ways to mitigate lifeguard risk and is
drafting a facility use agreement that outlines the
lifeguard requirements of the City and GISD
3) HR and Police are developing Active Shooter
training for departments
Page 74 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
21 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
12
IT Incident
Response
Management
Response processes
and procedures are
executed and
maintained, to
ensure timely
response to
detected
cybersecurity
events.
12.00 IT Director
1) The City has no formalized or documented
information security incident response
procedure
2) CoG's IT department has an informal
(undocumented/ad-hoc) resolution process to
ensure appropriate steps are taken to respond
to incidents. The process is triggered in the
event of a report/discovery of compromise, loss,
or theft of system data
We recommend the City implement a formal
incident response plan including:
1) Provide a roadmap for implementing its
incident response capability;
2) Describes the structure and organization of
City of Georgetown’s incident response
capability;
3) Provides a high-level approach for how the
incident response capability fits into City of
Georgetown as a whole and the overall Family
of Companies;
4) Meets the unique requirements of City of
Georgetown’s mission, size, structure, and
functions;
5) Defines reportable incidents as well as
requirements and guidelines for external
communications and information sharing (e.g.,
what can be shared with whom, when, and over
what channel);
6) Provides metrics for measuring the incident
response capability within the organization;
7) Defines the resources and management support
needed to effectively maintain and mature an
incident response capability; and
8) Is reviewed and approved by senior
management
IT agrees a formal process and procedures need to
exist to manage cybersecurity incidents
appropriately.
IT Immediate actions
(next 12 months)
Implement Incident response policy. Train IT staff
on procedures to ensure policy is being met.
IT future planned actions
(12 - 36 months)
Document formal incident response plan including
all recommendations by Plante.
13 Utility
Outage
The City is unable
to respond to mass
failures of electrical,
water, or sewage
outages in a timely
manner.
11.89 Utility
Director
1) Control Center has monitoring alarms in the
event of outages
2) Control Center has an outage management
system to diagnose location of fault and provide
area of impact and customer count
3) Response plan is in place for water, wastewater,
and electric system failures.
4) Regular maintenance tracking of all critical
equipment; replacement is made when
showing signs of degrading through testing
1) Maintain equipment useful lives schedule and
proactively monitor components which have
reached their useful lives
2) Perform a vulnerability assessment to judge your
preparedness for handling the increased
likelihood for power outages
Emergency Response Procedures have been
expanded to include establishment of an
Operations Command Center procedure for
emergency response for large scale utility
outages that do not rise to the level of EOC
activation.
Page 75 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
22 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
14
Disaster Recovery
/ Business
Continuity
Planning
Inability of the
organization to
continue key
business processes
during a potential
disaster due to lack
of sufficient
disaster recovery
planning and/or
execution.
11.60
City
Manager’s
Office
1) Most city staff members are able to work
remotely via Virtual Desktop Infrastructure
(VDI)
2) The Public Works Departments conduct
assessments of potentially hazardous situations
(ex: tree trimming to prevent outages during
windstorms)
3) The Fire and Police Departments can
immediately route 911 calls to the Williamson
County 911 center
4) Tabletop disaster recovery simulations are
performed on an annual basis by the
Emergency Management Coordinator in
conjunction with the Fire Department
5) No backup plan in place at Airport if fueling
system or lighting vault fails. This has been
identified as a weakness and accounted for in
the Airport Master Plan to remediate over the
next 5 years.
6) No DR/BCP plan at the Library,
Communications, Convention & Visitor’s
Bureau, Customer Care and Inspection Services
7) Back in 2005, the Municipal Court had a
system crash and were unable to recover
records. They had to recreate 2.5 months of
records and it took about 6 months. The issue
has not been resolved
1) The City has inconsistent DR/BCP across the
organization. Some departments have a robust
plan and others have none. A DR/BCP should be
developed for every City department. Each of
these department-level plans should then be
integrated into a city-wide plan
2) Tabletop disaster recovery simulations should be
performed with all City Departments
1) As the City buys new or upgrades existing
software, we are prioritizing cloud options that
improve security and access
Page 76 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
23 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
15 Billing for Citizen
Services
Citizens are billed
incorrect amounts
or not billed at all
for citizen services.
11.37
Customer
Care
Director
1) Rates and/or fees for Utility Services, Building
Inspection Services, Animal Services, Permits,
Fire, Police and Airport are approved by
Council
2) Parks and Recreation rates are set and
approved by the Parks and Recreation Director
and submitted to the Council annually
3) Customer Care utilizes systems built into the
meter data management (MDM) and customer
information systems (CIS) that apply validation
methodology to detect abnormal consumption
or amount billed. These “exceptions” are
identified in the systems for staff to review and
validate manually (referred to as “Edit Process”)
4) Billing for EMS services is performed by a 3rd
party service and any hardship write downs
require the Fire Chief’s approval
5) Departments handling cash perform daily cash
reconciliations
6) The Municipal Court clerks review all
tickets/citations before being sent to the
recipient
7) The Code Enforcement Department maintains
evidence of violations to be billed, and the
Energy Services Department maintains the
police report as evidence for billing for damages
8) Airport uses a third party appraisal for lease
amounts along with fuel prices set by City
Council
a. The fine schedule for the Municipal Court
citations should be restricted to specific users
b. All invoices should be created in a single system
across the City and remit-to addresses should
be limited by a “drop-down” function consisting
of only addresses the City accepts payments
c. Management should consider a third party
revenue recognition study to validate all sources
of revenue are complete and accurate across
the City operations
d. An outside party, Emergicon, reviews billing for
EMS incidents as there are various rates
depending on citizen’s ability to pay.
Emergicon also collects funds and this helps
reduce the occurrence of billing errors and
improves collections. However, Emergicon also
writes off funds and there is no reconciliation
of EMS revenue to billings. We recommend the
City enhance reconciliation controls around
billing procedures and perform internal audits
of quality control and verification of vendor
compliance.
1) Implementing a new ERP system will include a
thorough review of the Accounts Receivable/Billing
module.
2) Once Emergicon has completed a full fiscal year
of billings and collections, the City can audit and
evaluate the performance and compliance of
Emergicon’s processes and procedures.
Page 77 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
24 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
16 Composition of
Tax Base
Changes in the
balance of
commercial and
residential tax base
result in losses of
revenue from taxes.
10.63
City
Manager’s
Office
1) The City has performed a detailed mapping of
how each square mile of the city will be used
in the future
2) The City Manager’s Office completes regular
fiscal impact models to determine the effects
of commercial vs. residential development
3) The Economic Development Department has
established a comprehensive strategic plan
4) Economic Development relies on demographic
research for talking to prospects regarding
future development. Works closely with the
Planning Department
5) The Fire Department should be involved in all
communications regarding commercial
development in order to ensure the
Department is able to acquire the necessary
equipment to manage emergencies at large
scale commercial properties
6) The Fire Department has increased its staff to
respond to an increase in calls for service.
The rate of EMS calls for service is growing at
double the rate of population
7) The City is updating its Comprehensive Plan
which will include an update to the future
land use plan
8) Planning Dept. promotes and encourages a
varied level of housing products and
commercial tax base per the Comprehensive
Plan.
1) The City should communicate potential
new commercial and residential
development to directly impacted City
departments and evaluate how new
development would affect each directly
impacted department
2) Management should utilize a concentration
strategy that is flexible and supported by
realistic expectations
The City is updating its Comprehensive Plan
through a robust citizen engagement process
during 2018/19. This plan will identify
community standards and goals for growth.
City staff from various departments impacted by
development meet with the City Manager’s
Office on a bi-weekly basis to discuss major
development applications as well as to
collaborate and problem solve on various issues.
17 Grant Obligations
Organization fails
to meet grant
covenant
requirements.
10.55
Controller
1) Grants filings across the City are monitored by
various personnel within the Finance
Department
2) Grant applications require City Council
approval per the City’s Fiscal and Budgetary
Policy
3) Federal and State grants require compliance
filings and, if omitted, could impact future
grant funding, as well as result in audit findings
1) The City should designate a staff member as a
Grant Administrator. This staff member should
be responsible for maintaining a repository of all
grants being applied for, awarded, contact
person, and any required filings associated with
each grant. City should require that all Grants be
managed through the new Grant Administrator
2) A Grant Status Report should be provided on a
periodic basis to the City Manager’s office for
potential budget considerations
The City has completed these recommendations.
The Controller is the Grant Administrator. A
new policy was implemented in the spring and
the status report is presented to Council in the
quarterly financial report.
Page 78 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
25 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
18
IT Third Party
Roles &
Responsibilities
Security roles and
responsibilities are
not established for
all third-party
service providers
and lack clear
contractual
obligations for
service level
agreements and
KPI’s.
10.00 IT Director
1) The City has identified trusted partners with
respect to hardware and hosted applications
2) Roles and responsibilities have been established
but are not formally documented. Within the
workforce, absence of a formal documentation
poses a risk for segregation of duties and with
third parties, accountability may be lacking
3) The contract between City of Georgetown and
the service provider does not specifically outline
the roles and responsibilities related to
Cybersecurity controls handled by each
organization
4) There is no monitoring of external party use of
the system for potential Cybersecurity events
We recommend management take the following
actions:
1) Clearly identify the cybersecurity responsibilities
to be outlined in the contract with the service
provider including roles for identification,
response, and recovery procedures
2) Establish Key performance indicators for third-
party responsibilities including number of events,
data breaches, number of notifications
3) Continuously monitor contract SLA’s and
established key performance indicators
IT has been working to ensure new contracts meet a
higher level of security requirements. For example
the Office 365 contract with Microsoft has advanced
alerting for things like elevation in access privileges
and enhanced reporting to view our security posture
at any time.
IT manages KPI’s for 3rd party contracts through
simple notification of security events that can follow
the city’s Information Security Response plan should
provide adequate documentation for security events.
Incident response risks are being addressed under
Risk # 3 on this document.
IT Immediate actions
(next 12 months)
Continue to monitor all new contracts to ensure
proper cybersecurity language exists.
Require all vendors to use multi factor
authentication to access city resources.
IT future planned actions
(12 - 36 months)
Review older contracts and make notes of where
changes are needed during contract renewals.
Page 79 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
26 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
19 Vendor Reliance
Any termination of,
or adverse change
in, the
Organization's
relationships with
its key suppliers, or
loss of the supplies
in support of one
of the
organization’s key
services.
9.81
Purchasing
Manager
1) The majority of City Departments have multiple
vendors available to supply goods & services
and would not face disruption if they had to
switch vendors
2) We noted 3 departments that have a reliance
on key vendors and they are closely monitoring
this process: Transportation (asphalt and
concrete), Fire Department (specialty vehicle
repair) and Animal Services (specialty
veterinarian drugs and feed)
1) Assign one person the responsibility of
monitoring all key vendors to the City
2) Create a subsidiary listing of all key vendors
with contract details, SLA’s and performance
metrics
3) Report back to City Manager when it is
determined a vendor may become insolvent or
is not meeting SLA’s
4) Prior to contract renewal, negotiate with all key
vendors to capture volume discounts and
preferred pricing
5) Management indicated Garland Power & Light
currently reconciles their meter data to the
scheduling data and the transaction settlement
engine. This could be done in house but would
require additional headcount as the process
runs 24/7. Management should consider a cost/
benefit study to do this in-house
The new ERP will enhance the ability to analyze
vendor and contract details.
The City’s purchasing policy receives quotes
and/or formal bids for purchased over $3,000.
Purchases over $50,000 are approved by
Council so more review is given to these large
expenditures.
The management acknowledges that certain
items noted are “sole source” which provides a
reliance on key vendors in limited
situations/purchases.
Page 80 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
27 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
20
IT Critical Security
Event
Identification
A formal risk event
identification
process is not in
place to identify,
classify and resolve
security events
9.00 IT Director
1) Currently there are a variety of log generation
methods in place for the system, however there
is no catalog of security event types being
identified and reviewed within the logs by
security professionals
2) As noted in the Segregation of Duties risk,
there are no documented audit log reviews of
changes made to critical City databases
1) Identify high risk events that can be alerted
from current logging capabilities (NIST SP 800-
53 Rev. 4 AU-6). Potential high risk events can
be discerned through the risk assessment
process (NIST SP 800-53 Rev. 4 RA-3),
penetration testing, and best practice
documentation. Some common threat events
include:
• Multiple failed login attempts
• Elevations in access privileges
• Changes to application code
• Changes to security settings
• Process specific actions
2) Consider alert generation techniques for risky
events such as devices that connect to the
network without authorization
3) Identified events should be responded to in
accordance with the organization’s Incident
Response Plan
IT does not currently have designated security staff.
This makes it challenging to implement controls at
this level because of the time and knowledge
necessary to keep a proactive approach maintained.
IT agrees we should have an advanced alerting
process on high risk events however continuing to
maintain these types of processes can be staff
intensive.
IT Immediate actions
(next 12 months)
Hire a Lead System Administrator (approved for
FY19) to assist with security activities.
Identify high risk events that occur in current
logging tools. Research methods for alerting based
on events. Research staff time needed to
implement and maintain an alerting process that
always follows best practices. Research managed
security services and costs. Discuss options with
City Manager’s Office for implementation.
IT future planned actions
(12 - 36 months)
Create an alerting strategy/process that alerts staff
when appropriate. Implement alerting for high risk
events.
Implement managed security services if feasible.
Page 81 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
28 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
21
IT Security
Awareness,
Training and
Education
Personnel are not
informed of
potential IT threats
to the organization
and are unable to
respond effectively.
9.00 IT Director
1) The City has implemented an Acceptable Use
Policy amongst other policies around proper
use of computers and accessing digital
information. However, to ensure compliance,
there is a need to assess employee’s
understanding of policies and response to
cybersecurity threats via periodic awareness
and training
2) IT staff monitors and reports email scams to
all employees in an effort to increase
awareness
1) Rely on end users as the first line of defense to
limit exposure to social engineering frauds and
threats
2) Consider increasing complexity of password
requirements
3) Create a formal IT Awareness training and
provide to all employees on a periodic basis
4) Require employees to formally acknowledge in
writing that they have read and understand the
security awareness training, and that they
recognize the ramifications of non-compliance
IT Immediate actions
(next 12 months)
Implement city wide security awareness program
and training.
Partner with HR to leverage use of LMS for security
training.
IT future planned actions
(12 - 36 months)
Continue to provide security awareness training
and review annually for new material and best
practices.
22 Fire Department
Failure
The Fire
Department is not
adequately
equipped to handle
responses to
emergencies in the
City.
8.00 Fire Chief
1) The GFD studies data points to best position
their resources in order to minimize response
times. In instances when there are no
resources available, GFD has agreements with
third party ambulance providers who are
obligated to provide the same response time as
the GFD
2) Also, the GFD have mutual aid agreements with
neighboring communities to assist in calls when
the City is not available
3) The GFD indicated they perform fire
inspections of public buildings (schools,
hospitals, government buildings, etc.) but there
are not enough resources to do fire inspections/
capacity evaluations on all businesses in the
City
4) The City is currently building two stations to
ensure adequate response to the growing
population
1) Consider an independent third party evaluation
study of the GFD capabilities, response metrics
and resource allocations to evaluate if there
needs to be changes to the current resource
allocation model
2) Consider cooperative agreements with ESD8
and/or contiguous municipalities to elevate
synergistic programs (co-located/co-operated)
fire stations and boundary drops (enhanced
auto-aid).
3) Consider making licensed buildings be required
to be inspected annually. Also, consider a self-
inspection program for low risk properties
and/or an inspection matrix as follows:
• Low Risk – every 3 years
• Medium Risk – every 2 years
• High Risk – annually
4) Management should consider the implications for
property owners and businesses when the Public
Protection Classification (PPC) issued by the
Insurance Services Organization (ISO) is not
performed, as there may be a negative impact if not
inspected annually.
GFD regularly reviews KPIs and communicates
with city management on service delivery
standards. Mutual aid agreements are in place
for assistance when additional resources are
needed. Additionally, GFD is exploring
partnership opportunities on a long-term future
station with Round Rock.
A Fire inspector has been added to the staff for
FY19 to help address the backlog of inspections
and keep up with the growing number of
business inspections.
Page 82 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
29 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
23 Physical Security
Facilities are not
appropriately
secured from
unauthorized
access.
9.00 Asst. Parks
& Recreation
Director
Overall the City has robust physical securities
controls in Place:
1) Customer Care and Municipal Courts have
robust physical security programs in place.
Safes are utilized for cash and cameras cover
registers and safes. Dual access controls with
keys and codes are used at cash access points
2) Most City buildings require access badge/ fob
to enter restricted (non-public) areas.
3) Police, Fire and Energy Services departments
have restricted access areas
4) However, we noted several areas with limited
physical security controls:
• Animal Services – lack of physical
security is a major issue as animals have
been stolen. Cash is not well controlled
and cameras are not in place on critical
areas. The safe is not adequately secured.
• Building Inspection Services, Public
Works, GIS, Systems Engineering and the
Georgetown Municipal Complex have
poor physical security
1) Consider taking inventory of all key cards to
validate none have been stolen or lost
2) Consider development of physical security
training for all personnel regarding
safeguarding of assets, restrictive access to high
risk areas, etc. The City must support integrity
of physical security through the organization
with the assistance of the City’s Risk Manager
3) Standardize a consistent security plan across all
locations appropriate for each facility
4) The City currently monitors physical access to
the facility where IT resides to detect and
respond to physical security incidents. However,
CoG does not review physical access logs
periodically
1) Cameras are being evaluated for various cash
areas
2) Security access will be part of the current
facilities study
3) Security access will be evaluated with the
opening of each new or renovated facility.
24
Freedom of
Information Act
(FOIA)
Non-compliance
with FOIA requests 6.22 City
Secretary
1) The procedure is for all FOIA requests to enter
through Legal. They will decipher the request
and handoff to the City Secretary office to
obtain information.
2) FOIA request process is currently being
transferred from Legal to City Secretary and is
approximately 90% complete
3) GovQA is an electronic system used to maintain
and track FOIA requests.
1) When the transfer of FOIA request process is
complete, consider documenting the process
with written policies and procedures
2)
1) The City has completed the transfer of FOIA
request process to the Open Records Coordinator in
the City Secretary’s office.
2) Citywide training has been completed by the
Open Records Coordinator to provide guidelines and
consistency to the process.
3) The City Secretary Department is in the process
of completing Policies and Procedures for FOIA and
should have completed within the next month.
Page 83 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
30 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
25 Police Failure
The Police
Department is
inadequately
equipped to
respond to
emergencies or
responds in an
unauthorized
manner.
6.00 Police Chief
1) Police department is aware of people, process,
technology and regulatory requirements
2) Robust controls are in place to monitor
progress and key performance indicators
3) A culture of clearly communicating
expectations, behaviors, and training is in place
so officers are held accountable for their actions
3) Guardian Tracking is a day-to-day tracking of
personnel performance entry recordkeeping.
Police management reviews and a conversation
with the employees occurs when they handle
situations incorrectly
4) Training includes the following:
• Handling of persons with mental illness
• Defusing techniques to encourage peaceful
tactics
• Non-lethal methods of restraint
5) Internal affairs division investigates all
complaints against officers
1) Develop the following Key Risk Indicators (KRI’s)
and monitoring controls which may indicate a
risk event is about to occur
a. Increase in City crime rates
b. Increase in police misconduct/brutality
incident claims
c. Increase in squad car accidents
d. Excessive overtime
e. Unexpected cost overruns/continuous
unfavorable budget variances
f. Increase in dismissed cases due to insufficient
evidence, improper procedures or failure to
follow legal standards for police
1) The City will monitor quality of life crimes
within the city and identify strategies for
reduction where feasible.
2) The City will monitor and investigate all
complaints, including use of force and pursuits
and will identify strategies for reduction where
feasible.
3) The City will monitor police overtime and
identify strategies for reduction where feasible.
4) An annual report of crime statistics is
presented publically to the City Council.
26 Talent
Management
Organization lacks
a clear assessment
and evaluation
process to align
qualified employees
with specific
business
requirements and
needs.
5.42 HR Director
1) The City personnel policy requires bi-monthly
performance discussions with all employees
2) Formal annual and mid-year performance
evaluations, including employee development
and training plans, are performed on all
employees
3) Energy Department has a robust training
curriculum with a 4-year apprentice program
4) Police department uses Guardian Tracking to
evaluate officer performance daily
1) Have HR department work collaboratively with
business lines to gain in depth knowledge of
resource needs and constraints
2) Consider using an outside party for diversity in
pre-hire assessments
1) HR staff is developing a supervisor survey
to identify employee development for current
and future roles
2) HR staff trained all supervisors in 2017 on
proper hiring techniques including ways to
overcome various forms of hiring bias
3) The city conducted an employee survey in
2016 and again in 2018. 79% of employees
believe their job makes good use of their skills
and abilities. 84% believe their job provides
opportunities to do challenging and interesting
work.
27 Records
Management
No records
management policy
is in place, adhered
to, or is
inadequately
designed.
5.27
Records
Program
Manager
1) The City’s records retention policy is in line
with the Texas State Library records retention
policy. The department receives alerts from the
state library of any changes to policy
2) Finance indicated they are unclear on how
electronic records storage should be handled
3) Parks and Recreation has a large quantity of
waivers and registration hard copy forms
4) Animal Services has a lack of electronic records
and believes there is a risk of information loss
1) Formalize Records Management policy
regarding digital records and communicate to
all departments
2) Consider additional training on electronic
records management
3) Consider digitizing Parks & Recreation forms
1) The Records Team is training various
departments on retention, destruction of records
and digitalization of records.
2) Policies and Procedures have been completed and
implemented.
3) The following information has been made
available to employees via the internal GO site:
a. Records Management Policy & Procedures
b. Retention Schedules
c. Off-site storage information
d. Destruction authorization forms
Page 84 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
31 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
28 Regulatory Filings
Failure to comply
with regulatory
filings such as
GASB, EPA, etc.
5.20 Controller
1) Water Services completes Environmental Protection
Agency (EPA) and Texas Commission on
Environmental Quality (TCEQ) permit reports every
3-5 years
2) Finance prepares annual CAFR and SEFA which is
submitted to the clearinghouse
3) Customer Care prepares annual filings on storm
water use survey breaking out how much water was
taken in to the system.
4) City of Georgetown has an exemption from
complying and filing necessary reports mandated by
Senate Bill 898 (reducing energy consumption in
City owned facilities) & administered via the State
Energy Conservation Offices (SECO) because of the
100% renewable designation.
5) Customer Care is required by TCEQ to report water
quality testing results to customers on an annual
basis. Deadline for customer communications is 7/1.
GUS must certify with TCEQ by 5/1 that we provided
water quality testing results to water purveyors that
obtain wholesale water from GUS.
6) Energy Services relies on outsource provider Snyder
Engineering for all regulatory findings
7) Utility services is subject to an annual requirement
with the ERCOT to validate that a risk management
plan is in place
8) Airport has a significant amount of regulatory filings
ranging from EPA, TCEQ, Stormwater, Airplane
inventory, and Property Taxes through MCAT. Use
Microsoft Outlook as reminders
9) Fire Dept. has numerous state health services filings
regarding training, certifications, incidents, fatalities,
etc.
1) There is a significant amount of regulatory
filings across the City. Management should
consider a consolidated Regulatory Compliance
Landscape (RCL) ledger be compiled to have
one list of all requirements outlining the filing
dates. Further, Management should store this
on a shared drive and assign all filings to an
owner who is required to indicate when the
filing is complete. Someone should be
responsible for checking for missed filings
Management is evaluating a contracts
management system to track and comply with
contractual and regulatory requirements. This
may be part of the ERP implementation or a
stand-alone system.
Page 85 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
32 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
29 Succession
Planning
Leadership talent
within the
organization is
insufficiently
developed to
provide for orderly
succession in the
future.
4.39 HR Director
1) No formal succession planning in place. Per
Human Resources, they emphasize internal
cross training to grow future leaders from
inside the City organization
2) The City is in the process of performing an
assessment of retirement eligibility for key
personnel
1) The City should consider an outside party to
implement a formal Succession Plan
2) Consider a mentor shadowing program to
protect the City against unplanned terminations
or leaves of absences
1) City initiated first Emerging Leader
training program in 2018 with 20 graduates.
Anticipate annual opportunity to grow
employees at various levels each year
2) Supervisory Series initiated in 2017 and
successfully completed by 168 supervisors.
Additional curriculum to be added this year
aimed at growing managerial skillset of all city
supervisors
3) The city conducted an employee survey in
2016 and again in 2018. 76% of employees plan
to continue working for Georgetown for 5+
years, which is significantly higher than most
employers.
30 Budget and
Planning
Budgets and
business plans are
not realistic, based
on appropriate
assumptions, based
on cost drivers and
performance
measures, accepted
by key managers, or
useful or used as a
monitoring tool.
3.24 Finance
Director
1) The City uses a robust budget and planning
tool across the organization using historical
data supplemented with forward looking
analytics. Each Department head formalizes
their budget and forward to Finance for
consolidation
2) Finance utilizes Excel to manually consolidate
the budgets and upload into the ERP system
3) Final budgets are presented to City Council
for review and approval
4) Quarterly budget to actual reports are
presented to City Council
1) Certain departments such as utilities, water,
electric, etc. count on supplemental data to
prepare their budget (see Data Governance risk
#27). We recommend management validate and
document the completeness and accuracy of
assumptions for all budget line items
2) Management should set a clearly defined
threshold for all material variances to be
explained (e.g. +/-XX% and $YY,YYY)
1) The new ERP system will facilitate a
central location of budget development
information and reporting
2) Finance Administration’s performance
measures include budget to actual variance
targets
31 Tax
Non-compliance
with state or
federal tax law.
3.00 Controller
1) Finance maintains schedule of tax payments and
receipts to/ from County, State and Federal
authorities
1) Consider the creation of a master tax filing
schedule and reporting to City Manager
The City agrees with this recommendation.
32 State / Federal
Regulations
Failure to comply
with new or
existing federal or
state regulations.
2.44 Controller
1) Building Inspection Services provided that
maintaining state licenses and Continuing
Professional Education (CPE) is a challenge
2) State regulations require the Police Department
to report all racial profiling and crime data
3) Parks and Recreation indicated that there is a
State Health and Safety Code that requires
public play equipment comply with the
American Society for Testing Materials (ASTM)
F1487-07 which provides performance
standards for public playgrounds and this is
NOT being done on a routine basis
1) Develop a Citywide license and CPE tracking
system
2) Develop a process to ensure all City
playgrounds comply with ASTM F1487-07. The
code does not require a formal inspections
process, just that the City complies with the
ASTM F1487-07 standard
The City will review a tracking system in
context of all other technology needs.
Employees and supervisors will continue to be
responsible for tracking individual and
departmental CPE and licensing.
Parks Department is working on a schedule to
evaluate older parks to replace equipment as
needed. Newer parks and equipment is
compliant.
Page 86 of 104
APPENDIX A – RISK TREATMENT ACTION PLANS
33 | Page
# Risk Risk
Detail
Residual Risk
Score
Risk
Owner
Current State
Mitigating Activities
Future State
Mitigating Activities
Management
Response
33 Leadership
The people
responsible for the
important City
processes do not or
cannot provide the
leadership, vision,
and support
necessary to help
employees be
effective and
successful in their
jobs.
2.42 City
Manager
1) All departments we interviewed provided the
same issue on leadership – there is a strong
management base that sets realistic strategic
objectives and has an open communication line
with each department head
2) Leadership has frequent meetings with
department heads to check on status of
operations and those concepts are clearly
communicated throughout the organization
3) Detail performance evaluations are done at all
levels of the City government and each
employee is evaluated for job performance
1) The City should consider an upward feedback
program to validate lower levels of employees
are satisfied with management’s performance
1) A 360 evaluation process was implemented
last year for Directors and will be rolled out to
mid-level management in the upcoming year.
2) The city has implemented a bi-monthly check-
in program where employees have the
capability to provide upward feedback to their
supervisor.
3) The city conducted an employee survey in
2016 and again in 2018. Employee response
rates were 85% and 82% respectively and the
city has involved employees in tactical action
planning to further improvement engagement
and enablement.
Page 87 of 104
APPENDIX B
Information Technology Executive Summary
Appendix B
Page 88 of 104
APPENDIX B
CYBERSECURITY RISK ASSESSMENT EXECUTIVE SUMMARY
Inherent Risk: Risk management is the ongoing process of identifying,
assessing, and responding to risk. To manage risk, organizations should
understand the probability that a threat event will occur and the resulting
impact. The probability and impact analysis leads to identification of inherent
risk (i.e., risk without consideration of controls) to the IT environment. With
this information, organizations can determine the acceptable level of risk for
delivery of services and can express this as their risk tolerance.
Factors considered when performing the risk assessment are:
• Probability: What is the likelihood that a threat will occur?
• Impacts: What are the immediate damages if the threat is realized (e.g., disclosure of information,
modification of data, disruption of key systems/processes, containment, and resolution costs)?
• Identify Information Assets: What should be protected in relation to electronic data, IT applications and
IT infrastructure? Our methodology takes into consideration any third parties or vendors that transmit,
host, or process your organization’s data or IT systems.
• Criticality Analysis: How critical are your information assets? Each technology layer (i.e., data,
applications, and infrastructure) has its own unique criticality analysis.
• Threats: Identify the natural to man-made threats that impact the confidentiality, availability, and integrity of
your data and information systems.
• Consequences: What are the long-term effects of the threat being realized (e.g., damage to reputation of
your organization, loss of business or revenue, damage to your brand)?
• Controls: What effective security measures (security services and mechanisms) are needed to protect the
assets?
In understanding the high risk areas for the IT applications and systems, several key questions came to mind when
addressing the Cybersecurity considerations:
• What security controls are needed to satisfy the security requirements and to adequately mitigate risk
incurred by using information and information systems in the execution of organizational missions and
business functions?
• Have the security controls been implemented, or is there an implementation plan in place?
• What is the desired or required level of assurance that the selected security controls, as implemented, are
effective in their application?
The answers to these questions are not uniquely answered in isolation but rather in the context of an overall
effective risk management process suggested by the NIST Cybersecurity Framework. Through the control evaluation
process, we isolated areas that City of Georgetown can continue to identify, mitigate, and monitor risks associated
with cyber threats identified through the threat assessment. Logically, areas of high risk would require more
extensive controls than low risk areas and in most cases, inherent risks can be controlled by the implementation of
adequate countermeasures.
Page 89 of 104
APPENDIX B
NIST Cybersecurity Framework Maturity Summary
The chart below indicates City of Georgetown’s overall picture of the current state versus it’s desired/target state in
accordance with the Cybersecurity framework.
Page 90 of 104
APPENDIX B
Mitigation Plan
Page 91 of 104
APPENDIX B
3.1 FINDINGS AND RECOMMENDATIONS
3.1.1 Cybersecurity Governance Model
Assigned to: City of Georgetown
Priority High
Recommendations
Currently, the City’s Information Technology department has no succession plan for key
roles occupied by experienced staff. In addition, most members of the IT department
perform several duties beyond their originally assigned tasks and roles and responsibilities
related to key initiatives such as Risk & Incident Management, Disaster Recovery &
Business Continuity are not clearly defined.
According to Inform ation Security Governance Guidance for Boards of Directors and
Executive Management, 2nd edition, the five basic outcomes of information security
governance include:
1. Strategic alignment of information security with business strategy to support
organizational objectives
2. Risk management by executing appropriate measures to manage and mitigate risks
and reduce potential impacts on information resources to an acceptable level
3. Resource management by utilizing information security knowledge and infrastructure
efficiently and effectively
4. Performance measurement by measuring, monitoring and reporting information
security governance metrics to ensure that organizational objectives are achieved
5. Value delivery by optimizing information security investments in support of
organizational objectives
At a minimum, we recommend the City implement a governance framework that allows for
the proper management of a successful Information Security program (ISP). An effective
ISP involves participation from senior management to set the direction for proper
information security practices, adequate staffing (with assigned roles and responsibilities)
and compliance with policies. Furthermore, a commitment from management helps to
ensure support and funding from for security activities requiring financial resources; and that
organization-wide risk management programs are developed and implemented effectively.
Source: http://www.isaca.org/Knowledge-
Center/Research/ResearchDeliverables/Pages/Information-Security-Governance-Guidance-
for-Boards-of-Directors-and-Executive-Management-2nd-Edition.aspx
Page 92 of 104
APPENDIX B
3.1.2 Risk Management
Assigned to: City of Georgetown
Priority High
Recommendations
At the City of Georgetown, it is evident that the IT department has taken measures in
implementing security practices throughout the IS environment; however organizational
cybersecurity risk management practices are not formalized, and risk is managed in an ad
hoc/reactive manner; an organization-wide approach to managing cybersecurity risk has
not been established. As a result, security activities or business strategies may not be
directly aligned with organizational risk objectives or the current threat landscape.
The City has undertaken an effort through this assessment to evaluate the security controls
needed to combat cybersecurity risks, but there is a need for an overall information
security risk assessment to identify risks to the organization and threat mitigation
strategies.
To this effect, we recommend that management adopt a practice of performing a risk
assessment periodically. The periodic approach may take either of the following
approaches: (A) performing a full assessment every other year due to intensive resources
required to facilitate such an exercise or, (B) a targeted approach done annually. The
targeted approach may include:
(1) revisiting Plante Moran’s deliverables and updating controls where appropriate,
(2) re-assessing the City’s mitigation plan to update progress and note any further
concerns, and/or
(3) Selecting a few high-priority control areas (e.g. vendor management, or any business
objective/goal identified by executive management) and re-assessing associated threats
related to those areas.
Irrespective of the approach selected, the process for performing a risk assessment
typically includes:
• Identification of information assets (data, applications, infrastructure, and vendors)
• Assigning value to identified assets based on criticality (or dollar value in some
cases)
• Evaluation of vulnerabilities and threats
In addition to the above, we also suggest that the City assess the penalties and impact of
security breaches. From a regulatory perspective, such liabilities should be considered to
ensure that risks to sensitive data is properly assessed and accounted for.
Moreover assessing information security risks throughout the organization provides keen
insight into management’s risk tolerance for implementing security layers within the
organization. The IT risk assessment should be in-line with the City's risk management
strategies for identifying risks, evaluating existing controls and mitigating controls,
understanding residual risk and establishing a risk mitigation plan.
Page 93 of 104
APPENDIX B
3.1.3 Policies and Procedures
Assigned to: City of Georgetown
Priority High
Recommendations
Security policies and procedures are key components of an Information Security Program.
They reflect the organization's business processes and strategy, thereby enabling
management to define the scope of security, what is expected from employees, dictate
what must be protected and to what extent, and what the consequences of noncompliance
will be. To this effect, in addition to the already existing Acceptable Use policy in place, we
recommend management consider an organization-wide Information Security Policy, to
include key sections such as the ones listed below:
• Purpose/Scope
• Roles and responsibilities (including those related to regulatory requirements)
• Management commitment and business owner requirements
• Enforcement
• Information Sharing: Define and set requirements for relationships with or
connections to information systems of other agencies.
Additional policies that the City should consider adding include:
• Data Classification
• Information Risk Management (IRM)
• User Access Provisioning and Review
• Data Backup and Retention
• Data Destruction/Retention Policy
• Media Handling/Disposal Policy (this can be combined with the existing Computer
Disposal Policy)
• Data Protection and Encryption
• Secure Configuration/Hardening
• Physical Security Policy
• Contingency Plan
• Vulnerability Assessment and Remediation
• Incident Response Policy (for breaches, events and other critical incidents)
The ISP should be reviewed periodically (e.g. annually) by senior management and
enforced through annual end-user acknowledgement signoffs.
Page 94 of 104
APPENDIX B
3.1.4 Asset Management: Data Classification
Assigned to: City of Georgetown
Priority High
Recommendations
The City has identified and catalogued its hardware and software via a tool called
Lansweeper. This approach ties into an overall information flow enforcement (NIST SP
800-53 Rev. 4 AC-4) which ensures the confidentiality, integrity, and availability of critical
data when defined and enforced.
The next step is to classify data within the system based on its criticality and / or sensitivity
(NIST SP 800-53 Rev. 4 RA-2). Classification of data will also help drive the above-
mentioned information flow enforcement and help define the City’s security architecture.
Most organizations conduct the security categorization process as an organization-wide
activity with the involvement of chief information officers, senior information security
officers, information system owners, mission/business owners, and information
owners/stewards.
Plante Moran recommends the classification of City data to define an appropriate set of
protection levels and communication required for special handling. Classifications and
associated protective controls (including encryption for data at rest and data leak
prevention tools) should take into account department needs for sharing or restricting
information and the associated business impacts if such data were compromised.
Successful data classification in an organization requires a thorough understanding of
where the organization’s data assets reside and on what applications/devices they are
stored. Handling procedures should include details regarding the secure processing,
storage, transmission, declassification, and destruction of data.
Page 95 of 104
APPENDIX B
3.1.5 Access Management
Assigned to: City of Georgetown
Priority High
Recommendations
Logical Access: Access provisioning to the system is completed on the practice of
mirroring, that is, 'set up as another user within the system’. This practice can potentially
lead to excessive access rights being provided to users. On the other hand, for existing
users, additional access is provisioned without a formal review for SoD (Segregation of
Duties) conflict. When users are terminated, access removal from all necessary applications
may not be performed in a timely manner due to delayed notification from HR to the IT
department. Furthermore, in all aforementioned scenarios (access provisioning, modification
and termination), it was noted that not all applications have a formal process of provisioning
and de-provisioning.
A role-based access scheme should be established to ensure consistent application of user
access rights within the system. Users should be assigned their base set of access
authorizations based on the concept of “Least Privilege Necessary” to perform their role or
job function (as defined within their formal job description). Additional access beyond the
previously established role-based access scheme should be formally requested, reviewed
for conflicts and approved (NIST SP 800-53 Rev. 4 AC-2). Moreover, Management should
consider integrating access rights with data classification efforts identified in the findings
within this report (See 3.1.4 above, for more details).
Physical Security: The City currently monitors physical access to the facility where
information system resides to detect and respond to physical security incidents. However,
CoG does not review physical access logs periodically (e.g. quarterly/annually).
We recommend management take the following actions:
1. Establish a role based access scheme that takes into account the job
responsibilities associated with each role for City of Georgetown.
2. Establish a process to periodically review user access (including physical access) to
ensure accuracy and adherence to existing/changed business processes.
3. Ensure a process is in place to approve additional or special access requests and
timely de-provision access upon notification from HR.
4. Implement and enforce procedures to identify and document appropriate access
requirements for removing, adding or modifying City personnel’s access to
electronic PHI. The need for and extent of access should be based on an
assessment of risk, cost, benefit and feasibility as well as business need, and
permission to view, alter, retrieve and store ePHI.
5. Perform a periodic review of user access to PHI and ePHI (including access to the
data center) to verify the list is accurate and to ensure access is still commensurate
with job responsibilities.
Page 96 of 104
APPENDIX B
3.1.6 Contingency Plan
Assigned to: City of Georgetown
Priority High
Recommendations
In order to ensure that critical operations are available in the event of an interruption or
incident, redundancy is built into the datacenter environmental controls at the City and an
extensive data backup strategy is in place. However, a formal contingency plan is not in
place and related resources/systems are not catalogued and prioritized.
Plante Moran recommends the City conduct and formalize:
(1) a Business Impact Analysis (BIA) which identifies and analyzes mission-critical business
functions, and then quantifies the impact a loss of those functions would have on the City,
and
(2) An information system contingency plan to mitigate the risk of critical system and service
unavailability. The contingency planning process should occur after a formal Business
Impact Analysis (BIA) is conducted, in order to correlate the system with the critical
processes and services provided, and based on that information, characterize the
consequences of a disruption. Three steps are typically involved in accomplishing the BIA:
• Determine mission/business processes and recovery criticality
• Identify resource requirements
• Identify recovery priorities for system resources
The information system contingency plan should consider three phases:
(1) Activation and Notification Phase which outlines activation criteria and notification
procedures,
(2) Recovery Phase which outlines recovery activities, escalation, and notification, and
(3) Reconstitution Phase which allows validating successful recovery and deactivation of the
plan through activities such as validation testing, notifications, and event documentation.
The contingency planning process should also include the following elements:
• Roles and responsibilities
• Scope as applies to common platform types and organization functions (i.e.,
telecommunications, legal, media relations)
• Resource requirements
• Training requirements
• Exercise and testing schedules
• Plan maintenance schedule, and
• Minimum frequency of backups and storage of backup media
Further, an effective contingency plan should tie into the City’s Incident Response Plan and
should consider City’s personnel as information system contingency plans are not executed
on their own and an incident will often impact individuals that are crucial to tasks related to
information system operations. Personnel safety and evacuation, personnel health,
personnel welfare, relationships with response organizations, and communication planning
should be considered when developing the contingency plan. Finally, the agreed upon plan
should be compatible with the enterprise-wide Business Continuity Plan.
Sources: http://csrc.nist.gov/publications/nistpubs/800-34-rev1/sp800-34-rev1_errata-
Nov11-2010.pdf
Page 97 of 104
APPENDIX B
3.1.7 Incident Response Management
Assigned to: City of Georgetown
Priority High
Recommendations
Based on inquiry, it was noted that the City of Georgetown does not have a formal Incident
Response Plan. Incident management includes a proactive and reactive phase. While
reactive measures help to ensure that incidents are properly handled, proactive measures
allow incidents to be detected in a timely and controllable manner (See finding 3.1.9). An
improved approach will be to implement an Incident Management Program, which is
initiated by an Incident Response Policy and include the following key elements:
• Provide a roadmap for implementing its incident response capability;
• Describes the structure and organization of City of Georgetown’s incident response
capability;
• Provides a high-level approach for how the incident response capability fits into City
of Georgetown as a whole and the overall Family of Companies;
• Meets the unique requirements of City of Georgetown’s mission, size, structure, and
functions;
• Defines reportable incidents as well as ;
• Requirements and guidelines for external communications and information sharing
(e.g., what can be shared with whom, when, and over what channel)
• Provides metrics for measuring the incident response capability within the
organization;
• Defines the resources and management support needed to effectively maintain and
mature an incident response capability; and
• Is reviewed and approved by senior management
We recommend management take the following actions:
1. Develop a more comprehensive plan incorporating the above elements.
2. Integrate City of Georgetown’s Incident Response Plan testing activities with
relevant third parties.
Page 98 of 104
APPENDIX B
3.1.8 Third Party Cybersecurity Roles &
Responsibilities
Assigned to: City of Georgetown
Priority High
Recommendations
While the City has identified trusted partners with respect to hardware and hosted
applications. We noted the following deficiencies related to third party roles and
responsibilities:
• The contract between City of Georgetown and the service provider does not
specifically outline the roles and responsibilities related to Cybersecurity controls
handled by each organization.
• There is no monitoring of external party use of the system for potential
Cybersecurity events.
Security roles and responsibilities should be established for all third-party service providers
(NIST SP 800-53 Rev. 4 PS-7). Responsibilities are key to ensure that the City of
Georgetown and its service providers understand exactly who is responsible for which
Cybersecurity controls; this is especially important in a business continuity situation. These
roles and responsibilities should be formally documented in a contractual agreement.
Service level agreements should be established based on Key Performance Indicators (KPI)
where City of Georgetown’s expectations are set for each outsourced responsibility to its
third-party service providers. Once established, KPIs should be monitored to ensure third-
party service providers adhere to contractual obligations (NIST SP 800-53 Rev. 4 CA-7).
Furthermore, adherence to Key Performance Indicators should be used to identify potential
issues with vendor service that can be addressed through negotiations or seeking a new
vendor.
We recommend management take the following actions:
1. Clearly identify the cybersecurity responsibilities to be outlined in the contract with
the service provider including roles for identification, response, and recovery
procedures.
2. Establish Key performance indicators for third-party responsibilities including
number of events, data breaches, number of notifications.
3. Continuously monitor established key performance indicators.
Page 99 of 104
APPENDIX B
3.1.9 Critical Security Event Identification
Assigned to: City of Georgetown
Priority Medium
Recommendations
We noted a variety of log generation methods are in place for the system. These logs can
be used to identify everything from system health to potential security violations. Presently,
there is not a comprehensive catalog of security related event types being identified and
reviewed within the logs by security professionals.
To establish an effective event logging and monitoring program, City of Georgetown will
need to first identify high risk events that can be alerted from current logging capabilities
(NIST SP 800-53 Rev. 4 AU-6). Potential high risk events can be discerned through the risk
assessment process (NIST SP 800-53 Rev. 4 RA-3), penetration testing, and best practice
documentation. Some common threat events include:
• Multiple failed login attempts
• Elevations in access privileges
• Changes to application code
• Changes to security settings
• Process specific actions
For more risky events, such as devices that connect to the network without authorization,
the organization may consider alert generation techniques while for less risky events they
may simple review on a periodic basis. Identified events should be responded to in
accordance with the organization’s Incident Response Plan (NIST SP 800-53 Rev. 4 IR-4,
IR-5).
Once event detection processes are implemented a process to test said processes should
be established. Security assessments by internal or external independent parties can be an
effective way to ensure logging and monitoring processes are effective (NIST SP 800-53
Rev. 4 CA-2). Management should seek continuous improvement opportunities for the
event logging and monitoring program based on the results of security assessments.
We recommend management take the following actions:
1. Identify the system events that may indicate a potential security event.
2. Define monitoring techniques commensurate with associated risk.
3. Establish formal policies and procedures related to defined monitoring activities.
4. Periodically test the effectiveness of event logging and monitoring processes.
Page 100 of 104
APPENDIX B
3.1.10 Security Awareness, Training and
Education
Assigned to: City of Georgetown
Priority Medium
Recommendations
The City has implemented an acceptable use policy amongst other policies around proper
use of computers and accessing digital information. However, to ensure compliance, there
is a need to assess employee’s understanding of policies and response to cybersecurity
threats via periodic awareness and training.
End users are the first line of defense against a variety of social engineering threats and
must be relied upon to appropriately select strong passwords, perform secure day-to-day
operations, and appropriately use equipment. By not providing formal training to all
employees, the risk is increased that employees may not follow appropriate security
procedures.
We recommend a formal IT security awareness training be provided to all employees on a
periodic basis. Employees should be educated on the organization’s information security
policies upon hire, periodically (at least annually), and as major changes occur. In addition,
employees should be required to formally acknowledge that they have read and understand
the security topics discussed, and that they understand the ramifications of noncompliance.
Management should consider allocating resources for security awareness activities
(including other items, e.g. banners and posters), and enforce employee
participation/attendance within the organization.
Page 101 of 104
APPENDIX B
3.1.11 Unauthorized Mobile Code Detection
Assigned to: City of Georgetown
Priority Low
Recommendations
Mobile code is defined as any program, application, or content that is capable of being
embedded and transferred (via email, document, website, etc.). Examples of mobile
code include: JavaScript, Active X, PDF, VBscripts, etc. Avenues There are currently
multiple avenues for mobile code to be introduced into the information systems
supporting the system. Mobile code may be introduced from USB (current USB
restriction only prevent data being copied to a USB), through email, and through
downloads from websites.
The City should identify the types of mobile code that are approved for use within the
information system and educate users on the proper use of related technologies.
Likewise, organizations should define which types of mobile code are not approved for
use within the information system. Processes should be defined to identify unauthorized
mobile code deployed within the environment. These processes could include
configuration management controls, vulnerability scanning, etc. (NIST SP 800-53 Rev.
4 SC-18).
City of Georgetown does have controls in place to mitigate the risk of malicious mobile
code: antivirus controls, and limiting user access to administrator functions based on
the concept of least privilege.
We recommend management take the following actions:
1. Define acceptable and unacceptable mobile code and mobile code
technologies.
2. Deploy a process to monitor for the presence of mobile code
3. Integrate mobile code detection processes into the Incident Response Plan
Page 102 of 104
APPENDIX B
Page 103 of 104
City of Georgetown, Texas
City Council Workshop
November 13, 2018
SUBJECT:
Sec. 551.071: Consul tati on w i th Attorney
Advice from attorney abo ut pending or co ntemplated litigation and o ther matters on which the attorney has a duty to
advise the City Council, including agenda items
Sec. 551.072: De l i berati o ns of Real Property
- Wastewater Easement, Berry Creek Country Club - Berry Creek Interceptor -- Travis Baird, Real Estate Se rvic e s
Coordinator
- Sale of Prope rty at 1 01 E. 7th Street
Sec. 551.074: Personnel Matters
City Manager, City Attorney, City Secretary and Municipal Judge: Consideration of the appointment, employme nt,
evaluation, reassignment, duties, discipline, or dismissal
Sec. 551.86: Certai n Publ i c P ow er Uti l i ti es: Competi ti ve Matters
- Quarterly Financial FY18 Q4 Electric Updates - Chris Foster, Resource Manageme nt and Integration Manager
Sec. 551.087: De l i berati o n Regardi ng Economi c Devel opment Negoti ati ons
- Downtown Utility Upgrades
- P roject Legacy
ITEM SUMMARY:
FINANCIAL IMPACT:
NA
SUBMITTED BY:
Page 104 of 104