Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014
|
|
|
- Loraine McLaughlin
- 10 years ago
- Views:
Transcription
1 Remarks by Thomas J. Curry Comptroller of the Currency Before the 10 th Annual Community Bankers Symposium Chicago November 7, 2014 Good morning, it s a pleasure to be here today and to have this opportunity to speak to so many who have an interest in the viability of community banking in the United States. The issue of community bank viability is one that I have addressed many times since becoming Comptroller, and my focus has been on viability, not in the sense of just getting by, but on vitality. The reason for that is simple: I happen to believe that a robust system of community banks and thrifts is essential to our nation s economic health. We at the OCC try do our share to maintain the strength of community national banks and federal savings associations, and we do it in many ways. I won t attempt to catalog all of the things that we do for smaller institutions I ve discussed them many times in the past, and I suspect that almost everyone in this room has heard at least one of those talks but I would like to mention one general principle before moving on to the subject of today s remarks. We believe that every bank or thrift is unique, and that it s impossible to take a cookie-cutter approach to community bank supervision. Our Assistant Deputy
2 Comptrollers and portfolio managers tailor their supervision of each community bank or thrift to its own specific needs, its own business plan, and the unique characteristics of its own market. As a result, our expectations and standards for risk management practices consider the complexity and scope of a bank s operations. In this regard, it goes without saying that large and midsize banks are different from community institutions. Because of the outsized effect that large banks can have upon the economy and financial system, we demand more from them. That s why, for example, our heightened standards guidelines apply only to large and some midsize institutions, and not to community banks. The differences between these two groups of banks and thrifts are also evident in the area of cybersecurity, and I d like to spend the rest of my time today on that subject. This is a topic that s been very much in the headlines lately. We ve seen a number of attacks on banks and large retailers that have caused problems not just for those companies, but for their customers as well. In the case of the retailers, the card numbers and other information from millions of customers was stolen, and that has caused no end of worry for the affected consumers. In an age of identity theft and cyber crime, people fear their financial security could be jeopardized in one of these breaches. Community banks and thrifts also suffer from these data thefts, even if they were not involved in any way. Financial institutions are often on the hook to compensate customers for fraudulent charges, and replace credit and debit cards and monitor account activity for fraud at significant cost. That s not easy for any bank, but it s a burden that falls especially heavily upon community institutions. At a cost of $5 or more per card and covering the related fraud charges, the costs can run up very quickly. 2
3 These recent incidents highlight the need for improved cybersecurity. But they also demonstrate why we need to level the playing field between financial institutions and merchants. The same expectations for security of customer information and customer notification when breaches occur should apply to all institutions. And when breaches occur in merchant systems, it seems only fair to me that they should be responsible for some of the expenses that result. While we sometimes think of cybercrime as a threat aimed primarily at large banks, much of my focus in this area has been on community institutions. That s not to say that we don t pay close attention to what goes on at our large banks in the area of cybersecurity, because clearly these institutions are attractive targets for hackers. However, they have sophisticated and well-funded programs in place to address threats, and we devote full-time onsite supervisory resources to monitoring their efforts. Smaller financial institutions don t have the same kind of resources, so they need to take advantage of other options available to them. These options include support from public-private partnerships, such as the Financial Services Information Sharing and Analysis Center or FS-ISAC, as well as the support available from the OCC and other regulators. In that regard, I believe the Federal Financial Institutions Examination Council, or FFIEC, which brings together all of the supervisory agencies, has an important role to play in helping community institutions develop the processes to manage cyber-threats. As chairman of the FFIEC, I called for and the Council members concurred in the creation of the Cybersecurity and Critical Infrastructure Working Group. The working group has been quite active, and was responsible for alerts on the Heartbleed 3
4 and Shellshock vulnerabilities, and statements addressing cyber-attacks on automated teller machines, among other issuances. The FFIEC also sponsored a webinar for community bankers on cyber issues that was very well attended. One important initiative launched this summer by the FFIEC s member agencies was the Cybersecurity Assessment, involving the pilot of a new cybersecurity examination workprogram at more than 500 community institutions. The results were instructive. They will help member agencies make informed decisions about ways to enhance the effectiveness of cybersecurity-related supervisory programs, guidance and examiner training. The findings from the assessment will also help supervisors and bankers alike identify actions that can strengthen the industry s overall level of preparedness and its ability to address the growing level and ever-evolving nature of threats to systems and data. As you may know, the FFIEC released two documents earlier this week: a report containing general observations from the Cybersecurity Assessment, plus a statement encouraging financial institutions to join FS-ISAC. With threats evolving so rapidly, we expect management at every institution we supervise to monitor and maintain sufficient awareness of cybersecurity threats and vulnerabilities. The FS-ISAC is an important resource for institutions to identify, respond to, and mitigate cyber-threats and incidents. Both documents are important, and I would encourage you to give them some attention. The General Observations report highlights some of the key findings from the pilot, and also provides questions we think directors and senior management at community banks and thrifts should be asking. For example, it encourages management to incorporate cyber-incident scenarios into business continuity and disaster recovery 4
5 planning. The report stresses that management should consider how it will respond to a cyber-attack, not just internally, but with customers, third parties, regulators and law enforcement. In addition, the report notes that it s extremely important for management to understand the institution s inherent risk to cyber-threats and vulnerabilities when assessing its state of readiness. In that regard, management should be asking questions about the types of data connections the bank or thrift has with other institutions and third parties, and whether all of those connections are properly managed. This falls under the category of what our cybersecurity-gurus refer to as external dependency management. We want the institutions we supervise to understand the increasing complexity and interconnectedness of the financial system, as well as the importance of maintaining strong controls and carefully monitoring the ways in which they connect to third parties. Complexity and interdependency create opportunities for hackers to gain access to the systems of financial institutions and the third-party vendors that provide services to the industry. Not only do financial institutions need to have good controls over their own systems, they need to monitor carefully the ways in which they connect to vendors, how these contractors manage their systems, and how these vendors connect to still other third parties. Financial institutions also need to be aware of the various ways in which even their own employees may inadvertently create opportunities to compromise systems, by introducing personal (and possibly corrupted) devices into bank networks. In a highly interconnected environment, it can be very difficult to identify and address all of the potential vulnerabilities a bank might face. 5
6 In addition to being interconnected, the networks that serve the financial industry are global, which has additional implications for cybersecurity. Today, the global nature of the Internet means hackers can target bank systems from almost anywhere. That includes countries with regimes that, at a minimum, act as criminal havens by turning a blind eye toward illicit activities, and at their worst, sponsor attacks. As a result, financial institutions today face threats not only from insiders and individuals acting alone, but also from global networks of well-organized nation-states, criminals, and socalled hacktivists. An additional area of concern is third-party relationships. Third-party service providers are important to all financial institutions, but they can be especially important for community banks. While they have important benefits and are in many ways an essential part of business, it can be easy for financial institutions to become overly dependent upon third parties and overly-trusting. But just because these contractors have long client lists and hard-to-duplicate expertise doesn t mean they are infallible. Third-party relationships have been a significant area of concern for years, and not just in the area of cybersecurity. We ve taken serious enforcement actions against some of our large institutions for problems brought on by poorly-managed third-party relationships, from debt collection companies to telemarketers. And last year, we issued an enforcement action against one technology service provider that had been unable to promptly restore service after Superstorm Sandy. One concern that all of us have to be sensitive to in this regard is the access third parties have to large amounts of sensitive bank or customer data. For an industry in which reputation means everything, a single data breach involving confidential customer 6
7 information can be extremely costly. Just think about the reaction to the breaches at Target. Banks are particularly vulnerable to events that erode trust, and once an institution s reputation is damaged, it can take years to repair. In the eyes of the customer, it doesn t really matter whether the breach was occasioned by problems within the bank or thrift itself or by a flaw in a third-party s security. I m not trying to discourage the use of third-party vendors. They provide important services to both large and small banks, and community banks in particular often use outside contractors to leverage expertise and resources that they can t support internally. But we do expect the banks and thrifts we supervise to recognize that thirdparty relationships can pose significant risks, and any institution that supplements its own resources with outside providers needs to have risk management practices in place that are commensurate with that risk. All of these risks are manageable, but they must be well understood and they must be managed. Given the level of interconnectedness and dependency of third parties, a financial institution needs to understand not just its own cybersecurity precautions, but the precautions its vendors take to protect themselves from their third-party relationships. The OCC and the other regulators are playing a role in watching over technology service providers. While we won t go into every provider, we will examine service providers that support a large number of banks and that could, therefore, pose a systemic risk to the financial sector. However, I want to caution everyone that even if we do supervise a service provider, that does not alleviate a bank or thrift of its responsibility to understand and manage risks involved in their third-party relationships. Our supervision 7
8 does not take the place of due diligence or ongoing monitoring commensurate with the level of risk and complexity of the arrangement. Clearly, our expectations as supervisors are high in the area of cybersecurity. But the stakes are high as well. The industry s reputation is at stake, as is the trust that consumers place in their financial institution. Financial institutions of all types and sizes have a lot of work ahead of them. For our part, we at the OCC will do everything we can to support community banks in this effort. 8
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the
For Release Upon Delivery 10:00 a.m., December 10, 2014 TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY Before the COMMITTEE ON BANKING, HOUSING,
Keynote Speech. Beth Dugan Deputy Comptroller for Operational Risk. The Clearing House s First Operational Risk Colloquium
Keynote Speech by Beth Dugan Deputy Comptroller for Operational Risk at The Clearing House s First Operational Risk Colloquium February 11, 2015 Washington, D.C. Thank you. It s an honor to be invited
Remarks by. Carolyn G. DuChene Deputy Comptroller Operational Risk. at the
Remarks by Carolyn G. DuChene Deputy Comptroller Operational Risk at the Bank Safety and Soundness Advisor Community Bank Enterprise Risk Management Seminar Washington, D.C. October 22, 2012 Good afternoon,
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
Information Technology
Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP
2015 CEO & Board University Cybersecurity on the Rise Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
Cybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
THE EVOLUTION OF CYBERSECURITY
THE EVOLUTION OF CYBERSECURITY Identifying Best Practices June 2, 2015 Cerone F. Cy Sturdivant Managing Consultant Nashville, TN 1 TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when
PROPOSED INTERPRETIVE NOTICE
August 28, 2015 Via Federal Express Mr. Christopher J. Kirkpatrick Secretary Office of the Secretariat Commodity Futures Trading Commission Three Lafayette Centre 1155 21st Street, N.W. Washington, DC
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Cyber Security From The Front Lines
Cyber Security From The Front Lines Glenn A Siriano October 2015 Agenda Setting the Context Business Considerations The Path Forward Q&A Cyber Security Context Cyber Has Become a Boardroom Conversation
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
OCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
Who s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
CYBERSECURITY EXAMINATION SWEEP SUMMARY
This Risk Alert provides summary observations from OCIE s examinations of registered broker-dealers and investment advisers, conducted under the Cybersecurity Examination Initiative, announced April 15,
What Directors need to know about Cybersecurity?
What Directors need to know about Cybersecurity? W HAT I S C YBERSECURITY? PRESENTED BY: UTAH BANKERS ASSOCIATION AND JON WALDMAN PARTNER, SENIOR IS CONSULTANT - SBS 1 Contact Information Jon Waldman Partner,
www.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
Ed McMurray, CISA, CISSP, CTGA CoNetrix
Ed McMurray, CISA, CISSP, CTGA CoNetrix AGENDA Introduction Cybersecurity Recent News Regulatory Statements NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Questions Information Security Stats
Cybersecurity Issues for Community Banks
Eastern Massachusetts Compliance Network Cybersecurity Issues for Community Banks Copyright 2014 by K&L Gates LLP. All rights reserved. Sean P. Mahoney [email protected] K&L Gates LLP State Street
Vendor Management. Outsourcing Technology Services
Vendor Management Outsourcing Technology Services Objectives Board and Senior Management Responsibilities Risk Management Program Risk Assessment Service Provider Selection Contracts Ongoing Monitoring
FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB 2014-05. Cyber Risk Management Guidance. Purpose
FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB 2014-05 Cyber Risk Management Guidance Purpose This advisory bulletin provides Federal Housing Finance Agency (FHFA) guidance on cyber risk management.
the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group
the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group 54 Banking PersPective Quarter 2, 2014 Responsibility for the oversight of information security and
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:
Testimony of Doug Johnson On behalf of the New York Bankers Association before the New York State Senate Joint Public Hearing: Cybersecurity: Defending New York from Cyber Attacks November 18, 2013 Testimony
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world
CYBERSECURITY HOT TOPICS
1 CYBERSECURITY HOT TOPICS Secure Banking Solutions 2 Presenter Chad Knutson VP SBS Institute Senior Information Security Consultant Masters in Information Assurance CISSP, CISA, CRISC www.protectmybank.com
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July 2014)
Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Financial Institution Letter FIL-127-2008 November 7, 2008 GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July
Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks?
Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks? August 27, 2014 Presented by: Terry Ammons, Partner, Porter Keadle Moore Tim Davis, Senior,
Lessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
NIST Cybersecurity Framework & A Tale of Two Criticalities
NIST Cybersecurity Framework & A Tale of Two Criticalities Vendor Management & Incident Response Presented by: John H Rogers, CISSP Advisory Services Practice Manager [email protected] Presented
Answering your cybersecurity questions The need for continued action
www.pwc.com/cybersecurity Answering your cybersecurity questions The need for continued action January 2014 Boards and executives keeping a sustained focus on cybersecurity do more than protect the business:
Aftermath of a Data Breach Study
Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Who s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
ACE European Risk Briefing 2012
#5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs
Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
A Cautionary Tale Plus Cross-Channel Risk
Dan Tobin A Cautionary Tale Plus Cross-Channel Risk IT Examiner Supervision, Regulation & Credit [email protected] Agenda A Cautionary Tale Shames-Yeakel v. Citizens Financial Bank Cross-Channel Risk
New York State Department of Financial Services. Report on Cyber Security in the Banking Sector
New York State Department of Financial Services Report on Cyber Security in the Banking Sector Governor Andrew M. Cuomo Superintendent Benjamin M. Lawsky May 2014 I. Introduction Cyber attacks against
1. promoting an efficient and effective financial system that adequately finances economic growth, and
Remarks by Ms. Phillips at the Asset/Liability and Treasury Management Conference of the Bank Administration Institute Remarks by Ms. Susan M. Phillips, a member of the Board of Governors of the US Federal
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
Remarks by. Thomas J. Curry Comptroller of the Currency. Before the. Exchequer Club October 21, 2015
Remarks by Thomas J. Curry Comptroller of the Currency Before the Exchequer Club October 21, 2015 Thank you, it s a pleasure to be here with you today, although perhaps I should say, it s a pleasure to
SafeBiz. Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB)
SafeBiz Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB) 1 About Us Since 2003 we have helped victims of identity theft recover fully from this devastating crime, and continue
Cybersecurity Awareness for Executives
SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
INFOCUS. Five Questions to Guide Cybersecurity Risk Management BY EARL CRANE
promontory.com INFOCUS JUNE 3, 2015 BY EARL CRANE Five Questions to Guide Cybersecurity Risk Management The quick transformation of cybersecurity risk management from obscure specialty to top-of-thehouse
Identifying and Managing Third Party Data Security Risk
Identifying and Managing Third Party Data Security Risk Legal Counsel to the Financial Services Industry Digital Commerce & Payments Series Webinar April 29, 2015 1 Introduction & Overview Today s discussion:
FINAL // FOR OFFICIAL USE ONLY. William Noonan
FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States
The 7 Disaster Planning Essentials
The 7 Disaster Planning Essentials For Any Small Business Little-Known Facts, Mistakes And Blunders About Data Backup And IT Disaster Recovery Every Business Owner Must Know To Avoid Losing Everything
Testimony of John W. Carlson on behalf of the. The Financial Services Information Sharing & Analysis Center (FS-ISAC)
Testimony of John W. Carlson on behalf of the The Financial Services Information Sharing & Analysis Center (FS-ISAC) Before the U.S. House of Representatives Committee on Financial Services June 24, 2015
OCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015
Cyber Security Auditing for Credit Unions ACUIA Fall Meeting October 7-9, 2015 Topics Introduction Cyber Security Auditing Program Discuss an effective and compliant Cyber Security Auditing Program from
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
FINRA E-Learning Courses
FINRA E-Learning Courses The Definitive Source for Firm Element Training FINRA develops a wide range of e-learning courses for registered representatives, supervisors, operations staff, compliance personnel
Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks
Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks July 2014 Cyber Threat Intelligence and Incident Coordination Center: Protecting
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
Board Portal Security: How to keep one step ahead in an ever-evolving game
Board Portal Security: How to keep one step ahead in an ever-evolving game The views and opinions expressed in this paper are those of the author and do not necessarily reflect the official policy or position
