Information Technology



Similar documents
Vendor Management. Outsourcing Technology Services

Instructions for Completing the Information Technology Officer s Questionnaire

GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July 2014)

Information Technology. A Current Perspective on Risk Management

Payment Processor Relationships Revised Guidance

INFORMATION TECHNOLOGY OFFICER S QUESTIONNAIRE. Instructions for Completing the Information Technology Examination Officer s Questionnaire

Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.

Identifying and Managing Third Party Data Security Risk

9/13/ /20 Vision for Vendor Management & Oversight. Disclaimer. Bank Service Company Act - FIL-49-99

FFIEC Cybersecurity Assessment Tool

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

ICBA Summary of FFIEC Cybersecurity Assessment Tool

Board Responsibility. A bank can outsource a task, but it cannot outsource the responsibility.

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

FDIC Updates Guidance on Payment Processor Relationships

A Cautionary Tale Plus Cross-Channel Risk

What Directors need to know about Cybersecurity?

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

Sound Practices for the Management of Operational Risk

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Risk Management of Remote Deposit Capture

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Appendix J: Strengthening the Resilience of Outsourced Technology Services

Click to edit Master title style

Operational Risk Management Policy

Risk Management of Outsourced Technology Services. November 28, 2000

Cybersecurity: What CFO s Need to Know

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015

Any business relationship between a bank and another entity, by contract or otherwise

Enterprise Risk Management Process Improvement. Secure Banking Solutions, LLC

Cybersecurity The role of Internal Audit

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

External Supplier Control Requirements

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Cybersecurity. WBA Bank Executives Conference February 2 4, 2015 Milwaukee, WI

Morgan Stanley. Policy for the Management of Third Party Residential Mortgage Servicing Providers

Vendor Risk Management Financial Organizations

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014

Cybersecurity. Are you prepared?

Pursuing Compliance with the FFIEC Guidance Risk Assessment 101 KPMG RISK ADVISORY SERVICES

Outsourcing Technology Services A Management Decision

Board of Directors Meeting 12/04/2010. Operational Risk Management Charter

White Paper on Financial Institution Vendor Management

Advisory Guidelines of the Financial Supervisory Authority. Requirements regarding the arrangement of operational risk management

RESERVE BANK OF VANUATU OPERATIONAL RISK MANAGEMENT

O OCC BULLETIN OCC Automated Clearing House Activities. Risk Management Guidance

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management

PCI Compliance: Protection Against Data Breaches

Attachment A. Identification of Risks/Cybersecurity Governance

GUIDANCE FOR MANAGING THIRD-PARTY RISK

Subject: Safety and Soundness Standards for Information

The PNC Financial Services Group, Inc. Business Continuity Program

TABLE OF CONTENTS INTRODUCTION... 1

FFIEC CONSUMER GUIDANCE

Identifying Key Risk Indicator

Supplement to Authentication in an Internet Banking Environment

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Interagency Guidelines Establishing Information Security Standards. Small-Entity Compliance Guide

Statement of Guidance: Outsourcing All Regulated Entities

Vendor Management Best Practices

VENDORINSIGHTU P D A T E

TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

Vendor Risk Management in the New Regulatory Environment. kpmg.com

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

Board of Directors and Senior Management 2. Audit Management 4. Internal IT Audit Staff 5. Operating Management 5. External Auditors 5.

Consultative report. Committee on Payment and Settlement Systems. Board of the International Organization of Securities Commissions

Vendor Management Compliance Top 10 Things Regulators Expect

How To Assess A Critical Service Provider

Practical and ethical considerations on the use of cloud computing in accounting

The PNC Financial Services Group, Inc. Business Continuity Program

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012

THE EVOLUTION OF CYBERSECURITY

National Check Payments Certification. Fraud, Risk, and Risk Mitigation Part II. Copyright 2015 by the Electronic Check Clearing House Organization

Technology Risk Management

Remarks by. Carolyn G. DuChene Deputy Comptroller Operational Risk. at the

Transcription:

Information Technology

Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources

Compensating Controls at the Directorate Level IT governance Board of Directors Committee of the Board of Directors o IT Committee o IT Steering Committee o Audit Committee Strategic plan Consistent direction Management skills

Compensating Controls at the Directorate Level (cont.) Risk assessment Assess applicable threats, their likelihood and impacts, and mitigating controls Identify any additional mitigating actions that may be necessary o Support for IT initiative

Compensating Controls at the Directorate Level (cont.) Policies Information security programs Identity theft prevention programs Incident response plans Business continuity Vendor management programs Acquisition and programming standards Configuration management standards and patch management programs Wire transfer and Automated Clearing House policies

Compensating Controls at the Directorate Level (cont.) IT Audit Programs IT-related policies and standards (i.e., business continuity, information security, vendor management, wire transfer and automated clearing house activities) IT general control reviews Internal and external vulnerability assessments Penetration tests Audit and regulatory exception tracking tools Exceptions receive proper attention

Compensating Controls at the Directorate Level (cont.) Board Reports Information security programs and identity theft prevention programs (required at least annually) Initial and ongoing service provider reviews o Service provider relationships: financial statement reviews, audit findings, business continuity test results, and regulatory examination report findings

Significant and Emerging IT-Related Risk Considerations Third-party payment processor relationships (payment processors) Corporate account takeovers (account takeovers) Distributed denial of service attacks Outsourcing

Payment Processors Due diligence, close monitoring, and prudent underwriting Risk assessment Policies and procedures (including agreements and contracts) for due diligence, underwriting, and monitoring Consumer complaints or unusual automated clearing house return rates Response programs

Payment Processors Board Considerations Strategic Is the relationship consistent with the bank s strategic objectives? Are payment processors, its clients, and their industries representative of the bank s market and areas of expertise? How will the Board ensure that the processor will comply with credit risk, account security, service availability, audit, and reporting policies?

Payment Processors Board Considerations Risk Assessment Has the Board ensured management has considered the risks within the risk assessment? How will those risks, such as merchant data breaches, fraud, and credit and reputational risk, be mitigated? Policy and Procedure Have policies and procedures been revised to account for the responsibilities and mitigating controls applicable for payment processor relationships? Has the Board ensured adequate legal review over agreements and contracts?

Payment Processors Board Considerations (cont.) Audit Does the bank retain the right to audit payment processors? Does the scope of the audit programs address payment processor risks? Reporting What reports will the Board receive to monitor payment processor activities and conformance with approved risk tolerances?

Account Takeovers Board Considerations Strategic Are there adequate management capabilities to mitigate this risk or does the bank need to outsource? Risk Assessment How has the information security risk assessment been updated to reflect emerging risks from account takeover activities? What additional control structures have been implemented to mitigate these risks? Policy and Procedure How have the bank s policies and procedures been revised to prevent, detect, and respond to account takeovers?

Account Takeovers Board Considerations (cont.) Audit How do the bank s Internet banking, wire transfer, and Automated Clearing House audits assess the bank s programs for preventing, detecting, and responding to account takeover activity? Is the frequency of such audits consistent with the inherently high-risk nature of electronic funds transfer activity? Reporting What mechanisms are in place to keep the Board apprised of account takeover activity?

Distributed Denial of Service Attacks Designed to disrupt banking services Could slow or interrupt a bank's access to external on-line applications Typically do not affect safety of customer accounts

Distributed Denial of Service Attacks Board Considerations Risk Assessment Has the information security risk assessment been updated to reflect the changing threat scenario of such attacks? What additional actions have the Board facilitated to mitigate these threats? Policy and Procedure Have the bank s policies and procedures (particularly incident response plans) been revised to respond to distributed denial of service attacks? Audit Do business continuity or incident response audits assess the bank s readiness for distributed denial of service attacks? Reporting What mechanisms are in place to keep the Board apprised of these events?

Outsourcing Banks retain partial or full ownership of several key risks Types of risks may include: Operational Transactional Strategic Legal Regulatory Reputational Financial

Outsourcing Board Considerations Strategic Are outsourcing arrangements consistent with the bank s strategic objectives? Are agreements in place to ensure service providers share sufficient information to oversee such relationships and meet strategic objectives for information security? Risk Assessment Are all significant vendor and outsourcing relationships (by platform and location) accounted for in the information security risk assessment? What residual risks will the bank retain? What can be done to further reduce this level of risk?

Outsourcing Board Considerations (cont.) Policy and Procedure Do vendor management programs extend to all significant service providers, platforms and locations? Audit Do service providers provide routine audits of the platforms and locations that support the bank s outsourcing arrangements? Has the Board received and reviewed IT reports of examination for the platforms and locations of its service providers?

Outsourcing Board Considerations (cont.) Reporting What reports will the Board receive to ensure that bank management has executed proper oversight of vendors and service providers? How frequently will they be provided?

Summary Board and committee oversight Strategic plans Risk assessments Policies and procedures Audits Reports

Resources Payment Processors Revised Guidance on Payment Processor Relationships (FIL-3-2012) Managing Risks in Third-Party Payment Processor Relationships, Summer 2011 Supervisory Insights Journal article Account Takeovers FFIEC Supplement to Authentication in an Internet Banking Environment (FIL- 50-2011) FFIEC Guidance: Authentication in an Internet Banking Environment (FIL-103-2005) Distributed Denial of Service Attacks Understanding Distributed Denial of Service Attacks:

Resources (cont.) Technical assistance from federal agencies specializing in cyber security Outsourcing Foreign-Based Third-Party Service Providers Guidance on Managing Risks in These Outsourcing Relationships (FIL-52-2006) New Guidance for Examiners, Financial Institutions and Technology Service Providers on Management and Outsourcing Technology Services (FIL-89-2004) Bank Technology Bulletin on Outsourcing (FIL-50-2001) FFIEC IT Examination Handbook Outsourcing Technology Services Booklet

Resources (cont.) Additional Videos Directors Resource Center: http://www.fdic.gov/regulations/resources/index.html Mailbox: supervision@fdic.gov