OCIE Technology Controls Program



Similar documents
CYBERSECURITY EXAMINATION SWEEP SUMMARY

OCIE CYBERSECURITY INITIATIVE

Attachment A. Identification of Risks/Cybersecurity Governance

SEC Cybersecurity Findings May Establish De Facto Standard

Cybersecurity Awareness. Part 1

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Who s Doing the Hacking?

Cybercrime and Regulatory Priorities for Cybersecurity

Client Update SEC Releases Updated Cybersecurity Examination Guidelines

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Cybersecurity and the Threat to Your Company

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO

White Paper on Financial Industry Regulatory Climate

Cyber Security. Moderator: Marla J. Kreindler, Partner, Morgan, Lewis & Bockius LLP

Cybersecurity Workshop

What is Management Responsible For?

Cybersecurity Risks, Regulation, Remorse, and Ruin

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the

THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK

Cybersecurity The role of Internal Audit

Cybersecurity and Privacy Hot Topics 2015

September 20, 2013 Senior IT Examiner Gene Lilienthal

Cybersecurity Issues for Community Banks

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

PACB One-Day Cybersecurity Workshop

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Security Practices for Online Collaboration and Social Media

Cybersecurity..Is your PE Firm Ready? October 30, 2014

Collateral Effects of Cyberwar

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

WRITTEN TESTIMONY OF

Cybersecurity For Brokers: 'Only The Paranoid Survive'

Cybersecurity Awareness

Cybersecurity: What CFO s Need to Know

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Cybersecurity. Regional and Community Banks. Inherent Risks and Preparedness.

Secure by design: taking a strategic approach to cybersecurity

Italy. EY s Global Information Security Survey 2013

CYBERSECURITY HOT TOPICS

How To Protect Your Cybersecurity From Cyber Incidents

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Preventing, Insuring, and Surviving Fund Transfer Fraud... and Other Cyber Attacks

Into the cybersecurity breach

CYBERSECURITY INVESTIGATIONS

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

I N T E L L I G E N C E A S S E S S M E N T

Risk Management in Global Operating Industry

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Promoting a cyber security culture and demand compliance with minimum security standards;

PROPOSED INTERPRETIVE NOTICE

The Protection Mission a constant endeavor

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

NATIONAL CYBER SECURITY AWARENESS MONTH

IIABSC Spring Conference

Information Technology Security Review April 16, 2012

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

DFLIVERY VIA SECURE

Middle Class Economics: Cybersecurity Updated August 7, 2015

Cybersecurity and internal audit. August 15, 2014

Cyber Security - What Would a Breach Really Mean for your Business?

Developing National Frameworks & Engaging the Private Sector

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

FFIEC Cybersecurity Assessment Tool

THE CHANGING FACE OF CYBERCRIME AND WHAT IT MEANS FOR BANKS

Internet threats: steps to security for your small business

Cyber Security Risks for Banking Institutions.

Cybersecurity. Are you prepared?

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

State of Security Survey GLOBAL FINDINGS

Enterprise PrivaProtector 9.0

FERPA: Data & Transport Security Best Practices

Questions You Should be Asking NOW to Protect Your Business!

UNITED STATES OF AMERICA Before the SECURITIES AND EXCHANGE COMMISSION

Is the PCI Data Security Standard Enough?

Managing cyber risks with insurance

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Current Developments Concerning Cybersecurity. ICI General Membership Meeting Legal Forum Jillian Bosmann and Nancy O Hara Thursday, May 19, 2016

PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS

EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS

Global State of Information Security Survey 2015

Cyber-security: legal implications for financial institutions. IAPP Europe Data Protection Intensive 2013

A Guide to Benedictine College and Identity Theft

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Statement of Qualifications Cybercrime & data breach

Legislative Language

10 Smart Ideas for. Keeping Data Safe. From Hackers

Top Fraud Trends Facing Financial Institutions

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Transcription:

OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546

Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview Threat Actors Attacks that Impact the Markets Cybersecurity Industry Trends Exam Insights Industry Considerations and Best Practices 2

Chris Hetner with the SEC- the Cybersecurity Lead of the Technology Controls Program in OCIE The Securities and Exchange Commission, as a matter of policy, disclaims responsibility for any private publication or statement by any of its employees. The views expressed herein are those of the author and do not necessarily reflect the views of the Commission or of the author s colleagues upon the staff of the Commission. 20 years cybersecurity experience building and leading global program @ EY (Practice Lead), GE Capital (CISO), and Citi (Programs and Ops) Topics to be covered Cybersecurity program overview Summary of key attacks, risks and trends impacting the market Best practices to minimize risk of cybersecurity 3

Vision for the cybersecurity program is to shift the threat actors attention and efforts away from the securities market by making the securities market an uninviting and hardened-security target. The goal is to establish a cybersecurity framework across the market, inform policy within the SEC and achieve a level of consistency by driving education, awareness and outreach. Newly created cybersecurity lead role is focused on providing leadership and support for cybersecurity matters across the national examination program within the SEC, particularly in the Technology Controls Program. 4

Threat Actors Attributes Nation States National governments seek to sabotage deals Protect and enhance the interest of local companies and industry Prevalent in deals involving assets or industries to be of strategic importance. Organized Crime See cyber-crime as a low risk/high return activity Profit driven entities Crime-as-a-Service emerging as a capability Hacktivism Politically motivated attacks Represent one of the most influential and powerful in cyberspace Launch attacks in retaliation to perceived injustices Insider Threat Insiders with trusted and privileged access Act with a lack of care whose errors increase compromise Applies to contractors and employees Attack methods are similar. Motivation, Sophistication and Impact vary. 5

Attack Method Social Engineering Impact of Attack Social engineering attacks on wealth advisers and brokers in which the client is spoofed and the adviser/broker is tricked into sending funds belong to the client. Ransomware Stock Market Manipulation Destructive Malware Crypto Locker which is a form a ransomware that encrypts files and programs across a suite of computers. Therefore disabling trade operations. Stock market manipulation is a growth area for criminals who hack into companies looking for information (new products or merger plans) that could affect a company's stock price, and then use this information to profit from trading. Destructive Malware such as Wiper and Shamoon can permanently destroy data (books and records) that supports a Broker Dealer. Therefore severely impacting a firm s ability to continue operating. 6

Trend Description Specific Purpose Malware Customizes attacks for the purpose of stealing specific information or manipulating business processes Common Targets- Investment Strategies, Intellectual Property, Account Numbers, SSNs, Executing Wire Transfers Spear Phishing Email that appears to be legitimate customized to target high profile and individuals with privileged access to systems and data Information about the target is garnered using various sourced (i.e. Facebook, LinkedIn, Associations) Account Takeovers Exploit a Customer's Account and, In Many Instances, to Gain Seemingly Legitimate Access to Another Customer's Account. Impact of an Attack Once firm experiences a cyber attack and suffers a loss it can take up to several months to remediate In Many Cases Real Harm Does Not Come From the Cyber-attack Itself.Rather It Comes from the Downstream Effect of Having to Inform the Customers/Investors i.e. The Reputational Damage is Potentially Irreversible and More So When Confidential Information/Data Now Resides Beyond the Control of the Organization! 7

Firms were generally very responsive Vast majority of firms have implemented some form of information security policy 87%/majority of the examined firms reported that they have been the subject of a cyber-related incident Around half of the firms require an audit of vendors who have access to their network The designation of a CISO varied by firms business model. Majority of BD firms designate a CISO while advisors direct their CTO to take on responsibility Over half of the firms received fraudulent emails, purportedly from customers, seeking to direct transfers of customer funds or securities 8

I believe an important goal for the industry is to identify and prioritize cyber risk mitigation tactics. Cybersecurity must be engrained into the firms culture. Cybersecurity is more than a technology risk; it is a business risk and it must permeate the enterprise risk management process. Industry must take it upon itself to make the right investments that address cybersecurity risk. 9

Governance and Risk Management Risk Management Integration Governance and Board/C level Policy, Strategic Planning and Organization Management Program Management and Workforce Planning Operational Capabilities Identity, Access and Data Protection Controls Cyber Intelligence and Incident Response Cyber Threat Monitoring and Vulnerability Management Third Party Risk Management Business Integration IT Asset Management and Data Classification Security Architecture Legal and Compliance Management Training and Awareness 10

Azam A. Riaz, CAIA, CRCP, CFE June 18, 2015

The Securities and Exchange Commission, as a matter of policy, disclaims responsibility for any private publication or statement by any of its employees. The views expressed herein are those of the author and do not necessarily reflect the views of the Commission or of the author s colleagues upon the staff of the Commission.

2014 Examination Priorities 2015 Examination Priorities

To assess cybersecurity preparedness in the securities industry and to obtain information about the industry s recent experiences with certain types of cyber threats

The entity s cybersecurity governance, Identification and assessment of cybersecurity risks, Protection of networks and information, risks associated with remote customer access and funds transfer requests, Risks associated with vendors and other third parties, Detection of unauthorized activity, and Experiences with certain cybersecurity threats.

57 Broker-dealers 49 Investment Advisers

By Number of Registered Representatives (RR) 12.30% 12.30% 12.30% 22.80% 0-50 RR 51-200 RR 200-500 RR 501-2000 RR 28% 12.30% 2001-5000 RR 5000+ RR

14% Category 2% 10% 7% 7% 37% 9% 9% 5% Clearing Institutional Online Services Retail Brokerage Foreign-Affiliated Insurance Co. Affiliated Proprietary or Direct Market Access Small Diversified US Bank Affiliated

By Assets Under Management 36.70% 36.70% Less than $400 Million AUM $401-900 Million AUM $900 Million+ AUM 26.50%

Types of Clients 2% 4.10% 12.20% Diversified/Instituti 14.30% onal Pension 67.30% Private Funds

by Custody 33% Have Custody 67% Do Not have Custody

Business and operations; Detection and impact of cyber-attacks; Preparedness for cyber-attacks; Training and policies relevant to cybersecurity; and Protocol for reporting cyber breaches.

CYBERSECURITY INITIATIVE

Objective Broker-Dealers Investment Advisers Adopted written information security policies Policies address impact of cyber-attacks or intrusions Policies address responsibility for client losses in cyber incidents Security guarantees to protect clients against cyber-related losses Use external standards and other resources to model information security architecture and processes 93% 83% 82% 51% 30% 13% 15% 9% 88% 53%

Objective Broker-Dealers Investment Advisers Conduct periodic risk assessments on a firm wide basis to identify threats, vulnerabilities, and potential business consequences Require cybersecurity risk assessments of vendors with access to firms networks 93% 79% 84% 32%

Objective Broker-Dealer Investment Adviser Most examined firms reported being subject of a cyber-related incident Received fraudulent emails related to transfer of client funds Losses exceeding $5,000 Losses exceeding $75,000 Employees did not follow identity authentication procedures 88% 74% 54% 43% 26% due to fraudulent emails No broker-dealers had losses over $75,000 Yes for 25% of brokerdealers that had losses due to fraudulent emails 1 adviser (See next row) One adviser had losses exceeding $75,000 Yes for the one adviser that had losses exceeding $75,000 Reported to FinCEN 65% 1 adviser (aforementioned) reported to FinCEN Reported to another Regulator or Law Enforcement 7% Advisers generally did not report incidents to a regulator or law enforcement.

Almost half of the broker-dealers (47%) were members of industry groups, associations, or organizations (both formal and informal) that exist for the purpose of sharing information regarding cybersecurity attacks and identifying effective controls to mitigate harm. Many of the broker-dealers identified the Financial Services Information Sharing and Analysis Center ( FS-ISAC ) as adding significant value in this effort. While a few of the advisers also identified FS-ISAC as a resource, advisers more frequently relied on discussions with industry peers, attendance at conferences, and independent research to identify cybersecurity practices relevant to their business and learn about latest guidance from regulators, government agencies, and industry groups.

Objective Broker-Dealers Investment Advisers Physical devices and systems Software platforms and applications Network resources, connections and data flows Connections to firm networks from external resources Hardware, data and software Logging capabilities and practices 96% 92% 91% 92% 97% 81% 91% 74% 93% 60% 95% 68%

Objective Broker-Dealers Investment Advisers Incorporate requirements related to cybersecurity risk in contracts Policies and Procedures related to security training for vendors and business partners authorized to access their networks 72% 24% 51% 13%

Objective Broker-Dealers Investment Advisers Use of encryption 98% 91% Provide clients steps that can be taken to reduce cybersecurity risks when conducting business with the firm on website or email Designation of Chief Information Security Officer (CISO) Cybersecurity Insurance 65% 75% of the 26% of advisers that primarily advise retail clients and permit those clients to access their account information online 68% 30% CISO; Mostly taken up by CTO, CCO, CEO, COO 58% (1 filed claim) 21% (1 filed claim)

The staff is still reviewing the information to discern correlations between the examined firms preparedness and controls and their size, complexity, or other characteristics. As noted in OCIE s 2015 priorities, OCIE will continue to focus on cybersecurity using risk-based examinations.

Registered advisers must comply with the Identity Theft Red Flags Rule. The final rule release states that even advisers who do not accept physical custody of their clients accounts may be subject to the new rule if they can direct transfers or payments to third parties from a client s account or if they act as agents on behalf of individual clients. So if an adviser facilitates or directs bill payments for its clients or otherwise acts as their agent for financial purposes, the rule will likely apply.

Advisers falling within the rule must establish an identity theft program. The program must: Be in writing. Be approved by the board, an appropriate board committee, or senior management if the adviser has no board. Provide on-going oversight of the program by Board of Directors, an appropriate committee thereof or a designated senior management employee. Annual report suggested. Establish policies and procedures. o To identify any identity theft red flags. o To detect red flags. o To respond to red flags in a way to prevent and mitigate identity theft. o To update the program periodically to reflect changes in risk.

Guidelines in the appendix of the final rule include a number of examples of red flags, such as inconsistencies in personal identifying information, incomplete account opening information and changes in account usage. Provide training for employees. Provide oversight of service providers if the adviser has outsourced compliance. Adviser is ultimately responsible for compliance. Consider Guidelines for the program offered in appendix to the rule.

Adviser maintained signed Letters of Authorization ( LOA ) One client s email account was hacked requesting wire transfers to a foreign account The third-party fraud was not discovered until three separate wires totaling $290,000 had been sent to the foreign bank. Adviser censured and fined a civil penalty of $250,000

Azam A. Riaz Staff Accountant US Securities & Exchange Commission Brookfield Place, 200 Vesey Street, Suite 400 New York, NY 10281 (212) 336-0547 riaza@sec.gov