Managing the Operational Risk of Our Bank



Similar documents
Cybersecurity Governance Update: New FFIEC Requirements cliftonlarsonallen.com

Cybersecurity Governance Update on New FFIEC Requirements

Current Trends in Cyber Crime & Payments Fraud cliftonlarsonallen.com

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Payment Fraud Trends

IT Security Risks & Trends

THE CHANGING FACE OF CYBERCRIME AND WHAT IT MEANS FOR BANKS

Presented By: Corporate Security Information Security Treasury Management

Cybersecurity Workshop

Cybersecurity: What CFO s Need to Know

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Questions You Should be Asking NOW to Protect Your Business!

Data Breach Response Planning: Laying the Right Foundation

What is Management Responsible For?

Cybersecurity Awareness. Part 1

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Cybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015

ICBA Summary of FFIEC Cybersecurity Assessment Tool

CYBERSECURITY HOT TOPICS

How-To Guide: Cyber Security. Content Provided by

September 20, 2013 Senior IT Examiner Gene Lilienthal

Cybersecurity: Emerging Legal Risks

PACB One-Day Cybersecurity Workshop

FFIEC Cybersecurity Assessment Tool

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

What Directors need to know about Cybersecurity?

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Keynote Speech. Beth Dugan Deputy Comptroller for Operational Risk. The Clearing House s First Operational Risk Colloquium

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014

Cybersecurity. Are you prepared?

Summary of the State of Security

Cybersecurity. Regional and Community Banks. Inherent Risks and Preparedness.

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

How To Protect Your Online Banking From Fraud

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP

Cybersecurity: Protecting Your Business. March 11, 2015

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Five Trends to Track in E-Commerce Fraud

Get on First Base with your Regulators and Cyber Security

TMCEC CYBER SECURITY TRAINING

Top Fraud Trends Facing Financial Institutions

Cyber Security. John Leek Chief Strategist

Don t Fall Victim to Cybercrime:

Click to edit Master title style

Information Technology

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

FFIEC CONSUMER GUIDANCE

Cybersecurity A Clear and Present Danger

Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks?

Cyber Security An Exercise in Predicting the Future

10 Smart Ideas for. Keeping Data Safe. From Hackers

The Evolution of Data Breaches

CYBERSECURITY & EXPECTATIONS FOR INDEPENDENT GROCERS

I ve been breached! Now what?

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Small Business Cybersecurity Dos and Don ts. Helping Businesses Grow and Succeed For Over 30 Years. September 25, 2015 Dover Downs

Logging In: Auditing Cybersecurity in an Unsecure World

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Retail/Consumer Client. Internet Banking Awareness and Education Program

NATIONAL CYBER SECURITY AWARENESS MONTH

ACI Response to FFIEC Guidance

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

Cyber Liability Insurance: It May Surprise You

Government Crime Prevention Regulations. Richard Fraher VP & Counsel to the Retail Payments Office Federal Reserve Bank of Atlanta

SECURITY CONSIDERATIONS FOR LAW FIRMS

Get in the Groove with the Regulatory Jazz: Cyber Security and Vendor Management Examinations from the Regulators and Auditors Perspective

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

Cybercrime and Regulatory Priorities for Cybersecurity

Are All High-Risk Transactions Created Equal?

Online Banking Risks efraud: Hands off my Account!

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Defending Against Data Beaches: Internal Controls for Cybersecurity

Are You A Sitting Duck?

Visa CREDIT Card General Guidelines

Mobile Deposit Policy

How To Improve Your Cyber Security

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

CYBER EXPOSURES OF SMALL AND MIDSIZE BUSINESSES A DIGITAL PANDEMIC. October Sponsored by:

Data Breaches and Cyber Risks

National Cybersecurity Awareness Campaign

Cyber Self Assessment

Cybersecurity and Other IT Related Focus Areas. Francis Tam, Partner

CYBER SECURITY THREAT REPORT Q1

How To Protect Yourself From A Hacker Attack

SMALL BUSINESS PRESENTATION

White Paper on Financial Industry Regulatory Climate

Business Case. for an. Information Security Awareness Program

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Presented by: Mike Morris and Jim Rumph

Franchise Data Compromise Trends and Cardholder. December, 2010

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

IBM Security Strategy

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

東 京 電 機 大 学 国 際 化 サイバーセキュリティ 学 特 別 コース. Cyber Security in the Financial Sector

Information Security Addressing Your Advanced Threats

Information Security for the Rest of Us

Transcription:

Managing the Operational Risk of Our Bank 1

Managing Operational Risk Has your organizational leadership ever made any of the following comments? The Board wants us to focus on risk management since we ve received unfavorable ratings. I don t see why we need to address cybersecurity in our business contingency plan. We can put together a risk assessment after we select the new vendor/product. We have a Strategic Plan, what do you mean we need a technology plan? If you re silently saying Yes to these questions, your organization likely needs to address the management of your bank s operational risk. 2

Managing Operational Risk The first step to better risk management is acknowledging the reality and existence of operational risks. Eliminate uncertainty that it can t or won t happen, because it can and it might! No institution is immune to the effects of industry risks and regulatory pressure. 3

Managing Operational Risk 4

Managing Operational Risk Operational Risk - Is the risk of loss resulting from inadequate or failed internal processes, people and systems, or from external events. Operational Risk Certainties: Fundamentally different from all other risks, it s embedded in every activity and product of an institution, and is harder to measure, model, and eliminate than conventional risks. Becoming a larger portion of the overall risk pie According to a recent OCC review of examined banks, operational risk has overtaken credit risk as the most important risk type. A prerequisite for strong performance 5

Managing Operational Risk Operational Risk Categories: Internal Fraud External Fraud Employment Practices and Workplace Safety Clients, Products, and Business Factors Damage to Physical Assets Business Disruption and System Failures Execution, Delivery, and Process Management 6

Managing Operational Risk Importance has grown as Banks operational environments face increased challenges: The combination of evolving cyber threats and newly identified information technology vulnerabilities More sophisticated and proficient attacks compromising employee, third party, and system credentials to gain access, install malicious software, steal sensitive information, and operate inside systems for extended periods without detection Breaches at nonfinancial firms directly and indirectly impacting costs to banks Shifts in the business models and renewed global market volatility Changes in consumer behavior coupled with a significant focus on consumer protection 7

Managing Operational Risk Some emerging risks to consider Shifts in Business Models Third Party Relationships Bring Your Own Device (BYOD) Cybersecurity and Data Protection Expansion into Growth Markets New Product Innovation 8

Shifts in Business Models Business models are under increasing pressure as bankers seek to launch new products, use IT automation, reduce staffing, and reengineer business processes Changing business strategy can involve the bundling of products and services, or new bank roles as agent between consumers and merchants Competition from nonbank entities that are expanding into traditional banking areas 9

Third Party Relationships The bank should focus on all phases of risk management, including planning, due diligence, internal controls, reporting, contract negotiations, and ongoing monitoring before partnering with a vendor 10

Cybersecurity and Data Protection In Nov. 2014, the FFIEC released the results from their cybersecurity examinations which included 500 community financial institutions: Examined Bank: reviewed inherent risk associated with multiple points of entry including: VPNs, wireless networks, & bring your own device. Finding: insufficient focus on the interconnectedness of cyber risk Recommendation: strengthen the first line of defense, increase third party reviews, and board communications Result: Increased regulatory scrutiny and expectations extending beyond the IT dept. 11

Cybersecurity and Data Proection Maintain heightened awareness and appropriate resources to identify and mitigate cyber threats and vulnerabilities, and incorporate cyberresilience planning and controls into their business continuity planning and testing 12

Themes Hackers have monetized their activity More hacking More handson effort More sophistication Hackers targeting business customers Smaller organizations targeted Social engineering on the rise Email SaaS, webbased malware, DDoS protection 13

Three Largest Cyber Fraud Trends Organized Crime Wholesale theft of personal financial information CATO Corporate Account Takeover Use of online credentials for ACH, CC and wire fraud Ransomware Your data held for ransom 14 14

Thefts of PFI Target Sally Beauty Community Health Systems Dairy Queen Home Depot Neiman Marcus Harbor Freight University of Maryland Goodwill Jimmy Johns Olmsted Medical Center University of Indiana 15 15

Stolen Card Data Carder or Carding websites Dumps vs CVV s A peek inside a carding operation: http://krebsonsecurity.com/2014/06/peek inside a professional carding shop/ 16 16

Credit Card Data For Sale 17 17

What is Corporate Account Takeover Fraud? Corporate Account Takeover (CATO) fraud is: A form of corporate identity theft whereby cyber thieves gain control of a business s bank account by stealing employee passwords and other valid credentials. (Iowa Division of Banking CATO guidance) Transactional electronic banking services moving money in or out of the bank Bill pay Online ACH origination Online wire transfer initiation Remote Deposit Capture/Mobile Deposit Capture A2A/B2B/B2P 18

Cyber Crime Risks and Prevention Strategies Cyber Crime Corporate Account Takeover Fraud 60 percent of small businesses will close within six months of a cyber security attack. National Cyber Security Alliance 19

Mitigation Themes Employees who are aware and savvy soc test Networks resistant to malware DiD strategy Relationships with vendors validated & risk assessed Business customers use of online tools maximized 20

Risk Mitigation for Online Banking Limit administrative control on banking acct Do NOT use master account to perform standard banking activities Create segregation of duties and delegate responsibilities Initiation/request Authorization Review (might be part of authorization might be independent review later) 21

Risk Mitigation for Online Banking Meet with insurance agent to understand what, if any, cyber liability coverage is in place or can be acquired Understand limitations and exclusions Perform risk analysis of (electronic) banking function at least annually review the following: AV and anti malware software function Patch/update management How do other roles/responsibilities/activities of staff interact/intersect with banking responsibilities 22

Corporate Account Takeover Catholic church parish Hospice Collection agency Main street newspaper stand Electrical contractor Public school district Health care trade association Rural hospital Mining company On and on and on and on 23

How do CATO fraudsters break in? Email Phishing Entry for Trojans and other malware Weak passwords password 12345678 Poor computer upkeep Do not understand risk Patching, antivirus It won t happen to us/we re small No ISP Lack of training 24

Case Study County Hospital System October 2012 January 2013 Bank customer (hospital) gets hacked/phished Two ACH payroll files totaling > $150,000 Lessons learned 25

CATO Lawsuits - UCC a payment order received by the [bank] is effective as the order of the customer, whether or not authorized, if the security procedure is a commercially reasonable method of providing security against unauthorized payment orders, and the bank proves that it accepted the payment order in good faith and in compliance with the security procedure and any written agreement or instruction of the customer restricting acceptance of payment orders issued in the name of the customer. 26 26

CATO Lawsuits - UCC Parties Tennessee Electric vs. TriSummit Bank How much? $327,804 stolen via ACH through CATO Method Internet banking site was down DOS? Basis Tennessee Electric asserting TriSummit processed bogus ACH file without any call back 27 27

CATO Lawsuits - UCC Parties Choice Escrow vs BancorpSouth How much? $440,000 stolen via single wire through CATO Defense CE passed on dual control offered by the bank Decision Court ruled in favor of bank CE attorneys failed to demonstrate bank s procedures were not commercially reasonable 28 28

Ransomware Malware encrypts everything it can interact with i.e. anything the infected user has access to CryptoLocker Kovter Also displays and adds child pornography images May 20, 2014 Ransomware attacks doubled in last month (7,000 to 15,000) http://insurancenewsnet.com/oarticle/2014/05/20/cryptolocker goes spear phishinginfections soar warns knowbe4 a 506966.html 29 29

Ransomware Working (tested) backups are key 30 30

Bring Your Own Device Increase in allowance of employees and third parties to access systems (at bank and at vendor) from personal devices, such as mobile phones and tablets. Creates opportunities for credentials to be stolen and for bank systems to be infected with malware. In many instances, banks and third parties do not promptly resolve high risk vulnerabilities that are identified by detective controls. 31

Managing Operational Risk Expansion into Growth Markets and/or Products. Bank Secrecy Act and anti money laundering risk prevail and in some cases are increasing in risk Management succession planning and retention of key employees Lack of strategic plan execution 32

Managing Operational Risk New Product Innovation contemplated changes to business models and responses to strategic opportunities, such as the introduction of new or revised business products, processes, or delivery channels. 33

Managing Operational Risk 34

Managing Operational Risk How can we better manage these risks? Enhanced Governance Promote Strategic Planning Improve Vendor Management Practice Change Management Invest in Risk Mitigation Meet New Capital and Liquidity Requirements 35

Managing Operational Risk Enhanced Governance Develop a risk awareness culture throughout the organization Set the tone at the top Review compensation schemes and recruiting programs Improvements to Board Oversight Seek out individuals with knowledge in emerging operational risks, cyber risk, technology, and compliance Spend time on risk education and improving the overall knowledge of the operational/technical environment Cybersecurity incorporation into: overall governance risk management strategic planning processes 36

Managing Operational Risk Promote Strategic Planning Whether it s simplifying operations, changing business processes, or implementing new products, these decisions should be part of an overall strategic plan Determine how new business models will evolve within individual business lines and enterprise wide Consider emerging risks and the bank s position in this transforming landscape 37

Managing Operational Risk Improve Vendor Management Increase focus on third party audits, paring down the number of contracted vendors and improving contract management. Consider consolidation in the number of vendors contracted by financial institutions to assist in cost reduction strategies. The number, nature, and complexity of foreign and domestic third party relationships continue to expand. Ensure oversight and monitoring is commensurate with the breadth, complexity, and criticality of the arrangements. Identify and monitor risks of third party relationships and ensure resilience against business disruption. 38

Managing Operational Risk Practice Change Management Enhance the implementation of change management programs and processes and ensure their effective monitoring It s all about People, Rules and Tools 39

Managing Operational Risk Invest in Risk Mitigation Perform risk assessments more frequently and prior to selection of new product/service lines. Invest in tools to help mitigate high to med high risk. Consider utilizing risk and control self assessments, key risk indicators, business process mapping, comparative analysis, and the monitoring of action plans. 40

Managing Operational Risk Meet new capital guidelines March 31, 2015 Implementation What will change for us? Will we be ok? More capital? Change in products? 41

Managing Operational Risk As you continue to respond to the changing regulatory landscape, a fragile economy, and changing customer demands, don't take your eye off the ball when it comes to Operational Risk unless you want to be hit in the face. 42