What Directors need to know about Cybersecurity?



Similar documents
Top 10 Baseline Cybersecurity Controls Banks Aren't Doing

ICBA Summary of FFIEC Cybersecurity Assessment Tool

Click to edit Master title style

FFIEC Cybersecurity Assessment Tool

Ed McMurray, CISA, CISSP, CTGA CoNetrix

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Information Technology

CYBERSECURITY HOT TOPICS

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Cybersecurity: What CFO s Need to Know

Certification Programs

Certification Programs

Enterprise Risk Management Process Improvement. Secure Banking Solutions, LLC

THE EVOLUTION OF CYBERSECURITY

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons

Cybersecurity. Are you prepared?

Cyber Security and the Board of Directors

Data Breach Response Planning: Laying the Right Foundation

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Attachment A. Identification of Risks/Cybersecurity Governance

Cybersecurity The role of Internal Audit

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Cybersecurity Awareness

Information Technology. A Current Perspective on Risk Management

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

OCIE CYBERSECURITY INITIATIVE

Domain 1 The Process of Auditing Information Systems

Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks?

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Cybersecurity Issues for Community Banks

Get on First Base with your Regulators and Cyber Security

Into the cybersecurity breach

Vendor Risk Management Financial Organizations

Cybersecurity Governance Update: New FFIEC Requirements cliftonlarsonallen.com

TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Vendor Management. Outsourcing Technology Services

Cybersecurity Workshop

Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

Cybersecurity and Privacy Hot Topics 2015

Top Fraud Trends Facing Financial Institutions

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cybersecurity Awareness. Part 1

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Cybersecurity. WBA Bank Executives Conference February 2 4, 2015 Milwaukee, WI

F G F O A A N N U A L C O N F E R E N C E

The Protection Mission a constant endeavor

Current Trends in Cyber Crime & Payments Fraud cliftonlarsonallen.com

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Protecting against cyber threats and security breaches

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

Cyber Risks in the Boardroom

Who s Doing the Hacking?

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

OCIE Technology Controls Program

Bellevue University Cybersecurity Programs & Courses

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

fs viewpoint

Cybersecurity Awareness

Data Breaches and Cyber Risks

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

PENETRATION TESTING GUIDE. 1

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Cybersecurity Enhancement Account. FY 2017 President s Budget

Cybersecurity and internal audit. August 15, 2014

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Cybersecurity Awareness for Executives

Instructions for Completing the Information Technology Officer s Questionnaire

Cybersecurity Awareness. Part 2

CYBERSECURITY EXAMINATION SWEEP SUMMARY

Outsourced Third Party Relationship Management/ Vendor Management. TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP

NATIONAL CYBER SECURITY AWARENESS MONTH

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Identifying and Managing Third Party Data Security Risk

Data Breaches and Cyber Risks

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies

FFIEC CONSUMER GUIDANCE

Presented by Frederick J. Santarsiere

Cybersecurity y Managing g the Risks

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA

RETHINKING CYBER SECURITY Changing the Business Conversation

I N T E L L I G E N C E A S S E S S M E N T

Transcription:

What Directors need to know about Cybersecurity? W HAT I S C YBERSECURITY? PRESENTED BY: UTAH BANKERS ASSOCIATION AND JON WALDMAN PARTNER, SENIOR IS CONSULTANT - SBS 1

Contact Information Jon Waldman Partner, Senior IS Consultant CISA, CRISC Masters of Info Assurance DSU Mission: Save the World! Phone: 605-380-8897 jon@protectmybank.com www.protectmybank.com 2

Our Experience PROCESS: Information Security Program design and roll-out IT Risk Management Vendor Management Technology Selection Business Continuity/ Disaster Recovery Incident Response Information Security Consulting IT Audit ISP Audit Controls Audit Wire Transfer Audit ACH Audit Internet Banking Audit TECHNOLOGY: Penetration Testing Vulnerability Assessment System Configuration Assessment Acceptable Use Scanning PEOPLE: Social Engineering Awareness Programs ISO Training CATO Training 3

Dakota State Nationally Recognized National Security Agency Department of Homeland Security 4,000 universities in the country Only 100 named national centers in the past 10 years National Center of Excellence in Information Assurance www.dsu.edu 4

What s the deal with Cybersecurity? Agenda: What IS Cybersecurity? What s the state of the state regarding Cybersecurity? What s going on with Cybersecurity regulation? Who s responsible for Cybersecurity? What are the 10 Questions you as Directors and Executives need to know about Cybersecurity at your institution? 5

What is Cybersecurity? Cyber Risk the increased probability that the very-highimpact, internet-based risks and threats we once thought were improbably will harm our networks Cybersecurity the controls and processes in place to protect our networks and customer information from cyber risk How does it relate to Information Security? discipline of Information Security, which not only encompasses Cybersecurity, but also all of the traditional things we ve done to protect our confidential customer information, including IT Risk Assessment, Vendor Management, Business Continuity Planning, Vulnerability Assessment, IT Audit, and much more Images courtesy of ISACA and member Menny Barzilay http://www.isaca.org/knowledge-center/blog/lists/posts/post.aspx?id=296 6

Cybersecurity State of the Union Is more or less money being access digitally today than previously? What are the two things that bad guys are after? More attacks against your physical organization or against your digital organization? Increase in outsourcing Cybercrime = Organized Crime More breaches More threats MORE RISK! 7

Vendors, CATO, and Ransomware Bank networks are pretty secure When is the last time you heard a community bank get HACKED? How are bad guys getting our information and money, then? Through our Vendors (Target) Breaches of our customers (Commercial Account Takeover) Other random attacks (phishing emails, ransomware) 8

Growth in Banking New Products/Services Mobile Cash Management Consumer Capture Online Account Opening Integrative Teller Machines P2P Payment Systems Cybercrime Increasing Organized Crime Advance Persistent Threats Third Party Bank Customer 9

Cybersecurity Assessments 2 nd Half of 2014 Targeted Regulatory Exams June 2013, the FFIEC established the Cybersecurity and Critical Infrastructure Working Group (CCWIG) Approximately 500 assessments on banks with $1 billion or less in assets approx. 20000 man-hours = big deal! Information gathering and learning mode Finalized report in December 2014 for all exams moving forward 10

Cybersecurity Assessment Results Exams were built upon key aspects of existing supervisory expectations addressed in the FFIEC IT Handbook Goal to identify area of Inherent Risk at financial institutions regarding cybersecurity preparedness Assesses an institution s current practices and overall cybersecurity preparedness, with a focus on the following key areas: Risk Management and Oversight Threat Intelligence and Collaboration Cybersecurity Controls External Dependency Management Cyber Incident Management and Resilience 11

Lots of Questions The Cybersecurity General Observations document was only four pages, and quite broad Three MAJOR take-aways: Board of Directors are going to be EXPECTED to be MUCH more involved in Information Security Program activities Banks are going to have to have comprehensive, valuable, and repeatable Risk Management processes More regulation is to come! 12

Which leads us to the present FFIEC Cybersecurity Assessment Tool released on Tuesday June 30th, 2015 Not really a tool, as we have traditionally defined software or hardware More of a process to help banks perform a selfassessment on their Cybersecurity Preparedness Based on size-and-complexity Resulting from the 2014 Cybersecurity Assessment lessons-learned 13

FFIEC CA Tool (3 parts) Three (3) major components 1. Rating your Inherent Risk for Cybersecurity threats based on your size and complexity 2. Rating your Cybersecurity Maturity regarding how prepared you are to handle different Cybersecurity threats 3. Interpreting and analyzing your results by understanding how your Inherent Risk ties to your Cybersecurity Maturity, and where you SHOULD be regarding risk vs. maturity. 14

Cybersecurity Inherent Risk Five Inherent Risk Areas 1. Technologies and Connection Types 2. Delivery Channels 3. Online/Mobile Products and Technology Services 4. Organizational Characteristics 5. External Threats 74% 24% 1% >1% >1% 15

Cybersecurity Maturity 16

How does Cybersecurity Maturity work? Measured by 5 Cybersecurity Maturity Levels 1. Baseline 2. Evolving 3. Intermediate 4. Advanced 5. Innovative 17

Increasing Maturity 18

Who s Responsible for Cybersecurity? Who wants to go first? Raise of hands? I ll give you a hint 19

20

Who ME? It is an expectation that C-Level Management and/or Board of Directors install a top-down approach to cybersecurity The President/CEO will be expected to DRIVE this Cybersecurity Assessment process (read: not necessarily complete each question), and the Board of Directors needs to understand what the results of this Cybersecurity Assessment mean from a high-level 21

How much do I need to know? Board involvement was a major point of the FFIEC Cybersecurity Assessment that were performed in the second half of 2014 and heavily mentioned in the General Observations The Cybersecurity Assessment Tool specifically mentions Board involvement TWENTY-ONE (21) times in the Cybersecurity Maturity section, just in case you didn t think the FFIEC is taking Board involvement seriously. Domain 1 - Cyber Risk Management and Oversight talks about Board involvement on an increasing frequency to go with increasing maturity, particularly in the Oversight component of the Governance factor, mentioning the Board fourteen (14) times alone. So pretty involved, at least with knowing what is going on 22

FFIEC Mgmt - Board of Directors Things to know: Boards are going to be held responsible for the management of IT and Cybersecurity Are ULTIMATELY responsible for the protection of customer information Boards must set the Risk Appetite Boards must review and approve the Bank s Strategic Plans Boards must review and approve all IT-related policies Boards must understand the technologies used at the institution Boards need to oversee all major IT projects Boards must provide a credible challenge for management decisions Boards must understand IT and Cybersecurity risk 23

What is a Risk Appetite? What type of Bank are you? Bleeding Edge Leading Edge Average ( The Pack ) Conservative What s your IT Strategy? What s your risk appetite? Risk Mitigation Strategy! 24

The 10 Questions Deputy Secretary of the US Department of Treasury Sarah Bloom Raskin ABA Summer Leadership Meeting 7/14/2015 Follow-up from previous 10 questions with an update since the FFIEC released their Cybersecurity Assessment Tool 25

Question 1 Has the bank embedded cybersecurity into governance, control, and risk management systems? 26

Question 1 explained What this really means Baking Cybersecurity into your existing Information Security Programs Being proactive instead of reactive to cybersecurity threats Understanding the world around you 27

Question 2 Have you remained vigilant about systematically identifying key assets, that is, those that provide high-value targets for malicious cyber actors? 28

Question 2 explained What are your most risky assets? How do you KNOW they are your most risky assets? Do you receive updates on these most-risky assets? 29

Question 3 Have you tailored security controls to the specific cyber risks presented by each key network, system, or set of sensitive data? 30

Question 3 explained How are you mitigating your risk around these most-risky assets? Do you have goals? Do you have an organizational risk appetite? Can you compare your riskiest assets to other assets? Or institutions? 31

Question 4 How do you prioritize the implementing of enhanced controls around key networks, systems, and sensitive data? 32

Question 4 explained What are your next steps to make sure that your most risky assets are being protected? Have you budgeted for additional controls? The more mature your organization, the more mature the controls. The more mature the controls, the more costly the next steps 33

Question 5 Have you reviewed the FFIEC Cybersecurity Assessment Tool and appropriately incorporated it into your approach to cyber risk management? 34

Question 5 explained Do you understand your Inherent Risk Profile? Do you know where your Cyber Maturity is for each of the five (5) Domains? 1. Cyber Risk Management and Oversight 2. Threat Intelligence and Collaboration 3. Cybersecurity Controls 4. External Dependency Management 5. Cyber Incident Management and Resilience Have you set a Cyber Maturity GOAL for each of those five (5) Domains? What are your next steps? 35

Question 6 Have you designated specific professionals to be responsible for the institution s cybersecurity strategy and provided them with the authority, resources, and access they need to effectively perform their work? 36

37

Question 6 explained Who s in charge? Do they have the responsibility they need? Are they the EXPERTS they need to be? Are they receiving adequate training and ongoing education? Do they have the funds and resources they require to protect customer information properly? 38

Question 7 Have you trained personnel on cybersecurity policies? 39

Question 7 explained Are your folks prepared to handing Cybersecurity issues? Corporate Account Takeover Phishing Malware CEO Fraud Wire Fraud Do your folks receive ongoing training? Is it REAL training not just watching a 30-minute video once a year? 40

Questions 8 & 9 How do you ensure that insurance coverage matches cyber-related risks? Does our cyber risk insurance impose minimum required practices, which may lead to denial of coverage if not followed? 41

Questions 8 & 9 explained Cyber Insurance is in a tricky spot right now there s NO STANDARD Do you know your options? Do you know what s REALLY covered? New, separate cyber insurance Some cyber insurance companies are requiring and verifying certain controls are in place before providing policies Some cyber insurance companies are offering additional services, such as digital forensics or incident response in addition to liability coverages Look into options! 42

Question 10 As part of cyber hygiene: Do you require multi-step identity checks known as multi-factor authentication before allowing access to networks, systems, and data? Have you restricted special, high-level access to only those who need it? Are you doing regular maintenance and consistently patching software? Are you effectively scanning systems for malicious activity? 43

Multi-step Identity Checks Multi-factor authentication Two-step authentication Dual Control verification Using additional forms of authentication is easier and less expensive now than it s ever been If you re NOT using additional forms of strong authentication for your most risky systems (admin accounts, commercial online banking, etc.) then you need to stop what you re doing and make a few phone calls 44

Limiting Admin Access Who has admin access to your most important information and critical systems? Do they NEED it? Who s watching the watchers? How often is this access reviewed? 45

Constant Updates and Patching Changes to current patching cycles are becoming challenging for IT administrators Does your organization have a formal, documented PLAN? Is it followed? Is it EFFECTIVE? How do you know? What about out-of-band patches to fix critical vulnerabilities, like zero-day vulnerabilities? Does patch management get reported upstream at a 10,000 foot level? 46

Continuous Vulnerability Scanning With the influx of new, wide-spread vulnerabilities affecting internetfacing devices, and the frequency with which they occur do you REALLY want to wait 12 to 18 months to find out if your network is vulnerable to attack? Continuous vulnerability scanning internally (Vulnerability Assessment) and externally (Penetration Testing) is being encouraged by almost all new standards, including the new FFIEC Cybersecurity Assessment Tool. Combining your own ability to scan yourself (weekly, monthly, or quarterly) with an external service (contracted Pen Test or VA) can both help make sure your network is safe and validate your patch management processes at the same time. 47

Additional Questions for later Are we keeping up on our Vendor Management? Do we know if our outsourced vendors and service providers are REALLY protecting our confidential customer data? How do we plan to FAIL WELL? Do we have relationships in place to assist us in the event of a breach? Law enforcement Digital Forensics Incident Response How do we plan to inform our customers, our shareholders, and/or the general public in the event of a breach? Are we sharing information with other financial institutions and with industry groups? 48

Next Steps Seriously find out the answers to these questions! Make sure Information and Cyber Security are a part of your regular meetings and not just as footnotes in your meeting minutes. Actively engage your IT Committee and ISO-level employees Ensure you understand your organization s risk appetite REALLY manage your Information and Cyber Security programs Build a culture of ongoing education in your institution. Never stop learning! Did I mention that you should know the answers to these questions? 49

Education Conferences and Conventions Technology & Security Conferences from your Association Webinars Regular Hot Topics from your Association Banking Schools Graduate Banking Schools such as www.gsb.com Information Security Certifications a deep dive into financial institution-specific, role-based training and education CB Security Manager (CBSM) CB Security Technical Professional (CBSTP) CB Security Executive (CBSE) CB Vendor Manager (CBVM) CB Ethical Hacker (CBEH) CB Incident Responder CCBIH) More - Ask about our Learning Paths! And more at / 50

51

Questions & Contact Info Jon Waldman Partner, Senior IS Consultant CISA, CRISC Masters of Info Assurance DSU Mission: Save the World! Phone: 605-380-8897 jon@protectmybank.com www.protectmybank.com 52