Information Technology. A Current Perspective on Risk Management



Similar documents
Information Technology

FFIEC Supplemental Guidance to Authentication in an Internet Banking Environment. Robert Farmer Senior Technology Compliance Manager

Instructions for Completing the Information Technology Officer s Questionnaire

INFORMATION TECHNOLOGY OFFICER S QUESTIONNAIRE. Instructions for Completing the Information Technology Examination Officer s Questionnaire

Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX

FFIEC CONSUMER GUIDANCE

Cybersecurity Awareness

Cybersecurity Governance Update: New FFIEC Requirements cliftonlarsonallen.com

Cybersecurity Awareness. Part 2

11- INFORMATION TECHNOLOGY RMP SNAPSHOT WORKPROGRAM

Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online.

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Supplement to Authentication in an Internet Banking Environment

Best Practices: Reducing the Risks of Corporate Account Takeovers

Appendix J: Strengthening the Resilience of Outsourced Technology Services

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CYBERSECURITY HOT TOPICS

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Alternatives for Managing Commercial Payments Risk

Cybersecurity: What CFO s Need to Know

Vendor Management. Outsourcing Technology Services

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

What Directors need to know about Cybersecurity?

Attachment A. Identification of Risks/Cybersecurity Governance

External Supplier Control Requirements

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Cybersecurity Governance Update on New FFIEC Requirements

How To Protect Your Online Banking From Fraud

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

VENDOR MANAGEMENT. General Overview

Click to edit Master title style

THE CHANGING FACE OF CYBERCRIME AND WHAT IT MEANS FOR BANKS

SECURITY. Risk & Compliance Services

REGULATORY COMPLIANCE REGULATORY COMPLIANCE SERVICES. Dynamic Solutions. Superior Results.

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

The Protection Mission a constant endeavor

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

FFIEC BUSINESS ACCOUNT GUIDANCE

Cybercrime and Regulatory Priorities for Cybersecurity

THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER

A Decision Maker s Guide to Securing an IT Infrastructure

FFIEC CONSUMER GUIDANCE

THE FFIEC CHALLENGE A Call for Reliable Authentication

Mobile Deposit Policy

FFIEC Authentication Guidance Examination in 2012: Are You Prepared?

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Top Fraud Trends Facing Financial Institutions

Five keys to a more secure data environment

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

ICBA Summary of FFIEC Cybersecurity Assessment Tool

September 20, 2013 Senior IT Examiner Gene Lilienthal

INFORMATION SECURITY FOR YOUR AGENCY

Cloud Security and Managing Use Risks

Cybersecurity. WBA Bank Executives Conference February 2 4, 2015 Milwaukee, WI

Electronic Fraud Awareness Advisory

Information Security Policy

Top 10 Baseline Cybersecurity Controls Banks Aren't Doing

How To Ensure The C.E.A.S.A

Automation Suite for. 201 CMR Compliance

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

STATE OF NEW JERSEY Security Controls Assessment Checklist

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Critical Controls for Cyber Security.

Current Trends in Cyber Crime & Payments Fraud cliftonlarsonallen.com

Risk Management of Remote Deposit Capture

PACB One-Day Cybersecurity Workshop

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July 2014)

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Remote Deposit Quick Start Guide

Get in the Groove with the Regulatory Jazz: Cyber Security and Vendor Management Examinations from the Regulators and Auditors Perspective

The Business Case for Security Information Management

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

IT Security Risks & Trends

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA Toll Free: (877) IRON411

Information Security for the Rest of Us

Computer and Network Security Policy

Public Cloud Security: Surviving in a Hostile Multitenant Environment

Top Ten Technology Risks Facing Colleges and Universities

Information security controls. Briefing for clients on Experian information security controls

The Education Fellowship Finance Centralisation IT Security Strategy

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

Best Practices Guide to Electronic Banking

Cybersecurity Awareness

Reliance Bank Fraud Prevention Best Practices

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Who s Regulating Whom & What are the Requirements: Banks As Payment Services Providers

Understanding It s Me 247 Security. A Guide for our Credit Union Clients and Owners

A Cautionary Tale Plus Cross-Channel Risk

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Bellevue University Cybersecurity Programs & Courses

Domain 1 The Process of Auditing Information Systems

Transcription:

Information Technology A Current Perspective on Risk Management

Topics Covered Information Security Program Common Examination Findings Existing and Emerging Risks ACH/Wire Fraud and Corporate Account Takeover Distributed Denial of Service Attacks (DDoS) Cloud/Hosting Third-Party Payment Processing Questions 2

Information Security Program Protect Confidentiality, Integrity, & Availability of information Why establish an Information Security Program? Mitigate financial losses Required by insurance companies Prevent possible lawsuits Required by law FDIC Rules and Regulations Part 364(b) 3

Information Security Program Governance Structure IT Steering Committee Board Oversight Ongoing Maintenance Risk Assessment Business Continuity/Disaster Recovery Planning Information Security Program Physical, Technical, & Administrative Controls Access Controls Internal Controls Patch Management Baseline Configurations Incident Response Policies and Procedures Vendor Management Audit Program 4

Information Security Program Use the Risk Assessment to identify: Bank functionality and product lines IT systems and devices Data locations and uses Threats, risks, and controls Information Security Program Risk Assessment 5

Information Security Program Types of Controls: Administrative Policies Procedures Physical Secure areas Technical System configurations Patch management Access rights The control environment must continue to evolve with threats and risk. Information Security Program Controls 6

Information Security Program Policies and Procedures: Set forth the standards for operations and performance Support consistency of operations Serve as the baseline for the audit program Information Security Program Policies and Procedures 7

Information Security Program Audit Validates the information security program and control structure Consists of independent internal and external reviews General controls audits Vulnerability assessments Penetration tests Driven by the risk assessment Information Security Program Audit 8

Information Security Program Vendor and Service Provider Oversight Financial well-being Control structure Performance Technology Service Providers Regulatory Examinations Reports are available to serviced banks Report Requests: Name of provider/data center Types of services (e.g, core, Internet Banking, payment processing, etc.) Fax to: 816-234-8182 Vendor Management Information Security Program 9

Information Security Program Business Continuity/Disaster Recovery Plan for short and long term disruptions Incident Response Determine what happened Control and respond File a SAR if necessary Provide customer notice if misuse of data is possible or takes place Notify the FDIC Debit/Credit card exception Business Continuity/ Disaster Recovery Planning Incident Response Information Security Program FIL-27-2005 Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice 10

Information Security Program Ongoing Maintenance Governance Structure IT Steering Committee Board Oversight Risk Assessment Business Continuity/Disaster Recovery Planning Information Security Program Physical, Technical, & Administrative Controls Access Controls Internal Controls Patch Management Baseline Configurations Incident Response Policies and Procedures Vendor Management Audit Program 11

Common Examination Findings Risk Assessment Underutilized Use as a proactive risk identification process New technologies New business lines New risks Drives control structure 12

Common Examination Findings Patch Management Core and networked systems Servers, workstations, firewalls, routers, etc. Microsoft and non-microsoft systems Adobe, Java, QuickTime, Firefox, Oracle, etc. Firmware updates Outsourcing arrangements 13

Common Examination Findings ***Windows XP support ends April 8, 2014*** Migrate to a supported operating system Implement risk mitigation strategies Increased monitoring System isolation/protection from threat sources Ensure senior management and Board awareness FFIEC Joint Statement on End of Support for Windows XP Operating System http://ithandbook.ffiec.gov/reference-materials.aspx Federal Reserve Board Article: Risk Related to End of Support for Microsoft Windows XP http://www.communitybankingconnections.org/articles/2013/q4/community-bank- Operations.cfm 14

Common Examination Findings Configuration Standards Capture servers, workstations, and network devices Develop baseline standards Disable unnecessary/risky services Expand configuration from baseline as needed Apply standards to new equipment 15

Common Examination Findings Business Continuity/Disaster Recovery Planning Assess all business critical systems, operations, and product lines Look beyond core and include network-based installations Broaden planning and testing strategies as needed 16

Common Examination Findings Audit General Controls Reviews Vulnerability Assessments Penetration Tests Conduct at regular and appropriate intervals Establish scope based upon the risk assessment Formally track findings through to resolution and provide status reports to senior management and the Board Ensure the vulnerability assessment scope is appropriate and captures all necessary systems Maintain a current network topology 17

Common Examination Findings Risk Assessment Patch Management Audit/Tracking Governance Management Oversight Board Oversight Reporting to the Board Information Security Program Logical Security Weaknesses BCP/DR Gramm- Leach- Bliley Act 18

Existing and Emerging Risks ACH/Wire Fraud & Corporate Account Takeover Social Engineering and Identity Theft E-mail request for funds transfer Unwilling to communicate by voice May have limited account/personal information, though may seek to validate/obtain information Potential for call-back numbers to be hijacked Subsequent requests will follow if successful 19

Existing and Emerging Risks ACH/Wire Fraud & Corporate Account Takeover Corporate Account Takeover Malware infects customer s computer Used to initiate fraudulent ACH or wire transfer through bank s cash management system Controls and security awareness programs are essential Governing Legislation Electronic Funds Transfer Act of 1978 UCC 4a - commercially reasonable FIL-50-2011 Supplement to Authentication in an Internet Banking Environment 20

Existing and Emerging Risks ACH/Wire Fraud & Corporate Account Takeover FIL-50-2011 Supplement to Authentication in an Internet Banking Environment Requires annual risk assessments Directs that controls must exceed device ID and challenge questions Controls must be stronger for commercial accounts, with multi-factor authentication recommended Requires layered security for all accounts, including anomaly detection and response States that User IDs and passwords alone are insufficient for customer-level system administrators Mandates customer awareness and education 21

Existing and Emerging Risks ACH/Wire Fraud & Corporate Account Takeover Corporate Account Takeover Actions Disable Internet banking/cash management access Change all account numbers and credentials Complete customer-level forensic analysis and vulnerability assessment Implement customer-level patch and virus management programs Isolate customer s funds management workstation Offer strong authentication 22

Existing and Emerging Risks ACH/Wire Fraud & Corporate Account Takeover Funds Transfer Activity Traditional Controls Contractual requirements/responsibilities Authorizations for funds transfer requests Validation procedures Dual controls Audits Security awareness training Authorization limits Waivers 23

Existing and Emerging Risks Distributed Denial of Service (DDoS) Renders Internet-based services unavailable Be aware of pathways to internal systems Assess nature and criticality of internet-based services Understand what s at risk Develop incident response and business continuity plans Identify points-of-contact Do you have viable alternatives? How will you communicate with customers? Blocking sources of attack can be difficult Notify local FBI and FDIC Field Offices 24

Existing and Emerging Risks Cloud/Hosting What is Cloud? Benefits Cost reduction, flexibility, scalability, speed Risks/Concerns/Questions Type of Cloud? Who has access to the data? Where is the data? Is the data backed-up? What is the third-party s control structure? Can you perform effective/on-going due-diligence? How difficult is it to disengage? FFIEC Cloud Computing Statement http://ithandbook.ffiec.gov/reference-materials.aspx 25

Existing and Emerging Risks Third-Party Payment Processing Account relationships with entities that process payments for other businesses Can create risk in several areas Credit, legal, and compliance risks Potential for BSA/AML risks The bank bears the risk as the Originating Depository Financial Institution 26

Resources 27 www.fdic.gov FIL 12-99: Uniform Rating System for Information Technology FIL 22-2001: Security Standards for Customer Information FIL 68-2001: 501(b) Examination Guidance and Procedures FIL 27-2005: Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice FIL 81-2005: IT Risk Management Program FIL 44-2008: Guidance for Managing Third Party Risk FIL 3-2012: Payment Processor Relationships FIL 100-2007: Identity Theft Red Flags FIL 103-2005 and FIL 50-2011: Authentication in an Internet Banking Environment

Resources http://ithandbook.ffiec.gov FFIEC IT Handbooks http://ithandbook.ffiec.gov/reference-materials.aspx FFIEC Cloud Computing Statement FFIEC Joint Statement on End of Support for Windows XP Operating System www.fdic.gov/regulations/resources/director/video.html Directors' Resource Center Technical Assistance Video Program 28 www.communitybankingconnections.org/articles/2013/q4/ Community-Bank-Operations.cfm Federal Reserve Board Article: Risk Related to End of Support for Microsoft Windows XP

FDIC IT Contacts Dave Sanders dsanders@fdic.gov 816-234-8527 IT Supervisor A.J. Steiger asteiger@fdic.gov 816-234-8521 IT Exam Specialist Report Request Fax Number 816-234-8182 Your respective Field Supervisor or Case Manager 29

Questions? 30