Cybersecurity Awareness



Similar documents
Cybersecurity Awareness. Part 2

Cybersecurity Awareness

Cybersecurity Awareness. Part 1

A Crisis Response, Information Sharing View of FFIEC Appendix J?

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Cybersecurity: What CFO s Need to Know

Cybersecurity Issues for Community Banks

Ed McMurray, CISA, CISSP, CTGA CoNetrix

ICBA Summary of FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Click to edit Master title style

Information Technology. A Current Perspective on Risk Management

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cybersecurity. Are you prepared?

CYBERSECURITY EXAMINATION SWEEP SUMMARY

Data Breach Response Planning: Laying the Right Foundation

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP

CYBERSECURITY HOT TOPICS

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

THE EVOLUTION OF CYBERSECURITY

What Directors need to know about Cybersecurity?

OCIE Technology Controls Program

September 20, 2013 Senior IT Examiner Gene Lilienthal

Cybersecurity The role of Internal Audit

Into the cybersecurity breach

FS-ISAC CHARLES BRETZ

Cybersecurity Governance Update: New FFIEC Requirements cliftonlarsonallen.com

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Cybersecurity Workshop

Vendor Management. Outsourcing Technology Services

Information Technology

CYBERSECURITY INVESTIGATIONS

OCIE CYBERSECURITY INITIATIVE

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Enterprise Security Tactical Plan

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Attachment A. Identification of Risks/Cybersecurity Governance

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

NATIONAL CYBER SECURITY AWARENESS MONTH

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Top 10 Baseline Cybersecurity Controls Banks Aren't Doing

Financial Services. Information Sharing & Analysis Center FS ISAC

Appendix J: Strengthening the Resilience of Outsourced Technology Services

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

FINANCIAL SERVICES INFORMATION SHARING & ANALYSIS CENTER (FS-ISAC) OPERATING RULES

Working with the FBI

NIST Cybersecurity Framework & A Tale of Two Criticalities

The Protection Mission a constant endeavor

Cyber Security Metrics Dashboards & Analytics

SECURITY. Risk & Compliance Services

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

CYBER SECURITY GUIDANCE

Critical Controls for Cyber Security.

Jumpstarting Your Security Awareness Program

GEARS Cyber-Security Services

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Italy. EY s Global Information Security Survey 2013

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Data Breaches and Cyber Risks

SANS Top 20 Critical Controls for Effective Cyber Defense

Lessons from Defending Cyberspace

Office of Inspector General

Cybersecurity and Privacy Hot Topics 2015

I N T E L L I G E N C E A S S E S S M E N T

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Appendix A: Mapping Baseline Statements to FFIEC IT Examination Handbook

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Cybersecurity for Medical Devices

A Primer on Cyber Threat Intelligence

Information Security and Risk Management

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

Cyber Security An Exercise in Predicting the Future

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

VA Office of Inspector General

Data Security Incident Response Plan. [Insert Organization Name]

Transcription:

Awareness

Objectives Discuss the Evolution of Data Security Define Review Threat Environment Discuss Information Security Program Enhancements for Cyber Risk Threat Intelligence Third-Party Management Resilience Incident Response Describe Assessment Tool 2

3 Evolution of Data Security

4 Evolution of Data Security

Evolution of Data Security Emerging ATM 5

Definition The National Institute of Standards and Technology (NIST) defines cybersecurity as: The process of protecting information by preventing, detecting, and responding to attacks. NIST Framework for Identify Detect Respond Protect Recover 6

Appendix B to Part 364 II. Standards for Information Security Ensure the security and confidentiality of customer information; Protect against any anticipated threats or hazards to the security or integrity of such information; Protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any customer; and Ensure the proper disposal of customer information and consumer information. 7

Information Security Incidents 2014 42.8 million 2009 3.4 million 2010 9.4 million 2011 22.7 million 2012 24.9 million 2013 28.9 million 8 Source: PwC.com

People and Patches a campaign of just ten e-mails yields a greater than 90% chance that at least one person will become the criminal s prey 11% of recipients of phishing messages click on attachments. Source: Verizon 2015 Data Breach Investigations Report 9

People and Patches 99.9% of the exploited vulnerabilities had been compromised more than a year after the associated [patch] was published. Ten [vulnerabilities] accounted for almost 97% of the exploits observed in 2014. In 2014, there were 7,945 security vulnerabilities identified. That is 22 new vulnerabilities a day. Nearly one an hour. 10 Sources: Verizon 2015 Data Breach Investigations Report NopSec

Threat Environment Growing Vulnerabilities Interconnected systems New delivery channels Legacy products Emerging/Unknown Increasing Threats Number/types of actors Nature/volume of attacks Level of sophistication Emerging/Unknown 11

Threat Environment: Vulnerabilities Technological Weakness in hardware, software, network, or system configurations Organizational Lack of awareness of threats/vulnerabilities, incomplete asset inventories, weaknesses in/over-reliance on third parties Human Exploitation of human behavior such as trust and curiosity Lack of effective security awareness training Physical Theft, tampering, device failure, or introduction of infected media 12

Threat Environment: Actors Cyber Criminals - Financially motivated; attacks include account takeovers, ATM cash-outs, and payment card fraud. Nation States - Attempt to gain strategic advantage by stealing trade secrets and engaging in cyber espionage. Hacktivists - Maliciously use information technologies to raise awareness for specific causes. Insiders - Abuse their position and/or computer authorization for financial gain or as a response to a personal grievance with the organization. 13

Threat Environment: Attacks Malware/Destructive Malware e.g., Key Loggers, Trojans, Ransomware, Wiper Phishing/Spear Phishing Distributed Denial of Service (DDoS) Compound Attacks e.g., DDoS/Corporate Account Takeover, Phishing/Trojan The Unknown 14

Threat Environment: Example Email Installation Execution People Account Takeover Ransomware Data Theft Data Destruction Patches Detection Potential Concerns 15

Information Security Program Governance Structure and Policies Governance Resilience/ Restoration Threat Intelligence Business Continuity/ Disaster Recovery Information Security Program Audit Program Patch Management Incident Response Risk Assessment and Control Structure Third-Party Management Security Awareness 16

Governance Board and Senior Management Responsibilities and Duties Ensure strategic planning and budgeting provide sufficient resources. Provide sufficient authority, resources, and independence for information security. Ensure policies and procedures address cybersecurity. Incorporate cyber risk into the risk-based audit plan. Provide reporting that assures the Board the ISP is working and included cybersecurity. Cyber Risk is a Business Risk! 17

Control Structure Security Awareness Training Enterprise-wide Role-specific Customers/Merchants Third Parties Culture Think Before You Click 18

Control Structure Patch Management Formal written policy and procedures Develop system for identifying, prioritizing, applying, and testing patches Create/maintain asset inventories Software (Microsoft and Non-Microsoft) Firmware (routers and firewalls) Integrate threat intelligence Mitigate risk from unsupported operating systems and applications Report to board and senior management BE TIMELY IT Audit and internal reviews should validate 19

Information Security Program: Refocused Governance Structure and Policies Resilience/ Restoration Threat Intelligence Business Continuity/ Disaster Recovery Information Security Program Audit Program Incident Response Risk Assessment and Control Structure Third-Party Management 20

Information Security Program: Refocused FFIEC Guidance: Threat and Vulnerability Monitoring and Sharing Statement, dated November 3, 2014 Financial institution management is expected to monitor and maintain sufficient awareness of cybersecurity threats and vulnerability information so they may evaluate risk and respond accordingly. Participation in Financial Services Information Sharing and Analysis Center (FS-ISAC) is encouraged. FFIEC Business Continuity Planning Handbook, Appendix J released on February 6, 2015 Strengthening the Resilience of Outsourced Technology Services 21

Information Security Program: Refocused Governance Structure and Policies Resilience/ Restoration Threat Intelligence Business Continuity/ Disaster Recovery Information Security Program Audit Program Incident Response Risk Assessment and Control Structure Third-Party Management 22

Private Sources Threat Intelligence: FS-ISAC isight Partners Secunia Wapack Labs NC4 Phy Sec MSA Phy Sec 23

Threat Intelligence: FS-ISAC Alert Types Step 1: Understand the Alert Type ANC: Announcements CYT: Cyber Threat CYI: Cyber Incidents COI: Collective Intelligence CYV: Cyber Vulnerability PHT: Physical Threats PHI: Physical Incidents Depending on your role, you don t have to follow every update, but FS-ISAC recommends following these key reports. Doing so will limit emails to about 10/day. Step 2: Understand the Criticality and Priority ANC = Priority 1-10, 8-10 is high priority CYT = Risk 1-10, 8-9 is Urgent, 10 is Crisis CYI = Risk 1-10, 8-9 is Urgent, 10 is Crisis COI = No Criticality Metric CYV = Risk 1-10, 8-9 is Urgent, 10 is Crisis PHT = Risk 1-10, 8-9 is Urgent, 10 is Crisis PHI = Informational, Minimal Impact, Moderate Impact, Significant Impact, Major Business Disruption Step 3: Make Choices Based on Role Analysts and those involved in risk assessment or vulnerability/patch management should receive CYV alerts. Intelligence analysts may also want to participate on the Cyber Intel listserv. POCs are automatically added, but a portal account is not necessary if you wish to add additional analysts to the distribution Provide portal accounts to your staff based on each individual s role. This will allow them to employ portal filtering for their unique assignments Provide summary reports for mangers and technical reports for analysts. Making informed choices based on your role eliminates unneeded emails 24

Threat Intelligence: FS-ISAC Alert The abbreviation and criticality level will always appear in the subject line, along with the title. Be aware of FS-ISAC s Traffic Light Protocol. White Green Amber Red Share freely but copyrighted Share among FS-ISAC members and partners only. Not public. Share among FS-ISAC members only. Restricted to a defined group. Following the TLP Color, the alert will go into more detail such as the type of threat, summary, and handling instructions. 25

Threat Intelligence: US-CERT Alert CVE Affected Products Patching Information 26

Threat Intelligence External Sources FS-ISAC US-CERT Third-Party Servicers e.g., core, telecommunications, managed security services Internal Sources Reports Operational Reports Internal Audit Reports Fraud Detection Reports Logs Executives Board Fraud Operations Tellers Audit HR Network Administrator Security Committees 27

Information Security Program: Refocused Governance Structure and Policies Resilience/ Restoration Threat Intelligence Business Continuity/ Disaster Recovery Information Security Program Audit Program Incident Response Risk Assessment and Control Structure Third-Party Management 28

Third-Party Management Core Transactional Internet Banking Mobile Banking Managed Network Security 29

Appendix J: Third-Party Management Relationship Management Due Diligence Contracts Ongoing Monitoring Resiliency and Testing Mission Critical Services Capacity Service Provider Continuity Scenarios Evaluate/Understand Gaps Service Provider Alternatives 30

Information Security Program: Refocused Governance Structure and Policies Resilience/ Restoration Threat Intelligence Business Continuity/ Disaster Recovery Information Security Program Audit Program Incident Response Risk Assessment and Control Structure Third-Party Management 31

Appendix J: Resilience Incorporate the following risks/controls into business continuity plans: Data backup architecture and technology Data integrity controls Independent, secondary communication providers Layered security strategies Enhanced planning for the possibility of simultaneous attacks Increased awareness of insider threats Prearranged third-party forensic and incident management services 32

Appendix J: Incident Response Enhance and test incident response plans to incorporate potential cyber threats Integrate service providers into incident response planning FFIEC Guidance: Final Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice, dated April 1, 2005 Assess nature/scope and contain/control the incident Notify primary federal regulator File Suspicious Activity Report (SARs) and notify law enforcement Notify customers if there is a reasonable likelihood the information will be misused 33

Information Security Program: Refocused Governance Structure and Policies Resilience/ Restoration Threat Intelligence Business Continuity/ Disaster Recovery Information Security Program Audit Program Incident Response Risk Assessment and Control Structure Third-Party Management 34

FFIEC Assessment Tool FFIEC Press Release: Assessment Tool, dated June 30, 2015 Voluntary tool to assist banks in identifying their risk profile and assessing their cybersecurity preparedness Provides banks with a repeatable and measurable process to inform management of their institution s risks and cybersecurity preparedness over time 35

FFIEC Assessment Tool Inherent Risk Profile Technologies and Connection Types Delivery Channels Online/Mobile Products and Technology Services Institution Characteristics External Threats Maturity Cyber Risk Management and Oversight Threat Intelligence and Collaboration Controls External Dependency Management Cyber Incident Management and Response 36

FFIEC Assessment Tool Maturity Levels: Baseline Evolving Intermediate Advanced Innovative 37

Evolution of Data Security Emerging ATM 38

Summary Understand Acknowledge Threat Environment Enhance Information Security Program for Cyber Risk Threat Intelligence Third-Party Management Resilience Incident Response Incorporate Assessment Tool 39

Threat Intelligence Resources Financial Services-Information Sharing and Analysis Center (FS-ISAC) www.fsisac.com/ United States Computer Emergency Readiness Team (US-CERT) www.us-cert.gov/ InfraGard www.infragard.org/ U.S. Secret Service Electronic Crimes Task Force www.secretservice.gov/ectf.shtml The Top Cyber Threat Intelligence Feeds www.thecyberthreat.com/cyber-threat-intelligence-feeds/ 40

Resources 41 FFIEC IT Handbooks http://ithandbook.ffiec.gov FFIEC Awareness http://ffiec.gov/cybersecurity.htm Financial Stability Oversight Council 2015 Annual Report http://www.treasury.gov/initiatives/fsoc/studiesreports/pages/2015-annual-report.aspx Financial Institution Letters www.fdic.gov/regulations/resources/director/risk/itsecurity.htm

Assessment Tool Questions regarding the Assessment Tool can be submitted through: https://fdicsurveys.co1.qualtrics.com/jfe/form/sv_4jgpiwxwb9gjps1 42

43 Director s Resource Center Director s Resource Center www.fdic.gov/regulations/resources/director/ Technical Assistance Video Program Information Technology (IT) Corporate Governance Third-Party Risk Vendor Management (Coming Soon) 101 (Coming Soon) Cyber Challenge: A Community Bank Cyber Exercise Vignette 1: Item processing failure scenario Vignette 2: Customer account takeover scenario Vignette 3: Phishing and malware problem Vignette 4: Problem with the bank s technology service provider Vignettes 5-7: Coming Soon

Regional Contacts Atlanta Region Richard Snitzer RSnitzer@fdic.gov Lenna Escosa MEscosa@fdic.gov New York Region Michael Flynn (Boston) MFlynn@fdic.gov Ed Bunk (New York) EBunk@fdic.gov Stephanie Williams (New York) SteWilliams@fdic.gov Chicago Region Paul Onischuk POnischuk@fdic.gov Matthew Regan MaRegan@fdic.gov 44

Regional Contacts Dallas Region Marvin McCoy (Memphis) MMcCoy@fdic.gov Matthew Cheney (Dallas) Mcheney@fdic.gov Kansas City Region David Sanders DSanders@fdic.gov A.J. Steiger ASteiger@fdic.gov San Francisco Region Lloyd Miller LlMiller@fdic.gov 45

Question/Answers Questions? E-mail Questions to: CHI@fdic.gov 46