Cybersecurity Issues for Community Banks



Similar documents
Ed McMurray, CISA, CISSP, CTGA CoNetrix

Cybersecurity: What CFO s Need to Know

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Cybersecurity Awareness

Cybersecurity Awareness. Part 2

THE EVOLUTION OF CYBERSECURITY

Cybersecurity: Protecting Your Business. March 11, 2015

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

CYBERSECURITY EXAMINATION SWEEP SUMMARY

Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks?

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Cybersecurity The role of Internal Audit

CYBERSECURITY INVESTIGATIONS

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP

Cybersecurity. Are you prepared?

Instructions for Completing the Information Technology Officer s Questionnaire

Perspectives on Cyber Security & Digital Issues

Cybersecurity Awareness

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Cybersecurity Governance Update: New FFIEC Requirements cliftonlarsonallen.com

CORE Security and GLBA

NIST Cybersecurity Framework & A Tale of Two Criticalities

White Paper on Financial Institution Vendor Management

Interagency Guidelines Establishing Information Security Standards. Small-Entity Compliance Guide

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Click to edit Master title style

Vendor Management. Outsourcing Technology Services

OCIE Technology Controls Program

Adopting a Cybersecurity Framework for Governance and Risk Management

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

Regulatory focus on cybersecurity is intensifying.

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015

Identifying and Managing Third Party Data Security Risk

Re: Big Data Request for Information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Cybersecurity Awareness. Part 1

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Procedure for Managing a Privacy Breach

What Directors need to know about Cybersecurity?

Information Security and Risk Management

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Cyber Risks in the Boardroom

Network Security & Privacy Landscape

Subject: Safety and Soundness Standards for Information

FINRA Publishes its 2015 Report on Cybersecurity Practices

F G F O A A N N U A L C O N F E R E N C E

Into the cybersecurity breach

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Safeguarding Customer Information An ABA Toolbox

Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.

Webinar: Creating a Culture of Cybersecurity at Work

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Top Ten Technology Risks Facing Colleges and Universities

Information Technology

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

Nine Network Considerations in the New HIPAA Landscape

Valdosta Technical College. Information Security Plan

10 Smart Ideas for. Keeping Data Safe. From Hackers

CYBERSECURITY HOT TOPICS

SECTION-BY-SECTION ANALYSIS

OCIE CYBERSECURITY INITIATIVE

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Page 1 Disclaimer: None of the provisions of this document constitute legal advice. If you need legal advice on the provisions of the laws listed,

Cyber-Security: Proactively managing the cyber threat landscape

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

Cybersecurity and Privacy Hot Topics 2015

Transcription:

Eastern Massachusetts Compliance Network Cybersecurity Issues for Community Banks Copyright 2014 by K&L Gates LLP. All rights reserved. Sean P. Mahoney sean.mahoney@klgates.com K&L Gates LLP State Street Financial Center One Lincoln Street Boston, MA 02111 (617) 261-3202

WHAT WE WILL COVER TODAY Cybersecurity threats Laws and guidance governing bank cybersecurity programs klgates.com 2

CYBERSECURITY THREATS Verizon 2014 Data Breach Investigations Report identifies the following threats POS Intrusions Cyber-espionage Web App Attacks Insider Misuse Crimeware Miscellaneous Errors Card Skimmers Physical Theft/Loss DoS Attacks Other klgates.com 3

CYBERSECURITY THREATS Web App attacks and POS intrusions appear to be on the rise Web App attack and DoS attacks are most prevalent cyber-attacks in financial services According to American Bankers Association, two-thirds of the instances of unauthorized access are the results of phishing attacks Success rate of phishing emails is approximately 18% according to Verizon klgates.com 4

CYBERSECURITY THREATS Motivation for attacks generally falls within three broad categories Financial gain Ideologically motivated attacks (social, political or sport/narcissism) State sponsored klgates.com 5

LEGAL STANDARDS The big picture risk based approach November 3, 2014 FFIEC cybersecurity guidance Laws that protect information Title V of Gramm-Leach-Bliley State laws Fair credit reporting act Regulatory data security standards FFIEC NIST Framework Regulatory business continuity standards

THE BIG PICTURE Risk approach of regulations is often based upon risk of violations or harm to individuals Businesses also need to look at risks of data security breach to the business itself In many ways, regulatory compliance is the least important aspect Reputational risk for many businesses can be severe Loss of accompanying sensitive business data can also cause competitive harm Risk-based compliance is the future

THIS WEEK S FFIEC GUIDANCE Expectation that all financial institutions maintain current awareness of cybersecurity threats FFIEC encourages all financial institutions to participate in the Financial Services Information Sharing and Analysis Center (FS-ISAC) Other sources to monitor: FBI Infragard (www.infragard.org) U.S. Computer Emergency Readiness Team (www.uscert.gov) U.S. Secret Service Electronic Crimes Task Force (www.secretservice.gov/ectf.shtml) klgates.com 8

THIS WEEK S FFIEC GUIDANCE After assessing cybersecurity at 500 community banks, FFIEC commented on the following: Cybersecurity Inherent Risk Connection types Products and services Technologies used Cybersecurity Preparedness Risk management Threat intelligence and collaboration Cybersecurity controls External dependency management Cyber incident management and resilience klgates.com 9

LAWS THAT PROTECT INFORMATION Title V of the Gramm-Leach-Bliley Act Designed to restrict invasive marketing tactics Required privacy policies and disclosure thereof Provides consumers opportunities to opt-out of information sharing Also includes requirements to maintain policies and procedures to safeguard nonpublic personal information

LAWS THAT PROTECT INFORMATION Title V of the Gramm-Leach-Bliley Act Title V of the GLBA protects nonpublic personal information, which is defined as any personally identifiable financial information provided by a consumer to a financial institution resulting from a transaction by a consumer with a financial institution otherwise obtained from a financial institution NPI includes customer lists, as the fact that there is a customer relationship is deemed to constitute NPI

LAWS THAT PROTECT INFORMATION GLBA Safeguards Rule All financial institutions must develop a written information security plan that must: be appropriate to the financial institution's risk profile designate the employee or employees to coordinate identify and assess the risks evaluate the effectiveness of current safeguards for mitigating risks select appropriate service providers and require them to implement the safeguards evaluate the program

LAWS THAT PROTECT INFORMATION GLBA Identity Theft Provisions No person may obtain or attempt to obtain customer information by: making a false or fraudulent statement to a financial institution or a customer of a financial institution presenting a lost, stolen or forged document to a financial institution requesting information, the disclosure of which is known to be in violation of GLBA

LAWS THAT PROTECT INFORMATION State data security and breach reporting laws State laws enacted in response to data security breaches and growing concern of identity theft Most statutes impose data security breach notification requirements Some states, most notably Massachusetts, impose an obligation to adopt policies and procedures to protect information Compliance with Interagency Standards is often sufficient Information protected generally consists of a name plus another identifier that would enable a person to obtain credit or access an account

LAWS THAT PROTECT INFORMATION Massachusetts Data Security Law Legislature required data security regulations to meet the following design parameters: ensure the security and confidentiality of customer information in a manner fully consistent with industry standards protect against anticipated threats or hazards to the security or integrity of such information protect against unauthorized access to or use of such information that may result in substantial harm or inconvenience to any consumer take into account the person's size, scope and type of business, the amount of resources available to such person, the amount of stored data, and the need for security and confidentiality of the information

LAWS THAT PROTECT INFORMATION Massachusetts Data Security Law Requires every person engaged in commerce to have a written information security program including, among other things: Employee training and compliance Vendor management Specific computer security to the extent technically feasible Note 128-bit encryption is still significant for purposes of statutory security breach notification

REGULATORY STANDARDS Promulgated by bank regulatory agencies either on an interagency basis or through FFIEC May form the basis for what constitutes commercially reasonable security procedures May be viewed as a potential source of best practices

REGULATORY STANDARDS Interagency Guidance on Authentication Requires risk assessments taking into account new and evolving threats Sets expectation of layered security Fraud detection and monitoring Dual authorization through different access devices Use of out-of-band verification for transactions IP reputation-based tools

REGULATORY STANDARDS FFIEC Information Security Handbook Serves as bank examination manual for compliance with GLB safeguards rule Establishes information security risk management process Information security risk assessment Information security strategy Security controls implementation Security monitoring Security process monitoring and updating

REGULATORY STANDARDS FFIEC Information Security Handbook Processes need to involve management and departments throughout organization Compliance Information systems Human resources Facilities management Business operations

REGULATORY STANDARDS FFIEC Business Continuity Handbook Business continuity planning process includes Policy by which firm manages identified risks Allocation of resources and knowledgeable personnel Independent review Training and awareness Regular, enterprise-wide testing Continuous updating to adapt to changing environment

REGULATORY STANDARDS FFIEC Business Continuity Handbook Policy should address Continuity planning process Prioritization of business objectives and critical operations essential for recovery Integration with financial markets Integration with vendors and outsourced services Regular updates in response to changes in business processes, audit recommendations and testing

REGULATORY STANDARDS FFIEC Business Continuity Handbook Principal tools in continuity planning Data synchronization tools Pre-established crisis management team Incident response procedures Remote access Employee training Clear notification standards Insurance

NIST FRAMEWORK Introduces core set of cybersecurity activities Identify Protect Detect Respond Recover klgates.com 24

NIST FRAMEWORK Implementation tiers based on risk Tier 1 partial Tier 2 risk informed Tier 3 repeatable Tier 4 adaptive Framework profile Current ( as is state) Target (desired state) klgates.com 25

TAKE-AWAYS An integrated approach to data security is key Involve human resources Humans are often the weak link in your data security infrastructure Training and progressive discipline can be key risk mitigation techniques Business managers need to be involved in technical solutions Secure environment has to be usable or people will find ways to work around it (e.g., shadow IT ) The only thing worse than a poorly crafted policies and procedures are great ones that are not followed klgates.com 26

TAKE-AWAYS Have incident response team in place to manage reputational risk Information technology Public relations/crisis management Lawyers Manage your data Do not ignore records management as key component of cybersecurity program Manage your vendors Review and catalogue agreements with any vendor that touches your data klgates.com 27