Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.



Similar documents
OCIE CYBERSECURITY INITIATIVE

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

The Protection Mission a constant endeavor

FINRA Publishes its 2015 Report on Cybersecurity Practices

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Security Management. Keeping the IT Security Administrator Busy

Attachment A. Identification of Risks/Cybersecurity Governance

Defending Against Data Beaches: Internal Controls for Cybersecurity

Looking at the SANS 20 Critical Security Controls

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Cyber Self Assessment

Critical Controls for Cyber Security.

PROPOSED INTERPRETIVE NOTICE

Altius IT Policy Collection Compliance and Standards Matrix

Jumpstarting Your Security Awareness Program

Assessing the Effectiveness of a Cybersecurity Program

CYBERSECURITY EXAMINATION SWEEP SUMMARY

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Client Update SEC Releases Updated Cybersecurity Examination Guidelines

Miami University. Payment Card Data Security Policy

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Supplier Security Assessment Questionnaire

Data Management Policies. Sage ERP Online

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Supplier Information Security Addendum for GE Restricted Data

Cybersecurity Health Check At A Glance

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

CONCEPTS IN CYBER SECURITY

Information Security Program Management Standard

INCIDENT RESPONSE CHECKLIST

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

University of Pittsburgh Security Assessment Questionnaire (v1.5)

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

HIPAA Security Alert

Top Ten Technology Risks Facing Colleges and Universities

Internet threats: steps to security for your small business

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

SANS Top 20 Critical Controls for Effective Cyber Defense

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Click to edit Master title style

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

Cyber Security. John Leek Chief Strategist

VA Office of Inspector General

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Logging In: Auditing Cybersecurity in an Unsecure World

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

F G F O A A N N U A L C O N F E R E N C E

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

ADMINISTRATORS SERIES PRIVACY AND SECURITY AT UF. Cheryl Granto Information Security Manager, UFIT Information Security

Information security controls. Briefing for clients on Experian information security controls

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

STATE OF NEW JERSEY Security Controls Assessment Checklist

Information Shield Solution Matrix for CIP Security Standards

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Leveraging Regulatory Compliance to Improve Cyber Security

IT Security Risks & Trends

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Building a More Secure and Prosperous Texas through Expanded Cybersecurity

External Supplier Control Requirements

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

Information Technology General Controls And Best Practices

This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.

ABB s approach concerning IS Security for Automation Systems

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

Security Policy for External Customers

Information Blue Valley Schools FEBRUARY 2015

Is Your Vendor CJIS-Certified?

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Better secure IT equipment and systems

Transcription:

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m. Topics: Explain why it is important for firms of all sizes to address cybersecurity risk. Demonstrate awareness of cybersecurity-related laws and regulations governing broker-dealers. Have knowledge of relevant cybersecurity risk management frameworks and standards. Know how to structure and implement a cybersecurity risk management program. Address critical risk items directly with proven control techniques. Speakers: John Brady (moderator) Vice President and Chief Information Security Officer FINRA Technology Administration Allan Goldstein Chief Compliance Officer, Chief Operating Officer and Chief Financial Officer Trade Informatics LLC Lisa Roth President Monahan & Roth, LLC Hardeep Walia Co-Founder & Chief Executive Officer Motif Investing 2015 Financial Industry Regulatory Authority, Inc. All rights reserved.

Small Firm Focus: A Practical Approach to Cybersecurity FINRA Annual Conference May 29, 2015 Washington, DC

Panelists Moderator: John Brady, Vice President and Chief Information Security Officer, FINRA Technology Administration Panelists: Allan Goldstein, Chief Compliance Officer, Chief Operating Officer and Chief Financial Officer, Trade Informatics LLC Lisa Roth, President, Monahan & Roth, LLC Hardeep Walia, Co-Founder & Chief Executive Officer, Motif Investing 1

Cyber Security A Serious Matter Member firms (of all sizes) need to take cybersecurity seriously and address the threat Headline events have captured the attention of our Customers and our Regulators Target, Home Depot, JP Morgan Chase, EBay, etc FINRA and SEC Enforcement Actions and Surveys Wall Street Journal, Local and Regional Press $3.5 million / company* 37% due to insufficient funding for IT** 20% due to improper vetting of vendors 44% involving malware 24% involving compromised passwords * Ponemon Institute, May 5th 2014 ** Wall Street Journal, April 20th 2015 2

Cyber Security Regulations and Laws Laws Directly Related to Cybersecurity Regulation S-P Fact Act State Laws Regulations Cited by Regulators in Cybersecurity Guidance, Examination Findings and Enforcement (in addition to the above) Supervision and Control Business Continuity Books and Records Written Procedures 3

Cyber Risk Framework and Standards All Firms National Institute of Standards and Technology ( NIST ) Framework for Improving Critical Infrastructure Cybersecurity Version 1.0 International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) Information Framework ISACA s Control Objectives for Information and Related Technology (COBIT) Small Firms NIST Small Business Corner FCC Cybersecurity for Small Business Trade Associations (SIFMA, FS-ISAC) 4

NIST CSF & SANS Critical Controls NIST Cyber Security Framework Identify Protect Asset Management Business Environment Governance Risk Assessment Risk Management Strategy Access Control Awareness and Training Data Security Information Protection Processes and Procedures Maintenance Protective Technology SANS Institute Top 20 Critical Security Controls Inventory of Devices Inventory of Software Vulnerability Assessment and Remediation Application Software Security Secure Computer Configurations Secure Network Configurations Malware Defenses Wireless Access Control Security Skills Training Firewalling of Ports, Protocols, and Services Controlled use of Administrator Privileges Boundary Defense Controlled Access Based on Need to Know Data Protection Secure Network Engineering Other Sound Practices Identify high-risk business processes (e.g. outbound wire transfers) Add fraud detection steps to high-risk business processes 5

NIST CSF & SANS Critical Controls Detect NIST Cyber Security Framework Anomalies and Events Security Continuous Monitoring Detection Processes SANS Institute Top 20 Critical Security Controls Maintenance, Monitoring and Analysis of Audit Logs Account Monitoring and Control Other Sound Practices Have staff send incident reports to a designated security POC Respond Response Planning Communications Analysis Mitigation Improvements Incident Response and Management Penetration Tests and Red Team Exercises Update threat models and revisit security / fraud controls regularly Recover Recovery Planning Improvements Communications Data Recovery Capability Cyber Insurance Incident Response Retainer 6

Recommendations Build a Cybersecurity program patterned after FINRA s Cybersecurity Report and NIST s CSF: Identify Establish a Cyber Security Officer or Designee Conduct a Threat/Risk Assessment External Vendor Assessment Internal access control, BYOD, email Client expectations Create Policies & Procedures Escalation & reporting Need to Have access policy Change of employment status Staff Training Protect Firewall (upgrade and patch) Anti-virus, Anti-Spyware/malware Webfilter Appliance Laptop/portable device protections Conduct 3rd party intrusion testing Patch Management Remote Desktop vs VPN Clean screen/clean desk Restrict workstation admin privileges Cloud back-up 7

Recommendations (cont d) Detect Logging Whistleblower program Automated reporting Email review Awareness Respond Classification of threats Law enforcement, client notification, legal counsel, senior management, IT Security Team Periodic review and test of response program Recover Cyber insurance Data restoration Hardware restoration 8

WHERE TO START? 9

Physical Steps to Just Go Do Secure Electronic Equipment from Unauthorized Access: Determine who and how by assessing the premises Inventory Electronic Devices: BYOD policies, Record type of equipment and % business/personal use Identify Workable Contingency Operations: leverage your business continuity plan for processes Implement Temporary Guest Policies: Badges, Log book, temporary pass keys Establish Disposal Policies: Understand and implement appropriate paper and electronic destruction methods 10

Technical Steps to Just Go Do Backup your data: Best approach: a secure, cloud-based backup service Install Anti-Virus: You can start with free tools, however paid products have more features and capabilities Apply Security Patches and Software Updates: Most malware/viruses take advantage of missing patches to infect systems Use Strong Passwords or Two Factor Authentication: Best: two-factor authentication; 2nd best: a strong password generator and vault; change default passwords on devices and software; change passwords periodically Secure your WiFi: Enable encryption with an un-guessable passphrase Use a Firewall: Prevents unauthorized access to internal computers Encrypt Laptops and Portable Storage Media: Windows has built-in capability (called BitLocker) 11

Administrative Steps to Just Go Do Designate a Security POC: And instruct all staff to report incidents and concerns to that person Guard High Risk Business Processes: Identify risky business processes (e.g., outbound money transfers, customer service calls/email) and safeguard with fraud detection and verification steps Create Security Policies: For Passwords, Use of Mobile Devices, etc. Train Staff on Security Principles and your Policies: Teach staff how to choose strong passwords, where customer data can and can not be copied (e.g., prohibit putting sensitive data on mobile devices), etc. Hire a Consultant To Test Your Security: Penetration testing, vulnerability mapping, phishing testing/training Use Email and Web Security Services: To reduce the volume of spam and lower the risk of viruses arriving via email or web browsing; Web Security services can also block access to inappropriate web content 12

Resources Resources, References, & Enforcement Actions

Regulatory Guidance FINRA Report on Cybersecurity Practices (February 3, 2015) https://www.finra.org/sites/default/files/p602363%20report%20on%20cyber security%20practices_0.pdf NIST Cyber Security Framework and Roadmap http://www.nist.gov/cyberframework/upload/cybersecurity-framework- 021214-final.pdf http://www.nist.gov/cyberframework/upload/roadmap-021214.pdf SEC National Exam Program Risk Alert (OCIE Cyber Security Initiative) http://www.sec.gov/ocie/announcement/cybersecurity+risk+alert++%2526+ Appendix+-+4.15.14.pdf SEC Cybersecurity Guidance Update (April 2015) http://www.sec.gov/investment/im-guidance-2015-02.pdf 14

Tips and Templates FCC 10 Cyber Security Tips for Small Business http://transition.fcc.gov/daily_releases/daily_business/2012/db1018/doc- 306595A1.pdf FCC Small Biz Cyber Planner http://www.fcc.gov/cyberplanner SIFMA Cybersecurity Guidance for Small Firms http://www.sifma.org/workarea/downloadasset.aspx?id=8589949972 National Cyber Security Alliance Mobile Tip Sheet http://staysafeonline.org/stay-safe-online/resources/stc-mobile-tip-sheet Cyber Security in the Golden State (see Practical Steps ) https://oag.ca.gov/cybersecurity Verizon Data Breach Investigations Report http://www.verizonenterprise.com/dbir/ 15

SEC & FINRA Enforcement Actions Re: Next Financial: Regulation SP violations related to RR recruiting Read more at: https://www.financialservices.org/uploadedfiles/fsi/events/web_conferenc es/03next_financial_summary.pdf Re: Commonwealth Equity Services: Regarding mandatory anti-virus software on computers, computer audits, recordkeeping Read more at: https://www.sec.gov/litigation/admin/2009/34-60733.pdf Re: Wells Investment Securities: A firm s periodic audits were inadequate because they did not review laptops for security (FINRA case # 2009019893801) Read more at: http://disciplinaryactions.finra.org/ Re: Failure to Encrypt Sensitive Customer Data: Encryption failures including laptops (FINRA case # 2008015299801) Read more at: http://disciplinaryactions.finra.org/ 16

SEC & FINRA Enforcement Actions Regarding Security Policies and Procedures Recommendations or suggestions, rather than mandates. Found at: http://www.sec.gov/litigation/admin/2008/34-58515.pdf Inadequate controls to prevent account takeover and fraudulent ACH transfers. (FINRA case # 2012034190001) Found at: http://disciplinaryactions.finra.org/ Reviews of RR computer security measures. Found at: http://www.sec.gov/litigation/admin/2009/34-60733.pdf Response to cybersecurity issues detected through branch audits. Found at: http://www.sec.gov/litigation/admin/2009/34-60733.pdf 17

QUESTIONS? THANK YOU! 18

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m. Resources Regulatory Guidance FINRA Report on Cybersecurity Practices (February 3, 2015) www.finra.org/sites/default/files/p602363%20report%20on%20cybersecurity%20practices_0.pdf NIST Cyber Security Framework and Roadmap www.nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf www.nist.gov/cyberframework/upload/roadmap-021214.pdf SEC National Exam Program Risk Alert (OCIE Cyber Security Initiative) www.sec.gov/ocie/announcement/cybersecurity+risk+alert++%2526+appendix+-+4.15.14.pdf SEC Cybersecurity Guidance Update (April 2015) www.sec.gov/investment/im-guidance-2015-02.pdf Tips and Templates FCC 10 Cyber Security Tips for Small Business http://transition.fcc.gov/daily_releases/daily_business/2012/db1018/doc-306595a1.pdf FCC Small Biz Cyber Planner www.fcc.gov/cyberplanner SIFMA Cybersecurity Guidance for Small Firms www.sifma.org/workarea/downloadasset.aspx?id=8589949972 National Cyber Security Alliance Mobile Tip Sheet http://staysafeonline.org/stay-safe-online/resources/stc-mobile-tip-sheet 2015 Financial Industry Regulatory Authority, Inc. All rights reserved. 1

Cyber Security in the Golden State (see Practical Steps ) https://oag.ca.gov/cybersecurity Verizon Data Breach Investigations Report www.verizonenterprise.com/dbir/ SEC and FINRA Enforcement Actions Next Financial: Regulation SP violations related to RR recruiting www.financialservices.org/uploadedfiles/fsi/events/web_conferences/03next_financial_sum mary.pdf Commonwealth Equity Services: Regarding mandatory anti-virus software on computers, computer audits, recordkeeping www.sec.gov/litigation/admin/2009/34-60733.pdf Wells Investment Securities: A firm s periodic audits were inadequate because they did not review laptops for security (FINRA case # 2009019893801) http://disciplinaryactions.finra.org/search/viewdocument/25628 Failure to Encrypt Sensitive Customer Data: Encryption failures including laptops (FINRA case # 2008015299801) http://disciplinaryactions.finra.org/search/viewdocument/37555 Securities Policies and Procedures Recommendations or suggestions, rather than mandates. www.sec.gov/litigation/admin/2008/34-58515.pdf Inadequate controls to prevent account takeover and fraudulent ACH transfers. (FINRA case # 2012034190001) http://disciplinaryactions.finra.org/search/viewdocument/38882 Reviews of RR computer security measures. www.sec.gov/litigation/admin/2009/34-60733.pdf Response to cybersecurity issues detected through branch audits. www.sec.gov/litigation/admin/2009/34-60733.pdf 2015 Financial Industry Regulatory Authority, Inc. All rights reserved. 2