cyber risk the new business risk
play

Cyber Risk: the New Business Risk Current and Future Regulatory - PowerPoint PPT Presentation

Cyber Risk: the New Business Risk Current and Future Regulatory Expectations Presented By: Thomas G. Hinkel CISA, CCSA, CRISC, CCSA, CBCP VP Compliance Services Safe Systems, Inc. tom.hinkel@safesystems.com Safe Systems The Compliance


  1. Cyber Risk: the New Business Risk Current and Future Regulatory Expectations Presented By: Thomas G. Hinkel CISA, CCSA, CRISC, CCSA, CBCP VP – Compliance Services Safe Systems, Inc. tom.hinkel@safesystems.com Safe Systems The Compliance & Technology Partner for Financial Institutions

  2. Agenda • Size, Scope, and Spending • Regulatory History & Recent Regulations (Inc. CAT) • Current Threat Environment • Best Cyber Controls • Next Steps Safe Systems The Compliance & Technology Partner for Financial Institutions

  3. FDIC Cybersecurity Awareness Webinar Safe Systems The Compliance & Technology Partner for Financial Institutions

  4. FFIEC “… cyber threats [are] perhaps the foremost risk facing banks today … [and] represents one of the major, if not the major, risk facing banks today.” (Thomas J. Curry, Remarks at New England Council, Jul. 24, 2015) Safe Systems The Compliance & Technology Partner for Financial Institutions

  5. Safe Systems The Compliance & Technology Partner for Financial Institutions

  6. FFIEC “ A bank should evaluate and manage cyber risk as it does any other business risk. It is not simply the obligation of those employees in the server room, but rather an enterprise-wide initiative involving all employees .” - FFIEC Safe Systems The Compliance & Technology Partner for Financial Institutions

  7. FI Cybersecurity Spending Wells Fargo currently spends $250M. Citigroup annual budget - $300M. J.P. Morgan Chase to double spending in 2016 to $500M. BoA will spend $400M this year (2015), but could be more. “…the only place in the company that doesn’t have a budget constraint is cybersecurity.” – CEO Brian Moynihan Safe Systems The Compliance & Technology Partner for Financial Institutions

  8. How Ready Are Banks For The Rapidly Rising Threat Of Cyberattack? • “Despite the many positives that technology brings to the global banking industry, it also comes with a host of challenges. At or near the top of the list, in Standard & Poor's Ratings Services' opinion, is cybersecurity .” • “…we view weak cybersecurity as an emerging risk that has a potential to result in a negative rating actions. If we were to believe that a bank is ill-prepared to withstand a cyberattack, we could downgrade the bank before an actual attack .” Safe Systems The Compliance & Technology Partner for Financial Institutions

  9. Cyber Insurance Check for the following coverage: • IT equipment and facilities: Damage to the information assets and technology throughout the institution. • Media reconstruction • Extra expense: The extra costs of continuing operations • E-banking activities • Business interruption • Valuable papers and records: Cost to restore or replace papers and records • Errors and omissions Understand Exclusions and Limitations Safe Systems The Compliance & Technology Partner for Financial Institutions

  10. Regulatory History February 2013 - May 7, 2014 – FDIC President signs presents webinar to Executive Order ~6,500 FI CEO’s and February 6, 2015 – February 1, 2016 – “Improving Critical senior managers. November 10, 2015 – FFIEC Releases June 30, 2015 - FFIEC FDIC Supervisory Infrastructure “ Executive Leadership FFIEC updates Appendix J to BCP Releases Cybersecurity Insights publishes “A Cybersecurity,” and of Cybersecurity: Management Handbook addressing Assessment Tool Framework for Presidential Policy What Today's CEOs Handbook Cyber Resiliance Cybersecurity” Directive “Critical Need to Know About Infrastructure Security the Threats They Don't and Resilience.” See.” Safe Systems The Compliance & Technology Partner for Financial Institutions

  11. Current Threat Environment Malware – Malicious software • Often delivered via email (phishing, spear phishing) generally used to gain access to or to damage a computer or • Examples include Ransomware system. Distributed Denial of Service (DDoS) - Attack attempts to make a machine or network connected • Cannot be prevented to the Internet unavailable to its intended users. • DDoS attacks to distract a target organization while Compound Attacks – More than perpetrating another form of attack. one method of attack is deployed simultaneously. • Simultaneous attacks on the Bank and their core processor. Safe Systems The Compliance & Technology Partner for Financial Institutions

  12. FFIEC Cybersecurity Assessment Tool Inherent Risk Profile  Technologies and Connection Types  Delivery Channels  Online/Mobile Products and Technology Services  Organizational Characteristics  External Threats Safe Systems The Compliance & Technology Partner for Financial Institutions

  13. FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity  Cyber Risk Management and Oversight  Threat Intelligence and Collaboration  Cybersecurity Controls  External Dependency Management  Cyber Incident Management and Resilience Safe Systems The Compliance & Technology Partner for Financial Institutions

  14. Cybersecurity Management & Oversight “The Assessment results should be communicated to the chief executive officer (CEO) and Board.” -FFIEC Safe Systems The Compliance & Technology Partner for Financial Institutions

  15. Cybersecurity Cycle Safe Systems The Compliance & Technology Partner for Financial Institutions

  16. Cyber Controls • Threat Intelligence • Security Awareness Training Employees – Entry level to  Board. Make it role specific. Contractors  Customers  Merchants  Third-parties  • Patch Management Programs Safe Systems The Compliance & Technology Partner for Financial Institutions

  17. Summary - Final Thoughts - Employees are a weak link. Train, test, retrain, retest, repeat. Customers are a weak link. Awareness training, outreach. Outsourced relationships are a weak link. • Due diligence, contracts, & ongoing oversight (SOC reports) are key. • Focus on detective and corrective/responsive controls. Safe Systems The Compliance & Technology Partner for Financial Institutions

  18. Summary - Final Thoughts - Don’t Update and test overemphasize your incident preventive response plan. controls, focus on detective and Don’t forget responsive / third-parties. corrective. Information “Self - sharing is assessments” important, but are increasingly most is just important. noise. • Challenge is converting noise into actionable intelligence. Safe Systems The Compliance & Technology Partner for Financial Institutions

  19. Final Thoughts Cyber risk is a substantial business risk. A bank’s board and senior management must understand the seriousness of the threat environment and create a cybersecurity culture throughout the organization. - FDIC Safe Systems The Compliance & Technology Partner for Financial Institutions

  20. Final Thoughts The effective identification and mitigation of cyber risk must be grounded in a strong governance structure with the full support of the board and senior management. - FDIC Safe Systems The Compliance & Technology Partner for Financial Institutions

  21. Keeping Informed - Additional Resources - • www.safesystems.com/cybersecurity/ • www.complianceguru.com • www.safesystems.com/ECAT/ • FFIEC Cybersecurity Awareness http://ffiec.gov/cybersecurity.htm • FDIC Cyber Challenge: A Community Bank Cyber Exercise https://www.fdic.gov/regulations/resources/directo r/technical/cyber/purpose.html Safe Systems The Compliance & Technology Partner for Financial Institutions

  22. Thomas G. Hinkel CISA, CRISC, CCSA, CRMA, CBCP VP – Compliance Services Safe Systems, Inc. tom.hinkel@safesystems.com www.safesystems.com www.complianceguru.com Safe Systems The Compliance & Technology Partner for Financial Institutions

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend