Cyber Security Assessment Tool Overview FEDERAL DEPOSIT INSURANCE - - PowerPoint PPT Presentation

cyber security assessment tool overview
SMART_READER_LITE
LIVE PREVIEW

Cyber Security Assessment Tool Overview FEDERAL DEPOSIT INSURANCE - - PowerPoint PPT Presentation

Cyber Security Assessment Tool Overview FEDERAL DEPOSIT INSURANCE CORPORATION 1 Objectives Cybersecurity Discuss the Evolution of Data Security Define Cybersecurity Review Threat Environment Discuss Information Security


slide-1
SLIDE 1

FEDERAL DEPOSIT INSURANCE CORPORATION 1

Cyber Security Assessment Tool Overview

slide-2
SLIDE 2

FEDERAL DEPOSIT INSURANCE CORPORATION 2

Objectives

Cybersecurity

  • Discuss the Evolution of Data Security
  • Define Cybersecurity
  • Review Threat Environment
  • Discuss Information Security Program Enhancements for

Cyber Risk

  • Third-Party Management
  • Resilience
  • Incident Response
  • Describe Cybersecurity Assessment Tool
slide-3
SLIDE 3

FEDERAL DEPOSIT INSURANCE CORPORATION 3

Evolution of Data Security

Cybersecurity

slide-4
SLIDE 4

FEDERAL DEPOSIT INSURANCE CORPORATION 4

  • The National Institute of Standards and Technology (NIST)

defines cybersecurity as: “The process of protecting information by preventing, detecting, and responding to attacks.”

  • NIST Framework for Cybersecurity

Identify Detect Respond Protect Recover

Definition

Cybersecurity

slide-5
SLIDE 5

FEDERAL DEPOSIT INSURANCE CORPORATION 5

Appendix B to Part 364

Cybersecurity

  • II. Standards for Information Security
  • Ensure the security and confidentiality of customer

information;

  • Protect against any anticipated threats or hazards to the

security or integrity of such information;

  • Protect against unauthorized access to or use of such

information that could result in substantial harm or inconvenience to any customer; and

  • Ensure the proper disposal of customer information and

consumer information.

slide-6
SLIDE 6

FEDERAL DEPOSIT INSURANCE CORPORATION 6

People and Patches

Cybersecurity

“…a campaign of just ten e-mails yields a greater than 90% chance that at least one person will become the criminal’s prey…” “…11% of recipients of phishing messages click on attachments.”

Source: Verizon 2015 Data Breach Investigations Report

slide-7
SLIDE 7

FEDERAL DEPOSIT INSURANCE CORPORATION 7

People and Patches

Cybersecurity “99.9% of the exploited vulnerabilities had been compromised more than a year after the associated [patch] was published.” “Ten [vulnerabilities] accounted for almost 97% of the exploits

  • bserved in 2014.”

“In 2014, there were 7,945 security vulnerabilities identified. That is 22 new vulnerabilities a day. Nearly one an hour.”

Sources: Verizon 2015 Data Breach Investigations Report NopSec

slide-8
SLIDE 8

FEDERAL DEPOSIT INSURANCE CORPORATION 8

Threat Environment: Vulnerabilities

  • Technological
  • Weakness in hardware, software, network, or system configurations
  • Organizational
  • Lack of awareness of threats/vulnerabilities, incomplete asset

inventories, weaknesses in/over-reliance on third parties

  • Human
  • Exploitation of human behavior such as trust and curiosity
  • Lack of effective security awareness training
  • Physical
  • Theft, tampering, device failure, or introduction of infected media
slide-9
SLIDE 9

FEDERAL DEPOSIT INSURANCE CORPORATION 9

Threat Environment: Actors

Cybersecurity

  • Cyber Criminals - Financially motivated; attacks include account

takeovers, ATM cash-outs, and payment card fraud.

  • Nation Stat

States es - Attempt to gain strategic advantage by stealing trade secrets and engaging in cyber espionage.

  • Hacktivists - Maliciously use information technologies to raise

awareness for specific causes.

  • Insiders - Abuse their position and/or computer authorization for

financial gain or as a response to a personal grievance with the

  • rganization.
slide-10
SLIDE 10

FEDERAL DEPOSIT INSURANCE CORPORATION 10

Threat Environment: Attacks

Cybersecurity

  • Malware/Destructive Malware
  • e.g., Key Loggers, Trojans, Ransomware, Wiper
  • Phishing/Spear Phishing
  • Distributed Denial of Service (DDoS)
  • Compound Attacks
  • e.g., DDoS/Corporate Account Takeover,

Phishing/Trojan

  • The Unknown
slide-11
SLIDE 11

FEDERAL DEPOSIT INSURANCE CORPORATION 11

Threat Environment: Example

Cybersecurity

Execution Installation Email

  • Account Takeover
  • Ransomware
  • Data Theft
  • Data Destruction

Potential Concerns Patches People Detection

slide-12
SLIDE 12

FEDERAL DEPOSIT INSURANCE CORPORATION 12

Governance

Cybersecurity

  • Board and Senior Management Responsibilities and

Duties

  • Ensure strategic planning and budgeting provide sufficient

resources.

  • Provide sufficient authority, resources, and independence for

information security.

  • Ensure policies and procedures address cybersecurity.
  • Incorporate cyber risk into the risk-based audit plan.
  • Provide reporting that assures the Board the ISP is working and

included cybersecurity.

slide-13
SLIDE 13

FEDERAL DEPOSIT INSURANCE CORPORATION 13

Risk Assessment

Cybersecurity

  • Governance and accountability
  • Enterprise-wide asset inventory
  • Multi-disciplinary approach
  • Threat analysis including cyber risks
  • Identify inherent risk, determine controls, quantify

residual risk

  • Assesses changes in technology, operations, and

cyber threat environment

slide-14
SLIDE 14

FEDERAL DEPOSIT INSURANCE CORPORATION 14

Control Structure

Cybersecurity

  • Cyb

Cyber er Hyg Hygien iene

  • Security Awareness Training
  • Patch Management
  • Information Security Staff
  • Access Controls (Privileged Access)
  • Authentication
  • Detection Programs
slide-15
SLIDE 15

FEDERAL DEPOSIT INSURANCE CORPORATION 15

Control Structure

Cybersecurity

  • Security Awareness Training
  • Enterprise-wide
  • Role-specific
  • Customers/Merchants
  • Third Parties
  • Cybersecurity Culture

“Think Before You Click”

slide-16
SLIDE 16

FEDERAL DEPOSIT INSURANCE CORPORATION 16

Control Structure

Cybersecurity

  • Patch Management
  • Formal written policy and procedures
  • Develop system for identifying, prioritizing, applying, and testing patches
  • Create/maintain asset inventories
  • Software (Microsoft and Non-Microsoft)
  • Firmware (routers and firewalls)
  • Integrate threat intelligence
  • Mitigate risk from unsupported operating systems and applications
  • Report to board and senior management
  • BE TIMELY
  • IT Audit and internal reviews should validate
slide-17
SLIDE 17

FEDERAL DEPOSIT INSURANCE CORPORATION 17

Control Structure

Cybersecurity

  • Information Security Staff
  • Evaluate Staffing Adequacy
  • Organizational Chart
  • Independent functions
  • Job Descriptions
  • Certifications
  • e.g., Microsoft Certified Professional, CCNA, CISA, CISSP
  • Annual Training
  • Internal Training
  • External Training: e.g., ISACA, MISTI, Learning Tree, RSA

Conference, NACHA Conference

slide-18
SLIDE 18

FEDERAL DEPOSIT INSURANCE CORPORATION 18

Control Structure

Cybersecurity

  • Access Controls
  • Administered by an independent group
  • Emphasis on review of privileged access
  • Annual or regular, independent review of user access
slide-19
SLIDE 19

FEDERAL DEPOSIT INSURANCE CORPORATION 19

Control Structure

Cybersecurity

  • FFIEC Supplement to Authentication in an

Internet Banking Environment

  • Annual Risk Assessments
  • Layered Security
  • Anomaly Detection (Retail/Business Accounts)

– Initial Login/Authentication and Funds Transfers

  • Administrative Controls (Business Accounts)
  • Customer Awareness and Education

FIL-50-2011

slide-20
SLIDE 20

FEDERAL DEPOSIT INSURANCE CORPORATION 20

Control Structure

Cybersecurity

  • Detection Programs
  • Anti-virus Software/Malware Detection
  • Intrusion Detection/Intrusion Prevention
  • Activity Logging
  • Systems
  • Frequency/Content/Retention
  • Review/Automation
  • Reporting
slide-21
SLIDE 21

FEDERAL DEPOSIT INSURANCE CORPORATION 21

Disaster Recovery/Business Continuity Planning

Cybersecurity

  • Ensure cyber threats are added to business impact analysis

(BIA)

  • Include probability and impact to critical applications and

systems identified in BIA

  • Ensure cyber threats identified in BIA are incorporated in

recovery plans

  • Include cyber scenarios in business continuity tests
slide-22
SLIDE 22

FEDERAL DEPOSIT INSURANCE CORPORATION 22

Program Charter/Policy Committee Universe (Scope)

  • Risk Assessment
  • Cybersecurity

Plan/Budget Reporting Findings/Tracking

Audit

Cybersecurity

Types General Controls GLBA Vulnerability Assessment Penetration Test ACH/Wires Social Engineering

slide-23
SLIDE 23

FEDERAL DEPOSIT INSURANCE CORPORATION 23

  • FFIEC Guidance: “Cybersecurity Threat and Vulnerability Monitoring

and Sharing Statement,” dated November 3, 2014

  • “Financial institution management is expected to monitor and maintain

sufficient awareness of cybersecurity threats and vulnerability information so they may evaluate risk and respond accordingly.”

  • Participation in Financial Services Information Sharing and Analysis

Center (FS-ISAC) is encouraged.

  • FFIEC Business Continuity Planning Handbook, Appendix J released
  • n February 6, 2015 – Strengthening the Resilience of Outsourced

Technology Services

Information Security Program: Refocused

slide-24
SLIDE 24

FEDERAL DEPOSIT INSURANCE CORPORATION 24

Third-Party Management

Cybersecurity

Core Transactional Internet Banking Mobile Banking Managed Network Security

slide-25
SLIDE 25

FEDERAL DEPOSIT INSURANCE CORPORATION 25

Appendix J: Third-Party Management

Cybersecurity

  • Relationship Management
  • Due Diligence
  • Contracts
  • Ongoing Monitoring
  • Resiliency and Testing
  • Mission Critical Services
  • Capacity
  • Service Provider Continuity Scenarios
  • Evaluate/Understand Gaps
  • Service Provider Alternatives
slide-26
SLIDE 26

FEDERAL DEPOSIT INSURANCE CORPORATION 26

Appendix J: Resilience

Cybersecurity

  • Incorporate the following risks/controls into business continuity plans:
  • Data backup architecture and technology
  • Data integrity controls
  • Independent, secondary communication providers
  • Layered security strategies
  • Enhanced planning for the possibility of simultaneous attacks
  • Increased awareness of insider threats
  • Prearranged third-party forensic and incident management services
slide-27
SLIDE 27

FEDERAL DEPOSIT INSURANCE CORPORATION 27

Appendix J: Incident Response

Cybersecurity

  • Enhance and test incident response plans to incorporate potential

cyber threats

  • Integrate service providers into incident response planning
  • FFIEC Guidance: “Final Guidance on Response Programs for

Unauthorized Access to Customer Information and Customer Notice,” dated April 1, 2005

  • Assess nature/scope and contain/control the incident
  • Notify primary federal regulator
  • File Suspicious Activity Report (SARs) and notify law enforcement
  • Notify customers if there is a reasonable likelihood the information will be

misused

slide-28
SLIDE 28

FEDERAL DEPOSIT INSURANCE CORPORATION 28

FFIEC Cybersecurity Assessment Tool

  • FFIEC Press Release: Cybersecurity Assessment Tool, dated

June 30, 2015

  • Voluntary tool to assist banks in identifying their risk profile and

assessing their cybersecurity preparedness

  • Provides banks with a repeatable and measurable process to

inform management of their institution’s risks and cybersecurity preparedness over time

slide-29
SLIDE 29

FEDERAL DEPOSIT INSURANCE CORPORATION 29

FFIEC Cybersecurity Assessment Tool

  • Inherent Risk Profile
  • Technologies and Connection Types
  • Delivery Channels
  • Online/Mobile Products and Technology Services
  • Institution Characteristics
  • External Threats
slide-30
SLIDE 30

FEDERAL DEPOSIT INSURANCE CORPORATION 30

FFIEC Cybersecurity Assessment Tool

  • Risk Levels:
  • Least
  • Minimal
  • Moderate
  • Significant
  • Most
slide-31
SLIDE 31

FEDERAL DEPOSIT INSURANCE CORPORATION 31

FFIEC Cybersecurity Assessment Tool

  • Cybersecurity Maturity
  • Cyber Risk Management and Oversight
  • Threat Intelligence and Collaboration
  • Cybersecurity Controls
  • External Dependency Management
  • Cyber Incident Management and Response
slide-32
SLIDE 32

FEDERAL DEPOSIT INSURANCE CORPORATION 32

FFIEC Cybersecurity Assessment Tool

  • Maturity Levels:
  • Baseline
  • Evolving
  • Intermediate
  • Advanced
  • Innovative
slide-33
SLIDE 33

FEDERAL DEPOSIT INSURANCE CORPORATION 33

Cybersecurity

  • FFIEC IT Handbooks are being updated for

cybersecurity – there will NOT be a separate cybersecurity handbook, which is in keeping with the regulatory viewpoint that the baseline standards are already integrated throughout existing guidance.

slide-34
SLIDE 34

FEDERAL DEPOSIT INSURANCE CORPORATION 34

Cybersecurity

  • Supervisory Insights (Winter 2015)
  • “A Framework for Cybersecurity”
  • Discusses how components of an information security program

should be enhanced to address cybersecurity risks

  • Includes an extensive list of available regulatory resources to assist

financial institutions

slide-35
SLIDE 35

FEDERAL DEPOSIT INSURANCE CORPORATION 35

Cybersecurity Resources

  • Technical Assistance Videos
  • Cybersecurity Awareness
  • Corporate Governance
  • Information Technology
  • Vendor Management
  • Cyber Challenge Simulation Exercises
  • FFIEC Cybersecurity Assessment Tool
  • FFIEC Webinars
  • Executive Leadership of Cybersecurity (5/7/14 – available on YouTube)
slide-36
SLIDE 36

InTREx

Information Technology Risk Examination

slide-37
SLIDE 37

FEDERAL DEPOSIT INSURANCE CORPORATION 37

Workprogram

Core Modules

Audit Management

  • Risk Assessment
  • Vendor Management

(Ongoing)

  • Information Security

Standards (GLBA)

  • ID Theft Red Flags

Development and Acquisition

  • Vendor Management

(Acquisition)

Support and Delivery

  • BCP
  • Information Security
  • Operations
  • Incident Response
  • Network Security

(IDS, Firewall)

  • EFT/E-Banking

Cybersecurity

slide-38
SLIDE 38

FEDERAL DEPOSIT INSURANCE CORPORATION 38

Framework

  • Based on URSIT components
  • Uniform Rating System for Information Technology (URSIT)
  • ED Module concept used for each component
  • ED Module core decision factors were derived from

URSIT assessment factors

slide-39
SLIDE 39

FEDERAL DEPOSIT INSURANCE CORPORATION 39

Features

  • Incorporates baseline cybersecurity into procedures
  • Requires conclusion on cybersecurity preparedness
  • Requires conclusion on GLBA Information Security

Standards (Part 364 Appendix B)

  • Enhances focus on transaction/control testing
  • Allows for tracking of deficiencies noted in any

decision factor

slide-40
SLIDE 40

FEDERAL DEPOSIT INSURANCE CORPORATION 40

Questions?