SlideShare a Scribd company logo
1 of 18
11 CRITICAL AREAS OF

CYBERSECURITY FOCUS FOR
FINANCIAL INSTITUTIONS
I N T E L L I S E C P A R T N E R S P R E S E N T :
C Y B E R S E C U R I T Y R O U N D TA B L E / F E B 2 0 1 5
A G E N D A
• Cybersecurity Role in Risk
Management
• New Regulatory Guidance
• 11 Areas of Focus
• Next Steps
N Y S D E PA R T M E N T O F F I N A N C I A L S E R V I C E S :
“ T H E D E PA R T M E N T E N C O U R A G E S A L L I N S T I T U T I O N S T O
V I E W C Y B E R S E C U R I T Y A S A N I N T E G R A L A S P E C T O F T H E I R
O V E R A L L R I S K M A N A G E M E N T S T R AT E G Y, R AT H E R T H A N
S O L E LY A S A S U B S E T O F I N F O R M AT I O N T E C H N O L O G Y. ”
N E W F O C U S
• Frequency and sophistication
of cyberattacks continue to
grow
• Increased focus on
cybersecurity by Federal and
State regulators
• Cybersecurity should be a
top-of-mind strategic concern
• Potential ramifications too
serious to ignore
1 1 C R I T I C A L A R E A S O F
C Y B E R S E C U R I T Y F O C U S
1 . C O R P O R AT E G O V E R N A N C E
Tone At The Top Matters
Cybersecurity No Exception
Cybersecurity Not Just An IT Issue
2 . M A N A G E M E N T O F C Y B E R S E C U R I T Y
I S S U E S
Interaction Between Information Security & Core
Business Functions
Written Information Security Policies & Procedures
Periodic Re-Evaluation
3 . S E C U R I T Y & R I S K M A N A G E M E N T
R E S O U R C E S
The Right People
The Right Processes
The Right Technology
4 . S H A R E D I N F R A S T R U C T U R E R I S K S
Think “Least Privilege”
Segregate Critical Data
Focused Due Diligence
5 . I N T R U S I O N P R O T E C T I O N
Multi-Factor Authentication
Server & Database Configurations
Focus On Critical Data, Not Transaction Type
6 . S E C U R I T Y T E S T I N G & M O N I T O R I N G
Penetration Testing
Annual Tests May Not Longer Be Sufficient
Focus On Critical Data
7 . I N C I D E N T D E T E C T I O N A N D
R E S P O N S E
Sufficient Monitoring
Detection Of Attacks
Speed Of Response
8 . O N G O I N G T R A I N I N G
Cybersecurity Training
For All Staff
Specialized Training
9 . M A N A G E M E N T O F T H I R D - PA RT Y
S E RV I C E P R O V I D E R S
Extended Cybersecurity Boundaries
Identify Risks & Controls
Confirm “Chain Of Trust”
1 0 . B U S I N E S S C O N T I N U I T Y A N D
D I S A S T E R R E C O V E RY
Integrate With Cybersecurity
Policies & Procedures
Testing & Verification
1 1 . C Y B E R S E C U R I T Y I N S U R A N C E
Part Of Risk Control Strategy
Note Exclusions
Evaluate Periodically
N E X T S T E P S
• List not exhaustive
• Your cyber threat profile is
unique
• Thorough and proactive
evaluation of cyber risks
necessary
W E C A N H E L P
INTELLISECPARTNERS.COM
602.341.3435

More Related Content

What's hot

Small Investments, Big Returns: Three Successful Data Science Use Cases
Small Investments, Big Returns: Three Successful Data Science Use CasesSmall Investments, Big Returns: Three Successful Data Science Use Cases
Small Investments, Big Returns: Three Successful Data Science Use CasesSense Corp
 
Project Scheduling & Tracking
Project Scheduling & TrackingProject Scheduling & Tracking
Project Scheduling & TrackingFahim Tuhin
 
ROI of Content Marketing - GDMS Conference
ROI of Content Marketing - GDMS ConferenceROI of Content Marketing - GDMS Conference
ROI of Content Marketing - GDMS ConferenceAshley Segura
 
Agentless Patch Management for the Data Center
Agentless Patch Management for the Data CenterAgentless Patch Management for the Data Center
Agentless Patch Management for the Data CenterIvanti
 
Predictive Analytics - Get Skilled or Die Trying
Predictive Analytics - Get Skilled or Die TryingPredictive Analytics - Get Skilled or Die Trying
Predictive Analytics - Get Skilled or Die TryingKienco
 
Gabe Tartaglia - Engaging in a Connected World With the Power of Audio
Gabe Tartaglia	 - Engaging in a Connected World With the Power of AudioGabe Tartaglia	 - Engaging in a Connected World With the Power of Audio
Gabe Tartaglia - Engaging in a Connected World With the Power of AudioJulia Grosman
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire
 
Reimagining Retail by @JohnBatistich
Reimagining Retail by @JohnBatistichReimagining Retail by @JohnBatistich
Reimagining Retail by @JohnBatistichjbatistich
 
SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...
SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...
SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...Distilled
 
Drones - What's next?
Drones - What's next?Drones - What's next?
Drones - What's next?Speck&Tech
 
An introduction to Digital Marketing
An introduction to Digital MarketingAn introduction to Digital Marketing
An introduction to Digital MarketingShi Yunn Chua
 
Vertical Measures Webinar: Is There Any ROI in Content Marketing?
Vertical Measures Webinar: Is There Any ROI in Content Marketing?Vertical Measures Webinar: Is There Any ROI in Content Marketing?
Vertical Measures Webinar: Is There Any ROI in Content Marketing?Ashley Segura
 
Content Marketing ROI
Content Marketing ROI Content Marketing ROI
Content Marketing ROI Stukent Inc.
 
Gain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS Summit
Gain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS SummitGain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS Summit
Gain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS SummitAmazon Web Services
 
9 Top Bug Bounty Programs
9 Top Bug Bounty Programs9 Top Bug Bounty Programs
9 Top Bug Bounty ProgramsHackerOne
 

What's hot (19)

Small Investments, Big Returns: Three Successful Data Science Use Cases
Small Investments, Big Returns: Three Successful Data Science Use CasesSmall Investments, Big Returns: Three Successful Data Science Use Cases
Small Investments, Big Returns: Three Successful Data Science Use Cases
 
Project Scheduling & Tracking
Project Scheduling & TrackingProject Scheduling & Tracking
Project Scheduling & Tracking
 
Survey Says! 2017 Shrink Data Results
Survey Says! 2017 Shrink Data ResultsSurvey Says! 2017 Shrink Data Results
Survey Says! 2017 Shrink Data Results
 
ROI of Content Marketing - GDMS Conference
ROI of Content Marketing - GDMS ConferenceROI of Content Marketing - GDMS Conference
ROI of Content Marketing - GDMS Conference
 
Agentless Patch Management for the Data Center
Agentless Patch Management for the Data CenterAgentless Patch Management for the Data Center
Agentless Patch Management for the Data Center
 
Predictive Analytics - Get Skilled or Die Trying
Predictive Analytics - Get Skilled or Die TryingPredictive Analytics - Get Skilled or Die Trying
Predictive Analytics - Get Skilled or Die Trying
 
Gabe Tartaglia - Engaging in a Connected World With the Power of Audio
Gabe Tartaglia	 - Engaging in a Connected World With the Power of AudioGabe Tartaglia	 - Engaging in a Connected World With the Power of Audio
Gabe Tartaglia - Engaging in a Connected World With the Power of Audio
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
How to Use Video to Drive Leads
How to Use Video to Drive LeadsHow to Use Video to Drive Leads
How to Use Video to Drive Leads
 
DSA Presentation 3
DSA Presentation 3DSA Presentation 3
DSA Presentation 3
 
Reimagining Retail by @JohnBatistich
Reimagining Retail by @JohnBatistichReimagining Retail by @JohnBatistich
Reimagining Retail by @JohnBatistich
 
SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...
SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...
SearchLove San Diego 2018 | Ashley Ward | Reuse, Recycle: How to Repurpose Yo...
 
Drones - What's next?
Drones - What's next?Drones - What's next?
Drones - What's next?
 
An introduction to Digital Marketing
An introduction to Digital MarketingAn introduction to Digital Marketing
An introduction to Digital Marketing
 
Being human - TEDxNUS - Jose Sepulveda
Being human  - TEDxNUS - Jose Sepulveda Being human  - TEDxNUS - Jose Sepulveda
Being human - TEDxNUS - Jose Sepulveda
 
Vertical Measures Webinar: Is There Any ROI in Content Marketing?
Vertical Measures Webinar: Is There Any ROI in Content Marketing?Vertical Measures Webinar: Is There Any ROI in Content Marketing?
Vertical Measures Webinar: Is There Any ROI in Content Marketing?
 
Content Marketing ROI
Content Marketing ROI Content Marketing ROI
Content Marketing ROI
 
Gain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS Summit
Gain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS SummitGain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS Summit
Gain Maximum Visibility into Your Applications - DEM04 - Atlanta AWS Summit
 
9 Top Bug Bounty Programs
9 Top Bug Bounty Programs9 Top Bug Bounty Programs
9 Top Bug Bounty Programs
 

Similar to 11 Critical Areas of Cybersecurity Focus for Financial Institutions

Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...
Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...
Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...Lucidworks
 
[Webinar] Intelligent insight Driven Policing Webinar Presentation
[Webinar] Intelligent insight Driven Policing Webinar Presentation [Webinar] Intelligent insight Driven Policing Webinar Presentation
[Webinar] Intelligent insight Driven Policing Webinar Presentation MC+A
 
[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...
[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...
[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...Lucidworks
 
Winning the Cybersecurity Battle
Winning the Cybersecurity BattleWinning the Cybersecurity Battle
Winning the Cybersecurity BattleGovLoop
 
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...CTEKMarketing
 
MIC A Practical Approach
MIC A Practical ApproachMIC A Practical Approach
MIC A Practical ApproachAustin Skidmore
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseSophiaPalmira1
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampSophia Price
 
GRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - London
GRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - LondonGRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - London
GRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - LondonGRESB
 
CTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party Risk
CTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party RiskCTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party Risk
CTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party RiskCTEKMarketing
 
Final Project DescriptionThe goal of this assignment is again t
Final Project DescriptionThe goal of this assignment is again tFinal Project DescriptionThe goal of this assignment is again t
Final Project DescriptionThe goal of this assignment is again tChereCheek752
 
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...RootedCON
 
Why Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondWhy Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondLucidworks
 
e-Kasih, National Databank on Poverty, Malaysia
e-Kasih, National Databank on Poverty, Malaysiae-Kasih, National Databank on Poverty, Malaysia
e-Kasih, National Databank on Poverty, MalaysiaUNDP India
 
Predictive Security in the 3rd Platform Era
Predictive Security in the 3rd Platform EraPredictive Security in the 3rd Platform Era
Predictive Security in the 3rd Platform EraIDC Italy
 
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...FortuneCMO, LLC
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)PwC France
 
Presentation on BIKON - International BI conference
Presentation on BIKON - International BI conferencePresentation on BIKON - International BI conference
Presentation on BIKON - International BI conferenceKunal Bhattacharya
 
Best Practices in Global Risk Management
Best Practices in Global Risk Management Best Practices in Global Risk Management
Best Practices in Global Risk Management Dun & Bradstreet
 

Similar to 11 Critical Areas of Cybersecurity Focus for Financial Institutions (20)

Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...
Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...
Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...
 
[Webinar] Intelligent insight Driven Policing Webinar Presentation
[Webinar] Intelligent insight Driven Policing Webinar Presentation [Webinar] Intelligent insight Driven Policing Webinar Presentation
[Webinar] Intelligent insight Driven Policing Webinar Presentation
 
[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...
[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...
[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...
 
Winning the Cybersecurity Battle
Winning the Cybersecurity BattleWinning the Cybersecurity Battle
Winning the Cybersecurity Battle
 
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
 
MIC A Practical Approach
MIC A Practical ApproachMIC A Practical Approach
MIC A Practical Approach
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSense
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware Bootcamp
 
GRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - London
GRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - LondonGRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - London
GRESB slides - 2018 GRESB | Siemens Sustainable Real Assets Conference - London
 
CTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party Risk
CTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party RiskCTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party Risk
CTEK Summer Series Session 7: Actionable Tactics to Rethink Third-Party Risk
 
Final Project DescriptionThe goal of this assignment is again t
Final Project DescriptionThe goal of this assignment is again tFinal Project DescriptionThe goal of this assignment is again t
Final Project DescriptionThe goal of this assignment is again t
 
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
 
Advertising Analytics 2.0
Advertising Analytics 2.0Advertising Analytics 2.0
Advertising Analytics 2.0
 
Why Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondWhy Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and Beyond
 
e-Kasih, National Databank on Poverty, Malaysia
e-Kasih, National Databank on Poverty, Malaysiae-Kasih, National Databank on Poverty, Malaysia
e-Kasih, National Databank on Poverty, Malaysia
 
Predictive Security in the 3rd Platform Era
Predictive Security in the 3rd Platform EraPredictive Security in the 3rd Platform Era
Predictive Security in the 3rd Platform Era
 
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
SXSW Interactive 2018 Holly Rollo CMO RSA 'WHAT EVERY MARKETER MUST KNOW ABOU...
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)
 
Presentation on BIKON - International BI conference
Presentation on BIKON - International BI conferencePresentation on BIKON - International BI conference
Presentation on BIKON - International BI conference
 
Best Practices in Global Risk Management
Best Practices in Global Risk Management Best Practices in Global Risk Management
Best Practices in Global Risk Management
 

Recently uploaded

Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiMalviyaNagarCallGirl
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 

Recently uploaded (20)

Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 

11 Critical Areas of Cybersecurity Focus for Financial Institutions

  • 1. 11 CRITICAL AREAS OF
 CYBERSECURITY FOCUS FOR FINANCIAL INSTITUTIONS I N T E L L I S E C P A R T N E R S P R E S E N T : C Y B E R S E C U R I T Y R O U N D TA B L E / F E B 2 0 1 5
  • 2. A G E N D A • Cybersecurity Role in Risk Management • New Regulatory Guidance • 11 Areas of Focus • Next Steps
  • 3. N Y S D E PA R T M E N T O F F I N A N C I A L S E R V I C E S : “ T H E D E PA R T M E N T E N C O U R A G E S A L L I N S T I T U T I O N S T O V I E W C Y B E R S E C U R I T Y A S A N I N T E G R A L A S P E C T O F T H E I R O V E R A L L R I S K M A N A G E M E N T S T R AT E G Y, R AT H E R T H A N S O L E LY A S A S U B S E T O F I N F O R M AT I O N T E C H N O L O G Y. ”
  • 4. N E W F O C U S • Frequency and sophistication of cyberattacks continue to grow • Increased focus on cybersecurity by Federal and State regulators • Cybersecurity should be a top-of-mind strategic concern • Potential ramifications too serious to ignore
  • 5. 1 1 C R I T I C A L A R E A S O F C Y B E R S E C U R I T Y F O C U S
  • 6. 1 . C O R P O R AT E G O V E R N A N C E Tone At The Top Matters Cybersecurity No Exception Cybersecurity Not Just An IT Issue
  • 7. 2 . M A N A G E M E N T O F C Y B E R S E C U R I T Y I S S U E S Interaction Between Information Security & Core Business Functions Written Information Security Policies & Procedures Periodic Re-Evaluation
  • 8. 3 . S E C U R I T Y & R I S K M A N A G E M E N T R E S O U R C E S The Right People The Right Processes The Right Technology
  • 9. 4 . S H A R E D I N F R A S T R U C T U R E R I S K S Think “Least Privilege” Segregate Critical Data Focused Due Diligence
  • 10. 5 . I N T R U S I O N P R O T E C T I O N Multi-Factor Authentication Server & Database Configurations Focus On Critical Data, Not Transaction Type
  • 11. 6 . S E C U R I T Y T E S T I N G & M O N I T O R I N G Penetration Testing Annual Tests May Not Longer Be Sufficient Focus On Critical Data
  • 12. 7 . I N C I D E N T D E T E C T I O N A N D R E S P O N S E Sufficient Monitoring Detection Of Attacks Speed Of Response
  • 13. 8 . O N G O I N G T R A I N I N G Cybersecurity Training For All Staff Specialized Training
  • 14. 9 . M A N A G E M E N T O F T H I R D - PA RT Y S E RV I C E P R O V I D E R S Extended Cybersecurity Boundaries Identify Risks & Controls Confirm “Chain Of Trust”
  • 15. 1 0 . B U S I N E S S C O N T I N U I T Y A N D D I S A S T E R R E C O V E RY Integrate With Cybersecurity Policies & Procedures Testing & Verification
  • 16. 1 1 . C Y B E R S E C U R I T Y I N S U R A N C E Part Of Risk Control Strategy Note Exclusions Evaluate Periodically
  • 17. N E X T S T E P S • List not exhaustive • Your cyber threat profile is unique • Thorough and proactive evaluation of cyber risks necessary
  • 18. W E C A N H E L P INTELLISECPARTNERS.COM 602.341.3435