SlideShare a Scribd company logo
1 of 68
Download to read offline
TRILOGY CONSULTING APRIL 29, 2016
TRILOGY CONSULTING
THIRD PARTY RISK MANAGEMENT
CYBERSECURITY
REGULATORY COMPLIANCE
2
Overall Agenda
Assessment Overview and Results
Cybersecurity Overview
Assessment Results
Research & Analysis
Issues Recommendation Roadmap Recommendations
Recommendations Value of the Solution Takeaways
Third Party Risk Management Cybersecurity Regulatory Compliance
3
Executive Summary
Third Party Risk
Management
Cybersecurity Regulatory Compliance
OCC Gap Analysis Questionnaire
NIST Framework Core
Assessment Questionnaire
FFIEC Control Listing
These are the findings across the three workstreams:
1. Auditing gaps in vendor
contractual agreements
2. Limited maturity in review
depth
3. Undefined roles and
responsibilities
1. Asset management can be
improved
2. Risk mitigation strategy can be
enhanced
3. Awareness and training can be
more robust
1. Operational structure and
accountability system can be
improved
2. Security controls and training
can be updated
3. Documentation and
monitoring system can be
strengthened
4
Value of the Solution to Ernst Bank
Global Presence
8 Million
Consumers
7 Million
Amount of Active Users world-
wide using online mobile
banking
1.5 Billion
Total Amount of Money
in Deposit
TRILOGY CONSULTING APRIL 29, 2016
TRILOGY CONSULTING
THIRD PARTY RISK MANAGEMENT
6
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Agenda
Assessment
Overview and
Results
Issues Recommendations
7
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
OCC 2013-29 Overview and Results
Planning Due Diligence
Contract
Negotiation
Ongoing
Monitoring
Termination
Description
Provides detail
on how the
bank will select,
assess, and
oversee a third
party
Includes a
detailed process
on how to
properly select
a third party
Contains
detailed
documentation
on each party's
rights and
responsibilities
Consists of
comprehensive
assessments of
the third party
to ensure
contract
compliance
Explains how
and why a
contract may be
ended and how
to deal with
shared property
Score Moderate Minor Minor Moderate Minor
8
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
100%
Results
Planning Due Diligence
Contract
Negotiation
Ongoing
Monitoring
Termination
Score Moderate Minor Minor Moderate Minor
55%
19%
7%
19%
69%
15%
16%
75%
8%
11%
6%
44%
37%
19%
9
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Identified Third Party Risk Issues
Issue Recommendation
1. Auditing gaps in vendor
contractual agreements
1. Update contract requirements
2. Limited maturity in review
depth
2. Develop proper ongoing
monitoring for third and
fourth parties
3. Undefined roles and
responsibilities
3.1 Define risk management
committee
3.2 Employee training
10
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Recommendation One
Issue Recommendation
1. Auditing gaps in vendor
contractual agreements
1. Update contract requirements
11
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Contract Requirements
Ernst Bankā€™s right to conduct annual reports for high risk
vendors and offsite reviews for low risk vendors
Ernst Bankā€™s right to monitor the third partyā€™s compliance
The frequency in which the third party will submit control
audits and reports
Ernst Bankā€™s right to an external transfer in the event of
business disruption
Activities that cannot be subcontracted
Procedures for notifying the bank in writing whenever service
disruptions and security breaches pose a risk to Ernst Bank
12
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Recommendation Two
Issue Recommendation
2. Limited depth in reviewing
vendors and their subcontractors
2. Develop proper ongoing
monitoring for third and
fourth parties
13
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Third Party Monitoring Process
Reports to be collected:
1. Service-level agreement
reports
2. Performance reports
3. Audit reports
4. Control testing results
14
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Fourth Party Monitoring Flowchart
Identify all fourth
party providers
Assess what activities
and information are
being subcontracted
Develop a
Non-Disclosure
Agreement
Perform annual
reviews and onsite
reviews with third
party vendor
Assess changes to
fourth party's
financial situation,
insurance coverage,
etc.
Report to
Centralized
Data Repository
Is the fourth
party a high risk
vendor?
Vendor self
assessment
Collect reports
every 2-3 years
Report to
Centralized
Data Repository
Yes
No
15
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Issue Recommendation
3. Undefined Roles and
Responsibilities
3.1 Define risk management
committee
3.2 Employee Training
Recommendation Three
16
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Define Risk Management Committee
A Risk Management Committee
Composed Of:
1. Executive and non-executive directors
2. Lawyers
3. Risk Professionals
4. IT Support Specialists
Purpose:
ā€¢ Review all vendor contracts
ā€¢ Perform all onsite reviews and monitoring
procedures
ā€¢ Monitor Ernst Bankā€™s risk profile
ā€¢ Define risk review activities regarding
decisions such as new acquisitions
ā€¢ Report to the Senior Management
17
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Formal Training Program
ļƒ˜Ensure employees are
adequately trained and
the people in charge
have certification to be
qualified for their roles
Ernst Bank
Certification of
Employees
ā€¢ Certification for
vendor and IT
managers
ā€¢ Defines roles and
responsibilities
of each position
Training
Programs for
Third Parties
ā€¢ Identifies what is
expected of the
third party and
their roles and
responsibilities
ā€¢ Reduce risk of
misconduct by
third parties
18
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Certification of Employees
Third Party Risk
Management
Certification
Programs
Certified Third Party Risk
Professional(CTPRP)
Certified Regulatory
Vendor Program
Manager(CRVPM)
Certified Risk and
Compliance Management
Professional (CRCMP)
ā€¢ Managing the vendor life cycle
ā€¢ Vendor Risk Identification and
Rating
ā€¢ Test and 2 day training course
ā€¢ Be recognized as a professional in
the field
ā€¢ Knowledge required to build,
implement, and manage a 3rd party
oversight program
ā€¢ 6 hour training course
ā€¢ Understand international
standards and principles in IT
risk management
ā€¢ Understanding of the OCC
bulletin
ā€¢ 2,800 slide course and 3 exams
19
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Third Party Training Programs
ā€¢ "[The] DOJ and SEC also assess whether the company has informed third parties of the companyā€™s
compliance program and commitment to ethical and lawful business practices and, where
appropriate, whether it has sought assurances from third parties, through certifications and
otherwise, of reciprocal commitments. These can be meaningful ways to mitigate third-party risk.
(p.60-61)ā€ ā€“SEC
ā€¢ Implementation:
ā€¢ Have clear anti-bribery and third party supply chain statements in your code
of conduct as well as separate policies;
ā€¢ Identify and rank the risks of third parties
ā€¢ Complete appropriate risk based due diligence on the risk level of each third
party before engaging them, and continuously monitor the third parties for
any red flags (optimally using an automated system), and
ā€¢ Ensure that third parties have an effective compliance program in place, and
are aware of and trained on your companyā€™s expectations with respect to
bribery and corruption
TRILOGY CONSULTING APRIL 29, 2016
TRILOGY CONSULTING
CYBERSECURITY
21
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Cyber Security Agenda
Cybersecurity
Overview
Assessment
Results
Recommendation
Roadmap
Value of the
Solution
22
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Importance to Ernst Bank
2020: $170 B
$400 M to
$500 M
Annual Cost of Cyberattacks
1.5 M $14 B
Amount the Federal
Government will spend
on cybersecurity in
2016
Cybersecurity is
growing in size
and importance
Source: New York State Department of Financial Services
Increase in cyber breaches from 2012
Of Phishing Scams are targeted at financial institutions
Of intrusions lead to account takeovers
62%
76%
46%
23
Cybersecurity Overview
Scope
ā€¢ Ernst Bank requires a high-level cybersecurity awareness training program that targets employees at
every level
ā€¢ Create a data flow inventory system to target areas susceptible to cyber threats
ā€¢ Develop a comprehensive asset management system that inventories all systems, software,
applications, and devices used within the bank
Approach
ā€¢ Risk Assessment tool needed to analyze and outline current cyber security infrastructure
ā€¢ Based on assessment results develop a comprehensive plan for firm security
ā€¢ NIST Cyber Security Framework outlines the guidelines and standards needed to implement a well
protected system
Solutions
ā€¢ Cyber security risk assessment questionnaire rooted in the NIST Framework Core
ā€¢ Visual breakdown of Ernst Bankā€™s cyber security risks, along with details on the scoring methodology
ā€¢ Roadmap for improvement created by cyber security experts and tailored to Ernst Bankā€™s specific cyber
security needs
24
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
NIST Framework Core
Functions Purpose
Identify What assets need protection?
Protect What safeguards are available?
Detect What technologies can identify incidents?
Respond
What technologies can contain impacts of
incidents?
Recover What techniques can restore capabilities?
25
Risk Assessment Tool
25
ļƒ˜ Each question is based off a NIST Framework Core control
ļƒ˜ Once all five functions of questions have been filled out, the tool will generate the
results and in depth analysis of Ernst Bank
ļƒ˜ Identify potential weak points in the current infrastructure
26
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Scoring Breakdown
ā€¢ The cyber security protocols, procedures, and
implementations of Ernst Bank go above and beyond industry
standards, with no major improvements necessary
1 (Minor)
ā€¢ There are some areas of the cyber security system
implementation that require updates, but the majority of the
system is up to industry standards
2 (Moderate)
ā€¢ Significant updates in the policies and infrastructure of the
cyber security system are required3 (Major)
ā€¢ Drastic updates in the policies and infrastructure of the cyber
security system are needed urgently; even minor threats may
cause substantial damage to valuable data and assets
4 (Critical)
27
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Breakdown of Functions
ļƒ˜Each question is scored based on
the response given and the weight
assigned to its category
ļƒ˜Overall risk is broken down and
presented function by function
ļƒ˜Functions are given risk ratings of:
Minor, Moderate, Major and Critical
ļƒ˜Risk breakdown graphs show the
level of risk mitigation (taller bars
equate to more secure systems)
28
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Breakdown of Categories
ļƒ˜Each framework function is broken down by category
ļƒ˜Weak categories within each function are identified to help fix vulnerabilities within Ernst
Bankā€™s overall cyber security system
29
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Critical Risk Categories
Control Area Description Current Controls Recommendation
Asset Management The data, personnel, devices, systems,
and facilities that enable the organization
to achieve business purposes are
identified and managed consistent with
their relative importance to business
objectives and the organizationā€™s risk
strategy.
Inventory systems, data flows, and external
systems are not catalogued. This can result in
loosely managed software, misplaced or lost
data, or data exposure to malicious entities.
New device purchases and distributions should be catalogued
and the inventory system continuously updated. This allows
monitoring applications for weak points in the current
hardware and software infrastructure.
Cataloguing all data flows will make data more reachable and
remains within a secure and monitored environment.
Risk Management
Strategy
The organizationā€™s priorities, constraints,
risk tolerances, and assumptions are
established and used to support
operational risk decisions.
The current system does not identify and rank
vulnerabilities based on their potential fallout.
Organizational risk tolerances are not clearly
defined and managed. This can lead to an
unsuitable amount of risk by not
implementing sufficient security measures.
Identify possible risks and consequences of assets being
comprised. Then determine the acceptable risk level and work
to minimize factors that could comprise the acceptable risk
level.
Awareness and
Training
The organizationā€™s personnel and
partners are provided cybersecurity
awareness education and are adequately
trained to perform their information
security-related duties and
responsibilities consistent with related
policies, procedures, and agreements.
Employees are only trained in cyber security
practices when they are hired but are not
subject to continuous training. Like regular
employees, privileged users are not subject to
formal training. Users that have enhanced
access present a higher risk to key
information.
Ernst Bank needs to implement frequent training classes. The
physical hardware and software can only safeguard a network to
a certain degree, the human element is always a risk. Regular
training can help reduce the risk of social hacking. Users that
have access to more pertinent information within the data
hierarchy need to have more advanced and frequent training.
The following categories received a score of critical. Improvements are necessary immediately to bring these categories
up to NIST framework standards.
30
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Major Risk Categories
30
Control Area Description Current Controls Recommendation
Governance The policies, procedures, and processes to manage
and monitor the organizationā€™s regulatory, legal,
risk, environmental, and operational
requirements are understood and inform the
management of cybersecurity risk.
Organizational policies do not always
take cyber security risk into account.
Revise current policies to place a greater emphasis on cyber
security risk. This will help increase awareness and mitigate
risk due to employee error.
Analysis Response to breaches are executed and recovery
activities are conducted.
Notifications from detection systems
are not investigated
The CIO, Senior Manager, and Cyber Security Manager
should receive text and email alerts based on the severity of
notifications. This establishes a clear path of accountability
and responsibility.
Mitigation In the case of a breach, actions are taken to
contain the event, mitigate effects and minimize
repercussions.
Response planning is not updated
based on prior incidents.
To more effectively contain and mitigate incidents, Ernst
bank must update their response plans based on a record of
prior incidents.
Communications Activities are communicated and coordinated
with internal and external parties.
Response plans are not properly
executed in the occurrence of a breach
due to a lack of defined roles and
responsibilities from employees.
A detailed plan outlining employee roles and responsibilities
needs to be created. This will help Ernst Bank employees
properly respond to a breach when it occurs.
The following categories received a score of major risk. In order to bring these categories up to NIST Framework
standards, improvements are necessary.
31
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Quick Win- Coordinate a CSIRT
ā€¢ Mitigate and contain all breaches until the network is deemed safe
ā€¢ Develop policies and procedures for use in case of breach
ā€¢ Establish reporting guidelines for employees and methods for response
planning
ā€¢ Coordinate a communication network between all levels of employees and
other relevant groups.
ā€¢ Clearly define roles and responsibilities for all levels of employees
ā€¢ Assist in creating and maintaining a inventory system for Ernst Bank
Assemble an Computer Security Incident Response team to properly mitigate and
investigate all cyber incidents
32
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Quick Win- Asset Management
User log in
Deposit mobile
check
End-to-end
encryption of
check
Sent to Ernst
Bank server
Check processed
Stored in data
center for record
retention
ļƒ˜ Inventory all software and
hardware in place
ļƒ˜ Develop data flow maps of the
entire Ernst Bank network
ļƒ˜ Identify potential risks in the
systems in place
ļƒ˜Periodically review all systems
to detect obscurities
33
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Quick Win- Routine Employee Training
Send out phishing tests through a randomized selection system to
track effectiveness of employee training
Have privileged users attend upper-level training seminars
Contract an outside firm to provide monthly cyber security training
34
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Implementing Employee Training
Management Training Guidelines
Additional monthly training on data security
and new potential threats
Outline risks associated with higher access
based on standings within company
Evaluate effectiveness of breach reporting
system and how to respond if a breach is
suspected
Employee Training Guidelines
Discuss essential cyber security practices to
implement in the workplace
Conduct monthly training about new
potential phishing scams and attacks
Define policies and guidelines on reporting
possible breaches
35
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Value For Ernst Bank
Ernst Bankā€™s cyber
security system will be
strengthened by
implementing quick
win solutions
Ernst Bank cyber
security will be aligned
with NIST Framework
standards
Ernst Bank employees
will be more aware of
potential cyber security
threats
TRILOGY CONSULTING APRIL 29, 2016
TRILOGY CONSULTING
REGULATORY COMPLIANCE
37
TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016
Project Overview
Research & Analysis Recommendations Takeaways
38
TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016
Regulatory Compliance Timeline
2/1 2/15 2/29 3/14 3/28 4/11 4/25
Construct Project Timeline
Prepare a Control Listing From FFIEC IT Booklets
Draft a Workflow for Regulatory Compliance Department
Establish a Risk Rating Scale & Scoring Methodology
Execute a Gap Analysis & Develop a Mapping Matrix
Define Remaining Questions for Compliance Controls
Develop a Risk Assessment Tool
Send Assessment Tool to Ernst Bank for Completion
Analyze Results From the Risk Assessment Tool
Prepare and Present Final Presentation
39
TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016
Operations
Outsourcing
Information Security
Management
Research
Research & Analysis Recommendations Takeaways
Goal: Develop a regulatory compliance program to proactively identify,
evaluate and manage compliance with regulatory requirements.
Federal Financial
Institution Examination
Council (FFIEC)
ā€¢ Formal US
Government
interagency body
ā€¢ IT Examination
Handbook InfoBase
40
TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016
Analysis
Research & Analysis Recommendations Takeaways
28%
28%
20%
24%
Risk Breakdown
Minor Moderate Major Critical
2.29 2.43
2.75
Quality of Controls Likelihood Impact
Risk by Type
2.20 2.50
1.67
3.00
Information
Security
Outsourcing Operations Management
Risk by FFIEC Category
Ernst Bank has moderate risk
41
TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016
Key Findings from Risk Tool
Current State Recommendations
1. Operational structure and
accountability system can be
improved
1.1 New hierarchy
1.2 New workflow
1.3 Block system
2. Security controls and training
can be updated
2.1 Training program and
notification system
3. Documentation and
monitoring system can be
strengthened
3.1 Centralized data repository
and benchmarking
Research & Analysis Recommendations Takeaways
42
TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016
Recommendation 1.1: Hierarchy
Senior
Management
Team
Leaders
Team
Managers
Analyst
Teams
Management
Legal
Information
Security
Outsourcing
Operations
Team Leaders
ā€¢ 1 Domestic & 1 Foreign leader
Team Managers and Analyst Teams
ā€¢ 1 for each main location of Ernst Bank
Research & Analysis Recommendations Takeaways
Finding 1: Operational structure and accountability system can be improved
43
TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016
Research & Analysis Recommendations Takeaways
Identification
Risk discovery
Analysis
Benchmark
Classification
Block system
Mitigation
Risk resolution
Monitoring
Continuous
evaluation
Achieves optimal operational efficiency and maximum compliance levels
Recommendation 1.2: Workflow
Finding 1: Operational structure and accountability system can be improved
44
TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016
Block
A
ā€¢ Urgent
Block
B
ā€¢ Near-
Immediate
Block
C
ā€¢ Distant
Central
Data
Repository
Research & Analysis Recommendations Takeaways
Recommendation 1.3: Block System
Finding 1: Operational structure and accountability system can be improved
Block B Example:
Central Securities
Depositories (CSD)
Regulation
Block A Example:
Dodd-Frank Title IV
Block C Example:
Potential Regulations
45
TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016
Recommendation 2.1: Training
ā€¢ Security Updates
ā€¢ Online Training Portals
Frequent E-Blasts to
all Employees
ā€¢ Security Awareness Training
ā€¢ Compliance Focus
Awareness and
Procedural Training
ā€¢ New Workflow System
ā€¢ Recommended Hierarchy
Security
Responsibilities
Reorganization
Finding 2: Security controls and training can be updated
Research & Analysis Recommendations Takeaways
46
TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016
Regulations enter central data repository
Create industry benchmarks
Calculate internal metrics
Compare metrics to benchmarks
Research & Analysis Recommendations Takeaways
Finding 3: Documentation and monitoring system can be strengthened
Recommendation 3.1: Data Repository
47
TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016
Implementation Considerations
1. Operational structure and
accountability system can be
improved
1.1 New hierarchy
1.2 New workflow
1.3 Block system
ā€¢ Hiring of additional staff
ā€¢ Training program
2. Security controls and training
can be updated
2.1 Training program and
notification system
ā€¢ Training program
3. Documentation and
monitoring system can be
strengthened
3.1 Centralized data repository
and benchmarking
ā€¢ Virtual and physical data
repository system
ā€¢ Calculating metrics
Findings Recommendations Implementation
Research & Analysis Recommendations Takeaways
48
TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016
Roadmap
Research & Analysis Recommendations Takeaways
People
(2 Months)
Hire analysts underneath
team managers
Management
(1 Month)
Hire team managers at
each data center
Training
(7 Months)
Block system, notification
system and third party
training
Benchmarks
(4 Months)
Metrics are calculated to
measure compliance
Data Repository
(3 Months)
Implement data
repository to store
relevant compliance data
49
TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016
Value of Solutions
Cost savings and
increased revenue
Lower
risk
of
noncompliance
Higher
reputational
excellence
Scalability
Employee
efficiency
Customer
satisfaction
Research & Analysis Recommendations Takeaways
TRILOGY CONSULTING APRIL 29, 2016
TRILOGY CONSULTING
QUESTIONS
TRILOGY CONSULTING APRIL 29, 2016
TRILOGY CONSULTING
THIRD PARTY RISK MANAGEMENT
APPENDIX
52
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Classifying High Risk Vendors
Foreign sub-contractors
Number of 4th parties involved
Critical activities
Volume of financial transaction processed
53
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
A Challenging Landscape
Foreign Corrupt
Practice Act (FCBA)
UK Bribery Act
Gramm-Leach-Bliley Act
12 CFR Part 30 of the OCC
The Bank Service Company Act
OCC Bulletin 2013-29
CFPB Bulletin 2012-03
Notice of Deficiency
The OCC may request a compliance plan
to be submitted under itā€™s ā€œenforceable
guidelinesā€ under the 12 CFR Part 30. If
the bank fails to do so, it may face civil
monetary penalties.
54
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Penalties for Non-Compliance
Situation:
ā€¢ A major bank outsourced
identity protection
products to customers but
violated CFPB and FTC
acts
Situation:
ā€¢ A credit card company
outsourced two vendors
who violated several acts
Result:
ā€¢ $6.15 Million in
Reinstitution
ā€¢ $80 Million in Civil
Penalties
Result:
ā€¢ $144.5 Million in
Reinstitution
ā€¢ $43.7 Million in Civil
Penalties
55
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Third Party Risk Management Program
Structure
Board of Directors
Internal Audit
Governance
Enterprise Risk Committee Bank Management
Legal & Compliance
Risk Management Committee
IT Support Specialist Risk Professionals
Executive & Non-Executive Directors
Business Unit
Third Parties
Subcontractors
Third Line of Defense
Second Line
of Defense
First Line of Defense
56
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Overview of Assessment Tool
Planning
Due diligence
and third-
party selection
Contract
negotiation
Ongoing
monitoring
Termination
Qualitative OCC gap analysis
Assessment tool sections refer to the five stages of
the vendor management life cycle
57
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Employee Certification
ā€¢ Certified Third Party Risk Professional (CTPRP) recognition validates expertise,
provides professional credibility, recognition, and marketability of an individual
ā€¢ Shared Assessment Program, which developed CTPRP, has been setting the
industry standard for targeting vendor risk since 2005. It constantly strives to
streamline the risk assessment process and to develop faster, cost efficient ways
to conduct assessments
ā€¢ CTPRP professionals will demonstrate an understanding of TPRM including:
ā€¢ Managing the vendor life cycle
ā€¢ Vendor Risk identification and rating
ā€¢ Knowledge of the fundamentals of vendor risk assessment, monitoring, and management
ā€¢ Requirements:
ā€¢ Attend the Shared Assessments Program CTPRP Workshop
ā€¢ Successfully pass the Shared Assessments CTPRP Examination
ā€¢ Hold a minimum of five years experience as a risk management professional, in a
position(s) that demonstrates proficiency in assessment, management and remediation of
third party risk issues
58
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Item Member
Non-
Member
Workshop &
Exam
$695 $795
Annual
Maintenance
Fee (Year 1 & 2)
$75 $75
CTPRP
Renewal Fee
(Year 3)
$149 $149
Corporate
Discounts
Discount
Amount
5-25 registrants 10%
26-50 registrants 15%
51+ registrants 20%
Certification Program Pricing
59
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
CTPRP Programs
ā€¢ Amount of Certifications per year ~ 4 vendor managers and 4 IT
managers
ā€¢ Cost of certification ~ $5,724 one time cost
ā€¢ Renewal fees ~
ā€¢ $600 for years 1 and 2
ā€¢ $1,192 for year 3
ā€¢ Cost of third party failure ~ $1.3 million to $35 million
ā€¢ Certified managers will then hold 1 week long training sessions with
employees so they are better involved in the process
ā€¢ Minimal cost because managers will be the ones holding the training
sessions
ā€¢ Value added to all members of the organization
60
TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016
Recommendation
Line of Defense Model can fuel Ernst Bankā€™s performance by:
Reducing gaps in risk coverage
Reducing business confusion in dealing with risk
Reducing layers of redundant controls
Reducing complex and inconstant reporting
TRILOGY CONSULTING APRIL 29, 2016
TRILOGY CONSULTING
CYBERSECURITY
APPENDIX
62
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Sample Question Weighting
63
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Minor Categories
In these categories, Ernst Bank has the foundation of a secure system as defined by the NIST framework.
These categories are of extremely low risk to Ernst Bank and do not require adjustment at this time.
Control Area Description Current Controls Recommendation
Business
Environment
The organizationā€™s goals and objectives are
comprehended to its full potential by the
company. Using these identified goals and
objectives the company is able to identify the
necessary performance measures needed to
mitigate risk.
mission, objectives, stakeholders, and activities
are understood and prioritized; this information is
used to inform cybersecurity roles,
responsibilities, and risk management decisions.
The organizations goals and objectives
are fully comprehended and outlined.
Ernst bank has identified the
performance measures to mitigate risks
and it is clearly understood and
prioritized within the company.
No recommendation is needed at this time.
Maintenance Software and hardware maintenance is properly
preformed as outlined by company policies and
procedures.
Software and hardware maintenance is
performed frequently by Ernst Bank.
No recommendation is needed at this time.
Detection Processes Detection processes and procedures are
maintained and tested to adequately and timely
be aware of anomalous events.
Current detection processes in place
meet NIST framework standards and
are frequently tested and updated.
No recommendation is needed at this time.
64
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Moderate Categories
In these categories, Ernst Bank meets the standard guidelines as defined by the NIST framework. These categories pose an intermediate
level of risk to Ernst Bank and while they may need improvement, the investment to improve these areas is not necessary at this time.
Control Area Description Current Controls Recommendation
Access Control Data access is permitted to authorized
users, processes, transactions and
hardware on the network.
Data access is satisfactorily authorized
amongst users, processes and transactions
on a network.
Currently meets requirements.
Data Security Data is properly managed and protected
in order to maintain privacy, and security
of information
Data is satisfactorily managed and
protected in order to maintain privacy and
security of information
Currently meets requirements.
Security Continuous Monitoring Network is monitored at intervals to
identify potential cyber security threats
and verify that the network is protected.
Network is satisfactorily monitored at
intervals to identify potential cyber security
threats and verify that the network is
protected.
Currently meets requirements.
Recovery Planning Recovery processes in the event of a
breach are in place and incorporate past
breaches
Recovery processes are in place in the event
of a breach. Incorporation of past breaches
as reference is not frequently incorporated
Use of past breaches can help teach Ernst
Bank ways to identify vulnerabilities in its
network and be more prepared in the case of
a repeat event.
Information Protections, Processes, and
Procedures
Policies in place identify roles, and
responsibilities amongst employees and
the procedures in place protect the
network and data assets
Policies in place identify roles and
responsibilities amongst employees.
Employee training on cyber risks in
minimal.
More frequent employee training on cyber
risks is needed.
65
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Roles at Ernst Bank
ļƒ˜CEO will have final approval on any major changes to the cyber security
system. He or she will assess the plan in accordance with all other parts
of the business to determine the resources available to implement the
change.
ļƒ˜CIO will take the idea from the senior manager and work in tandem
with the CCO as well as other officers, such as CFO, to assess the level of
change required in the plan as well as the cost/benefit analysis.
ļƒ˜Senior Managers will utilize the experience of cyber security managers
and third party risk assessment teams to determine the best way to
implement updated policies and infrastructure.
ļƒ˜Cyber Security Managers will work on completing the questionnaire to
to identify potential flaws in the system. They will assist in development
and implementation of the newly designed cyber security system.
66
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Wrongful Activity From Cyber Intrusions
This is a breakdown of the wrongful activity resulting from cyber intrusions within financial institutions.
With this information, Ernst Bank can prepare for the impact of a cyber security breach
Account Takeovers,
46%
Identity Theft, 18%
Telecommunication
Network
Disruptions, 15%
Data Integrity
Breaches, 9%
67
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
IT Intrusions at Financial Institutions
This is a breakdown of the most common IT intrusions affecting financial institutions. With this information, Ernst
Bank can focus their attention on the most common cyber threats in order to protect themselves
Malware, 22%
Phishing, 21%
Pharming, 7%Botnets, 7%
Other, 43%
68
TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016
Monetary Losses from Cyber Threats
0% 20% 40% 60% 80%
Customer Reimbursements
Audit & Consulting Services
Deployment of Detection Software,
Services, & Policies
Loss of Consumer Business
Damage to Brand Reputation

More Related Content

What's hot

Career In Information security
Career In Information securityCareer In Information security
Career In Information securityAnant Shrivastava
Ā 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorOlivier Busolini
Ā 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
Ā 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber securitysajid mehmood
Ā 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdriveaccenture
Ā 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game Rahul Neel Mani
Ā 
Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Andrew Smart
Ā 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Dawn Yankeelov
Ā 
Information Security Committee Presentation Sample
Information Security Committee Presentation SampleInformation Security Committee Presentation Sample
Information Security Committee Presentation Sampleoaes2006
Ā 
Business Continuity Plan PowerPoint Presentation Slides
Business Continuity Plan PowerPoint Presentation Slides Business Continuity Plan PowerPoint Presentation Slides
Business Continuity Plan PowerPoint Presentation Slides SlideTeam
Ā 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixJohn Yeoh
Ā 
What is GRC ā€“ Governance, Risk and Compliance
What is GRC ā€“ Governance, Risk and Compliance What is GRC ā€“ Governance, Risk and Compliance
What is GRC ā€“ Governance, Risk and Compliance BOC Group
Ā 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
Ā 
Information risk management
Information risk managementInformation risk management
Information risk managementAkash Saraswat
Ā 
Governance, risk and compliance framework
Governance, risk and compliance frameworkGovernance, risk and compliance framework
Governance, risk and compliance frameworkCeyeap
Ā 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectEoin Woods
Ā 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System SecurityCSSRL PUNE
Ā 

What's hot (20)

A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
Ā 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
Ā 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
Ā 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Ā 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
Ā 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
Ā 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
Ā 
Risk Culture
Risk CultureRisk Culture
Risk Culture
Ā 
Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite
Ā 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
Ā 
Information Security Committee Presentation Sample
Information Security Committee Presentation SampleInformation Security Committee Presentation Sample
Information Security Committee Presentation Sample
Ā 
Business Continuity Plan PowerPoint Presentation Slides
Business Continuity Plan PowerPoint Presentation Slides Business Continuity Plan PowerPoint Presentation Slides
Business Continuity Plan PowerPoint Presentation Slides
Ā 
develop security policy
develop security policydevelop security policy
develop security policy
Ā 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
Ā 
What is GRC ā€“ Governance, Risk and Compliance
What is GRC ā€“ Governance, Risk and Compliance What is GRC ā€“ Governance, Risk and Compliance
What is GRC ā€“ Governance, Risk and Compliance
Ā 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
Ā 
Information risk management
Information risk managementInformation risk management
Information risk management
Ā 
Governance, risk and compliance framework
Governance, risk and compliance frameworkGovernance, risk and compliance framework
Governance, risk and compliance framework
Ā 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working Architect
Ā 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
Ā 

Similar to Ernst Bank's Third Party and Cybersecurity Assessment

TPRM - POV Presentation Final v2
TPRM - POV Presentation Final v2 TPRM - POV Presentation Final v2
TPRM - POV Presentation Final v2 Jason Mussman
Ā 
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdfQuestions for a Risk Analyst Interview - Get Ready for Success.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdfinfosecTrain
Ā 
š‘š¢š¬š¤ š€š§ššš„š²š¬š­ šˆš§š­šžš«šÆš¢šžš° šš®šžš¬š­š¢šØš§š¬
š‘š¢š¬š¤ š€š§ššš„š²š¬š­ šˆš§š­šžš«šÆš¢šžš° šš®šžš¬š­š¢šØš§š¬š‘š¢š¬š¤ š€š§ššš„š²š¬š­ šˆš§š­šžš«šÆš¢šžš° šš®šžš¬š­š¢šØš§š¬
š‘š¢š¬š¤ š€š§ššš„š²š¬š­ šˆš§š­šžš«šÆš¢šžš° šš®šžš¬š­š¢šØš§š¬priyanshamadhwal2
Ā 
Toward a Trusted Supply Chain White Paper from Microsoft
Toward a Trusted Supply Chain White Paper from MicrosoftToward a Trusted Supply Chain White Paper from Microsoft
Toward a Trusted Supply Chain White Paper from MicrosoftDavid J Rosenthal
Ā 
Isaca crisc-courseware
Isaca crisc-coursewareIsaca crisc-courseware
Isaca crisc-coursewareLaxmi Bank
Ā 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk managementInfosys
Ā 
Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!SQALab
Ā 
Solvency II Offering
Solvency II Offering Solvency II Offering
Solvency II Offering Thinksoft Global
Ā 
Algorithmic auditing 1.0
Algorithmic auditing 1.0Algorithmic auditing 1.0
Algorithmic auditing 1.0QuantUniversity
Ā 
QSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & ChecklistQSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & ChecklistTripwire
Ā 
Key Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management ProgramsKey Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management ProgramsColleen Beck-Domanico
Ā 
entrust-it - Seminar ULG 290416 v1.0
entrust-it - Seminar ULG 290416 v1.0entrust-it - Seminar ULG 290416 v1.0
entrust-it - Seminar ULG 290416 v1.0Geert Janssen
Ā 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsSkoda Minotti
Ā 
Third Party Due Diligence - Know Your Third Party - EY India
Third Party Due Diligence - Know Your Third Party - EY IndiaThird Party Due Diligence - Know Your Third Party - EY India
Third Party Due Diligence - Know Your Third Party - EY IndiaErnst & Young
Ā 
Building Practical Risk Application into your QMS
Building Practical Risk Application into your QMSBuilding Practical Risk Application into your QMS
Building Practical Risk Application into your QMSPECB
Ā 
IRJET - A Study on Identification of Risks at Various Phases of Road Const...
IRJET - 	  A Study on Identification of Risks at Various Phases of Road Const...IRJET - 	  A Study on Identification of Risks at Various Phases of Road Const...
IRJET - A Study on Identification of Risks at Various Phases of Road Const...IRJET Journal
Ā 
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesCorporater
Ā 

Similar to Ernst Bank's Third Party and Cybersecurity Assessment (20)

TPRM - POV Presentation Final v2
TPRM - POV Presentation Final v2 TPRM - POV Presentation Final v2
TPRM - POV Presentation Final v2
Ā 
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdfQuestions for a Risk Analyst Interview - Get Ready for Success.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
Ā 
š‘š¢š¬š¤ š€š§ššš„š²š¬š­ šˆš§š­šžš«šÆš¢šžš° šš®šžš¬š­š¢šØš§š¬
š‘š¢š¬š¤ š€š§ššš„š²š¬š­ šˆš§š­šžš«šÆš¢šžš° šš®šžš¬š­š¢šØš§š¬š‘š¢š¬š¤ š€š§ššš„š²š¬š­ šˆš§š­šžš«šÆš¢šžš° šš®šžš¬š­š¢šØš§š¬
š‘š¢š¬š¤ š€š§ššš„š²š¬š­ šˆš§š­šžš«šÆš¢šžš° šš®šžš¬š­š¢šØš§š¬
Ā 
Toward a Trusted Supply Chain White Paper from Microsoft
Toward a Trusted Supply Chain White Paper from MicrosoftToward a Trusted Supply Chain White Paper from Microsoft
Toward a Trusted Supply Chain White Paper from Microsoft
Ā 
Isaca crisc-courseware
Isaca crisc-coursewareIsaca crisc-courseware
Isaca crisc-courseware
Ā 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk management
Ā 
Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!
Ā 
Solvency II Offering
Solvency II Offering Solvency II Offering
Solvency II Offering
Ā 
Algorithmic auditing 1.0
Algorithmic auditing 1.0Algorithmic auditing 1.0
Algorithmic auditing 1.0
Ā 
QSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & ChecklistQSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & Checklist
Ā 
IASA ey deck presentation
IASA ey deck presentationIASA ey deck presentation
IASA ey deck presentation
Ā 
Key Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management ProgramsKey Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management Programs
Ā 
entrust-it - Seminar ULG 290416 v1.0
entrust-it - Seminar ULG 290416 v1.0entrust-it - Seminar ULG 290416 v1.0
entrust-it - Seminar ULG 290416 v1.0
Ā 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
Ā 
Third Party Due Diligence - Know Your Third Party - EY India
Third Party Due Diligence - Know Your Third Party - EY IndiaThird Party Due Diligence - Know Your Third Party - EY India
Third Party Due Diligence - Know Your Third Party - EY India
Ā 
Building Practical Risk Application into your QMS
Building Practical Risk Application into your QMSBuilding Practical Risk Application into your QMS
Building Practical Risk Application into your QMS
Ā 
IRJET - A Study on Identification of Risks at Various Phases of Road Const...
IRJET - 	  A Study on Identification of Risks at Various Phases of Road Const...IRJET - 	  A Study on Identification of Risks at Various Phases of Road Const...
IRJET - A Study on Identification of Risks at Various Phases of Road Const...
Ā 
Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
Ā 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
Ā 
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Ā 

Recently uploaded

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
Ā 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
Ā 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
Ā 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
Ā 
VIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
Ā 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
Ā 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
Ā 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
Ā 
Russian Faridabad Call Girls(Badarpur) : ā˜Ž 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ā˜Ž 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ā˜Ž 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ā˜Ž 8168257667, @4999Tina Ji
Ā 
BEST āœØ Call Girls In Indirapuram Ghaziabad āœ”ļø 9871031762 āœ”ļø Escorts Service...
BEST āœØ Call Girls In  Indirapuram Ghaziabad  āœ”ļø 9871031762 āœ”ļø Escorts Service...BEST āœØ Call Girls In  Indirapuram Ghaziabad  āœ”ļø 9871031762 āœ”ļø Escorts Service...
BEST āœØ Call Girls In Indirapuram Ghaziabad āœ”ļø 9871031762 āœ”ļø Escorts Service...noida100girls
Ā 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
Ā 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
Ā 
Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
Ā 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
Ā 
Catalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdfCatalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdfOrient Homes
Ā 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
Ā 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
Ā 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
Ā 

Recently uploaded (20)

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
Ā 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
Ā 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
Ā 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
Ā 
VIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130 Available With Room
Ā 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
Ā 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
Ā 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
Ā 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
Ā 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
Ā 
Russian Faridabad Call Girls(Badarpur) : ā˜Ž 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ā˜Ž 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ā˜Ž 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ā˜Ž 8168257667, @4999
Ā 
BEST āœØ Call Girls In Indirapuram Ghaziabad āœ”ļø 9871031762 āœ”ļø Escorts Service...
BEST āœØ Call Girls In  Indirapuram Ghaziabad  āœ”ļø 9871031762 āœ”ļø Escorts Service...BEST āœØ Call Girls In  Indirapuram Ghaziabad  āœ”ļø 9871031762 āœ”ļø Escorts Service...
BEST āœØ Call Girls In Indirapuram Ghaziabad āœ”ļø 9871031762 āœ”ļø Escorts Service...
Ā 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
Ā 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
Ā 
Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Ā 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Ā 
Catalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdfCatalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdf
Ā 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
Ā 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
Ā 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
Ā 

Ernst Bank's Third Party and Cybersecurity Assessment

  • 1. TRILOGY CONSULTING APRIL 29, 2016 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT CYBERSECURITY REGULATORY COMPLIANCE
  • 2. 2 Overall Agenda Assessment Overview and Results Cybersecurity Overview Assessment Results Research & Analysis Issues Recommendation Roadmap Recommendations Recommendations Value of the Solution Takeaways Third Party Risk Management Cybersecurity Regulatory Compliance
  • 3. 3 Executive Summary Third Party Risk Management Cybersecurity Regulatory Compliance OCC Gap Analysis Questionnaire NIST Framework Core Assessment Questionnaire FFIEC Control Listing These are the findings across the three workstreams: 1. Auditing gaps in vendor contractual agreements 2. Limited maturity in review depth 3. Undefined roles and responsibilities 1. Asset management can be improved 2. Risk mitigation strategy can be enhanced 3. Awareness and training can be more robust 1. Operational structure and accountability system can be improved 2. Security controls and training can be updated 3. Documentation and monitoring system can be strengthened
  • 4. 4 Value of the Solution to Ernst Bank Global Presence 8 Million Consumers 7 Million Amount of Active Users world- wide using online mobile banking 1.5 Billion Total Amount of Money in Deposit
  • 5. TRILOGY CONSULTING APRIL 29, 2016 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT
  • 6. 6 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Agenda Assessment Overview and Results Issues Recommendations
  • 7. 7 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 OCC 2013-29 Overview and Results Planning Due Diligence Contract Negotiation Ongoing Monitoring Termination Description Provides detail on how the bank will select, assess, and oversee a third party Includes a detailed process on how to properly select a third party Contains detailed documentation on each party's rights and responsibilities Consists of comprehensive assessments of the third party to ensure contract compliance Explains how and why a contract may be ended and how to deal with shared property Score Moderate Minor Minor Moderate Minor
  • 8. 8 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 100% Results Planning Due Diligence Contract Negotiation Ongoing Monitoring Termination Score Moderate Minor Minor Moderate Minor 55% 19% 7% 19% 69% 15% 16% 75% 8% 11% 6% 44% 37% 19%
  • 9. 9 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Identified Third Party Risk Issues Issue Recommendation 1. Auditing gaps in vendor contractual agreements 1. Update contract requirements 2. Limited maturity in review depth 2. Develop proper ongoing monitoring for third and fourth parties 3. Undefined roles and responsibilities 3.1 Define risk management committee 3.2 Employee training
  • 10. 10 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Recommendation One Issue Recommendation 1. Auditing gaps in vendor contractual agreements 1. Update contract requirements
  • 11. 11 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Contract Requirements Ernst Bankā€™s right to conduct annual reports for high risk vendors and offsite reviews for low risk vendors Ernst Bankā€™s right to monitor the third partyā€™s compliance The frequency in which the third party will submit control audits and reports Ernst Bankā€™s right to an external transfer in the event of business disruption Activities that cannot be subcontracted Procedures for notifying the bank in writing whenever service disruptions and security breaches pose a risk to Ernst Bank
  • 12. 12 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Recommendation Two Issue Recommendation 2. Limited depth in reviewing vendors and their subcontractors 2. Develop proper ongoing monitoring for third and fourth parties
  • 13. 13 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Third Party Monitoring Process Reports to be collected: 1. Service-level agreement reports 2. Performance reports 3. Audit reports 4. Control testing results
  • 14. 14 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Fourth Party Monitoring Flowchart Identify all fourth party providers Assess what activities and information are being subcontracted Develop a Non-Disclosure Agreement Perform annual reviews and onsite reviews with third party vendor Assess changes to fourth party's financial situation, insurance coverage, etc. Report to Centralized Data Repository Is the fourth party a high risk vendor? Vendor self assessment Collect reports every 2-3 years Report to Centralized Data Repository Yes No
  • 15. 15 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Issue Recommendation 3. Undefined Roles and Responsibilities 3.1 Define risk management committee 3.2 Employee Training Recommendation Three
  • 16. 16 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Define Risk Management Committee A Risk Management Committee Composed Of: 1. Executive and non-executive directors 2. Lawyers 3. Risk Professionals 4. IT Support Specialists Purpose: ā€¢ Review all vendor contracts ā€¢ Perform all onsite reviews and monitoring procedures ā€¢ Monitor Ernst Bankā€™s risk profile ā€¢ Define risk review activities regarding decisions such as new acquisitions ā€¢ Report to the Senior Management
  • 17. 17 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Formal Training Program ļƒ˜Ensure employees are adequately trained and the people in charge have certification to be qualified for their roles Ernst Bank Certification of Employees ā€¢ Certification for vendor and IT managers ā€¢ Defines roles and responsibilities of each position Training Programs for Third Parties ā€¢ Identifies what is expected of the third party and their roles and responsibilities ā€¢ Reduce risk of misconduct by third parties
  • 18. 18 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Certification of Employees Third Party Risk Management Certification Programs Certified Third Party Risk Professional(CTPRP) Certified Regulatory Vendor Program Manager(CRVPM) Certified Risk and Compliance Management Professional (CRCMP) ā€¢ Managing the vendor life cycle ā€¢ Vendor Risk Identification and Rating ā€¢ Test and 2 day training course ā€¢ Be recognized as a professional in the field ā€¢ Knowledge required to build, implement, and manage a 3rd party oversight program ā€¢ 6 hour training course ā€¢ Understand international standards and principles in IT risk management ā€¢ Understanding of the OCC bulletin ā€¢ 2,800 slide course and 3 exams
  • 19. 19 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Third Party Training Programs ā€¢ "[The] DOJ and SEC also assess whether the company has informed third parties of the companyā€™s compliance program and commitment to ethical and lawful business practices and, where appropriate, whether it has sought assurances from third parties, through certifications and otherwise, of reciprocal commitments. These can be meaningful ways to mitigate third-party risk. (p.60-61)ā€ ā€“SEC ā€¢ Implementation: ā€¢ Have clear anti-bribery and third party supply chain statements in your code of conduct as well as separate policies; ā€¢ Identify and rank the risks of third parties ā€¢ Complete appropriate risk based due diligence on the risk level of each third party before engaging them, and continuously monitor the third parties for any red flags (optimally using an automated system), and ā€¢ Ensure that third parties have an effective compliance program in place, and are aware of and trained on your companyā€™s expectations with respect to bribery and corruption
  • 20. TRILOGY CONSULTING APRIL 29, 2016 TRILOGY CONSULTING CYBERSECURITY
  • 21. 21 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Cyber Security Agenda Cybersecurity Overview Assessment Results Recommendation Roadmap Value of the Solution
  • 22. 22 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Importance to Ernst Bank 2020: $170 B $400 M to $500 M Annual Cost of Cyberattacks 1.5 M $14 B Amount the Federal Government will spend on cybersecurity in 2016 Cybersecurity is growing in size and importance Source: New York State Department of Financial Services Increase in cyber breaches from 2012 Of Phishing Scams are targeted at financial institutions Of intrusions lead to account takeovers 62% 76% 46%
  • 23. 23 Cybersecurity Overview Scope ā€¢ Ernst Bank requires a high-level cybersecurity awareness training program that targets employees at every level ā€¢ Create a data flow inventory system to target areas susceptible to cyber threats ā€¢ Develop a comprehensive asset management system that inventories all systems, software, applications, and devices used within the bank Approach ā€¢ Risk Assessment tool needed to analyze and outline current cyber security infrastructure ā€¢ Based on assessment results develop a comprehensive plan for firm security ā€¢ NIST Cyber Security Framework outlines the guidelines and standards needed to implement a well protected system Solutions ā€¢ Cyber security risk assessment questionnaire rooted in the NIST Framework Core ā€¢ Visual breakdown of Ernst Bankā€™s cyber security risks, along with details on the scoring methodology ā€¢ Roadmap for improvement created by cyber security experts and tailored to Ernst Bankā€™s specific cyber security needs
  • 24. 24 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 NIST Framework Core Functions Purpose Identify What assets need protection? Protect What safeguards are available? Detect What technologies can identify incidents? Respond What technologies can contain impacts of incidents? Recover What techniques can restore capabilities?
  • 25. 25 Risk Assessment Tool 25 ļƒ˜ Each question is based off a NIST Framework Core control ļƒ˜ Once all five functions of questions have been filled out, the tool will generate the results and in depth analysis of Ernst Bank ļƒ˜ Identify potential weak points in the current infrastructure
  • 26. 26 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Scoring Breakdown ā€¢ The cyber security protocols, procedures, and implementations of Ernst Bank go above and beyond industry standards, with no major improvements necessary 1 (Minor) ā€¢ There are some areas of the cyber security system implementation that require updates, but the majority of the system is up to industry standards 2 (Moderate) ā€¢ Significant updates in the policies and infrastructure of the cyber security system are required3 (Major) ā€¢ Drastic updates in the policies and infrastructure of the cyber security system are needed urgently; even minor threats may cause substantial damage to valuable data and assets 4 (Critical)
  • 27. 27 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Breakdown of Functions ļƒ˜Each question is scored based on the response given and the weight assigned to its category ļƒ˜Overall risk is broken down and presented function by function ļƒ˜Functions are given risk ratings of: Minor, Moderate, Major and Critical ļƒ˜Risk breakdown graphs show the level of risk mitigation (taller bars equate to more secure systems)
  • 28. 28 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Breakdown of Categories ļƒ˜Each framework function is broken down by category ļƒ˜Weak categories within each function are identified to help fix vulnerabilities within Ernst Bankā€™s overall cyber security system
  • 29. 29 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Critical Risk Categories Control Area Description Current Controls Recommendation Asset Management The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to business objectives and the organizationā€™s risk strategy. Inventory systems, data flows, and external systems are not catalogued. This can result in loosely managed software, misplaced or lost data, or data exposure to malicious entities. New device purchases and distributions should be catalogued and the inventory system continuously updated. This allows monitoring applications for weak points in the current hardware and software infrastructure. Cataloguing all data flows will make data more reachable and remains within a secure and monitored environment. Risk Management Strategy The organizationā€™s priorities, constraints, risk tolerances, and assumptions are established and used to support operational risk decisions. The current system does not identify and rank vulnerabilities based on their potential fallout. Organizational risk tolerances are not clearly defined and managed. This can lead to an unsuitable amount of risk by not implementing sufficient security measures. Identify possible risks and consequences of assets being comprised. Then determine the acceptable risk level and work to minimize factors that could comprise the acceptable risk level. Awareness and Training The organizationā€™s personnel and partners are provided cybersecurity awareness education and are adequately trained to perform their information security-related duties and responsibilities consistent with related policies, procedures, and agreements. Employees are only trained in cyber security practices when they are hired but are not subject to continuous training. Like regular employees, privileged users are not subject to formal training. Users that have enhanced access present a higher risk to key information. Ernst Bank needs to implement frequent training classes. The physical hardware and software can only safeguard a network to a certain degree, the human element is always a risk. Regular training can help reduce the risk of social hacking. Users that have access to more pertinent information within the data hierarchy need to have more advanced and frequent training. The following categories received a score of critical. Improvements are necessary immediately to bring these categories up to NIST framework standards.
  • 30. 30 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Major Risk Categories 30 Control Area Description Current Controls Recommendation Governance The policies, procedures, and processes to manage and monitor the organizationā€™s regulatory, legal, risk, environmental, and operational requirements are understood and inform the management of cybersecurity risk. Organizational policies do not always take cyber security risk into account. Revise current policies to place a greater emphasis on cyber security risk. This will help increase awareness and mitigate risk due to employee error. Analysis Response to breaches are executed and recovery activities are conducted. Notifications from detection systems are not investigated The CIO, Senior Manager, and Cyber Security Manager should receive text and email alerts based on the severity of notifications. This establishes a clear path of accountability and responsibility. Mitigation In the case of a breach, actions are taken to contain the event, mitigate effects and minimize repercussions. Response planning is not updated based on prior incidents. To more effectively contain and mitigate incidents, Ernst bank must update their response plans based on a record of prior incidents. Communications Activities are communicated and coordinated with internal and external parties. Response plans are not properly executed in the occurrence of a breach due to a lack of defined roles and responsibilities from employees. A detailed plan outlining employee roles and responsibilities needs to be created. This will help Ernst Bank employees properly respond to a breach when it occurs. The following categories received a score of major risk. In order to bring these categories up to NIST Framework standards, improvements are necessary.
  • 31. 31 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Quick Win- Coordinate a CSIRT ā€¢ Mitigate and contain all breaches until the network is deemed safe ā€¢ Develop policies and procedures for use in case of breach ā€¢ Establish reporting guidelines for employees and methods for response planning ā€¢ Coordinate a communication network between all levels of employees and other relevant groups. ā€¢ Clearly define roles and responsibilities for all levels of employees ā€¢ Assist in creating and maintaining a inventory system for Ernst Bank Assemble an Computer Security Incident Response team to properly mitigate and investigate all cyber incidents
  • 32. 32 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Quick Win- Asset Management User log in Deposit mobile check End-to-end encryption of check Sent to Ernst Bank server Check processed Stored in data center for record retention ļƒ˜ Inventory all software and hardware in place ļƒ˜ Develop data flow maps of the entire Ernst Bank network ļƒ˜ Identify potential risks in the systems in place ļƒ˜Periodically review all systems to detect obscurities
  • 33. 33 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Quick Win- Routine Employee Training Send out phishing tests through a randomized selection system to track effectiveness of employee training Have privileged users attend upper-level training seminars Contract an outside firm to provide monthly cyber security training
  • 34. 34 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Implementing Employee Training Management Training Guidelines Additional monthly training on data security and new potential threats Outline risks associated with higher access based on standings within company Evaluate effectiveness of breach reporting system and how to respond if a breach is suspected Employee Training Guidelines Discuss essential cyber security practices to implement in the workplace Conduct monthly training about new potential phishing scams and attacks Define policies and guidelines on reporting possible breaches
  • 35. 35 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Value For Ernst Bank Ernst Bankā€™s cyber security system will be strengthened by implementing quick win solutions Ernst Bank cyber security will be aligned with NIST Framework standards Ernst Bank employees will be more aware of potential cyber security threats
  • 36. TRILOGY CONSULTING APRIL 29, 2016 TRILOGY CONSULTING REGULATORY COMPLIANCE
  • 37. 37 TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016 Project Overview Research & Analysis Recommendations Takeaways
  • 38. 38 TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016 Regulatory Compliance Timeline 2/1 2/15 2/29 3/14 3/28 4/11 4/25 Construct Project Timeline Prepare a Control Listing From FFIEC IT Booklets Draft a Workflow for Regulatory Compliance Department Establish a Risk Rating Scale & Scoring Methodology Execute a Gap Analysis & Develop a Mapping Matrix Define Remaining Questions for Compliance Controls Develop a Risk Assessment Tool Send Assessment Tool to Ernst Bank for Completion Analyze Results From the Risk Assessment Tool Prepare and Present Final Presentation
  • 39. 39 TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016 Operations Outsourcing Information Security Management Research Research & Analysis Recommendations Takeaways Goal: Develop a regulatory compliance program to proactively identify, evaluate and manage compliance with regulatory requirements. Federal Financial Institution Examination Council (FFIEC) ā€¢ Formal US Government interagency body ā€¢ IT Examination Handbook InfoBase
  • 40. 40 TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016 Analysis Research & Analysis Recommendations Takeaways 28% 28% 20% 24% Risk Breakdown Minor Moderate Major Critical 2.29 2.43 2.75 Quality of Controls Likelihood Impact Risk by Type 2.20 2.50 1.67 3.00 Information Security Outsourcing Operations Management Risk by FFIEC Category Ernst Bank has moderate risk
  • 41. 41 TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016 Key Findings from Risk Tool Current State Recommendations 1. Operational structure and accountability system can be improved 1.1 New hierarchy 1.2 New workflow 1.3 Block system 2. Security controls and training can be updated 2.1 Training program and notification system 3. Documentation and monitoring system can be strengthened 3.1 Centralized data repository and benchmarking Research & Analysis Recommendations Takeaways
  • 42. 42 TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016 Recommendation 1.1: Hierarchy Senior Management Team Leaders Team Managers Analyst Teams Management Legal Information Security Outsourcing Operations Team Leaders ā€¢ 1 Domestic & 1 Foreign leader Team Managers and Analyst Teams ā€¢ 1 for each main location of Ernst Bank Research & Analysis Recommendations Takeaways Finding 1: Operational structure and accountability system can be improved
  • 43. 43 TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016 Research & Analysis Recommendations Takeaways Identification Risk discovery Analysis Benchmark Classification Block system Mitigation Risk resolution Monitoring Continuous evaluation Achieves optimal operational efficiency and maximum compliance levels Recommendation 1.2: Workflow Finding 1: Operational structure and accountability system can be improved
  • 44. 44 TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016 Block A ā€¢ Urgent Block B ā€¢ Near- Immediate Block C ā€¢ Distant Central Data Repository Research & Analysis Recommendations Takeaways Recommendation 1.3: Block System Finding 1: Operational structure and accountability system can be improved Block B Example: Central Securities Depositories (CSD) Regulation Block A Example: Dodd-Frank Title IV Block C Example: Potential Regulations
  • 45. 45 TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016 Recommendation 2.1: Training ā€¢ Security Updates ā€¢ Online Training Portals Frequent E-Blasts to all Employees ā€¢ Security Awareness Training ā€¢ Compliance Focus Awareness and Procedural Training ā€¢ New Workflow System ā€¢ Recommended Hierarchy Security Responsibilities Reorganization Finding 2: Security controls and training can be updated Research & Analysis Recommendations Takeaways
  • 46. 46 TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016 Regulations enter central data repository Create industry benchmarks Calculate internal metrics Compare metrics to benchmarks Research & Analysis Recommendations Takeaways Finding 3: Documentation and monitoring system can be strengthened Recommendation 3.1: Data Repository
  • 47. 47 TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016 Implementation Considerations 1. Operational structure and accountability system can be improved 1.1 New hierarchy 1.2 New workflow 1.3 Block system ā€¢ Hiring of additional staff ā€¢ Training program 2. Security controls and training can be updated 2.1 Training program and notification system ā€¢ Training program 3. Documentation and monitoring system can be strengthened 3.1 Centralized data repository and benchmarking ā€¢ Virtual and physical data repository system ā€¢ Calculating metrics Findings Recommendations Implementation Research & Analysis Recommendations Takeaways
  • 48. 48 TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016 Roadmap Research & Analysis Recommendations Takeaways People (2 Months) Hire analysts underneath team managers Management (1 Month) Hire team managers at each data center Training (7 Months) Block system, notification system and third party training Benchmarks (4 Months) Metrics are calculated to measure compliance Data Repository (3 Months) Implement data repository to store relevant compliance data
  • 49. 49 TRILOGY CONSULTING REGULATORY COMPLIANCE APRIL 29, 2016 Value of Solutions Cost savings and increased revenue Lower risk of noncompliance Higher reputational excellence Scalability Employee efficiency Customer satisfaction Research & Analysis Recommendations Takeaways
  • 50. TRILOGY CONSULTING APRIL 29, 2016 TRILOGY CONSULTING QUESTIONS
  • 51. TRILOGY CONSULTING APRIL 29, 2016 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APPENDIX
  • 52. 52 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Classifying High Risk Vendors Foreign sub-contractors Number of 4th parties involved Critical activities Volume of financial transaction processed
  • 53. 53 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 A Challenging Landscape Foreign Corrupt Practice Act (FCBA) UK Bribery Act Gramm-Leach-Bliley Act 12 CFR Part 30 of the OCC The Bank Service Company Act OCC Bulletin 2013-29 CFPB Bulletin 2012-03 Notice of Deficiency The OCC may request a compliance plan to be submitted under itā€™s ā€œenforceable guidelinesā€ under the 12 CFR Part 30. If the bank fails to do so, it may face civil monetary penalties.
  • 54. 54 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Penalties for Non-Compliance Situation: ā€¢ A major bank outsourced identity protection products to customers but violated CFPB and FTC acts Situation: ā€¢ A credit card company outsourced two vendors who violated several acts Result: ā€¢ $6.15 Million in Reinstitution ā€¢ $80 Million in Civil Penalties Result: ā€¢ $144.5 Million in Reinstitution ā€¢ $43.7 Million in Civil Penalties
  • 55. 55 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Third Party Risk Management Program Structure Board of Directors Internal Audit Governance Enterprise Risk Committee Bank Management Legal & Compliance Risk Management Committee IT Support Specialist Risk Professionals Executive & Non-Executive Directors Business Unit Third Parties Subcontractors Third Line of Defense Second Line of Defense First Line of Defense
  • 56. 56 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Overview of Assessment Tool Planning Due diligence and third- party selection Contract negotiation Ongoing monitoring Termination Qualitative OCC gap analysis Assessment tool sections refer to the five stages of the vendor management life cycle
  • 57. 57 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Employee Certification ā€¢ Certified Third Party Risk Professional (CTPRP) recognition validates expertise, provides professional credibility, recognition, and marketability of an individual ā€¢ Shared Assessment Program, which developed CTPRP, has been setting the industry standard for targeting vendor risk since 2005. It constantly strives to streamline the risk assessment process and to develop faster, cost efficient ways to conduct assessments ā€¢ CTPRP professionals will demonstrate an understanding of TPRM including: ā€¢ Managing the vendor life cycle ā€¢ Vendor Risk identification and rating ā€¢ Knowledge of the fundamentals of vendor risk assessment, monitoring, and management ā€¢ Requirements: ā€¢ Attend the Shared Assessments Program CTPRP Workshop ā€¢ Successfully pass the Shared Assessments CTPRP Examination ā€¢ Hold a minimum of five years experience as a risk management professional, in a position(s) that demonstrates proficiency in assessment, management and remediation of third party risk issues
  • 58. 58 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Item Member Non- Member Workshop & Exam $695 $795 Annual Maintenance Fee (Year 1 & 2) $75 $75 CTPRP Renewal Fee (Year 3) $149 $149 Corporate Discounts Discount Amount 5-25 registrants 10% 26-50 registrants 15% 51+ registrants 20% Certification Program Pricing
  • 59. 59 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 CTPRP Programs ā€¢ Amount of Certifications per year ~ 4 vendor managers and 4 IT managers ā€¢ Cost of certification ~ $5,724 one time cost ā€¢ Renewal fees ~ ā€¢ $600 for years 1 and 2 ā€¢ $1,192 for year 3 ā€¢ Cost of third party failure ~ $1.3 million to $35 million ā€¢ Certified managers will then hold 1 week long training sessions with employees so they are better involved in the process ā€¢ Minimal cost because managers will be the ones holding the training sessions ā€¢ Value added to all members of the organization
  • 60. 60 TRILOGY CONSULTING THIRD PARTY RISK MANAGEMENT APRIL 29, 2016 Recommendation Line of Defense Model can fuel Ernst Bankā€™s performance by: Reducing gaps in risk coverage Reducing business confusion in dealing with risk Reducing layers of redundant controls Reducing complex and inconstant reporting
  • 61. TRILOGY CONSULTING APRIL 29, 2016 TRILOGY CONSULTING CYBERSECURITY APPENDIX
  • 62. 62 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Sample Question Weighting
  • 63. 63 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Minor Categories In these categories, Ernst Bank has the foundation of a secure system as defined by the NIST framework. These categories are of extremely low risk to Ernst Bank and do not require adjustment at this time. Control Area Description Current Controls Recommendation Business Environment The organizationā€™s goals and objectives are comprehended to its full potential by the company. Using these identified goals and objectives the company is able to identify the necessary performance measures needed to mitigate risk. mission, objectives, stakeholders, and activities are understood and prioritized; this information is used to inform cybersecurity roles, responsibilities, and risk management decisions. The organizations goals and objectives are fully comprehended and outlined. Ernst bank has identified the performance measures to mitigate risks and it is clearly understood and prioritized within the company. No recommendation is needed at this time. Maintenance Software and hardware maintenance is properly preformed as outlined by company policies and procedures. Software and hardware maintenance is performed frequently by Ernst Bank. No recommendation is needed at this time. Detection Processes Detection processes and procedures are maintained and tested to adequately and timely be aware of anomalous events. Current detection processes in place meet NIST framework standards and are frequently tested and updated. No recommendation is needed at this time.
  • 64. 64 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Moderate Categories In these categories, Ernst Bank meets the standard guidelines as defined by the NIST framework. These categories pose an intermediate level of risk to Ernst Bank and while they may need improvement, the investment to improve these areas is not necessary at this time. Control Area Description Current Controls Recommendation Access Control Data access is permitted to authorized users, processes, transactions and hardware on the network. Data access is satisfactorily authorized amongst users, processes and transactions on a network. Currently meets requirements. Data Security Data is properly managed and protected in order to maintain privacy, and security of information Data is satisfactorily managed and protected in order to maintain privacy and security of information Currently meets requirements. Security Continuous Monitoring Network is monitored at intervals to identify potential cyber security threats and verify that the network is protected. Network is satisfactorily monitored at intervals to identify potential cyber security threats and verify that the network is protected. Currently meets requirements. Recovery Planning Recovery processes in the event of a breach are in place and incorporate past breaches Recovery processes are in place in the event of a breach. Incorporation of past breaches as reference is not frequently incorporated Use of past breaches can help teach Ernst Bank ways to identify vulnerabilities in its network and be more prepared in the case of a repeat event. Information Protections, Processes, and Procedures Policies in place identify roles, and responsibilities amongst employees and the procedures in place protect the network and data assets Policies in place identify roles and responsibilities amongst employees. Employee training on cyber risks in minimal. More frequent employee training on cyber risks is needed.
  • 65. 65 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Roles at Ernst Bank ļƒ˜CEO will have final approval on any major changes to the cyber security system. He or she will assess the plan in accordance with all other parts of the business to determine the resources available to implement the change. ļƒ˜CIO will take the idea from the senior manager and work in tandem with the CCO as well as other officers, such as CFO, to assess the level of change required in the plan as well as the cost/benefit analysis. ļƒ˜Senior Managers will utilize the experience of cyber security managers and third party risk assessment teams to determine the best way to implement updated policies and infrastructure. ļƒ˜Cyber Security Managers will work on completing the questionnaire to to identify potential flaws in the system. They will assist in development and implementation of the newly designed cyber security system.
  • 66. 66 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Wrongful Activity From Cyber Intrusions This is a breakdown of the wrongful activity resulting from cyber intrusions within financial institutions. With this information, Ernst Bank can prepare for the impact of a cyber security breach Account Takeovers, 46% Identity Theft, 18% Telecommunication Network Disruptions, 15% Data Integrity Breaches, 9%
  • 67. 67 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 IT Intrusions at Financial Institutions This is a breakdown of the most common IT intrusions affecting financial institutions. With this information, Ernst Bank can focus their attention on the most common cyber threats in order to protect themselves Malware, 22% Phishing, 21% Pharming, 7%Botnets, 7% Other, 43%
  • 68. 68 TRILOGY CONSULTING CYBERSECURITY APRIL 29, 2016 Monetary Losses from Cyber Threats 0% 20% 40% 60% 80% Customer Reimbursements Audit & Consulting Services Deployment of Detection Software, Services, & Policies Loss of Consumer Business Damage to Brand Reputation